Showing 3,341 - 3,360 results of 5,694 for search '"internet"', query time: 0.11s Refine Results
  1. 3341

    Risk, Disappointment and Distraction in Keith Gessen’s All the Sad Young Literary Men by James Peacock

    Published 2014-01-01
    “…For these young men it becomes, along with Google searches and internet pornography, a form of distraction. Gessen poses a problem: writing has a responsibility to address historic events contemporaneously but increasingly, in competition with the visual image, only has power or purpose when viewed retrospectively as part of an earlier structure of feeling.…”
    Get full text
    Article
  2. 3342

    الصوتیات والمرئیات المتاحة عبر المواقع الاسلامیة : دراسة کمیة ونوعیة by د. فاطمة ابراهیم خمیس

    Published 2015-04-01
    “…The paper focus on the motivations and behaviors of users consening audiovisual materials available on Internet , also the problems the users are facing , In addition the paper try to determining the best Islamic sites from quality point of view containing audios and videos based on browsers frequency visits to these sites , Finally evaluate those sites technically and. objectively…”
    Get full text
    Article
  3. 3343

    Development of carrier’s IP bearer network in cloud-network coordinated era by Yongqing ZHU, Xiaoying HUANG, Wenqiang ZHANG

    Published 2017-11-01
    “…IP bearer network is one of the basic internet infrastructures.It plays a more and more important role in the cloud-network coordinated era.Entering the era of everything interconnected,the IP beaer network evolution has changed from network-centric to user-centric.Combined the current situation of the IP bearer network with the research of related technologies and service,some suggestions on IP bearer network development based on the concept of “experience circle” were given.The “experience circle” concept came from the research on traffic regional aggregation,which offered a way to optimize the IP bearer network based on user’s experience,as well as suggestions on IP-transport synergy and application coordination.…”
    Get full text
    Article
  4. 3344

    Strategy Study to Enhance the Value of Telecom Operators Based on Traffic Management——Empirical Analysis of S Corporation by Biao He, Mingguang Zhang, Lu Li

    Published 2013-11-01
    “…Operator has to mine customer needs and refine traffic management to avoid being only pipe in the mobile internet era, achieve a shift from the pipe to the bilateral market organizer, and enhance the value of telecom operator. …”
    Get full text
    Article
  5. 3345

    “A Wandering Existence”: Social Media Practices of Chinese Youth in the Context of Platform-Swinging by Hongxun Zhao, Jiahui Wang, Xurui Hu

    Published 2025-02-01
    “…In the era of ubiquitous mobile internet, Chinese youth are engaging in dual pursuits of knowledge and employment through various social media platforms, showcasing unique social media practices. …”
    Get full text
    Article
  6. 3346

    Research on VoNR solution application by Bei LI, Guanghai LIU, Tian XIAO, Yuhua HU, Hangbo ZHENG, Chen CHENG, Yifan WU, Xiuzhen HUANG

    Published 2022-05-01
    “…In the 5G era, in order to improve user perception, shorten call setup delay, and enhance the clarity of real-time voice communication, 3GPP standard introduces the VoNR solution.VoNR is to allow voice, video and data services to be carried on the 5G network, let users experience the high-definition and high-quality audio and video call services, and enjoy 5G high-speed data Internet services while calls.The VoNR technical characteristics and the VoNR solution implementation effect were deeply analyzed.The current challenges faced by the VoNR solution were presented, which provided technical reference for the subsequent nationwide implementation of VoNR.…”
    Get full text
    Article
  7. 3347

    Method of unknown protocol classification based on autoencoder by Chunxiang GU, Weisen WU, Ya’nan SHI, Guangsong LI

