Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
3201
Diabetes-Related Websites
Published 2016-06-01“…Finding and using current and reliable sources of health information on the Internet also helps you make choices that support your health while avoiding potentially harmful products and practices. …”
Get full text
Article -
3202
Les communes bretonnes sur le Web
Published 2014-12-01“…In a context of increased uses of Internet and of territorial uncertainty, this study hypothesizes that the Web impacts the spatial dimensions of public organizations, especially by offering a new frame to express various territorial relationships. …”
Get full text
Article -
3203
A solution for flexible adaption of network services in mobile edge computing
Published 2019-03-01“…In order to cope with the challenges brought by the “internet of everything”,mobile edge computing has been highly valued by academics and industry for its unique advantages.However,traditional IP networks are unable to provide network services dynamically in an efficient way for mobile edge computing,due to deficiencies from their original design.To this end,based on emerging network technologies,a solution for flexible adaptation of network services in mobile edge computing scenarios was proposed,aiming at realizing on-demand and effective deployment of network services to meet the diversified and personalized needs of different users.…”
Get full text
Article -
3204
Research on reconfigurable information communication basal network architecture
Published 2014-01-01“…Based on the thinking of network reconfiguration,the reconfigurable information communication basal network architecture was proposed,and then the network atomic capacity theory,polymorphic addressing and routing mechanism,network reconfiguration mechanism and the secure manageability and controllability mechanism were put forward respectively.The architecture would provide a resolution for current and future applications with different quality of services,flexible and expansible function,universal inter-connection,heterogeneous convergence,manageability and controllability,which also supports the compatible evolution with current internet and is feasible to be implemented on a large scale.…”
Get full text
Article -
3205
-
3206
Contemporary Jokes about Students: The Body of Texts and Their Genetic Relations
Published 2013-01-01“…The aim of this article is to broaden the scope of existing research by analysing the genetic relations of contemporary jokes in a sample of Russian-language jokes about students collected from different sources (written, oral, Internet). Jokes about students are compared to jokes from other cycles and other genres with the help of statistical investigation. …”
Get full text
Article -
3207
Study on semantic Web security
Published 2012-11-01“…Semantic Web technologies themselves as well as the web of data constituted by semantic Web applications on the Internet might introduce new security,privacy and trust issues as well as requirements.So,security issues faced by the Semantic Web and its security status were analyzed in detail.On this basis,the semantic Web security reference framework was proposed.Finally,urgent needs about key technologies,policy specifications and safety standards of semantic Web were pointed out based on the semantic Web security reference framework.…”
Get full text
Article -
3208
Key Tecbnology Application of OTT TV Service Traffic Marketing
Published 2015-04-01“…The traffic marketing of OTT TV service was mainly introduced.With the combination of mobile terminals and strong correlation across the screen content technology,O2O service and other business models,the value chain of OTT TV will be extended to the mobile internet and content related services,user-oriented marketing will be a great help to accelerate the develop of OTT TV service.Technologies such as producing using existing content,multi-screen protocol and content associated were described in detai1.Meanwhile,technology solutions such as content organizations,business services and marketing organization with the sharing of users were discussed.…”
Get full text
Article -
3209
Woodstock au fil de ses médiations : Les technologies sonores et les mises en scène du live
Published 2022-12-01“…Finally, we closely consider the aforementioned broadcast to describe some of the new possibilities of the staging of liveness that is afforded by the Internet.…”
Get full text
Article -
3210
Cloud native network creating a new era of intelligent application
Published 2022-06-01“…With the continuous emergence of new applications such as holographic multimedia, integration of space, air and ground, metaverse and social Internet of things, the development of business applications moved towards digitalization, integration, bandwidth and intelligence, which correspondingly puts forward new demands for the transformation of the network.Through the research and analysis of future network characteristics, combined with the characteristics of the cloud native network, the cloud native advantage can be used to meet the needs of current hot business applications.The general architecture of the cloud native network was proposed.The capabilities of data plane, control plane and management plane were defined.Finally, the typical and hot application cases of the cloud native network were given.…”
Get full text
Article -
3211
“(Virtuous) Wives Don’t Have Anything to Hide”: Understanding Digital Privacy Perceptions and Behavior of Married Women in Rural India
Published 2025-01-01“…This study explores digital privacy perceptions and behaviors among married women in rural India, a rapidly expanding demographic of mobile media and Internet users in the Global South. This ethnographic study found that women’s experience of privacy entails balancing between norms related to “hide” and “having nothing to hide.” …”
