Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
3501
The Effect of Social Media Addiction, Nomophobia, and Netlessphobia on Students' Online Shopping Addictions During the Covid-19 Pandemic
Published 2024-06-01“…The excessive use of internet-based technologies and social media platforms during the COVID-19 pandemic has caused problems such as social media addiction, nomophobia, netlesphobia, and online shopping addiction in individuals. …”
Get full text
Article -
3502
Design and analysis of active queue management algorithm based on predictive control
Published 2011-01-01“…Model predictive control as a novel active queue management(AQM) algorithm was proposed for Internet system with large delay,called MPAQM.Considering the causality of time-delay system,the predicted output was defined.Then,the control requirement was converted to the optimal control objective,and the drop probability was obtained by solving the optimal problem.Furthermore,the delay-independent stability condition of closed-loop system was derived,which gave the guidelines how to select the parameters of MPAQM algorithm to assure the stability and fast convergence of the network system.The performances of MPAQM were evaluated through a series of simulations in NS2 under the single/multiple topology.The simulation results show that the queue length with MPAQM algorithm reaches the desired value with minimal tracking error and lower drop probability.MPAQM algorithm outperforms RED,PI and SPI-RED algorithms in terms of disturbance rejection,stability,and robustness.…”
Get full text
Article -
3503
Various types of cyber threats
Published 2024-01-01“…Security of the Internet and online communication has become an essential challenge in contemporary world. …”
Get full text
Article -
3504
Diversity Perceptions in the UK Retail Industry: A Case of Tesco
Published 2023-03-01“…It can be argued that with exponential technological changes like the emergence of artificial intelligence, machine learning, the internet of things (IoT), etc. retailers around the world are facing continuous challenges in keeping their business model updated and relevant for sustainable business growth and profitability. …”
Get full text
Article -
3505
Observar y analizar la educación desde la ventana de los medios
Published 2007-01-01“…Analiza además un caso específico de Internet, el Observatorio Ciudadano de la Educación (OCE): sus orígenes, desarrollo y características generales. …”
Get full text
Article -
3506
Online peer-tutoring: a renewed impetus for autonomous English learning
Published 2019-07-01“…Informed by data from questionnaires, a focus group interview, tutees’ logs, and records of their engagement with the model’s internet resources, researchers identified a change in participants’ conceptualization of autonomous learning and an impact on their self-directed practices rooted in the immediacy, accessibility, comfort and availability of resources that the online peer-tutoring model favors. …”
Get full text
Article -
3507
WRITTEN CODE SWITCHING: THE CASE OF INDONESIAN EMAIL USERS
Published 2017-05-01“…Moreover, this might lead to a better understanding of the use of code switching, especially in the emerging genre of Internet communication. …”
Get full text
Article -
3508
Technological Addictions: Disease or Adaptive Behavior?
Published 2017-04-01“…It has emerge the idea of addiction to video games, to mobile, to the internet and in recent years, to social networks, among others; however, to what extent they are true addictions, is a subject of deep debate, since they are not recognized as diseases in the current official classifications. …”
Get full text
Article -
3509
YEREL YÖNETİMLERDE İNSAN KAYNAKLARINA YENİ BİR YAKLAŞIM: E-PERSONEL YÖNETİMİ
Published 2014-05-01“…Bilgi teknolojisi ve internet alanındaki hızlı gelişmeye paralel olarak özel ve kamu sektörü kuruluşları insan kaynakları yönetimlerini bu değişime uygun hale getirmek zorunda kalmaktadırlar. …”
Get full text
Article -
3510
Multi-domain collaborative anti-jamming based on multi-agent deep reinforcement learning
Published 2022-12-01“…Dynamic transmission requirements and the limited cache space bring great challenges to wireless data transmission in the malicious jamming environment.Aiming at the above problems, a collaborative anti-jamming channel selection and data scheduling joint decision method for distributed internet of things was studied from the perspective of frequency domain and time domain.A data transmission model based on multi-user Markov decision process was constructed and a collaborativeanti-jamming joint-channel-and-data decision algorithm based on multi-agent deep reinforcement learning was proposed.Simulation results show that the proposed algorithm can effectively avoid the malicious jamming and the co-channel interference.Compared with the comparison algorithm, the network throughput is significantly improved, and the number of packet dropout is significantly reduced.…”
Get full text
Article -
3511
Performance analysis of dual-media cooperative communication based on wireless and power line under hybrid fading
Published 2019-05-01“…Wireless communication and power line communication are extensively applied in various fields, such as household Internet of things. For cooperative communication of amplify–forward relay using wireless access and power line transmission, the hybrid model of universal Nakagami wireless fading and lognormal power line fading was used in this study. …”
Get full text
Article -
3512
3D Interactions between Virtual Worlds and Real Life in an E-Learning Community
Published 2011-01-01“…Virtual worlds became an appealing and fascinating component of today's internet. In particular, the number of educational providers that see a potential for E-Learning in such new platforms increases. …”
Get full text
Article -
3513
E-LEARNING CHALLENGES IN POLAND DURING THE COVID-19 PANDEMIC
