Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
3401
L’injonction à participer au monde numérique
Published 2017-09-01“…Does the rhetorical insistence of analysts to find the existence of this “participation” not tantamount to playing the game of the big companies of the Internet ? Today, the capture of traces opens up to a permanent commodification of human time and the monetization of attention.…”
Get full text
Article -
3402
Design of network management and regulation system over flexible reconfiguration
Published 2012-11-01“…Network management and regulation system is a new arising appliance for the manageable,controllable and trustworthy demand of the Internet.The architecture design of the backbone link-level management and regulation system usually follows the core router,in which the separation of the data plane and the control plane could not meet the requirement of HW/SW data co-process,the rigid connection with closed building style could not satisfy the flexible identification of new applications.The loosely coupled switching HW/SW co-process architecture and the iterative looping HW/SW migration architecture were proposed,which could satisfy the above HW/SW co-process demand and the new application flexible identification demand.…”
Get full text
Article -
3403
ELECTRONIC VOTING TECHNOLOGIES IN RUSSIA
Published 2019-12-01“…An important positive effect of the introduction of Internet technologies is to increase the awareness of citizens about the elections and their participants, as well as to reduce the financial costs of voting and fast processing of its results. …”
Get full text
Article -
3404
Konseling Online: Sebuah Pendekatan Teknologi Dalam Pelayanan Konseling
Published 2013-02-01“…Various forms and types of service in counseling can be applied by utilizing internet technology, such as Email, Chat Program, Videoconferencing Program dan Webcam. …”
Get full text
Article -
3405
A Multi-Interface Platform System for Assistance and Evaluation of Disabled People
Published 2011-01-01“…The software facilitates the saving of experimental data for analysis, it can be automatically reconfigured to match user’s ability, and it is operated locally or remotely through the internet. Quantitative indicators are defined for evaluation purposes and to determine the needed assistance and adaptation. …”
Get full text
Article -
3406
Analysis and status of the scattering channel model for ultraviolet communications
Published 2021-06-01“…Due to its unique features such as high local security, low background noise, and non-light-of-sight communication, the ultraviolet communication, which uses the light wave of “solar blind” wavelength (200~280 nm) as the information carrier, becomes a promising optical communication technique for applications in both secure communications and internet of vehicles and so on.The scattering channel models were classified into analytical channel models and stochastic channel models according to their different computational efficiencies.The research of the first three scattering orders in analytical channel models and the Monte-Carlo simulation model and Monte-Carlo integration model in stochastic channel models were mainly focused on.Some future research directions for the scattering channel model of ultraviolet communications were also provided.…”
Get full text
Article -
3407
Future IP network architecture evolution for service and network collaboration
Published 2021-10-01“…As the technical foundation of the internet, how IP technology develops in the next 5 to 10 years is the key issue facing the communication industry.The success and weakness of the traditional IP network architecture were analyzed, and the future IP network should not only inherit the design principles of the traditional IP technology was proposed, such as the end-to-end principle and layered decoupling principle, but also solve the problem that the service is too separated from the network.From the perspective of network evolution and future service requirements, the core issue of future IP networks is to strengthen the collaboration of between services and networks , and the improved IP network design principle “horizontal: end-to-end principle empowered by service-oriented network, vertical: layered model supported by intelligent control plane” was proposed, and based on this principle, the reference architecture of the future network was proposed.…”
Get full text
Article -
3408
Computing method for periodic stream reservation in TSN combined with SDN controller
Published 2021-10-01“…In recent years, with the development of TSN, its low latency, low jitter and predictable maximum delay can be widely used in automatic driving technology and industrial Internet.To solve the 75% (empirical value) bandwidth problem of stream reservation technology in TSN protocols, and combine with the separation of data plane and control plane in SDN, a stream reservation solution was put forward, which was combined with TSN-SDN controller and scheduling the transmission path and reservation of the entire topology in the control plane.And two reservation computing methods was put forward, which would give out a bandwidth with time slot.The simulation experimental results show that it can control the jitter to 0 based on require latency, and also use the bandwidth based on time slot to guarantee the utilization of bandwidth.…”
Get full text
Article -
3409
Raw Milk: Fact or Fiction
Published 2012-03-01“… The use of raw milk as a beverage for humans is a hotly debated topic. A simple Internet search using the term “raw milk” yields conflicting claims about its benefits and dangers. …”
Get full text
Article -
3410
Research at flat underlying network architecture of campus
Published 2014-10-01“…By systematic analysis of the status quo on the campus network,via deployment of BRAS and high-density switches,we deployed a flat network core,by deployment of accounting system through a bypass way,using IPOE access technology,combined with local forwarding wireless networking,assisted with linkage logging system,we achieved a unified user access certification,and we optimized the network boundary by integrating of global security policy,strategies for Internet traffic optimization base on application protocols and the deployment of caching system.Practice shows,flat underlying network architecture improves the network performance,meets the inherent requirements of campus network,while also improves users’ experience.Flat network architecture is feasible for campus network.…”
