Showing 3,501 - 3,520 results of 5,694 for search '"internet"', query time: 0.06s Refine Results
  1. 3501

    The Effect of Social Media Addiction, Nomophobia, and Netlessphobia on Students' Online Shopping Addictions During the Covid-19 Pandemic by Dilşad Güzel, Muhammet Mutlu

    Published 2024-06-01
    “…The excessive use of internet-based technologies and social media platforms during the COVID-19 pandemic has caused problems such as social media addiction, nomophobia, netlesphobia, and online shopping addiction in individuals. …”
    Get full text
    Article
  2. 3502

    Design and analysis of active queue management algorithm based on predictive control by WANG Ping, CHEN Hong, LU Xiao-hui

    Published 2011-01-01
    “…Model predictive control as a novel active queue management(AQM) algorithm was proposed for Internet system with large delay,called MPAQM.Considering the causality of time-delay system,the predicted output was defined.Then,the control requirement was converted to the optimal control objective,and the drop probability was obtained by solving the optimal problem.Furthermore,the delay-independent stability condition of closed-loop system was derived,which gave the guidelines how to select the parameters of MPAQM algorithm to assure the stability and fast convergence of the network system.The performances of MPAQM were evaluated through a series of simulations in NS2 under the single/multiple topology.The simulation results show that the queue length with MPAQM algorithm reaches the desired value with minimal tracking error and lower drop probability.MPAQM algorithm outperforms RED,PI and SPI-RED algorithms in terms of disturbance rejection,stability,and robustness.…”
    Get full text
    Article
  3. 3503

    Various types of cyber threats by Luknar Ivana, Jovanović Filip

    Published 2024-01-01
    “…Security of the Internet and online communication has become an essential challenge in contemporary world. …”
    Get full text
    Article
  4. 3504

    Diversity Perceptions in the UK Retail Industry: A Case of Tesco by Walid Ahmed, Asim Majeed, Ayesha Asim

    Published 2023-03-01
    “…It can be argued that with exponential technological changes like the emergence of artificial intelligence, machine learning, the internet of things (IoT), etc. retailers around the world are facing continuous challenges in keeping their business model updated and relevant for sustainable business growth and profitability. …”
    Get full text
    Article
  5. 3505

    Observar y analizar la educación desde la ventana de los medios by Delia CROVI DRUETTA

    Published 2007-01-01
    “…Analiza además un caso específico de Internet, el Observatorio Ciudadano de la Educación (OCE): sus orígenes, desarrollo y características generales. …”
    Get full text
    Article
  6. 3506

    Online peer-tutoring: a renewed impetus for autonomous English learning by Luis Ignacio Herrera Bohórquez, José David Largo Rodríguez, John Jairo Viáfara González

    Published 2019-07-01
    “…Informed by data from questionnaires, a focus group interview, tutees’ logs, and records of their engagement with the model’s internet resources, researchers identified a change in participants’ conceptualization of autonomous learning and an impact on their self-directed practices rooted in the immediacy, accessibility, comfort and availability of resources that the online peer-tutoring model favors. …”
    Get full text
    Article
  7. 3507

    WRITTEN CODE SWITCHING: THE CASE OF INDONESIAN EMAIL USERS by Nani Hizriani

    Published 2017-05-01
    “…Moreover, this might lead to a better understanding of the use of code switching, especially in the emerging genre of Internet communication. …”
    Get full text
    Article
  8. 3508

    Technological Addictions: Disease or Adaptive Behavior? by María Magdalena Caro Mantilla

    Published 2017-04-01
    “…It has emerge the idea of addiction to video games, to mobile, to the internet and in recent years, to social networks, among others; however, to what extent they are true addictions, is a subject of deep debate, since they are not recognized as diseases in the current official classifications. …”
    Get full text
    Article
  9. 3509

    YEREL YÖNETİMLERDE İNSAN KAYNAKLARINA YENİ BİR YAKLAŞIM: E-PERSONEL YÖNETİMİ by Mehmet Özel, Veysel Eren

    Published 2014-05-01
    “…Bilgi teknolojisi ve internet alanındaki hızlı gelişmeye paralel olarak özel ve kamu sektörü kuruluşları insan kaynakları yönetimlerini bu değişime uygun hale getirmek zorunda kalmaktadırlar. …”
    Get full text
    Article
  10. 3510

    Multi-domain collaborative anti-jamming based on multi-agent deep reinforcement learning by Biao ZHANG, Ximing WANG, Yifan XU, Wen LI, Hao HAN, Songyi LIU, Xueqiang CHEN

    Published 2022-12-01
    “…Dynamic transmission requirements and the limited cache space bring great challenges to wireless data transmission in the malicious jamming environment.Aiming at the above problems, a collaborative anti-jamming channel selection and data scheduling joint decision method for distributed internet of things was studied from the perspective of frequency domain and time domain.A data transmission model based on multi-user Markov decision process was constructed and a collaborativeanti-jamming joint-channel-and-data decision algorithm based on multi-agent deep reinforcement learning was proposed.Simulation results show that the proposed algorithm can effectively avoid the malicious jamming and the co-channel interference.Compared with the comparison algorithm, the network throughput is significantly improved, and the number of packet dropout is significantly reduced.…”
    Get full text
    Article
  11. 3511

    Performance analysis of dual-media cooperative communication based on wireless and power line under hybrid fading by Zhixiong Chen, Yifang Jing, Dongsheng Han, Lijiao Wang

    Published 2019-05-01
    “…Wireless communication and power line communication are extensively applied in various fields, such as household Internet of things. For cooperative communication of amplify–forward relay using wireless access and power line transmission, the hybrid model of universal Nakagami wireless fading and lognormal power line fading was used in this study. …”
    Get full text
    Article
  12. 3512