Get full text
Article -
3212
Network protocol identification based on active learning and SVM algorithm
Published 2013-10-01“…Obtaining qualified training data for protocol identif ion generally requires domain experts to be involved,which is time-consuming and laborious.A novel approach for network protocol identification based on active learning and SVM algorithm was proposed.The experimental evaluations on real-world network traces show this approach can accurately and efficiently classify the target network protocol from mixed Internet traffic,and meanwhile display a sig-nificant reduction in the number of labeled samples.Therefore,this approach can be employed as an auxiliary tool for analyzing unknown protocols in real-world environment.…”
Get full text
Article -
3213
A survey of attack and defense on human-computer interaction security
Published 2019-10-01“…With the development of technologies such as the internet of things and artificial intelligence,human-computer interaction applications are constantly being introduced.However,the development of human-computer interaction technology is also accompanied by new security issues,and human-computer interaction security attacks frequently occur.The status of four kinds of human-computer interaction technologies:HID-USB,fingerprint recognition,speech recognition and face recognition,as well as the offensive and defensive benefits were reviewed and analyzed,and the research direction of human-computer interaction security in the future was discussed.At the same time,some suggestions were given.…”
Get full text
Article -
3214
Review on video privacy protection
Published 2013-08-01“…With the rapid development of the Internet and the tremendous proliferation of video applications,video privacy protection has garnered significant attention nowadays.It is a key problem to protect privacy while ensuring normal application.A survey of video privacy protection technologies was presented,and summary,comparison and analysis were mainly in three aspects:privacy extraction,privacy protection and access control.Moreover,some distinctive issues that correlate to privacy protection in video surveillance,such as privacy definition and perceptive security evaluation were also addressed.Finally,challenges and perspectives of video privacy protection technology were discussed.…”
Get full text
Article -
3215
ELEKTRONİK TİCARET VE MUHASEBE SİSTEMATİĞİ
Published 2007-06-01“…Burada en temel nokta kredi kartı ve para kartı ile internet üzerinden yapılan alışverişlerin birbirlerinden ayrı tutulması ve farklı hesaplarda izlenmesi gerekliliği olmuştur. …”
Get full text
Article -
3216
Research of worm-propagation prediction based on stochastic experiment
Published 2007-01-01“…The prediction of the worm propagation is the basis of the worm defense.It is becoming more difficult to model the propagation of worms in the early stage of worm-spreading,because the worm strategies are smarter and the Internet structure is more complicated than ever before.In present study,a stochastic simulator was designed to simulate the propagation of worms.From the analysis of 1000 groups of experiment results,it was proved that the worm-propagation is a stochastic process,and the correlation coefficient between each group of results is close to 1.Therefore,a new prediction method was proposed,which could accurately calculate the propagation of worm when 0.1% of all vulnerable hosts were infected.…”
Get full text
Article -
3217
School Drug Testing: A Critical Review of the Literature
Published 2010-01-01“…Research studies in major academic databases and Internet websites are reviewed. Several observations are highlighted from the review: (1) there are few research studies in this area, particularly in different Chinese contexts; (2) the quality of the existing studies was generally low; and (3) research findings supporting the effectiveness of school drug testing were mixed. …”
Get full text
Article -
3218
Slot-predicting based ALOHA algorithm for RFID anti-collision
Published 2011-01-01“…The proposed algorithm modified the prior frame size by comparison with the preset decision threshold and identified the end conditions based on the value of accumulation factor C of EPC protocol.The slot-predicting binary se-lection scheme was used in each frame to accelerate idle slots and solve collisions with binary selection instantly,so that to reduce the invalid slots.Simulation results show that the proposed algorithm can increase the system throughput and consumes less power and fewer time slots than previous work,and provide a solution for data collection of Internet of Things which takes RFID tags as perceptive terminal nodes.…”
Get full text
Article -
3219
Review of 5Gmobile communication technology standard
Published 2018-08-01“…The industry is working togetheRto create 5G technology standard,which shouldmeet the needs ofmobile broadband and internet of things.Recently,3GPP declares the first 5G standard which supports the standalone deployment frozen.5G supports wider bandwidth,low latency,flexible configuration.New service-based architecture is designed for 5G,which supports important service capabilities,e.g.network slice,edge computing.5G standards were introduced,including new radio,new core and security.In the end,the trends of 5G standard were summarized.…”
Get full text
Article -
3220
Street art et mise en tourisme de la métropole parisienne, des festivals aux street art tours
Published 2018-07-01“…The private actors who organize these street art tours try to reach a very large audience, from curious locals to international tourists, and use mainly the internet for their promotion, via independent sites as well as major ones like Airbnb. …”
Get full text
Article