Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
3261
Research on the HTML5 Application Runtime Environment for Mobile Terminal
Published 2013-05-01“…A new generation of Web HTML5 standard has become a general technical standard for mobile internet application platform in the future,and mobile Web application based on HTML5 is becoming a new form of application. …”
Get full text
Article -
3262
Políticas de seguridad informática
Published 2006-01-01“…La globalización de la economía ha exigido que las empresas implementen plataformas tecnológicas que soporten la nueva forma de hacer negocios. El uso de Internet para este fin, conlleva a que se desarrollen proyectos de seguridad informática que garanticen la integridad, disponibilidad y accesibilidad de la información. …”
Get full text
Article -
3263
An Efficient Code-Based One-Time Blind Signature Scheme for Electronic Forensics
Published 2024-01-01“…Our scheme can also be applied to electronic forensics of traffic accidents on the Internet of Vehicles, which can protect users’ privacy.…”
Get full text
Article -
3264
HoneyBow:an automated malware collection tool based on the high-interaction honeypot principle
Published 2007-01-01“…Malware has become one of the severest threats to the public Internet.To deal with the malware breakout ef-fectively as early as possible,an automated malware collection solution must be implemented as a precondition.An automated malware collection tool was presented based on the high-interaction honeypot principle called HoneyBow.Comparing with the Nepenthes platform based on the low-interaction honeypot principle,HoneyBow has its advantages on wilder range of captured malware samples and the capability of collecting unknown malware samples,which are vali-dated by the experiment results from wild malware collection and the case of Mocbot dealment.…”
Get full text
Article -
3265
HitIct:Chinese corpus for the evaluation of lossless compression algorithms
Published 2009-01-01“…HitIct, a Chinese corpus for the evaluation of lossless compression algorithms based on ANSI code, was proposed.In accordance with the principle of application representativeness, Complementary principle and openness principle, a large number of candidate files were obtained from the Internet, and then average compression ratio, average correlation coefficient, compression ratio correlation coefficient and standard deviation were used to select the files that give the most accurate indication of the overall performance of compression algorithms.Experimental results show that this collection has a good representativeness and stability, and can be used as the supplementary test set of the main benchmark for comparing compression methods.…”
Get full text
Article -
3266
Analysis of the ergonomics of interfaces of popular e-marketing tools
Published 2023-12-01“…Three tools designed for Internet monitoring were analysed - Brand24, Mention and Awario. …”
Get full text
Article -
3267
Indoor sensing technology based on channel state information
Published 2019-10-01“…The wide spread wireless network has brought about tremendous development of mobile internet business services and has become one of the infrastructures of modern society.The basic principles and implementation methods of wireless sensing technology were expounded from the perspective of wireless channel state analysis.The technological innovation in the field of wireless sensing in recent years was discussed,especially channel state information based human body posture detecting and environmental monitoring.Finally,the future development trend of sensing technology based on wireless communication network was analyzed in order to provide reference for related research.…”
Get full text
Article -
3268
Enhanced-AAWP,a heterogeneous network oriented worm propagation model
Published 2011-01-01“…A logical worm propagation model contributes to the analysis of how exactly various worms spread in Internet.With the abstract of heterogeneous network environments,and considering the impact of infection time on worm propa-gation,a heterogeneous network oriented worm propagation model namely Enhanced-AAWP was derived using discrete time and deterministic approximation.Then,the worms which employed local preference scanning or random scanning were studied based on Enhanced-AAWP.As the simulation results show,the amount of NAT,the density of vulnerable hosts in NATs,and the probability of local preference scanning are influencing factors during the course of worm propa-gations in heterogeneous network environments.…”
Get full text
Article -
3269
Progress of automatic driving technology and future information service architecture evolution of telecom operators
