Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
3161
Evolution,characteristics and revelation of the US cyber-security review system
Published 2019-12-01“…As the founder of the global internet,the United States has established a well-structured cyber-security review system.It is based on a series of systematic and complete laws,regulations,and has constructed independent and efficient organizations.Such all-around and compulsory system is structured with distinctive characteristics,such as the extension and the procedure of the review in an orderly way,the vague standard and the compulsory results.Thus,it has certain reference significance to the establishment of a sound Chinese cyber-security review system.…”
Get full text
Article -
3162
INFLUENCE OF MODERN FINANCIAL TECHNOLOGIES ON THE INSTITUTIONAL STRUCTURE OF THE RUSSIAN BANKING SYSTEM
Published 2019-10-01“…Based on the construction of a regression model, the impact of the development of mobile technologies on the institutional composition of the Russian banking system has been assessed, indicating, that with increased usage of the Internet and mobile technologies in the process of making customer payments, the number of internal structural units of existing credit institutions is reduced.…”
Get full text
Article -
3163
Research on smart authentication authorization and accounting in next generation network
Published 2006-01-01“…With the fast development of Internet,there were more and more network access methods and network services.But too many accounts were inconvenient for users to perform the AAA(authentication,authorization and accounting),and many service providers hadn’t appropriate AAA mechanisms.In order to solve these problems,the smart AAA was introduced.The architecture of the smart AAA was designed,and SOAP based SAML was used to exchange security information between smart AAA and other service providers.Analysis indicates the smart AAA will provide the universal and intelligent AAA services for both users and operators.…”
Get full text
Article -
3164
Survey of research on future network architectures
Published 2014-08-01“…Nowadays, the Internet is facing unprecedented challenges, including scalability, security, management, mobil-ity, content distribution capability, and energy saving, etc., which are difficult to solve through incremental development. …”
Get full text
Article -
3165
Measurement and evaluation of China’s mainland AS-level topology
Published 2007-01-01“…Through large-scale active probing from multiple vantage points,more comprehensive and accurate AS graph for China’s mainland was obtained,after which a detailed characterization was made for it.By comparison with various popular network models at present,It was found that PFP model accurately reproduces china AS graph,which indicates that China’s mainland’s AS graph shows similarities to the global one.Based on this,a hypothesis was proposed that the Internet AS level topology may have inherent topological similarity under proper partitioning operations.…”
Get full text
Article -
3166
Facts about Vitamin D
Published 2009-04-01“…Includes links to reliable nutrition information on the internet. Published by the UF Department of Family Youth and Community Sciences, April 2009. …”
Get full text
Article -
3167
L’impact réel des technologies de l’information et de la communication sur la forme scolaire
Published 2011-03-01“…The generalized use of computers and in particular Internet has not only modified the relations between people but also their behavior towards information and knowledge. …”
Get full text
Article -
3168
Survey of privacy preserving data queries in cloud computing
Published 2014-12-01“…Driven by resource sharing,public clouds will become the national infrastructure like electricity grids and the Internet.A core issue in public cloud computing is privacy.It is crucial for public clouds to provide necessary services while protecting data privacy.Existing work on data privacy from the perspectives of privacy preserving computation was survied,integrity verification of public cloud computing results,public cloud data access control,and hardware secu-rity in cloud computing.Existing work is analyzed and future research directions for public cloud privacy is discussed.…”
Get full text
Article -
3169
Performance analysis and construction scheme proposal of 5G network at 700 MHz band
Published 2022-05-01“…5G network opens a new stage of mobile Internet and effectively promotes industrial automation and social development.In order to promote the construction and development of 5G network, the demand of 700 MHz band applied to 5G network was analyzed, took the lead in organizing field test and detailed analysis, 700 MHz 5G network construction scheme based on the test result was discussed, so as to guide 5G base station deployment and antenna parameter configuration.…”
Get full text
Article -
3170
Leisure activities of young drug users and non-drug users: association with five personality factors
Published 2023-09-01“…The most common forms of leisure are spending free time on the Internet, going for walks and socialising with friends, studying and doing homework, watching films and TV programmes (including on the Internet), as well as hobbies and interests. …”
Get full text
Article -
3171
-
3172
La implicación social en la acción y gobernanza climática urbana: lecciones desde Barcelona y Sevilla
Published 2023-02-01Get full text
Article -
3173
Bir Kamu Hastanesinde Ebe Ve Hemşirelerin Sosyal Ağ Siteleri Kullanımı İle İletişim Becerileri Arasındaki İlişkinin İncelenmesi
Published 2019-04-01“…Giriş:Günümüzdeteknolojinin gelişmesi ile birlikte bilgisayar ve internet hayatınvazgeçilmezleri haline gelmiştir. İnternet teknolojisinde en son yenilik ise,sosyal ağ siteleridir. …”
Get full text
Article -
3174
Factores asociados al miedo por la información recibida durante la pandemia en policías y militares peruanos
Published 2023-01-01“…Conclusión: La televisión y las redes sociales son los principales medios que generaron miedo entre los policías y militares; además, el estar asustado estuvo más asociado a informarse por internet.…”
Get full text
Article -
3175
PENIAPHOBIA AS A COMPONENT OF THE DESTRUCTIVE DIGITAL MEDIA DISCOURSE IN THE ASIA-PACIFIC REGION
Published 2024-11-01“…The authors attribute peniaphobia to one of the universal social stigmas that affect the social structure and culture of the community, recognizing that media discourse is actively using open public Internet communication to control public consciousness gently. …”
Get full text
Article -
3176
Exploring health outcome disparities in African regional economics communities: a multilevel linear mixed-effect analysis
Published 2025-01-01“…In addition, governments should invest in elderly care programs and infrastructure development for water supply. Efforts to promote internet access should be complemented by interventions to enhance child health and healthcare accessibility. …”
Get full text
Article -
3177
Evaluation of Regional Rural e-Commerce Development Potential with Intuitive Fuzzy Information Theory
Published 2022-01-01“…In recent years, China’s Internet industry has developed rapidly, and the Internet has penetrated into all aspects of people’s daily lives. …”
Get full text
Article -
3178
Une esthétique post-média
Published 2017-09-01“…Pour comprendre ce dernier, à l’ère du post-Internet, il faut prendre en compte un nouvel élément : le logiciel. …”
Get full text
Article -
3179
THE DIGITAL FRONTIER: STRATEGIES AND TOOLS FOR CULTIVATING EDUCATIONAL-STRATEGIC COMPETENCE FOR PRE-SERVICE TEACHERS
Published 2024-06-01“…The incorporation of Internet technologies into the educational process stimulates the cognitive activity of learners. …”
Get full text
Article -
3180
Implementasi Algoritme Spongent sebagai Algoritme Hashing untuk Integritas pada Modul Komunikasi Lora
Published 2023-12-01“… Internet of Things (IoT) merupakan konsep terbaru dalam ranah teknologi dan informasi komunikasi dengan fondasinya berdasarkan pada pertukaran informasi antara objek-objek pintar. …”
Get full text
Article