    Published 2020-06-01
    “…Aiming at the problem that a large number of unknown protocols exist in the Internet,which makes it very difficult to manage and maintain the network security,a classification and identification method of unknown protocols was proposed.Combined with the autoencoder technology and the improved K-means clustering technology,the unknown protocol was classified and identified for the network traffic.The autoencoder was used to reduce dimensionality and select features of network traffic,clustering technology was used to classify the dimensionality reduction data unsupervised,and finally unsupervised recognition and classification of network traffic were realized.Experimental results show that the classification effect is better than the traditional K-means,DBSCAN,GMM algorithm,and has higher efficiency.…”
    Get full text
    Article
  8. 3348

    Community Contacts: Being Prepared for a Disaster by Linda B. Bobroff

    Published 2003-07-01
    “…The time to get ready is NOW, so call the agencies for information or, if you have Internet access, look at the websites and print out what you need. …”
    Get full text
    Article
  9. 3349

    Analysis of telecom operators’ IoT strategy from the perspective of 2G/3G transition by Xiaozhong LIU, Junyu FANG, Yongbin JIANG

    Published 2022-10-01
    “…In the context of 2G/3G transition, it is a general trend for NB-IoT and LTE Cat.1 to undertake their business development.On the basis of reviewing and analyzing the current status and trends of the 2G/3G-IoT (Internet of things) business, sorting out the IoT business development strategies of the three major domestic telecom operators at the terminal, network and application levels, the three existing business models of telecom operators in the NB-IoT and LTE Cat.1 business area were summarized, including traffic-oriented, platform-supported, and application-enabled.Finally, from three aspects of business opportunity expansion, product marketing and team services, the future upgrade of the business model was prospeted.…”
    Get full text
    Article
  10. 3350

    Retour de l’absent by Claire Demesmay, Sabine Russ-Sattar, Katrin Sold

    Published 2018-11-01
    “…It draws its data from a mixed methodological basis, using existing research papers, statistical data from the IOM and other IGOs as well as press and internet site analysis. Its empirical core however, is comprised of semi-structured interviews and background talks with members of the Tunisian expatriate communities in France, Italy and Germany in spring and summer 2014, i.e. in the key period between the adoption of the new Constitution and the Tunisian parliamentary elections of October.…”
    Get full text
    Article
  11. 3351

    Cross-Domain Recommendation Algorithm Based on Latent Factor Model by Sheng Gao, Siting Ren, Jun Guo

    Published 2015-07-01
    “…In the internet environment,the combining of multi-source heterogeneous information objects in different areas makes users face information selection dilemma problem in big data environment.It has been very difficulty for traditional information recommendation algorithms to adapt to the interdisciplinary information recommendation service.The evaluation model from a user clustering set to an information object clustering set has common characteristics of cross-domain and personality characteristics of single domain.By analyzing the evaluation data from users to information objects in different areas,these characteristics were extracted based on latent factor model.Then by transmitting and sharing the common characteristics of cross-domain,the data sparseness problem of target field was alleviated,which could improve the accuracy of cross-domain information recommendation.…”
    Get full text
    Article
  12. 3352

    Towards the Integration between IoT and Cloud Computing: An Approach for the Secure Self-Configuration of Embedded Devices by Antonio Puliafito, Antonio Celesti, Massimo Villari, Maria Fazio

    Published 2015-12-01
    “…The secure boot-up and setup of Internet of Things (IoT) devices connected over the Cloud represent a challenging open issue. …”
    Get full text
    Article
  13. 3353

    Promethee Sıralama Yöntemi İle Özel AlışverişSiteleri Üzerine Bir Araştırma by Nihan Özgüven

    Published 2012-02-01
    “…İnternet üzerinden alışverişyapmanın tüketicilere sağladığıfaydalar, internetten alışverişeğiliminin artmasına neden olmuştur. …”
    Get full text
    Article
  14. 3354

    Neobanki jako element cyfrowej transformacji finansów by Dorota Ślażyńska-Kluczek

