Showing 3,401 - 3,420 results of 5,694 for search '"internet"', query time: 0.08s Refine Results
  1. 3401

    L’injonction à participer au monde numérique by Serge Proulx

    Published 2017-09-01
    “…Does the rhetorical insistence of analysts to find the existence of this “participation” not tantamount to playing the game of the big companies of the Internet ? Today, the capture of traces opens up to a permanent commodification of human time and the monetization of attention.…”
    Get full text
    Article
  2. 3402

    Design of network management and regulation system over flexible reconfiguration by Yu-feng LI, Han QIU, Qin-rang LIU, Ju-long LAN

    Published 2012-11-01
    “…Network management and regulation system is a new arising appliance for the manageable,controllable and trustworthy demand of the Internet.The architecture design of the backbone link-level management and regulation system usually follows the core router,in which the separation of the data plane and the control plane could not meet the requirement of HW/SW data co-process,the rigid connection with closed building style could not satisfy the flexible identification of new applications.The loosely coupled switching HW/SW co-process architecture and the iterative looping HW/SW migration architecture were proposed,which could satisfy the above HW/SW co-process demand and the new application flexible identification demand.…”
    Get full text
    Article
  3. 3403

    ELECTRONIC VOTING TECHNOLOGIES IN RUSSIA by O. V. Erokhina

    Published 2019-12-01
    “…An important positive effect of the introduction of Internet technologies is to increase the awareness of citizens about the elections and their participants, as well as to reduce the financial costs of voting and fast processing of its results. …”
    Get full text
    Article
  4. 3404

    Konseling Online: Sebuah Pendekatan Teknologi Dalam Pelayanan Konseling by Zadrian Ardi, Frischa Meivilona Yendi, Ifdil Ifdil

    Published 2013-02-01
    “…Various forms and types of service in counseling can be applied by utilizing internet technology, such as Email, Chat Program, Videoconferencing Program dan Webcam. …”
    Get full text
    Article
  5. 3405

    A Multi-Interface Platform System for Assistance and Evaluation of Disabled People by Chadi Fouad Riman, Hector Peralta, Eric Monacelli, Yasser Alayli, Ali El Hajj, Imad Mougharbel

    Published 2011-01-01
    “…The software facilitates the saving of experimental data for analysis, it can be automatically reconfigured to match user’s ability, and it is operated locally or remotely through the internet. Quantitative indicators are defined for evaluation purposes and to determine the needed assistance and adaptation. …”
    Get full text
    Article
  6. 3406

    Analysis and status of the scattering channel model for ultraviolet communications by Renzhi YUAN, Zhifeng WANG, Mugen PENG

    Published 2021-06-01
    “…Due to its unique features such as high local security, low background noise, and non-light-of-sight communication, the ultraviolet communication, which uses the light wave of “solar blind” wavelength (200~280 nm) as the information carrier, becomes a promising optical communication technique for applications in both secure communications and internet of vehicles and so on.The scattering channel models were classified into analytical channel models and stochastic channel models according to their different computational efficiencies.The research of the first three scattering orders in analytical channel models and the Monte-Carlo simulation model and Monte-Carlo integration model in stochastic channel models were mainly focused on.Some future research directions for the scattering channel model of ultraviolet communications were also provided.…”
    Get full text
    Article
  7. 3407

    Future IP network architecture evolution for service and network collaboration by Bing HUANG, Bin TAN, Jian LUO, Yong GUO

    Published 2021-10-01
    “…As the technical foundation of the internet, how IP technology develops in the next 5 to 10 years is the key issue facing the communication industry.The success and weakness of the traditional IP network architecture were analyzed, and the future IP network should not only inherit the design principles of the traditional IP technology was proposed, such as the end-to-end principle and layered decoupling principle, but also solve the problem that the service is too separated from the network.From the perspective of network evolution and future service requirements, the core issue of future IP networks is to strengthen the collaboration of between services and networks , and the improved IP network design principle “horizontal: end-to-end principle empowered by service-oriented network, vertical: layered model supported by intelligent control plane” was proposed, and based on this principle, the reference architecture of the future network was proposed.…”
    Get full text
    Article
  8. 3408

