Showing 2,861 - 2,880 results of 5,694 for search '"internet"', query time: 0.07s Refine Results
  1. 2861

    The Moderating Influence of Project Scope on Leadership Skills, Stakeholder Management, and Execution of Fibre Optic Infrastructure by James Konya Akhwaba

    Published 2020-01-01
    “…Telecommunication and Internet service enterprise has drastically evolved in the last 10 years across the globe. …”
    Get full text
    Article
  2. 2862

    The Influence of Physical Tuning Technology on Voice Over LTE (VoLTE) by zurnawita zurnawita, Dikky Chandra, fajru ju zulya

    Published 2024-09-01
    “…Currently, LTE technology is only used for faster internet data activities. Unfortunately, phone calls still rely on second-generation (2G) or third-generation (3G) networks. …”
    Get full text
    Article
  3. 2863
  4. 2864

    „Nowe” problemy wychowawcze w dobie „nowych” mediów by Arkadiusz Olczyk

    Published 2012-12-01
    “…For many of them the Internet became an addiction which already requires treatment and therapy. …”
    Get full text
    Article
  5. 2865

    Network traffic control using traffic shaping techniques by Radojičić Valentina D.Ž., Marković Goran Z., Mitrović Slobodan D.

    Published 2024-01-01
    “…In this way, the operational characteristics of certain business systems as well as the quality of residential internet/iptv services could be compromised. One of the standard approaches to solving such a kind of problems is related to the concept of traffic management that includes 1) Traffic Policing techniques, as well as 2) Traffic Shaping techniques. …”
    Get full text
    Article
  6. 2866

    PROFILES AND PREFERENCES OF ON-LINE MILLENIAL SHOPPERS IN BULGARIA by Patricia R. Loubeau, Robert Jantzen, Elitsa Alexander

    Published 2014-05-01
    “…The most important reason why Bulgarian young people shop online is the pursuit of unique products not locally available, followed by convenience and better pricing, and their favorite category of internet purchases is “Apparel and Accessories.” Bulgarian millennials are using the internet to shop for trendy fashion and to obtain a variety of brands that are unavailable locally. …”
    Get full text
    Article
  7. 2867

    An overview of fake news detection: From a new perspective by Bo Hu, Zhendong Mao, Yongdong Zhang

    Published 2025-01-01
    “…With the rapid development and popularization of Internet technology, the propagation and diffusion of information become much easier and faster. …”
    Get full text
    Article
  8. 2868

    Predictors, prevalence, and patterns of cyberbullying among school-going children and adolescents by Prabhu James Ranjith, Mysore Narasimaha Vranda, M. Thomas Kishore

    Published 2023-07-01
    “…The Cyberbullying Online Aggression Survey Instrument (COASI), Strength and Difficulties Questionnaire (SDQ), Coping with Cyberbullying Questionnaire (CWCBQ), and Internet usage pattern were administered to collect the data. …”
    Get full text
    Article
  9. 2869

    Multiple redundant flow fingerprint model based on time slots by Kexian LIU, Jianfeng GUAN, Wancheng ZHANG, Zhikai HE, Dijia YAN

    Published 2023-02-01
    “…With the increasingly widespread use of the Internet, various network security problems are frequently exposed, while the “patching” style security enhancement mechanisms cannot effectively prevent the growing security risks.The researchers in the field of network security believe that the future Internet architecture should take security as a basic attribute to provide the native security support which is also called as endogenous safety and security.In order to support the data trustworthiness of endogenous security, a time-slot based multiple redundant flow fingerprint model was designed and implemented based on the research of the watermark (or fingerprint) mechanism.The proposed model used only three time slot intervals and operated the packets within the specified time slots, so that the fingerprint can be embedded without conflicting with the adjacent bit operations.Redundant coding was introduced to improve the fingerprint robustness, and the behaviors such as jitter or malicious disruptions by attackers in the network were considered.Furthermore, the impacts of delayed interference, spam packet interference and packet loss interference were analyzed.The analytical results show that the robustness of the fingerprint model improves with increasing redundant bits when the packet distribution in the network stream is given.Besides, in order to reduce the consumption of time and space and improve the efficiency and accuracy of packet operations, a flow fingerprinting prototype system was designed and implemented based on the kernel, and its efficiency and robustness were evaluated.The experimental result show that the model has high robustness.Additionally, the application scenario of the model was elaborated, which can effectively detect man-in-the-middle attacks and prevent network identity spoofing with the help of the flow fingerprinting model.…”
    Get full text
    Article
  10. 2870

