Showing 3,301 - 3,320 results of 5,694 for search '"internet"', query time: 0.08s Refine Results
  1. 3301

    Selected results from a large study of Web searching: the Excite study by Amanda Spink, Jack L. Xu

    Published 2000-01-01
    “…This paper reports selected findings from an ongoing series of studies analyzing large-scale data sets containing queries posed by Excite users, a major Internet search service. The findings presented report on: (1) queries length and frequency, (2) Boolean queries, (3) query reformulation, (4) phrase searching, (5) search term distribution, (6) relevance feedback, (7) viewing pages of results, (8) successive searching, (9) sexually-related searching, (10) image queries and (11) multi-lingual aspects. …”
    Get full text
    Article
  2. 3302

    Research and design of the intelligent energy management and control platform in the airport area based on the IoT technology by Yuan HUANG, Gang WU, Junyong LIU, Chenxi YANG, Mengpin GAO

    Published 2021-06-01
    “…The construction of the green airport urgently needs an efficient energy security information system in face of the electric energy substitution and clean energy access.A design idea of the intelligent energy management and control platform in the airport area based on the Internet of things (IoT) technology was proposed.The platform included a perception layer, a network layer, a data layer and an application layer.The IoT technology and the fusion technology of the information and energy were adopted to realize the application scenarios for multiple users.Finally, an energy control platform framework was designed by combing the energy information of a civil hub airport to provide basic services for further exploration of the value of the energy.…”
    Get full text
    Article
  3. 3303

    Sağlık İletişiminde Yeni Yaklaşımlar: Dijital Medya Kullanımı by Zekiye Tamer Gencer, Yılmaz Daşlı, Enis Baha Biçer

    Published 2019-04-01
    “…Sektörel olarak özelleşme kişiye özel hizmet anlamına geldiğinden, internet kullanıcıları hem bireyler hem de sağlık kurumları nezdinde sayıca artış göstermiştir. …”
    Get full text
    Article
  4. 3304

    A Cross-Sectional Study on the Affordable Care Act from the Perspective of People Living with HIV: The Interplay between Knowledge, Stigma, Trust, and Attitudes by Christopher Kaperak, Sarah Elwood, Tamara Saint-Surin, Christopher Winstead-Derlega, Robert O. Brennan, Rebecca Dillingham, Kathleen A. McManus

    Published 2020-01-01
    “…HIV clinicians and case managers should consider disseminating information about the ACA and its impact on HIV care delivery via internet videos. Lack of internet and stigma are a threat to PLWH gaining actionable healthcare information.…”
    Get full text
    Article
  5. 3305

    3D highly isolated 6-port tri-band MIMO antenna system with 360° coverage for 5G IoT applications based machine learning verification by Md Afzalur Rahman, Samir Salem Al-Bawri, Sultan S. Alharbi, Wazie M. Abdulkawi, Noorlindawaty Md Jizat, Mohammad Tariqul Islam, Abdel-Fattah A. Sheta

    Published 2025-01-01
    “…Abstract A multipurpose antenna system that can handle a broad area of frequencies is crucial in the effort to build up widespread 5G Internet-of-Things (IoT) networks. For fifth-generation Internet-of-things applications, this research introduces a new multi-band antenna that can operate in the sub-6 GHz band (2–7 GHz), Ku-band (13–17.5 GHz), and millimeter wave band (25–39 GHz). …”
    Get full text
    Article
  6. 3306

    Cerrando brechas: género y competencias digitales en la formación inicial del profesorado para una ciudadanía digital igualitaria by Alba de la Cruz Redondo, Antonia García Luque

    Published 2025-01-01
    “…No obstante, se percibe una tendencia al uso diferencial de internet y las tecnologías en función del género y algunos indicadores muestran que aún queda lejos una era digital igualitaria en términos de género.…”
    Get full text
    Article
  7. 3307

    Circular economy: A sustainable model for waste reduction and wealth creation in the textile supply chain by Anik Kumar Das, Md. Farhad Hossain, Borhan Uddin Khan, Md. Mahfuzur Rahman, M. A. Z. Asad, Mahmuda Akter

    Published 2025-01-01
    “…This article explores how transitioning to a CE model could mitigate the industry's environmental damage while influencing economic growth. Furthermore, how internet of things (IoT) (Internet of things) can be contributed to CE initiatives by providing a transparent traceability along the whole textile supply chain. …”
    Get full text
    Article
  8. 3308

    Anti-HBs Positivity Related to Past HBV Infection and Vaccination in Older Adults in Polish Population—Cohort-Based Study by Katarzyna Zięba, Kacper Jagiełło, Joanna Musialik, Łukasz Wierucki, Adam Hajduk, Małgorzata Mossakowska, Jerzy Chudek

    Published 2024-12-01
    “…Being functionally independent, ‘white collar’, using the Internet, and having past surgical procedures are factors associated with a higher chance of being vaccinated. …”
    Get full text
    Article
  9. 3309

    Audit Tata Kelola Teknologi Informasi pada Pengukuran Kinerja dan Kapasitas Bandwith berdasarkan Cobit 4.1 by Widya Sayekti, Juliana Ermawati, Renny Sari Dewi