    Computing method for periodic stream reservation in TSN combined with SDN controller by Jianzhong SU, Huayu ZHANG, Hailong ZHU

    Published 2021-10-01
    “…In recent years, with the development of TSN, its low latency, low jitter and predictable maximum delay can be widely used in automatic driving technology and industrial Internet.To solve the 75% (empirical value) bandwidth problem of stream reservation technology in TSN protocols, and combine with the separation of data plane and control plane in SDN, a stream reservation solution was put forward, which was combined with TSN-SDN controller and scheduling the transmission path and reservation of the entire topology in the control plane.And two reservation computing methods was put forward, which would give out a bandwidth with time slot.The simulation experimental results show that it can control the jitter to 0 based on require latency, and also use the bandwidth based on time slot to guarantee the utilization of bandwidth.…”
    Get full text
    Article
  9. 3409

    Raw Milk: Fact or Fiction by Michelle A. Zitt, Ron Schmidt, Karla P. Shelnutt

    Published 2012-03-01
    “… The use of raw milk as a beverage for humans is a hotly debated topic. A simple Internet search using the term “raw milk” yields conflicting claims about its benefits and dangers. …”
    Get full text
    Article
  10. 3410

    Research at flat underlying network architecture of campus by Chu-jian LIN, Si-hai ZHANG

    Published 2014-10-01
    “…By systematic analysis of the status quo on the campus network,via deployment of BRAS and high-density switches,we deployed a flat network core,by deployment of accounting system through a bypass way,using IPOE access technology,combined with local forwarding wireless networking,assisted with linkage logging system,we achieved a unified user access certification,and we optimized the network boundary by integrating of global security policy,strategies for Internet traffic optimization base on application protocols and the deployment of caching system.Practice shows,flat underlying network architecture improves the network performance,meets the inherent requirements of campus network,while also improves users’ experience.Flat network architecture is feasible for campus network.…”
    Get full text
    Article
  11. 3411

    Empirical research on the diffusion effect of ICT innovation diffusion and prediction in China by Wenyu HU, Wenju WANG

    Published 2020-01-01
    “…Based on the characteristics of information and communication technology (ICT) in China,an empirical study was made on the diffusion effect of ICT innovation using Bass extension model.The results show that the curve fitting estimation effect of genetic algorithm was remarkable.In addition,non-cumulative adopter model was used to empirically analyze the diffusion effect of ICT innovation from the aspects of technology evolution,business,region and provinces.It was concluded that innovation diffusion was significantly driven by innovation effect along with the evolution of ICT,especially 3G/4G,broadband Internet,digital TV and their convergent business.Finally,the non-cumulative Bass model using genetic algorithm were used to predict the user size of fixed-line,mobile,broad-band,radio and television in the next five years.…”
    Get full text
    Article
  12. 3412

    Invitation à la transparence : le site web sénégalais « vos démarches administratives » by Jocelyn Pierre

    Published 2008-06-01
    “…Since the project began, it combines the aims related to Internet development in Senegal and objectives linked to “good governance”. …”
    Get full text
    Article
  13. 3413

    E-TİCARET SEKTÖRÜNDE MÜŞTERİ MEMNUNİYETİ VE SADAKATİ ARASINDAKİ İLİŞKİ: BİR YAPISAL EŞİTLİK MODELİ UYGULAMASI by Muhammed Raşid Şimşek, Adem Babacan

    Published 2018-11-01
    “…Araştırmada Türkiye’de internettenonline satış faaliyeti gösteren şirketlerden alışveriş yapan müşterilerarasında basit rassal örnekleme yöntemiyle 410 internet kullanıcısıseçilmiştir. Bu müşterilere müşteri memnuniyeti ile ilgili ve sadakati ileilgili sorulardan oluşan beşli likert tipi ölçek ile anket uygulanmıştır.Anketten çıkan sonuçlar yorumlanarak müşteri memnuniyeti ve sadakati arasındailişki belirlenmiştir.…”
    Get full text
    Article
  14. 3414

