Showing 3,381 - 3,400 results of 5,694 for search '"internet"', query time: 0.11s Refine Results
  1. 3381

    E-TECHNOLOGY FOR MONITORING MEDICAL STUDENT’S ACADEMIC PERFORMANCE IN QUALITY MANAGEMENT SYSTEM OF EDUCATION by Ksenia A. Mitrofanova, Petr V. Ivachev, Konstantin V. Kuzmin

    Published 2016-12-01
    “…The majority of students continued to use the Internet for educational purposes more actively. Furthermore, some students developed their skills in using e-Learning technologies.…”
    Get full text
    Article
  2. 3382

    Multiple Addressing Coordination and Switching Technology in Space-Integrated-Ground Information Network by Wenlan DIAO, Jianping AN, Yu ZHANG, Han HU

    Published 2020-12-01
    “…The construction requirements and deployment status of the space-integrated-ground integrated information network was analyzed, and the diffi culties in the integration of satellite network and internet was discussed.To tackle the problems of complex network structure, high dynamic topology, diffi cult data compatibility and limited satellite resources, a multi addressing coordination and switching technology based on IP address, ID identifi cation and content name was proposed.In particular, a multi addressing datagram format was designed, and the multi addressing route forwarding mechanism was extended.It could realized the interconnection of heterogeneous networks, the stability of mobile communication, the compatible switching of polymorphic data, and the effi cient routing with low power consumption of satellites.…”
    Get full text
    Article
  3. 3383

    Security risk analysis of power 5G hybrid networking by Xiaojian ZHANG, Jiaxuan FEI, Haitao JIANG, Qigui YAO

    Published 2022-01-01
    “…5G communication technology provides strong support for the power internet of things, and it also introduces new security challenges in the application process of the power industry.Starting from the analysis of the needs of the power 5G business, five 5G networking deployment and construction plans were proposed, and a comparative analysis of them was conducted in security and cost.And then, a hybrid networking architecture of 5G and power communication networks was proposed, and the 5G network slicing architecture was re-segmented according to business scenarios.Finally, from the four parts of terminal access, edge computing, network channel and core network, the security risks introduced by 5G technology were analyzed in detail.…”
    Get full text
    Article
  4. 3384

    Research on various deployment schemes and service modes of 5G base station private network module by Yingqi WEI, Yue HUANG, Shuangjiu WU

    Published 2022-05-01
    “…In order to promote the rapid implementation of 5G private network on the enterprise side, support enterprises to adopt 5G to transform their own network and improve network capacity, a scheme to realize minimalism, deploy minimalism and quickly build enterprise 5G private network was built.The scheme adopts 5G base station private network module to realize 5G data flow’s local breakout, that is 5G data flow can jump directly to the enterprise intranet.According to the enterprise's on-site needs, the private network can be flexibly built in the way of 1-to-1 and 1-to-N deployment, which is suitable for supporting 5G coverage of temporary venues, establishing local 5G network, industrial internet 5G bearer and other scenarios.…”
    Get full text
    Article
  5. 3385

    Are mobile devices playing a part in creating new tourist practices? Les Champs-Elysées: a case study by Marie Delaplace, Leïla Kebir

    Published 2020-12-01
    “…Drawing on the data relating to respondents who described the purpose of their visit as “tourism”, we shall demonstrate that although they had access to this technology, and over three-quarters had internet connectivity, their usage was ultimately very traditional in that it largely facilitated pre-existing practices in a different way.…”
    Get full text
    Article
  6. 3386

    Analysis on the research progress of space division multiplexing in optical fiber communication by Junsen LAI, Rui TANG, Bingbing WU, Wenxuan WU, Hongfa LI, Guojun LIU, Wenyu ZHAO, Haiyi ZHANG

    Published 2017-09-01
    “…The evolution of optical fiber communication technology is driven by the ceaseless growth of capacity demand of Internet.Space division multiplexing (SDM) based on multi-core fiber,few-mode fiber,few-mode multi-core fibers and orbital angular momentum has become the focus of academy and industry.Key technologies and latest research progress were reviewed,including novel fiber design,spatial mode conversion,spatial channel de/multiplexing and optical amplification.Based on the comparison and analysis of four kinds of SDM technologies,their bottlenecks and potential future application were also discussed.…”
    Get full text
    Article
  7. 3387

    Survey of controller placement problem in software defined network by Xian-ming GAO, Bao-sheng WANG, Wen-ping DENG, Jing TAO