    3D Interactions between Virtual Worlds and Real Life in an E-Learning Community by Ulrike Lucke, Raphael Zender

    Published 2011-01-01
    “…Virtual worlds became an appealing and fascinating component of today's internet. In particular, the number of educational providers that see a potential for E-Learning in such new platforms increases. …”
    Get full text
    Article
  13. 3513

    E-LEARNING CHALLENGES IN POLAND DURING THE COVID-19 PANDEMIC by Agieszka Parlińska

    Published 2022-06-01
    “…The research results helped to formulate several conclusions regarding the factors which influence effective e-learning, such as: internet access and quality; the availability of adequate software, hardware and other tools; and the digital competence of teachers and students. …”
    Get full text
    Article
  14. 3514

    Research on batch anonymous authentication scheme for VANET based on bilinear pairing by Cheng SONG, Ming-yue ZHANG, Wei-ping PENG, Zong-pu JIA, Zhi-zhong LIU, Xi-xi YAN

    Published 2017-06-01
    “…To solve the problem of efficiency of anonymous authentication in vehicular ad hoc network,a batch anonymous authentication scheme was proposed by using bilinear pairing on elliptic curves .The signature was generated by the roadside unit node (RSU) and the vehicle together.Thus,the burden of VANET certification center was reduced and the authentication efficiency was proved.Meanwhile,the difficulty of the attacker to extract the key was increased.Furthermore,security proofs were given to the scheme in the random oracle model.Analysis shows that the proposed scheme can meet the needs of many kinds of security requirements,the computational overhead is significantly reduced,and the authentication efficiency is improved effectively too.Therefore,the scheme has important theoretical significance and application value under computational capability constrained Internet of things (IoT) environment.…”
    Get full text
    Article
  15. 3515

    Christian ModernizationsCirculating Media Practices of the Mission along the Nile Modernisations chrétiennes. Pratiques circulantes des media le long du Nil by Martin Zillinger

    Published 2014-12-01
    “…The demand to make a complete break with the past is emphasized by the use of media (books and more recently the internet) and formats (like a creed) that are seemingly removed from the modifications of time and space. …”
    Get full text
    Article
  16. 3516

    Le travail émotionnel des adolescents face au web affectif. L’exemple de la réception d’images violentes, sexuelles et haineuses by Sophie Jehel, Serge Proulx

    Published 2020-05-01
    “…Our analysis relied on a threefold theoretical framework: the “digital labour” hypothesis, understood as putting Internet users to work; the “affective web” which stimulates this work by capturing attention and calculation of affects; and finally, the dimension of “panoptic surveillance” by making the images visible, which increases emotional tension. …”
    Get full text
    Article
  17. 3517

    Multi-strategy QoS-aware service selection and ranking model by Lei WU, Yu-long LIU, Shi-jun LIU

    Published 2012-09-01
    “…As the increment of services with same function and different QoS in the internet,in order to select and rank the services that fulfill users’ functionality requirements and QoS requirements,a multi-strategy QoS-aware service ranking and selection approach is presented.Considering service performance,and service operation,maintenance costs,an extended Web service QoS model was developed.To determine how well a service satisfies users’and operators’ concerned QoS requirements,a set of functions is presented to normalize services’QoS on various QoS aspects with different metrics and scales,also to compute services satisfaction scores ,and to combine the users’satisfaction scores and the operators’scores together as an overall satisfaction scores based on certain strategy.A prototype system was built for service selection and ranking,and the model above was verified through an application case.…”
    Get full text
    Article
  18. 3518

    Survey of Low Earth Orbit Satellite Communication Network Routing Technology by Shuang ZHENG, Xing ZHANG, Wenbo WANG

    Published 2022-09-01
    “…Low earth orbit satellite communication network is an important part of the internet of everything era, but the characteristics of satellite constellation topology such as high dynamic, limited heterogeneous resources and unbalanced network service capacity make the traditional routing protocol applied to the ground network no longer suitable for low earth orbit satellite network.In this regard, scholars at home and abroad had carried out extensive research on low-orbit satellite routing technology.Firstly, the research status of low-orbit satellite routing was discussed from inter-satellite routing and satellite-to-ground routing, and the inter-satellite routing technologies with business as the core and topology as the core were compared in detail.On this basis, the key problems faced by low-orbit satellite routing strategies were analyzed, namely, high dynamic network topology, large inter-satellite link propagation delay, uneven network load and limited on-board resources.The future research of routing technology was prospected accordingly.…”
    Get full text
    Article
  19. 3519

    Product, services and technology review blogs by Gené van Heerden

    Published 2022-10-01
    “… While much research has been conducted on consumer skepticism about advertising, limited attention has been focused on the relationship between gender and scepticism. As the Internet and new technologies continuously transform corporate communications, the relationship between gender and scepticism in new media such as the blogosphere begs further research. …”
    Get full text
    Article
  20. 3520

    SDN based e-mail repudiation source restraining method by Zhi-geng HAN, Xia FENG, Geng CHEN

    Published 2016-09-01
    “…With the limitation of controllability of the existing Internet architecture,the existing secure e-mail technology such as certified e-mail can only post detection but cannot source restraining on e-mail repudiation.Based on the idea of control and data separation of software-defined networking technology,by means of bypass attaching customized repudiation restrain unit to the traditional e-mail model.An e-mail repudiation source restraining method was proposed without destroying the existing e-mail structure.After presenting e-mail evidence binding protocol,repudiation behavior detection algorithm,certified reputation evaluation model,and repudiation restraining strategy formation algorithm embedded in repudiation restrain unit,the effectiveness were tested of the proposed method in 4 cross scenarios.The experimental results show that,under the premise of compatibility with the current e-mail system,the method can source restrain e-mail repudiation effectively.…”
    Get full text
    Article