Showing 3,441 - 3,460 results of 5,694 for search '"internet"', query time: 0.06s Refine Results
  1. 3441

    Comparative analysis of the availability of popular social networking sites by Maciej Ciukaj, Maria Skublewska-Paszkowska

    Published 2024-09-01
    “… In the era of growing number of Internet users and the importance of social media, ensuring the accessibility of these platforms for all audiences has become a crucial aspect of digital inclusion. …”
    Get full text
    Article
  2. 3442

    Comment analyser ce que font les enseignants dans la préparation de leurs cours ? Ébauche d’un cadre conceptuel by Jean-Philippe Maitre, Michaël Huchette, Éric Bruillard

    Published 2018-06-01
    “…Preparing their lessons, teachers produce material and media from resources that are their own but also found on the Internet, or by asking colleagues, etc. This ordinary activity is in fact complex and poorly documented. …”
    Get full text
    Article
  3. 3443

    Game-based detection method of broken access control vulnerabilities in Web application by HE Haitao, XU Ke, YANG Shuailin, ZHANG Bing, ZHAO Yuxuan, LI Jiazheng

    Published 2024-06-01
    “…To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficulty of universal detection of logical vulnerabilities, game theory was applied to the access control logic vulnerability detection for the first time. …”
    Get full text
    Article
  4. 3444

    AS-level model for restraining DoS attacks by Xian-liang JIANG, Guang JIN, Jian-gang YANG, Jia-ming HE

    Published 2013-09-01
    “…Combined with the next generation security architecture,a novel AS-level defense scheme was proposed to restrain DoS attacks in the Internet.And the deficiencies of previous capability schemes were analyzed in detail,especially on requesting/withdrawing authorization of capabilities.The scheme takes account of a congestion feedback mechanism,a combination with multi-level active queue management,and the credit computation.Then a further analysis on the scheme’s effectiveness was presented.Several experiments with NS2 and CAIDA’s topology datasets were performed to evaluate the authorizing time and traffic,the average requesting time and common file transfer time of different schemes.The results show that this scheme can effectively reduce the average requesting time of capabilities,improve common file transfer efficiency,and enhance the feasibility and robustness.…”
    Get full text
    Article
  5. 3445

    A systemic approach and multiscale data management. A ‘refrigerator’ case study by Paolo Marco Tamborrini, Eleonora Fiore

    Published 2020-06-01
    “…Many digital technologies, such as the Internet of Things, Artificial Intelligence and Machine Learning, could radically change the way of conceiving a design process, especially when they are used to retrieve essential information to define a problem, identify the requirements and support design decisions, all of which are typical of the pre-design phase. …”
    Get full text
    Article
  6. 3446

    Steganalysis for stegotext based on text redundancy by LUO Gang, SUN Xing-ming

    Published 2009-01-01
    “…Targeted at the text steganography with mimic model,a steganalysis method based on source redundancy for stegotexts was proposed.This method processed the text and the words in it as the m-order Markov source and the source symbols respectively,then computed the redundancy of the source.Through analyzing the relationship between the re-dundancy and the size of the text,the existence of hidden information could be determined.With testing of 8 000 ste-gotexts produced by the four main softwares NiceText,Texto,Stego and Sams Big Play Maker,and 2 400 normal texts randomly sampled from innocuous texts downloaded from the Internet,the results show that the false positive rate of our steganalysis method is 0.5% and the false negative rate is 3.9%.Experiments and analyzing results indicate that the steganalysis method can effectively detect stegotexts based on natural language processing with mimic model.…”
    Get full text
    Article
  7. 3447

    Faces da literatura contemporânea: o caso da poesia viral by Márcio Roberto do Prado

    Published 2016-01-01
    “…Además, se discutirán las razones para la resistencia a la dinámica literaria y comunicacional del internet, que todavía hoy se nota por parte de los profesores e investigadores de la literatura, teniendo en cuenta la problemática del valor.…”
    Get full text
    Article
  8. 3448