    Published 2017-07-01
    “…In order to change situation of high management complexity in current Internet,software defined network (SDN) was proposed,which mainly aimed to directly control forwarding behaviors of data-flow by using flow strategies generated by controllers.With the deployment and applications of SDN,research communities found that the controller placement in SDN network could directly affect network performance.In recent years,controller placement problem (CPP) has become a hot topic,where performance metric and searching algorithms are important research areas.Based on current researches,the existing controller placement problem was systematically analyzed and summarized,which was expected to be helpful for the follow-up research.…”
    Get full text
    Article
  8. 3388

    Research on caching strategy based on transmission delay in Cell-Free massive MIMO systems by Rui WANG, Min SHEN, Yun HE, Xiangyan LIU

    Published 2021-12-01
    “…To meet the ultra-low latency and ultra-high reliability requirements of users in the future mobile Internet, the wireless caching technology was combined with Cell-Free massive MIMO systems.The caching model was designed based on AP cooperative caching and regional popularity evaluation.The transmission delay expression involving AP clustering, cooperative caching, and regional popularity was derived, and the content placement problem was expressed as total content transmission delay minimization.Through the demonstration of the NP-hard and submodular monotony of the optimization problem, the greedy algorithm-based optimization strategy was proposed.Simulation results show that the proposed strategy can effectively reduce the content transmission delay and improve the cache hit rate.…”
    Get full text
    Article
  9. 3389

    Research on cloud native based distributed IoT operating system architecture by Nan CHEN, Jianjun ZHAO, Ping ZHONG, Yongjun HUANG, Tian CHEN

    Published 2022-07-01
    “…Complex application development, various types of IoT devices, diverse network technology and different types of IoT edge are the major problems of IoT.The novel concept and architecture of the cloud native based distributed IoT operating system were proposed with 8 core features, which extended the scope of operating system from IoT devices to the edge and cloud, followed the trend analysis of IoT industry and technology.The cloud native based distributed IoT operating system has been utilized to decoupling the complexity and differences of massive heterogeneous resources of cloud (platform), edge gateway, devices and the one-stop full life cycle support of intelligent Internet of things applications development, deployment and hosting.The research and development practices of CTWing OS as well as testing and applications were also introduced.…”
    Get full text
    Article
  10. 3390

    Amitiés particulières au Maghreb : sociabilités et discours homosexuels by Valérie Beaumont

    Published 2010-12-01
    “…Finally, this article reveals the means used to objectify identities and sexual orientations, particularly through migration, associations and the Internet, in a context where social and ideological currents, whether local or external, are structuring new patterns of life that lead to both openness and withdrawal back to conservative moral and religious values.…”
    Get full text
    Article
  11. 3391

    Research progress of digital image forensic techniques based on deep learning by Tong QIAO, Hongwei YAO, Binmin PAN, Ming XU, Yanli CHEN

    Published 2021-10-01
    “…In the new era of rapid development of internet, where massive forgery images with updated tampering techniques flood into, traditional algorithms are no longer able to deal with the latest multimedia tampering techniques, especially those caused by Deepfake and deep learning techniques.Thus, a universal framework for image forensics including image pre-processing module, feature extraction module and post-processing module designed for specific classification were proposed creatively.Accordingly, the state-of-the-art algorithms were reviewed,and meanwhile the main strength and limitations of current algorithms were generalized.More importantly, the future studies were also listed for advancing the development of digital image forensics.…”
    Get full text
    Article
  12. 3392

    DDoS defense with IP traceback and path identification by JIN Guang, ZHANG Fei, QIAN Jiang-bo, ZHANG Hong-hao

    Published 2011-01-01
    “…A novel idea to combine both IP traceback and path identification(Pi) was proposed,and malicious packets could be identified and filtered at located upstream nodes.Then a practical packet marking and filtering scheme was proposed.The nodes along the path out of the destination domain deployed Pi.Meanwhile the border router of the destination domain deployed the traceback marking scheme.The victim could retrieve related information from arrived malicious packets.Then Pi-based filtering could be implemented at the border ingresses.A practical marking,storing and filtering scheme was provided in detail.The results of large-scale simulations with authoritative Internet topologies show the scheme is effective to alleviate attack impacts on the victim and upstream links in the destination domain.…”
    Get full text
    Article
  13. 3393

