Showing 3,081 - 3,100 results of 5,694 for search '"internet"', query time: 0.04s Refine Results
  1. 3081

    Tomando buenas decisiones: La televisión y el aprendizaje de los niños pequeños, consejos para los padres by David C. Diehl, Stephanie C. Toelle

    Published 2011-07-01
    “…The series is designed to reach both professional educators and parents and to provide research summaries, tips for parents, and internet resources for further information. Spanish versions published by the UF Department of Family Youth and Community Sciences, June 2011. …”
    Get full text
    Article
  2. 3082

    An Overview of Small Farm Direct Marketing by Mickie E. Swisher, James Sterns

    Published 2003-06-01
    “…Other times, the consumer and farmer may not actually meet, for example, Internet sales. This document is FCS 7211, one of a series of the Department of Family, Youth and Community Sciences, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article
  3. 3083

    High Performance Web of Things Architecture for the Smart Grid Domain by David Vernet, Agustín Zaballos, Ramon Martin de Pozuelo, Víctor Caballero

    Published 2015-12-01
    “…This network has been converted into an example of the Internet of Things. In this regard, the Web of Things enables an improvement in the processing of these data. …”
    Get full text
    Article
  4. 3084

    The Aristocratic Culture of Great Britain in the Globalization Era by T. A. Ivushkina

    Published 2012-08-01
    “…Informational technologies and American mass culture they have brought about have a tremendous influence on the style of life of the class under consideration. The Internet and television have become the most powerful means of breaking traditions and causing changes in all spheres.…”
    Get full text
    Article
  5. 3085

    Technical scheme of the unified account authentication service for operators by Maowen GUO, Rong ZHANG, Yanqing LU, Yan LI

    Published 2018-05-01
    “…Aiming at the pain point of current internet applications,on the basis of analyzing the key factors that should be considered in the development of unified account authentication service,a technical scheme of unified account authentication service based on mobile phone number was put forward,including the overall architecture of the system,the application interface scene,and the implementation of differentiated authentication.Then,the related ideas about the operators’ unified account authentication service interconnection were analyzed.Finally,the prospect of the operators to develop unified account authentication service was also discussed.…”
    Get full text
    Article
  6. 3086

    SoftCOM AI,autonomous driving telecom network solution by Bing ZHAO, Zhimin LIU, Yiming YUAN, Tao HAN

    Published 2019-04-01
    “…At present,AI has risen to become the core strategy for the transformation and upgrading of science and technology in various countries.Under the background of the internet of everything,all walks of life have set off a research boom of AI.The telecom industry is no exception.As the carrier network faces the challenge of digital transformation,the automatic driving of the telecommunication network through AI technology has gradually become the consensus of the industry.Huawei’s SoftCOM AI solution for autopilot and its deployment methods,values and cases were introduced .…”
    Get full text
    Article
  7. 3087

    Method of three-domain integration for IT support system by Yizhi DING, Lei QI, Shaoping LI, Hongwei LV, Yingxia NIU

    Published 2015-12-01
    “…For the realization of digital transformation,three-domain integration of IT support system is imperative.The present situation and problems of the three-domain of IT support system were analyzed.The goal of overall development of IT system was proposed.The method of integration from the target architecture,basic resource layer,data layer,application layer was discussed.It can effectively support the digital transformation,and create an agile,internet based and open new generation operation support system.…”
    Get full text
    Article
  8. 3088

    CROWDFUNDING IN ENTREPRENEURIAL SYSTEM. TYPES AND TECHNOLOGIES by S. Rukavishnikov

    Published 2017-02-01
    “…We investigated some internet-sites that specialize in one or another form of crowdfunding. …”
    Get full text
    Article
  9. 3089

    Research on professional learning margin of university information security teachers in China by Yuan MENG, Pei-qun WU

    Published 2017-07-01
    “…Analyzing the educational background features of China’s university information security teachers can provide reference for the teaching staff construction of cyberspace security discipline.Based on the result of a national survey,Web content analysis was used to approach to analyze the resumes of information security teachers from Internet.The result shows that these teachers are mainly computer,mathematics,telecommunication and electronics majors,from undergraduate to master,doctorate,postdoctoral,their professional gradually to the information security professional gathering.…”
    Get full text
    Article
  10. 3090

    Analysis and thought on quantum insert technology by Xue-bo ZHANG, Si WANG, Hong-xia ZOU

