Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
3441
Comparative analysis of the availability of popular social networking sites
Published 2024-09-01“… In the era of growing number of Internet users and the importance of social media, ensuring the accessibility of these platforms for all audiences has become a crucial aspect of digital inclusion. …”
Get full text
Article -
3442
Comment analyser ce que font les enseignants dans la préparation de leurs cours ? Ébauche d’un cadre conceptuel
Published 2018-06-01“…Preparing their lessons, teachers produce material and media from resources that are their own but also found on the Internet, or by asking colleagues, etc. This ordinary activity is in fact complex and poorly documented. …”
Get full text
Article -
3443
Game-based detection method of broken access control vulnerabilities in Web application
Published 2024-06-01“…To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities, game theory was applied to the access control logic vulnerability detection for the first time. …”
Get full text
Article -
3444
AS-level model for restraining DoS attacks
Published 2013-09-01“…Combined with the next generation security architecture,a novel AS-level defense scheme was proposed to restrain DoS attacks in the Internet.And the deficiencies of previous capability schemes were analyzed in detail,especially on requesting/withdrawing authorization of capabilities.The scheme takes account of a congestion feedback mechanism,a combination with multi-level active queue management,and the credit computation.Then a further analysis on the scheme’s effectiveness was presented.Several experiments with NS2 and CAIDA’s topology datasets were performed to evaluate the authorizing time and traffic,the average requesting time and common file transfer time of different schemes.The results show that this scheme can effectively reduce the average requesting time of capabilities,improve common file transfer efficiency,and enhance the feasibility and robustness.…”
Get full text
Article -
3445
A systemic approach and multiscale data management. A ‘refrigerator’ case study
Published 2020-06-01“…Many digital technologies, such as the Internet of Things, Artificial Intelligence and Machine Learning, could radically change the way of conceiving a design process, especially when they are used to retrieve essential information to define a problem, identify the requirements and support design decisions, all of which are typical of the pre-design phase. …”
Get full text
Article -
3446
Steganalysis for stegotext based on text redundancy
Published 2009-01-01“…Targeted at the text steganography with mimic model,a steganalysis method based on source redundancy for stegotexts was proposed.This method processed the text and the words in it as the m-order Markov source and the source symbols respectively,then computed the redundancy of the source.Through analyzing the relationship between the re-dundancy and the size of the text,the existence of hidden information could be determined.With testing of 8 000 ste-gotexts produced by the four main softwares NiceText,Texto,Stego and Sams Big Play Maker,and 2 400 normal texts randomly sampled from innocuous texts downloaded from the Internet,the results show that the false positive rate of our steganalysis method is 0.5% and the false negative rate is 3.9%.Experiments and analyzing results indicate that the steganalysis method can effectively detect stegotexts based on natural language processing with mimic model.…”
Get full text
Article -
3447
Faces da literatura contemporânea: o caso da poesia viral
Published 2016-01-01“…Además, se discutirán las razones para la resistencia a la dinámica literaria y comunicacional del internet, que todavía hoy se nota por parte de los profesores e investigadores de la literatura, teniendo en cuenta la problemática del valor.…”
Get full text
Article -
3448
Research on consensus mechanism optimization for IoT blockchain
Published 2020-02-01“…The essence of the blockchain is a decentralized distributed ledger system.The Internet of things is interconnected by massive heterogeneous terminals and has natural distributed characteristics.Therefore,the combinedIoT blockchain is widely optimistic.At the same time,due to the heterogeneity of the IoT-aware terminal,the limited computing capacity and the ability of data transmission,the IoT blockchain faces great challenges.The password consensus technology has become a key issue.On the basis of summarizing the current blockchain consensus algorithm,its applicability to the IoT blockchain was analyzed,the current application status of several IoT blockchain platforms and consensus mechanisms was introduced,and the optimization research progress of the consensus mechanismin IoT blockchain was described.Finally,the optimization technology of the IoT blockchain and the potential research directions were summarized.…”
Get full text
Article -
3449
FACEBOOK'TA BENLİK SUNUMU VE TOPLUMSAL CİNSİYET ROLLERİ
Published 2015-08-01“…Günümüzde hızla gelişen internet teknolojileri toplumsal cinsiyet rollerine yönelik sunumların incelenmesi için yeni bir mecra olarak karşımıza çıkmaktadır. …”
Get full text
Article -
3450
Design and application of wireless network optimal data sharing architecture
Published 2016-04-01“…However,the presence of dispersed storage,low utilization rate and inconvenience in using and other issues of existing data are incapable of meeting the future needs of large data network optimization.Referring from the big data technology widely used in internet field,network optimization center,an architecture design of network optimization big data sharing platform was proposed,dispersed data was intergrated,and a unified data sharing port was formulated,which could utilize efficiency of data usage. …”