    IMPROVEMENT OF TECHNOLOGY OF SALES ON THE BASIS OF USE OF MECHANISMS OF SEARCH OPTIMIZATION by N. Kazakova, L. Mikhailova, A. Sazonov

    Published 2019-03-01
    “…The technology of search optimization as one of elements of the digital marketing directed to increases in volume of Internet sales at the present stage of development of economy has been analyzed. …”
    Get full text
    Article
  14. 3394

    5G deterministic network key technology research and application by ZHU Shiyin, YANG Jian, KONG Lei

    Published 2024-08-01
    “…5G deterministic network is an important part to support the construction of 5G+ Industrial Internet, and it is of great significance to study the key technologies and landing schemes of 5G deterministic network. …”
    Get full text
    Article
  15. 3395

    Research progress of mobile video prefetching for mobile content distribution networks by Shihang ZHANG, Yawen LUO, Min ZHANG, Qifu SUN, Xiaolong YANG

    Published 2021-01-01
    “…With the development of mobile internet and the popularization of video applications, the mobile content distribution network (MCDN) emerged as the times require.Prefetching technology is one of the key technologies for content distribution.It predicts the user’s future requests and prefetches the predicted content to the network edge in advance, thereby reducing the data acquisition delay and improving the quality of experience (QoE).In order to elaborate on the development status of mobile video prefetching technology, the latest research results of mobile video prefetching technology were introduced from the perspectives of user’s mobile behavior perception, content attribute perception, and network resource perception.And finally its main advantages and disadvantages were analyzed and the direction of further research in the future was pointed out.…”
    Get full text
    Article
  16. 3396

    Sentiment Analysis of International and Foreign Chinese-Language Texts with Multilevel Features by Minxia Zhu

    Published 2022-01-01
    “…This paper takes the application of international Chinese to foreigners on the Internet as the research object. A variety of features are constructed according to the characteristics of international and foreign Chinese texts and networks. …”
    Get full text
    Article
  17. 3397

    The real world guide to psychotherapy practice by Alex N. Sabo & Leston Havens (Eds.) by P. M. Heyns

    Published 2002-12-01
    “…Daar is ook die eis dat dienste deur laervlakkundiges gelewer moet word en dat antwoorde selfs liewer op die internet gesoek moet word. Dit noodsaak ’n herbesinning oor die swetterjoel psigoterapeutiese benaderings wat tans wel bestaan, veral ook in die lig daarvan dat kognitiewe-gedragsterapeutiese benaderings, gerugsteun deur positiewe navorsingsliteratuur, wel dikwels vinnige resultate beloof. …”
    Get full text
    Article
  18. 3398

    Research and design of hybrid scheduling system of node operating system for cyber physical systems by Xiao-zhou DU, Chen-hong CAO, Jian-zhong QIAO, Shu-kuan LIN

    Published 2013-12-01
    “…In accordance with the new characteristics of physical,internet and intelligence of CPS,a hybrid scheduling system was designed for CPS node operating system with real-time performance,flexibility,and adaptability.Based on the in-depth study of the intrinsic differences between event-driven scheduling mechanism and multithreaded one,a hybrid programming model was designed that combines collaborative multithread and hybrid stack management using adapter mechanism.A hybrid scheduling model was also designed that supports both event and thread task types.Reasonable real-time algorithms were implemented for verification.Experimental results show that the real-time per-formance of the scheduling system is obviously better than that of TinyOS,thus it is better suited for CPS than TinyOS does.…”
    Get full text
    Article
  19. 3399

    Digital adaptation issues for different demographics in Russian Moscow region by L. G. Akhmaeva, D. V. Dolgopolov, A. I. Eremeeva

    Published 2020-12-01
    “…The article considers the interaction specifics with the digital environment and gadgets for various demographic sections, as well as their involvement in modern global trends regarding Internet addiction and online positioning. The article concludes that the development of various communication channels depending on demographic targeting is required.…”
    Get full text
    Article
  20. 3400

    Viralité et starisation : le procès Johnny Depp / Amber Heard by Laura Santone

    Published 2024-12-01
    “…The analysis is thus developed on two complementary levels: on the one hand, it is based on the notions of PDV (Point of View), empathy, empathic mobility and extimising empathy; on the other, it draws on the « affects », and the imagination, of fans/internet users, for whom the star, as Edgar Morin wrote in the 1970s, « is the fruit of a projection-identification complex of particular virulence ». …”
    Get full text
    Article