    Research on consensus mechanism optimization for IoT blockchain by Qijie SONG, Tieming CHEN, Yuan CHEN, Dongjie MA, Zhengqiu WENG

    Published 2020-02-01
    “…The essence of the blockchain is a decentralized distributed ledger system.The Internet of things is interconnected by massive heterogeneous terminals and has natural distributed characteristics.Therefore,the combinedIoT blockchain is widely optimistic.At the same time,due to the heterogeneity of the IoT-aware terminal,the limited computing capacity and the ability of data transmission,the IoT blockchain faces great challenges.The password consensus technology has become a key issue.On the basis of summarizing the current blockchain consensus algorithm,its applicability to the IoT blockchain was analyzed,the current application status of several IoT blockchain platforms and consensus mechanisms was introduced,and the optimization research progress of the consensus mechanismin IoT blockchain was described.Finally,the optimization technology of the IoT blockchain and the potential research directions were summarized.…”
    Get full text
    Article
  9. 3449

    FACEBOOK'TA BENLİK SUNUMU VE TOPLUMSAL CİNSİYET ROLLERİ by Fatma Uçar

    Published 2015-08-01
    “…Günümüzde hızla gelişen internet teknolojileri toplumsal cinsiyet rollerine yönelik sunumların incelenmesi için yeni bir mecra olarak karşımıza çıkmaktadır. …”
    Get full text
    Article
  10. 3450

    Design and application of wireless network optimal data sharing architecture by Rupeng XU, Jingye CUI, Zeluo GUAN, Jing NING, Gang RU, Lei NIE, Zhiliang CHEN

    Published 2016-04-01
    “…However,the presence of dispersed storage,low utilization rate and inconvenience in using and other issues of existing data are incapable of meeting the future needs of large data network optimization.Referring from the big data technology widely used in internet field,network optimization center,an architecture design of network optimization big data sharing platform was proposed,dispersed data was intergrated,and a unified data sharing port was formulated,which could utilize efficiency of data usage. …”
    Get full text
    Article
  11. 3451

    Political Organising and Mobilising in the Age of the Fourth Industrial Revolution: A Reflection on the Gauteng Young Communist League of South Africa by Kgabo Morifi

    Published 2020-03-01
    “…As “a way of describing the blurring of boundaries between the physical, digital, and biological worlds...a fusion of advances in artificial intelligence, robotics, the Internet of Things, 3D printing, genetic engineering, quantum computing, and other technologies…” (McGinnis, 2018), the 4IR is primarily concerned with the inchoate transformation of the production of goods and services, resulting from the application of a new wave of technological innovations. …”
    Get full text
    Article
  12. 3452

    Aide-toi, la viralité t’aidera. Ou de la création et diffusion des proverbes dans les médias by Vincenzo Lambertini

    Published 2024-12-01
    “…After defining virality and proverbs, I will take into account some examples of virality before the advent of the Internet. Thus, I will compare proverbs and virality through contrasting (French-Italian) and interdisciplinary (from biology and virology) approaches, using authentic examples drawn from social media and semi-spontaneous conversations broadcast on radio or television. …”
    Get full text
    Article
  13. 3453

    Writing Against Culture with Online Poker by Jukka Jouhki

    Published 2011-01-01
    “…A stale game of middle-aged men turned into an exciting, familiar hobby with a global reach. Progress in internet infrastructures enabled a boost of poker online. …”
    Get full text
    Article
  14. 3454

    Dual verifiable cloud storage scheme based on blockchain by Tao FENG, Fanqi KONG, Chunyan LIU, Rong MA, Albettar Maher

