Showing 3,181 - 3,200 results of 5,694 for search '"internet"', query time: 0.05s Refine Results
  1. 3181

    Analisis Perbandingan Algoritma SVM, KNN, dan CNN untuk Klasifikasi Citra Cuaca by Mohammad Farid Naufal

    Published 2021-03-01
    “…Hal ini dapat membantu pengembangan self autonomous machine agar tidak bergantung pada koneksi internet dan dapat melakukan kalkulasi sendiri secara real time. …”
    Get full text
    Article
  2. 3182

    Design Considerations of Online Infertility Prevention Training (OIPT): Development and Evaluation by Bahar Baran, Sirin Nur Yaci, Murat Ocal, Digdem Muge Siyez

    Published 2022-02-01
    “… Health-related internet sources should contain accurate, reliable and updated information, and their usability should be high to enable people to navigate successfully. …”
    Get full text
    Article
  3. 3183

    A Network Investigation on Idiopathic Hypogonadotropic Hypogonadism in China by Weiwei Zhao, Hongying Ye, Xiaolong Zhao, Zhaoyun Zhang, Shouyue Sun, Yiran Jiang, Min He, Cheng Xu, Renming Hu, Yiming Li

    Published 2013-01-01
    “…We aimed to develop and follow an internet-based cohort and to improve our understanding of the disease. …”
    Get full text
    Article
  4. 3184

    Dynamic Connectivity Hub: Multiple ISPs Smart Aggregation for Optimized IoT Connectivity by Hany Ali, Mohamed A. Abouelatta, Khaled Y. Youssef

    Published 2025-01-01
    “…The increasing complexity of Internet of Things (IoT) networks demands scalable and adaptive solutions to ensure reliable and efficient connectivity. …”
    Get full text
    Article
  5. 3185
  6. 3186

    INFORMATION OPENNESS OF THE MUNICIPAL SYSTEM OF EDUCATION: THE EXPERIENCE OF SOCIAL AUDIT by Tatiana E. Zerchaninova, Olga V. Novgorodtseva

    Published 2015-03-01
    “…The analysis of the content of the official websites of educational organizations in the network «Internet» was conducted at the first stage of social audit. …”
    Get full text
    Article
  7. 3187

    Os meandros da educação e da aprendizagem em meio à pandemia covid-19: os desafios e as lições by Hercules Guimarães Honorato

    Published 2021-01-01
    “…A coleta de dados foi via survey on-line, cujo link foi encaminhado às redes sociais deste autor na internet. O artigo está estruturado em quatro seções principais: a primeira trata da metodologia; a seguinte apresenta o quadro teórico; a terceira discute a educação e a pandemia; e a última seção apresenta as análises dos dados levantados. …”
    Get full text
    Article
  8. 3188

    Тhe features of using PR and advertising in international business by Iryna Derid, Karina Bozhko, Inna Zorianska

    Published 2024-06-01
    “…General scientific methods are used: a statistical method for studying trends in the use of the Internet and social networks, as well as for researching the ratios of different types of advertising in advertising expenditures in different countries of the world; the case study method for researching advertising and PR campaigns; methods of analysis, synthesis, and descent from the abstract to the concrete to link advertising influences and cultural characteristics. …”
    Get full text
    Article
  9. 3189

    Research Status of Home-Based Rehabilitation in Chronic Diseases and Construction of Intelligent Rehabilitation Treatment Platform by WANG Jinghua, YU Shaohong, LI Li

    Published 2023-06-01
    “…In view of the development status of "Internet + medicine" and the practical needs of patients with chronic diseases, through reviewing and sorting out the relevant literature and materials on home-based rehabilitation of chronic diseases, the research trends of home-based rehabilitation of chronic diseases at home and abroad as well as the advantages and disadvantages of the current management modes were analyzed and summarized. …”
    Get full text
    Article
  10. 3190

    Youth Involvement in Pornography and Academic Engagement in Selected Secondary Schools in Kabale Municipality. by Kanyesigye, Bens Rogers

    Published 2024
    “…Social media platforms, internet sources, and private messaging applications were the primary sources of pornographic content, exacerbated by widespread internet and smartphone use, and the lack of proper supervision by parents, teachers, and school administrators. …”
    Get full text
    Thesis
  11. 3191

    Determinants of Performance in Physical Sciences at Uganda Certificate of Education: A Case Study of Selected Schools in Ntungamo Municipality. by Muhindo, Alex

    Published 2024
    “…On school-based factors, it was concluded that there was a need to have well-equipped science laboratories and computer laboratories with internet services to promote the teaching and learning of physical sciences. …”
    Get full text
    Thesis
  12. 3192