Get full text
Article -
3451
Political Organising and Mobilising in the Age of the Fourth Industrial Revolution: A Reflection on the Gauteng Young Communist League of South Africa
Published 2020-03-01“…As “a way of describing the blurring of boundaries between the physical, digital, and biological worlds...a fusion of advances in artificial intelligence, robotics, the Internet of Things, 3D printing, genetic engineering, quantum computing, and other technologies…” (McGinnis, 2018), the 4IR is primarily concerned with the inchoate transformation of the production of goods and services, resulting from the application of a new wave of technological innovations. …”
Get full text
Article -
3452
Aide-toi, la viralité t’aidera. Ou de la création et diffusion des proverbes dans les médias
Published 2024-12-01“…After defining virality and proverbs, I will take into account some examples of virality before the advent of the Internet. Thus, I will compare proverbs and virality through contrasting (French-Italian) and interdisciplinary (from biology and virology) approaches, using authentic examples drawn from social media and semi-spontaneous conversations broadcast on radio or television. …”
Get full text
Article -
3453
Writing Against Culture with Online Poker
Published 2011-01-01“…A stale game of middle-aged men turned into an exciting, familiar hobby with a global reach. Progress in internet infrastructures enabled a boost of poker online. …”
Get full text
Article -
3454
Dual verifiable cloud storage scheme based on blockchain
Published 2021-12-01“…In response to the problem that in the industrial Internet of things (IIoT), industrial equipment stored data in the cloud, causing data to be easily tampered with and unable to track malicious users, causing a vicious circle, with the help of the traceability and immutability of the blockchain, a dual verifiable cloud storage scheme based on the blockchain was proposed.Firstly, homomorphic encryption technology was used to encrypt data and upload it to the cloud , which ensured transmission security and realized data privacy protection.Secondly, the aggregated ciphertext and uploader information were stored on the blockchain, which could effectively avoid the risk of data being tampered with by illegal users, and could trace malicious users to achieve double verification of cloud data integrity.Finally, a safety analysis was carried out to prove that the proposed scheme is safer and more reliable than similar schemes.…”
Get full text
Article -
3455
HABER SİTELERİNDE İÇERİK VE TASARIMA YÖNELİK DEĞERLENDİRME ÖLÇÜTLERİNE BİR YAKLAŞIM
Published 2014-05-01“…İnternetle birlikte haber yayımcılığında hızla yerini alan haber siteleri, internet kullanıcılarının fazlaca rağbet ettikleri siteleri oluşturmaktadır. …”
Get full text
Article -
3456
ELEKTRONİK DÖNÜŞÜM KARŞISINDA VATANDAŞ DENEYİMİ: ISPARTA BELEDİYESİ İNCELEMESİ
Published 2011-06-01“…Bu anlamda bilişim teknolojileri kullanılarak vatandaşları ilgilendiren işlemlerin internet ortamında hizmete sunulması olarak tanımlayabileceğimiz elektronik belediye, (e-belediyecilik) yerel yönetimlerde atılan önemli adımlardandır. …”
Get full text
Article -
3457
Differentiated and negotiable mechanism for data communication
Published 2021-10-01“…In view of the massive and differentiated computing units and terminal devices in the cloud environment and the Internet of things, the differences in hardware resources and computing capabilities posed new challenges to high reliability and high performance data communication, a data communication mechanism supporting differentiation and negotiation was proposed.A parameters negotiation method was proposed, and parameters were negotiated by the sender according to the difference of the receiver capability to achieve differentiated and negotiable data communication.A retransmission feedback mechanism was designed, and the transmission rate was dynamically adjusted and the data was retransmitted based on the data reception feedback of the receiver by the sender to improve communication efficiency and reliability.The experimental results show that the proposed mechanism can perform dynamic adaptive, efficient and parallel communication according to the difference of the receiver capability.…”
Get full text
Article -
3458
A survey of key protocol and application scenario of time-sensitive network
Published 2019-10-01“…With the development of information technology,the demand for scenarios with objects as the main body of communication is increasing,such as factory automation control,automatic driving,etc.The time delay requirements of such communication for data transmission far exceed the controllable range of traditional ethernet,then time-sensitive network have emerged.Time-sensitive network is a standardized technology that provides deterministic information transmission based on standard ethernet.It minimizes jitter through time-aware scheduling mechanism and provides reliable guarantee of data transmission for time-sensitive applications.The core characteristics and mechanism of time-sensitive network were introduced through the description of IEEE standards and its application scenarios were analyzed in vehicle network,industrial internet,aircraft data network and mobile fronthaul network.…”
Get full text
Article -
3459
Revendiquer le droit à émigrer via l’expression du sentiment d’injustice
Published 2018-06-01“…In both their discourse and the correlative audiovisual representations on Internet, one always finds the question of injustice. …”
Get full text
Article -
3460
Raw Milk: Fact or Fiction
Published 2012-03-01“… The use of raw milk as a beverage for humans is a hotly debated topic. A simple Internet search using the term “raw milk” yields conflicting claims about its benefits and dangers. …”
Get full text
Article