    Published 2017-08-01
    “…Quantum insert (QI) is a technology that makes redirection attacks by injecting malicious content into certain sessions.A brief introduction of American “Quantum Insert” project was given and the connotation of this technology was discussed.It then looked into the application that quantum insert was put to in the Internet “Great Cannon” event.An open source QI tool made available by Fox IT,an IT security company,was then analyzed.An experimental verification environment was built using this tool and a verification was made.Finally,a thought was given on how to put QI to use in building network defense.…”
    Get full text
    Article
  11. 3091

    New developing narrow band IoT technology NB-IoT by Zhi-bin ZHENG, De CHEN, Hao WU

    Published 2017-12-01
    “…The newly developing low power wide area(LPWA) cellular data access requirements and challenges of Internet of Things is introduced,then the design principle and standardization progress of NB-IoT technologies are analyzed.At last,several typical NB-IoT applications are described.NB-IoT will be the most competent LWPA technology,since NB-IoT has five technical advantages:flexible deployment,wide coverage,low power consumption,low cost and massive connections.…”
    Get full text
    Article
  12. 3092

    Survey on phishing detection research by Xi FU, Hui LI, Xingwen ZHAO

    Published 2020-10-01
    “…With the continuous development of the internet,the threat posed by phishing to people's daily lives is increasing.As a core security technology against phishing attacks,phishing detection technology can help people effectively avoid security threats caused by phishing attacks.Firstly,starting with the basic concepts of phishing,the current application scenarios of phishing identification were summarized.Then,the research status of phishing identification technology in detail were analyzed.Finally,possible future research directions were discussed.…”
    Get full text
    Article
  13. 3093

    Of Microsoft and Mycobacteria by Hans Pasterkamp

    Published 2001-01-01
    “…Not only would he have been a candidate with some legitimate claim to the Internet, but his call for a major increase in funding for new defence systems would have been supported by the general public, both at home and abroad. …”
    Get full text
    Article
  14. 3094

    Research on Network Optimization Strategy of Ultra-Broadband CMNet Metro Network by Quanze Jiang, Zhiyuan Lai, Fangrong Chen

    Published 2013-04-01
    “…From the competitive situation of internet broadband services in domestic operators,CMNet MAN business network architecture situation and existing problems were analyzed combined with the trends of the broadband business application development.The plaftorm construction of optimizing resource control mobile CMNet MAN was raised under conditions of ultra-broadband,and the sink service control layer BRAS and aggregation switches,optimized WLAN bearer,the CMNet metro and transport network joint networking strategy were also proposed.…”
    Get full text
    Article
  15. 3095

    Analysis and enlightenment on the cybersecurity strategy of various countries in the world by Yu-xiao LI, Yong-jiang XIE

    Published 2016-01-01
    “…And the strategy should include the cybersecurity situa-tion assessment, strategic target, strategic actions, the system and mechanism of internet governance, and so on.…”
    Get full text
    Article
  16. 3096

    Feasibility of creation and use of specialized search systems for scientific and technical information by M. F. Zianchuk, I. V. Saltanova

    Published 2022-01-01
    “…The efficiency of using global Internet search systems versus specialized systems, including the State System of Scientific and Technical Information of the Republic of Belarus, for searching the scientific and technical information is compared in this article. …”
    Get full text
    Article
  17. 3097
  18. 3098

    Research on Wireline Operators' Traffic-Based Operations Strategy by Ke Ruan, Ming Feng, Yongqing Zhu, Jie Zou

    Published 2013-11-01
    “…The industry and academia generally focus on the mobile internet, neglecting the wired markets. Aiming to explain the basic issues surrounding traffic-based operations on wired operators, the concept, characteristic and international operator's cases of the wired traffic-based operations were restudied. …”
    Get full text
    Article
  19. 3099

    Study on Data Modeling and Collection in OSS Based on Hadoop by Lei Lei, Jingwen Li, Dapeng Gong, Rui Wang, Lei Su, Ningjiang Chen

    Published 2015-01-01
    “…Through the application of end to end analysis on mobile internet terminal as case subject,it provides reference for the construction on telecom industry EDC.…”
    Get full text
    Article
  20. 3100

    Video text extraction method based on clustering by SONG Yan1, LIU An-an1, ZHANG Yong-dong1, LIN Shou-xun1

    Published 2009-01-01
    “…A new method for video text extraction in order to overcome the weakness of existing methods was proposed.First,multi-scale text location and text region refinement in text location step were adopted.Then an improved K-means clustering method was used to segment text regions to obtain a binarized image in text segmentation step.Finally,OCR software was used to recognize text.The results of experiment show that the method can effctively used in sensitive words detection in videos from the Internet.…”
    Get full text
    Article