    Research on cloud-based traffic adaptive command and control method for mobile botnet by Wei CHEN, Shi-wen ZHOU, Cheng-yu YIN

    Published 2014-11-01
    “…Botnet is a serious attack evolved from traditional malwares.With the rapid development of computing capability and mobile Internet access technology,building a realistic mobile botnet has become a potential threat.An adaptive traffic control mechanism for cloud-based mobile botnet was proposed.It adopts different traffic consumption strategies according to different 3G or Wi-Fi network environments.Then scheduling algorithms to execute botnet commands was applied.The experimental results show the traffic adaptive algorithm can improve the stealthy and efficiency of mobile botnet while ensure that the botnet commands can be executed effectively.…”
    Get full text
    Article
  15. 3415

    Double-mode model about distributions of network traffic by CHEN Ming, PEI Ling-bo, LIANG Wen

    Published 2008-01-01
    “…The shaping process of the high bandwidth-low bandwidth-high bandwidth network structures which are prevalent in Internet was pointed out and then the novel concept of shaping operator was proposed. …”
    Get full text
    Article
  16. 3416

    A Secure and Fair Joint E-Lottery Protocol by Chin-Ling Chen, Yuan-Hao Liao, Woei-Jiunn Tsaur

    Published 2014-01-01
    “…In spite of many lottery schemes having been proposed, most e-lottery schemes focus on the players’ privacy or computation overhead rather than support a joint purchase protocol on the Internet. In this paper, we use the multisignature and verifiable random function to construct a secure and fair joint e-lottery scheme. …”
    Get full text
    Article
  17. 3417

    APPLYING THE AUTOENCODER MODEL FOR URL PHISHING DETECTION by Dang Thi Mai

    Published 2024-12-01
    “…In the era of digital transformation, alongside the rapid development of the Internet and online applications, phishing attacks targeting users through malicious URLs have been increasingly prevalent. …”
    Get full text
    Article
  18. 3418

    Delay adaptive transmission method for scalable video streaming based on OpenFlow by Tao HUANG, Li ZHANG, Yun-yong ZHANG, Yun-jie LIU

    Published 2013-11-01
    “…For the current internet streaming media transmission delay sensitivity issues, a delay adaptive method for SVC (scalable video coding) streaming media transmission based on OpenFlow was proposed. …”
    Get full text
    Article
  19. 3419

    SDN hypervisor oriented vSDN controller placement algorithm by Xiaodong DONG, Zhiqiang GUO, Sheng CHEN, Xiaobo ZHOU, Heng QI, Keqiu LI

    Published 2017-04-01
    “…With the development of the future internet technology,the future network architecture which utilizes network virtualization as a tool to solve the rigidity of traditional network becomes the main stream.As a new network architecture,software defined networking provides an effective network virtualization solution.Firstly,related technology of network virtualization in SDN was concluded,distinguished differences between deploying virtual network in SDN and traditional network was compared,and aiming at the virtual network mapping problem in SDN virtualization platform,a latency sensitive SDN virtualization controller placement algorithm.At last,experiment results show that the algorithm not only can assure the delay between SDN controllers and switches in an acceptable range,but also improve the utilization efficiency of network resources.…”
    Get full text
    Article
  20. 3420

    MOADA-SVR:a multivariate online anomaly detection algorithm based on SVR by QIAN Ye-kui1, CHEN Ming1

    Published 2011-01-01
    “…Network anomaly detection is critical to guarantee stabilized and effective network operation.Although PCA-based network-wide anomaly detection algorithm has good detection performance,it cannot satisfy demands of online detection.In order to solve the problem,after traffic matrix model was introduced,a normality model of traffic was constructed using SVR and the sparsification of support vector solutions.Based on these,a multivariate online anomaly detection algorithm based on SVR named MOADA-SVR was proposed.Theoretic analysis showed that MOADA-SVR had lower storage and less computing overhead compared with PCA.Analysis for traffic matrix datasets Internet showed that MOADA-SVR had also good detection performance,approximating PCA.…”
    Get full text
    Article