    Published 2020-02-01
    “…Berdasarkan pembagian fokus penelitian, maka penulis membatasi riset ini hanya pada pengelolaan kapasitas bandwidth internet di UISI. Penelitian ini didasari pada kerangka kerja Control Objective for Information and related Technology (COBIT) 4.1 terutama pada sub proses DS 3. …”
    Get full text
    Article
  10. 3310

    Analisis Kemiskinan Digital Indonesia di Era Revolusi Industri 4.0 by Permata Sakti

    Published 2022-02-01
    “…Hasil penelitian menunjukkan kemiskinan digital di Indonesia secara umum menurun. Kemudahan internet akses dan distribusi infrastruktur yang lebih baik bisa menjadi penyebab turunnya hal tersebut. …”
    Get full text
    Article
  11. 3311

    VIRTUALIZATION OF IDENTITY IN THE CONTEXT OF SELF-REALIZATION OF A PERSONALITY by Y. V. Lyubiviy, R. V. Samchuk

    Published 2020-12-01
    “…It was found that a necessary condition for the formation of a virtual identity is the exchange of results of productive and intermediary activities between Internet users, which they carry out in Internet networks with the help of virtual reality itself. …”
    Get full text
    Article
  12. 3312

    Analisis Tingkat Kepuasan Pengguna Aplikasi Mytelkomsel Menggunakan Evaluasi Heuristik dan Metode Pieces (Studi Kasus : Mahasiswa Kampus Karawaci Universitas Gunadarma) by Fajar Nugraha, Dewi Agushinta Rahayu, Irwan Bastian

    Published 2022-06-01
    “…Tujuan aplikasi ini untuk memberikan informasi tentang sisa pulsa, kuota internet yang aktif, masa aktif kartu Subscriber Identity Module (SIM), dan masih banyak lagi. …”
    Get full text
    Article
  13. 3313

    Social protection management system in the Altai Republic by E. V. Domashova

    Published 2021-06-01
    “…As a result of the analysis of Internet resources as well as theoretical analysis of the reports of the Ministry of Labor, Social Development and Employment of the Altai Republic, problematic areas of the functioning of the social protection management system of the republic were identified.…”
    Get full text
    Article
  14. 3314

    The Effects O Artificial Intelligence And Robotic Systems On Librarianship by Müslüm Yıldız, Banu Fulya Yıldırım

    Published 2018-03-01
    “…In this study, the possible effects of artificial intelligence and robotic systems on the profession of librarianship/information and document management were evaluated considering the findings of research conducted at Oxford University in 2017 and it was emphasized that in the near future, the only way to continue in this profession would be to keep the professional knowledge up to date as well as to follow the technological developments in areas such as computers, communication, and the internet.…”
    Get full text
    Article
  15. 3315

    INVESTIGATION OF THE WEB ANALYTICS ROLE IN IMPROVING THE EFFICIENCY OF THE ORGANIZATION`S PERFORMANCE by O. V. Demkina, N. G. Shalamova

    Published 2019-06-01
    “…Web analytics allows you to collect and analyze information about visitors of Internet resources.The main metrics, used in web analytics, have been considered in the article, including domestic organizations in various fields of activity. …”
    Get full text
    Article
  16. 3316

    Novel cyberspace-oriented access control model by Feng-hua LI, Yan-chao WANG, Li-hua YIN, Rong-na XIE, Jin-bo XIONG

    Published 2016-05-01
    “…A novel cyberspace-oriented access control model was proposed,termed as CoAC,which avoided the threats by comprehensively considering vital factors,such as access requesting entity,general tense,access point,device,networks,resource,internet-based interactive graph and chain of resource transmission.By appropriately adjusting these factors,CoAC emulated most of typical access control models and fulfilled the requirements of new information service patterns and dissemination modes.The administrative model of CoAC was also presented and the functions and methods for administrating CoAC were described by utilizing Z-notation.CoAC is flexible and scalable,it can be further refined and expanded to figure out new opportunities and challenges in the upcoming access control techniques.…”
    Get full text
    Article
  17. 3317

    The Fourth Industrial Revolution: Another Industrial Revolution Leaving Black Women Behind? by Malaika Mahlatsi

    Published 2020-03-01
    “…This fusion of advances in complex technologies, including but not limited to robotics, quantum computing, blockchain, artificial intelligence (AI) and the internet of things (IoT), would affect all disciplines and industries of the modern world. …”
    Get full text
    Article
  18. 3318

    Network authentication technology based on public key system by Songtao PANG

    Published 2016-02-01
    “…Network authentication technology is the key to the application of internet plus security. The digital signature which depends on the certificate authority (CA)and PKI based on public key system is the main method for identity and message authentication. …”
    Get full text
    Article
  19. 3319

    TEXT CLASSIFICATION BASED ON SUPPORT VECTOR MACHINE by Lê Thị Minh Nguyện

    Published 2019-06-01
    “…The development of the Internet has increased the need for daily online information storage. …”
    Get full text
    Article
  20. 3320

    A survey of distributed denial-of-service attack, prevention, and mitigation techniques by Tasnuva Mahjabin, Yang Xiao, Guang Sun, Wangdong Jiang

    Published 2017-12-01
    “…With simple but extremely powerful attack mechanisms, it introduces an immense threat to current Internet community. In this article, we present a comprehensive survey of distributed denial-of-service attack, prevention, and mitigation techniques. …”
    Get full text
    Article