    Published 2022-07-01
    “…Klienci oczekują płatności wykonywanych szybko i bezpiecznie, unikają ponadto wizyt w oddziałach banków, a preferują kontakt poprzez Internet oraz aplikacje mobilne. W obliczu wyzwań cyfryzacji banki proponują nowe rozwiązania spełniające oczekiwania klienta. …”
    Get full text
    Article
  15. 3355

    Community Contacts: Being Prepared for a Disaster by Linda B. Bobroff

    Published 2003-07-01
    “…The time to get ready is NOW, so call the agencies for information or, if you have Internet access, look at the websites and print out what you need. …”
    Get full text
    Article
  16. 3356

    Dynamic and semantic-aware access-control model for privacy preservation in multiple data center environments by Aiguo Chen, Guoming Lu, Hanwen Xing, Yuan Xie, Shunwei Yuan

    Published 2020-05-01
    “…With the rapid development of intelligent perception and other data acquisition technologies in the Internet of things, large-scale scientific workflows have been widely used in geographically distributed multiple data centers to realize high performance in business model construction and computational processing. …”
    Get full text
    Article
  17. 3357

    Behavior authentication of Web users based on machine learning by Zenan WU, Liqin TIAN, Zhigang WANG

    Published 2018-01-01
    “…According to the security problem of Web user information,the user behavior was analyzed and authenticated by the method of machine learning.First of all,through the principal component analysis to reduce the dimension of the original data set,then use the SVM algorithm to allow the computer to learn the history of user behavior evidence,to get a model to identify the user's identity.The practical application and theoretical analysis show that the model in user behavior identification authentication,can be more accurate and efficient classification of dangerous users and trusted users,analysis lay a solid theoretical and practical basis for the high performance user behavior such as electronic commerce,network finance and other key of Internet applications.…”
    Get full text
    Article
  18. 3358

    National key information infrastructure:status,international comparison and policy recommedations by Sude QING, Yang SONG, Li ZHAO, Lei CAO

    Published 2017-08-01
    “…2015 is the year when “the 12th Five-year Plan” fully completed,and “the 13th Five-year Plan” starts.To discover problems,judge trends and solve problems are the top priorities in the first year of planning.According to“Global Information Technology Report 2015”that released by World Economic Forum,China is also facing three weaknesses,such as the low per capita internet bandwidth,the limited mobile broadband penetration and the urgent need of innovation environment.Situation analysis and international comparison were presented,and policy recommendations were given from three major aspects,such as improving broadband capabilities,developing Aerospace integrated networks and innovative application environments,which break down into six sub-directions such as domestic broadband networks,international network layout,mobile communications,space infrastructure,application infrastructure and software-defined network.…”
    Get full text
    Article
  19. 3359

    Geçici Bilgi İhtiyacının Giderilme Sürecinde Kullanıcı Okuma Davranışlarının İncelenmesi by Veli Özcan Budak

    Published 2021-12-01
    “…Kısa süreli/geçici olarak ortaya çıkan bilgi ihtiyacımızı gidermek amacıyla sıklıkla başvurduğumuz arama motorları gibi internet tabanlı araçlar sayesinde, bilgiye erişme işlemi hız ve pratiklik kazanmıştır. …”
    Get full text
    Article
  20. 3360

    Achieving efficient location privacy protection based on cache by Lu-lu LI, Jia-feng HUA, Sheng WAN, Hui ZHU, Feng-hua LI

    Published 2017-06-01
    “…With the development of mobile Internet and the popularization of intelligent terminals,location based services(LBS) has been widespread in navigation,social network and other fields.Due to the sensitivity of personal location information,data privacy protection related to location of mobile objects has become the hotspots of research.Considering the openness of the background information,and based on the information cache mechanism,a dummy selection algorithm was proposed to reduce the number of interactions between the user and the untrusted server and combine the k-anonymity to achieve efficient location privacy.Without relying on trusted third party,the scheme can prevent the attackers owned background information from inference attack,and the detail simulation results indicate its effectiveness and efficiency.…”
    Get full text
    Article