    Published 2021-12-01
    “…In response to the problem that in the industrial Internet of things (IIoT), industrial equipment stored data in the cloud, causing data to be easily tampered with and unable to track malicious users, causing a vicious circle, with the help of the traceability and immutability of the blockchain, a dual verifiable cloud storage scheme based on the blockchain was proposed.Firstly, homomorphic encryption technology was used to encrypt data and upload it to the cloud , which ensured transmission security and realized data privacy protection.Secondly, the aggregated ciphertext and uploader information were stored on the blockchain, which could effectively avoid the risk of data being tampered with by illegal users, and could trace malicious users to achieve double verification of cloud data integrity.Finally, a safety analysis was carried out to prove that the proposed scheme is safer and more reliable than similar schemes.…”
    Get full text
    Article
  15. 3455

    HABER SİTELERİNDE İÇERİK VE TASARIMA YÖNELİK DEĞERLENDİRME ÖLÇÜTLERİNE BİR YAKLAŞIM by Halil İbrahim Gürcan

    Published 2014-05-01
    “…İnternetle birlikte haber yayımcılığında hızla yerini alan haber siteleri, internet kullanıcılarının fazlaca rağbet ettikleri siteleri oluşturmaktadır. …”
    Get full text
    Article
  16. 3456

    ELEKTRONİK DÖNÜŞÜM KARŞISINDA VATANDAŞ DENEYİMİ: ISPARTA BELEDİYESİ İNCELEMESİ by Nilüfer NEGİZ

    Published 2011-06-01
    “…Bu anlamda bilişim teknolojileri kullanılarak vatandaşları ilgilendiren işlemlerin internet ortamında hizmete sunulması olarak tanımlayabileceğimiz elektronik belediye, (e-belediyecilik) yerel yönetimlerde atılan önemli adımlardandır. …”
    Get full text
    Article
  17. 3457

    Differentiated and negotiable mechanism for data communication by Wenlong KOU, Fenghua LI, Xiuze DONG, Xiaogang CAO, Kui GENG, Qing LI

    Published 2021-10-01
    “…In view of the massive and differentiated computing units and terminal devices in the cloud environment and the Internet of things, the differences in hardware resources and computing capabilities posed new challenges to high reliability and high performance data communication, a data communication mechanism supporting differentiation and negotiation was proposed.A parameters negotiation method was proposed, and parameters were negotiated by the sender according to the difference of the receiver capability to achieve differentiated and negotiable data communication.A retransmission feedback mechanism was designed, and the transmission rate was dynamically adjusted and the data was retransmitted based on the data reception feedback of the receiver by the sender to improve communication efficiency and reliability.The experimental results show that the proposed mechanism can perform dynamic adaptive, efficient and parallel communication according to the difference of the receiver capability.…”
    Get full text
    Article
  18. 3458

    A survey of key protocol and application scenario of time-sensitive network by Peizhuang CONG, Ye TIAN, Xiangyang GONG, Xirong QUE, Wendong WANG

    Published 2019-10-01
    “…With the development of information technology,the demand for scenarios with objects as the main body of communication is increasing,such as factory automation control,automatic driving,etc.The time delay requirements of such communication for data transmission far exceed the controllable range of traditional ethernet,then time-sensitive network have emerged.Time-sensitive network is a standardized technology that provides deterministic information transmission based on standard ethernet.It minimizes jitter through time-aware scheduling mechanism and provides reliable guarantee of data transmission for time-sensitive applications.The core characteristics and mechanism of time-sensitive network were introduced through the description of IEEE standards and its application scenarios were analyzed in vehicle network,industrial internet,aircraft data network and mobile fronthaul network.…”
    Get full text
    Article
  19. 3459

    Revendiquer le droit à émigrer via l’expression du sentiment d’injustice by Simon Mastrangelo

    Published 2018-06-01
    “…In both their discourse and the correlative audiovisual representations on Internet, one always finds the question of injustice. …”
    Get full text
    Article
  20. 3460

    Raw Milk: Fact or Fiction by Michelle A. Zitt, Ron Schmidt, Karla P. Shelnutt

    Published 2012-03-01
    “… The use of raw milk as a beverage for humans is a hotly debated topic. A simple Internet search using the term “raw milk” yields conflicting claims about its benefits and dangers. …”
    Get full text
    Article