Published 2022-06-01“…The research results helped to formulate several conclusions regarding the factors which influence effective e-learning, such as: internet access and quality; the availability of adequate software, hardware and other tools; and the digital competence of teachers and students. …”
Get full text
Article -
3514
Research on batch anonymous authentication scheme for VANET based on bilinear pairing
Published 2017-06-01“…To solve the problem of efficiency of anonymous authentication in vehicular ad hoc network,a batch anonymous authentication scheme was proposed by using bilinear pairing on elliptic curves .The signature was generated by the roadside unit node (RSU) and the vehicle together.Thus,the burden of VANET certification center was reduced and the authentication efficiency was proved.Meanwhile,the difficulty of the attacker to extract the key was increased.Furthermore,security proofs were given to the scheme in the random oracle model.Analysis shows that the proposed scheme can meet the needs of many kinds of security requirements,the computational overhead is significantly reduced,and the authentication efficiency is improved effectively too.Therefore,the scheme has important theoretical significance and application value under computational capability constrained Internet of things (IoT) environment.…”
Get full text
Article -
3515
Christian ModernizationsCirculating Media Practices of the Mission along the Nile Modernisations chrétiennes. Pratiques circulantes des media le long du Nil
Published 2014-12-01“…The demand to make a complete break with the past is emphasized by the use of media (books and more recently the internet) and formats (like a creed) that are seemingly removed from the modifications of time and space. …”
Get full text
Article -
3516
Le travail émotionnel des adolescents face au web affectif. L’exemple de la réception d’images violentes, sexuelles et haineuses
Published 2020-05-01“…Our analysis relied on a threefold theoretical framework: the “digital labour” hypothesis, understood as putting Internet users to work; the “affective web” which stimulates this work by capturing attention and calculation of affects; and finally, the dimension of “panoptic surveillance” by making the images visible, which increases emotional tension. …”
Get full text
Article -
3517
Multi-strategy QoS-aware service selection and ranking model
Published 2012-09-01“…As the increment of services with same function and different QoS in the internet,in order to select and rank the services that fulfill users’ functionality requirements and QoS requirements,a multi-strategy QoS-aware service ranking and selection approach is presented.Considering service performance,and service operation,maintenance costs,an extended Web service QoS model was developed.To determine how well a service satisfies users’and operators’ concerned QoS requirements,a set of functions is presented to normalize services’QoS on various QoS aspects with different metrics and scales,also to compute services satisfaction scores ,and to combine the users’satisfaction scores and the operators’scores together as an overall satisfaction scores based on certain strategy.A prototype system was built for service selection and ranking,and the model above was verified through an application case.…”
Get full text
Article -
3518
Survey of Low Earth Orbit Satellite Communication Network Routing Technology
Published 2022-09-01“…Low earth orbit satellite communication network is an important part of the internet of everything era, but the characteristics of satellite constellation topology such as high dynamic, limited heterogeneous resources and unbalanced network service capacity make the traditional routing protocol applied to the ground network no longer suitable for low earth orbit satellite network.In this regard, scholars at home and abroad had carried out extensive research on low-orbit satellite routing technology.Firstly, the research status of low-orbit satellite routing was discussed from inter-satellite routing and satellite-to-ground routing, and the inter-satellite routing technologies with business as the core and topology as the core were compared in detail.On this basis, the key problems faced by low-orbit satellite routing strategies were analyzed, namely, high dynamic network topology, large inter-satellite link propagation delay, uneven network load and limited on-board resources.The future research of routing technology was prospected accordingly.…”
Get full text
Article -
3519
Product, services and technology review blogs
Published 2022-10-01“… While much research has been conducted on consumer skepticism about advertising, limited attention has been focused on the relationship between gender and scepticism. As the Internet and new technologies continuously transform corporate communications, the relationship between gender and scepticism in new media such as the blogosphere begs further research. …”
Get full text
Article -
3520
SDN based e-mail repudiation source restraining method
Published 2016-09-01“…With the limitation of controllability of the existing Internet architecture,the existing secure e-mail technology such as certified e-mail can only post detection but cannot source restraining on e-mail repudiation.Based on the idea of control and data separation of software-defined networking technology,by means of bypass attaching customized repudiation restrain unit to the traditional e-mail model.An e-mail repudiation source restraining method was proposed without destroying the existing e-mail structure.After presenting e-mail evidence binding protocol,repudiation behavior detection algorithm,certified reputation evaluation model,and repudiation restraining strategy formation algorithm embedded in repudiation restrain unit,the effectiveness were tested of the proposed method in 4 cross scenarios.The experimental results show that,under the premise of compatibility with the current e-mail system,the method can source restrain e-mail repudiation effectively.…”
Get full text
Article