Published 2016-08-01“…The concept of artificial intelligence has been proposed for more than 60 years,with the development of internet of things and big data technology,more and more AI technology applications have been achieved.One of the most remarkable AI technology integration application is automatic driving technology.Firstly,the progress of automatic driving technology was studied.Secondly,key technologies of automatic driving were analyzed.Thirdly, the relationship between the telecom operator information service architecture and the requirements of automatic driving was analyzed.In the end,the technology breakthrough point of information service architecture with the core of application of artificial intelligence technology in the future were given.…”
Get full text
Article -
3270
Towards Accurate Node-Based Detection of P2P Botnets
Published 2014-01-01“…Botnets are a serious security threat to the current Internet infrastructure. In this paper, we propose a novel direction for P2P botnet detection called node-based detection. …”
Get full text
Article -
3271
ON INFORMATION COMPETENCE OF A MEDICAL STUDENT
Published 2016-12-01“…The authors consider the ability to search for an the expert knowledge, to analyze, select, sort and process the information obtained from outside sources via the Internet to be one of the necessary skills to assimilate into the professional environment. …”
Get full text
Article -
3272
A Survey of Content-Oriented Future Communication Network
Published 2012-09-01“…With the exposure of many shortcomings in nowadays internet, there have been lots of studies deeply in the future network around academic circles recent years. …”
Get full text
Article -
3273
Use of high-speed connectivity to global academic network for research and education in Central Asia
Published 2017-10-01“…Today, the Central Asian Research and Education Network(CAREN) is upgrading ancient Silk Road to a 21st - century high-speed internet highway for research and educational institutions through the region. …”
Get full text
Article -
3274
Analyse de l’impact du conformisme social sur l’adoption de l’e-learning dans un pays en développement
Published 2022-08-01“…Based on survey data conducted in 2015 on Cameroonian citizens and households, this paper analyzes the effects of social interaction on Internet use for researching information in relation to studies. …”
Get full text
Article -
3275
La valeur économique comme fait social : la preuve par les évaluations boursières
Published 2015-12-01“…The explosion of the CDS during the period 2001-2007 and the Internet Bubble are illustrations of this hypothesis. …”
Get full text
Article -
3276
Le périple d’Edward Snowden
Published 2013-10-01“…Facing the deluge of data available on the Internet, one of the most exciting research directions for the social scientist concerns the identification and analysis of social phenomena through this new data. …”
Get full text
Article -
3277
Simp czy sigma? Wizerunek Stanisława Wokulskiego w memach
Published 2025-02-01“…The paper indicates that internet users usually refer two contemporary categories to describe certain episodes from the character’s life and the attitudes he displays: the simp and the sigma. …”
Get full text
Article -
3278
Thinking of the smart network development caused by collective motion:situational-section fitting network
Published 2018-05-01“…Exploring the way of global coordinated controlling of internet resources for the consistency of user experience,is a difficult problem to be solved urgently in the development of smart network at present.Inspiration was got from the natural collective motion,and a coordinated fitting scheme of globe-domain resources based on node self perception,autonomous decision and automatic adjustment——situational-section fitting network (SiFiNet) was proposed.The basic concept of situational network was given,and the core mechanisms of scene perception modeling,scene fitting decision and service adaptive loading were discussed,which provided a possible solution for the development of smart network.…”
Get full text
Article -
3279
Development trend and application analysis of blockchain with 5G
Published 2020-03-01“…Through the evolution from the information internet era of large connections and large collaborations to the era of strong trust and strong security,the blockchain has triggered a multi-wave technology wave with its characteristics of openness,transparency and decentralization,becoming the new generation of information technology development trends.Starting from the dimensions of technology,people's livelihood and industry,the infrastructure and evolution trends reveal that the blockchain was the essence of the reorganization and re-innovation of the existing technology.The applications were re-divided into the currency circle and chain ring from a technical perspective.By comparing the blockchain technology with 5G technology,the innovative application scenarios of the decoupling and cross-integration were explored that may be involved in the future of the blockchain.…”
Get full text
Article -
3280
Realization of Looking up Virtual Router's FIB Based on Set Partition
Published 2014-10-01“…Virtual router is a core network device of future internet, which runs multiple virtual routers in parallel on a common physical router platform. …”
Get full text
Article