    Media now : understanding media, culture, and technology / by Straubhaar, Joseph D., LaRose, Robert, Davenport, Lucinda

    Published 2018
    Table of Contents: “…Media and the information age -- The changing media -- Media and society -- The media -- Books -- Print and digital newspapers -- Magazines -- Recorded music -- Radio -- Film and video -- Television -- The Internet -- The third screen: smart phones and tablets -- Video games -- Public relations -- Media issues -- Advertising -- Media uses and impacts -- Media policy and law -- Media ethics -- Global communications media.…”
    View in OPAC
    Book
  13. 3193

    Evolution of core network oriented to 5G by Hongyuan MA, Ziyu XIAO, Zhonggui BU, ·uan ZHAO

    Published 2019-09-01
    “…The 5G network is dedicated to the vision of “internet of everythingand information is easy to reach”.5G network adopts scene design to meet diverse business needs in a more flexible way.Based on the core network target architecture oriented to 5G,the problems in network evolution were analyzed from the aspects of network equipment form,networking architecture,network and service capabilities,and network management orchestration.Following the principle of “one-step network architecture layout,smooth evolution of network element functions,and gradual migration adjustment of capacity traffic”,the 5G evolution strategy recommendations for different periods were given.…”
    Get full text
    Article
  14. 3194

    TD-LTE and LTE FDD fusion networking strategy by Lunsuo WANG

    Published 2016-01-01
    “…With the rapid development of mobile internet,as well as the rapid expansion of the scale of 4G network,the frequency resources worldwide are increasingly scarce.Learning from the successful experience of the development of TD-LTE and LTE FDD fusion,the challenges faced by the development of the integration of networking strategy and TD-LTE international development were analyzed,the development mode and strategy of TDD and FDD were proposed,and the future development targeted recommendations of the communication operator network was put forward.The TD-LTE and LTE FDD convergence has become a big trend.As the strategic layout of the communications operators,4G network using LTE network approach,should be taken into account in the LTE master plan in advance.…”
    Get full text
    Article
  15. 3195

    Unknown attack detection model based on network behavior analysis by Yi-han YU, Yu FU, Xiao-ping WU

    Published 2016-06-01
    “…As for the intranet security threats of the increasing number of unknown attacks,an unknown attack detection model based on network behavior analysis was proposed.With the help of the information resources within the intranet,firstly,the information resources of the intranet were collected,then the risk factors of abnormal behav-ior of the internet information node were analyzed,finally,the information node and the information resources ac-quisition path as the key element were used to construct the detection model of the directed graph.By verifying,the model can achieve the desired detection results.…”
    Get full text
    Article
  16. 3196

    Double-Core Model of Intelligent Pipe and Intelligent Management to Realize Flow Management by Yizhi Ding, Haidong Cui

    Published 2013-09-01
    “…In order to follow the development trend of mobile internet and improve business income, it is necessary for communication operators to push flow management completely. …”
    Get full text
    Article
  17. 3197
  18. 3198

    Application of intelligent sorting of customer service work orders with multiple factors vectorization by Hua REN, Zheng WANG, Shaomin WANG

    Published 2018-12-01
    “…As the most important contact point for customers in the internet industry,customer service orders have become the main issues that need to be addressed and urgently solved in various industries.The intelligent sequencing of work orders provides a feasible application for solving this problem.The rapid development of artificial intelligence technology and big data technology has given new directions and opportunities to solve such problems.The background of the intelligent sequencing of customer service orders was analyzed firstly.On the basis of this,the main methods and implementations of intelligent sequencing of customer service orderswere analyzed,and the application of intelligent sequencing of customer service orders based on multi-factor vectorization was expounded.…”
    Get full text
    Article
  19. 3199

    Analysis of Network Demand and Research on the Key Technology for Integration of 5G and Wi-Fi by Ming Liu, Zhizhong Zhang, Fang Cheng

    Published 2014-08-01
    “…Integration of multi-radio access technology, multiple needs and multiple internet were studied to become the inevitable trend for IMT 2020(5G). …”
    Get full text
    Article
  20. 3200

    Survey of DDoS defense:challenges and directions by Fei CHEN, Xiao-hong BI, Jing-jing WANG, Yuan LIU

    Published 2017-10-01
    “…The distributed denial of server (DDoS) attack is a major threat to the Internet.Numerous works have been proposed to deal with this problem through attack detection and defense mechanism design.A survey was presented to introduce the DDoS defense technologies,from the traditional strategies,through Cloud-based systems,toward SDN-based mechanisms.According to the characteristics of DDoS attack,the features and drawbacks of these systems were discussed,which could provide new insights for the development of the new generation of network security framework in the future.…”
    Get full text
    Article