Get full text
Article -
3411
Empirical research on the diffusion effect of ICT innovation diffusion and prediction in China
Published 2020-01-01“…Based on the characteristics of information and communication technology (ICT) in China,an empirical study was made on the diffusion effect of ICT innovation using Bass extension model.The results show that the curve fitting estimation effect of genetic algorithm was remarkable.In addition,non-cumulative adopter model was used to empirically analyze the diffusion effect of ICT innovation from the aspects of technology evolution,business,region and provinces.It was concluded that innovation diffusion was significantly driven by innovation effect along with the evolution of ICT,especially 3G/4G,broadband Internet,digital TV and their convergent business.Finally,the non-cumulative Bass model using genetic algorithm were used to predict the user size of fixed-line,mobile,broad-band,radio and television in the next five years.…”
Get full text
Article -
3412
Invitation à la transparence : le site web sénégalais « vos démarches administratives »
Published 2008-06-01“…Since the project began, it combines the aims related to Internet development in Senegal and objectives linked to “good governance”. …”
Get full text
Article -
3413
E-TİCARET SEKTÖRÜNDE MÜŞTERİ MEMNUNİYETİ VE SADAKATİ ARASINDAKİ İLİŞKİ: BİR YAPISAL EŞİTLİK MODELİ UYGULAMASI
Published 2018-11-01“…Araştırmada Türkiye’de internettenonline satış faaliyeti gösteren şirketlerden alışveriş yapan müşterilerarasında basit rassal örnekleme yöntemiyle 410 internet kullanıcısıseçilmiştir. Bu müşterilere müşteri memnuniyeti ile ilgili ve sadakati ileilgili sorulardan oluşan beşli likert tipi ölçek ile anket uygulanmıştır.Anketten çıkan sonuçlar yorumlanarak müşteri memnuniyeti ve sadakati arasındailişki belirlenmiştir.…”
Get full text
Article -
3414
Research on cloud-based traffic adaptive command and control method for mobile botnet
Published 2014-11-01“…Botnet is a serious attack evolved from traditional malwares.With the rapid development of computing capability and mobile Internet access technology,building a realistic mobile botnet has become a potential threat.An adaptive traffic control mechanism for cloud-based mobile botnet was proposed.It adopts different traffic consumption strategies according to different 3G or Wi-Fi network environments.Then scheduling algorithms to execute botnet commands was applied.The experimental results show the traffic adaptive algorithm can improve the stealthy and efficiency of mobile botnet while ensure that the botnet commands can be executed effectively.…”
Get full text
Article -
3415
Double-mode model about distributions of network traffic
Published 2008-01-01“…The shaping process of the high bandwidth-low bandwidth-high bandwidth network structures which are prevalent in Internet was pointed out and then the novel concept of shaping operator was proposed. …”
Get full text
Article -
3416
A Secure and Fair Joint E-Lottery Protocol
Published 2014-01-01“…In spite of many lottery schemes having been proposed, most e-lottery schemes focus on the players’ privacy or computation overhead rather than support a joint purchase protocol on the Internet. In this paper, we use the multisignature and verifiable random function to construct a secure and fair joint e-lottery scheme. …”
Get full text
Article -
3417
APPLYING THE AUTOENCODER MODEL FOR URL PHISHING DETECTION
Published 2024-12-01“…In the era of digital transformation, alongside the rapid development of the Internet and online applications, phishing attacks targeting users through malicious URLs have been increasingly prevalent. …”
Get full text
Article -
3418
Delay adaptive transmission method for scalable video streaming based on OpenFlow
Published 2013-11-01“…For the current internet streaming media transmission delay sensitivity issues, a delay adaptive method for SVC (scalable video coding) streaming media transmission based on OpenFlow was proposed. …”
Get full text
Article -
3419
SDN hypervisor oriented vSDN controller placement algorithm
Published 2017-04-01“…With the development of the future internet technology,the future network architecture which utilizes network virtualization as a tool to solve the rigidity of traditional network becomes the main stream.As a new network architecture,software defined networking provides an effective network virtualization solution.Firstly,related technology of network virtualization in SDN was concluded,distinguished differences between deploying virtual network in SDN and traditional network was compared,and aiming at the virtual network mapping problem in SDN virtualization platform,a latency sensitive SDN virtualization controller placement algorithm.At last,experiment results show that the algorithm not only can assure the delay between SDN controllers and switches in an acceptable range,but also improve the utilization efficiency of network resources.…”
Get full text
Article -
3420
MOADA-SVR:a multivariate online anomaly detection algorithm based on SVR
Published 2011-01-01“…Network anomaly detection is critical to guarantee stabilized and effective network operation.Although PCA-based network-wide anomaly detection algorithm has good detection performance,it cannot satisfy demands of online detection.In order to solve the problem,after traffic matrix model was introduced,a normality model of traffic was constructed using SVR and the sparsification of support vector solutions.Based on these,a multivariate online anomaly detection algorithm based on SVR named MOADA-SVR was proposed.Theoretic analysis showed that MOADA-SVR had lower storage and less computing overhead compared with PCA.Analysis for traffic matrix datasets Internet showed that MOADA-SVR had also good detection performance,approximating PCA.…”
Get full text
Article