Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
3081
Tomando buenas decisiones: La televisión y el aprendizaje de los niños pequeños, consejos para los padres
Published 2011-07-01“…The series is designed to reach both professional educators and parents and to provide research summaries, tips for parents, and internet resources for further information. Spanish versions published by the UF Department of Family Youth and Community Sciences, June 2011. …”
Get full text
Article -
3082
An Overview of Small Farm Direct Marketing
Published 2003-06-01“…Other times, the consumer and farmer may not actually meet, for example, Internet sales. This document is FCS 7211, one of a series of the Department of Family, Youth and Community Sciences, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
Get full text
Article -
3083
High Performance Web of Things Architecture for the Smart Grid Domain
Published 2015-12-01“…This network has been converted into an example of the Internet of Things. In this regard, the Web of Things enables an improvement in the processing of these data. …”
Get full text
Article -
3084
The Aristocratic Culture of Great Britain in the Globalization Era
Published 2012-08-01“…Informational technologies and American mass culture they have brought about have a tremendous influence on the style of life of the class under consideration. The Internet and television have become the most powerful means of breaking traditions and causing changes in all spheres.…”
Get full text
Article -
3085
Technical scheme of the unified account authentication service for operators
Published 2018-05-01“…Aiming at the pain point of current internet applications,on the basis of analyzing the key factors that should be considered in the development of unified account authentication service,a technical scheme of unified account authentication service based on mobile phone number was put forward,including the overall architecture of the system,the application interface scene,and the implementation of differentiated authentication.Then,the related ideas about the operators’ unified account authentication service interconnection were analyzed.Finally,the prospect of the operators to develop unified account authentication service was also discussed.…”
Get full text
Article -
3086
SoftCOM AI,autonomous driving telecom network solution
Published 2019-04-01“…At present,AI has risen to become the core strategy for the transformation and upgrading of science and technology in various countries.Under the background of the internet of everything,all walks of life have set off a research boom of AI.The telecom industry is no exception.As the carrier network faces the challenge of digital transformation,the automatic driving of the telecommunication network through AI technology has gradually become the consensus of the industry.Huawei’s SoftCOM AI solution for autopilot and its deployment methods,values and cases were introduced .…”
Get full text
Article -
3087
Method of three-domain integration for IT support system
Published 2015-12-01“…For the realization of digital transformation,three-domain integration of IT support system is imperative.The present situation and problems of the three-domain of IT support system were analyzed.The goal of overall development of IT system was proposed.The method of integration from the target architecture,basic resource layer,data layer,application layer was discussed.It can effectively support the digital transformation,and create an agile,internet based and open new generation operation support system.…”
Get full text
Article -
3088
CROWDFUNDING IN ENTREPRENEURIAL SYSTEM. TYPES AND TECHNOLOGIES
Published 2017-02-01“…We investigated some internet-sites that specialize in one or another form of crowdfunding. …”
Get full text
Article -
3089
Research on professional learning margin of university information security teachers in China
Published 2017-07-01“…Analyzing the educational background features of China’s university information security teachers can provide reference for the teaching staff construction of cyberspace security discipline.Based on the result of a national survey,Web content analysis was used to approach to analyze the resumes of information security teachers from Internet.The result shows that these teachers are mainly computer,mathematics,telecommunication and electronics majors,from undergraduate to master,doctorate,postdoctoral,their professional gradually to the information security professional gathering.…”
Get full text
Article -
3090
Analysis and thought on quantum insert technology
Published 2017-08-01“…Quantum insert (QI) is a technology that makes redirection attacks by injecting malicious content into certain sessions.A brief introduction of American “Quantum Insert” project was given and the connotation of this technology was discussed.It then looked into the application that quantum insert was put to in the Internet “Great Cannon” event.An open source QI tool made available by Fox IT,an IT security company,was then analyzed.An experimental verification environment was built using this tool and a verification was made.Finally,a thought was given on how to put QI to use in building network defense.…”
Get full text
Article -
3091
New developing narrow band IoT technology NB-IoT
Published 2017-12-01“…The newly developing low power wide area(LPWA) cellular data access requirements and challenges of Internet of Things is introduced,then the design principle and standardization progress of NB-IoT technologies are analyzed.At last,several typical NB-IoT applications are described.NB-IoT will be the most competent LWPA technology,since NB-IoT has five technical advantages:flexible deployment,wide coverage,low power consumption,low cost and massive connections.…”
Get full text
Article -
3092
Survey on phishing detection research
Published 2020-10-01“…With the continuous development of the internet,the threat posed by phishing to people's daily lives is increasing.As a core security technology against phishing attacks,phishing detection technology can help people effectively avoid security threats caused by phishing attacks.Firstly,starting with the basic concepts of phishing,the current application scenarios of phishing identification were summarized.Then,the research status of phishing identification technology in detail were analyzed.Finally,possible future research directions were discussed.…”
Get full text
Article -
3093
Of Microsoft and Mycobacteria
Published 2001-01-01“…Not only would he have been a candidate with some legitimate claim to the Internet, but his call for a major increase in funding for new defence systems would have been supported by the general public, both at home and abroad. …”
Get full text
Article -
3094
Research on Network Optimization Strategy of Ultra-Broadband CMNet Metro Network
Published 2013-04-01“…From the competitive situation of internet broadband services in domestic operators,CMNet MAN business network architecture situation and existing problems were analyzed combined with the trends of the broadband business application development.The plaftorm construction of optimizing resource control mobile CMNet MAN was raised under conditions of ultra-broadband,and the sink service control layer BRAS and aggregation switches,optimized WLAN bearer,the CMNet metro and transport network joint networking strategy were also proposed.…”
Get full text
Article -
3095
Analysis and enlightenment on the cybersecurity strategy of various countries in the world
Published 2016-01-01“…And the strategy should include the cybersecurity situa-tion assessment, strategic target, strategic actions, the system and mechanism of internet governance, and so on.…”
Get full text
Article -
3096
Feasibility of creation and use of specialized search systems for scientific and technical information
Published 2022-01-01“…The efficiency of using global Internet search systems versus specialized systems, including the State System of Scientific and Technical Information of the Republic of Belarus, for searching the scientific and technical information is compared in this article. …”
Get full text
Article -
3097
Editorial: Computer vision and image synthesis for neurological applications
Published 2025-02-01Get full text
Article -
3098
Research on Wireline Operators' Traffic-Based Operations Strategy
Published 2013-11-01“…The industry and academia generally focus on the mobile internet, neglecting the wired markets. Aiming to explain the basic issues surrounding traffic-based operations on wired operators, the concept, characteristic and international operator's cases of the wired traffic-based operations were restudied. …”
Get full text
Article -
3099
Study on Data Modeling and Collection in OSS Based on Hadoop
Published 2015-01-01“…Through the application of end to end analysis on mobile internet terminal as case subject,it provides reference for the construction on telecom industry EDC.…”
Get full text
Article -
3100
Video text extraction method based on clustering
Published 2009-01-01“…A new method for video text extraction in order to overcome the weakness of existing methods was proposed.First,multi-scale text location and text region refinement in text location step were adopted.Then an improved K-means clustering method was used to segment text regions to obtain a binarized image in text segmentation step.Finally,OCR software was used to recognize text.The results of experiment show that the method can effctively used in sensitive words detection in videos from the Internet.…”
Get full text
Article