    Survey of deterministic service assurance technology in time sensitive networking by ZHANG Lijuan, YU Chunni, XU Fengyou

    Published 2024-08-01
    “…With the rapid development of information technology, new types of services such as remote surgery and high-precision robot control in the Internet of things and industrial Internet have necessitated new requirements for end-to-end latency. …”
    Get full text
    Article
  11. 2871

    A Wireless Emergency Telemedicine System for Patients Monitoring and Diagnosis by M. Abo-Zahhad, Sabah M. Ahmed, O. Elnahas

    Published 2014-01-01
    “…Once abnormal event happened or the request to real-time display vital signs is confirmed, all physiological signs will be immediately transmitted to remote medical server through both cellular networks and internet. Also data can be transmitted to a family member’s mobile phone or doctor’s phone through GPRS. …”
    Get full text
    Article
  12. 2872

    Online suicidal thoughts and/or behaviours talk: A scoping review protocol. by Andrea Lamont-Mills, Luke T Bayliss, Steven A Christensen

    Published 2022-01-01
    “…The anonymity that the internet and social media affords users means that suicidal thoughts and/or behaviours can be talked about with a sense of freedom and disinhibition that is often not possible in face-to-face contexts. …”
    Get full text
    Article
  13. 2873

    Crowdfunding as a modern direction of business angel investing in Ukraine by H. M. Sitchenko

    Published 2021-12-01
    “…The specifics of crowdfunding for attracting investments from voluntary individual venture investors via the Internet have been studied. Leading foreign experience is analyzed and features and obstacles of application in domestic conditions are defined. …”
    Get full text
    Article
  14. 2874

    Advocating the use of risk-based online single submission (OSS) to MSMES in Sukabumi district by Alfhi Fusvita Cahya, Hardi Warsono, Kismartini Kismartini

    Published 2024-03-01
    “…Efforts that need to be made, namely by providing internet and computer facilities for business actors at the licensing service office, guiding business actors to obtain the necessary permits, conducting routine outreach to business actors who have difficulty getting access and do not understand digitization, always follow the updates on OSS developments, and so on.…”
    Get full text
    Article
  15. 2875

    الثقافة المعلوماتیة لطلاب مدارس المتفوقین فى العلوم والتکنولوجیا Stem فى مصر ودور النظام التعلمی بتلک المدارس فى تعزیزها : دراسة میدانیة... by د. اشرف البسیونى مصطفى رداد

    Published 2019-04-01
    “…Thepreparation of the capstone projects was the main motives for obtaininginformation.The search for information on the internet has become on top ofsearching skills of students. …”
    Get full text
    Article
  16. 2876

    PROFILES AND PREFERENCES OF ON-LINE MILLENIAL SHOPPERS IN BULGARIA by Patricia R. Loubeau, Robert Jantzen, Elitsa Alexander

    Published 2014-05-01
    “…The most important reason why Bulgarian young people shop online is the pursuit of unique products not locally available, followed by convenience and better pricing, and their favorite category of internet purchases is “Apparel and Accessories.” Bulgarian millennials are using the internet to shop for trendy fashion and to obtain a variety of brands that are unavailable locally. …”
    Get full text
    Article
  17. 2877

    Análisis de rendimiento en redes IPv6 by Andrés Eugenio Enríquez-Lenis, Guefry Léider Agredo-Méndez

    Published 2015-01-01
    “…El objetivo principal de esta investigación es determinar el desempeño de diferentes servicios en Internet sobre una arquitectura de red IPv6 por medio de experimentación. …”
    Get full text
    Article
  18. 2878

    The Video Manipulation Effect (VME): A quantification of the possible impact that the ordering of YouTube videos might have on opinions and voting preferences. by Robert Epstein, Alex Flores

    Published 2024-01-01
    “…Recent research has identified a number of powerful new forms of influence that the internet and related technologies have made possible. …”
    Get full text
    Article
  19. 2879

    Performance Comparison of JIT and JET Protocols on the OBS Networks by Alaa Jamal Abd, Mohammed Joudah Zaiter

    Published 2022-12-01
    “… Over the past few years, internet traffic has been explosive growth due to users' need for more applications and services. …”
    Get full text
    Article
  20. 2880

    The Attitude of Children and Parents Towards Children Influencers by Izabela Kołaszewska, Agnieszka Kacprzak

    Published 2022-01-01
    “…The phenomenon of internet influencers is among the most discussed issues in marketing to children. …”
    Get full text
    Article