Showing 3,521 - 3,540 results of 5,694 for search '"internet"', query time: 0.06s Refine Results
  1. 3521

    Research on network traffic classification based on machine learning and deep learning by Yue GU, Dan LI, Kaihui GAO

    Published 2021-03-01
    “…With the continuous development of Internet technology and the continuous expansion of network scale, there are many different types of applications , and various new applications have endlessly emerged.In order to ensure the quality of service (QoS) and ensure network security, accurate and fast traffic classification is an urgent problem for both operators and network managers.Firstly, the problem definition and performance metrics of network traffic classification were given.Then, the traffic classification methods based on machine learning and deep learning were introduced respectively, the advantages and disadvantages of these methods were analyzed, and the existing problems were expounded.Next, the related work by focusing on the three problems encountered elaborated and analyzed in traffic classification when considering online deployment: dataset, zero-day application identification and the cost of online deployment, and further discusses the challenges faced by the current network traffic classification researches.Finally, the next research direction of network traffic classification was prospected.…”
    Get full text
    Article
  2. 3522

    Cross-network access control mechanism for complex network environment by Fenghua LI, Tianzhu CHEN, Zhen WANG, Linjie ZHANG, Guozhen SHI, Yunchuan GUO

    Published 2018-02-01
    “…Complex network environments,such as space-ground integrated networks,internet of things and complex private networks,have some typical characteristics,e.g.…”
    Get full text
    Article
  3. 3523

    IEEE 802.1x-based user identity-embedded IPv6 address generation scheme by Peng KUANG, Ying LIU, Lin HE, Gang REN

    Published 2019-12-01
    “…Embedding extensible user identities into IPv6 addresses not only provides the possibility of tracing the user identity and finely controlling the user behavior,but also helps to improve the security,auditability and credibility of the Internet.Current schemes that embed user identity within IPv6 address are hard to deploy in practice due to the complexity of DHCPv6 client development or the complicated management of temporary address.Considering the sequential logic between identity authentication and address allocation,a IEEE 802.1x-based user identity-embedded IPv6 address generation scheme was proposed.By conducting identity authentication using layer-2 mechanisms and then assigning IPv6 addresses,this scheme decoupled the process of identity authentication and address allocation,and avoided the limitation of developing new extended DHCPv6 clients for each operating system and maintaining temporary address leases on DHCPv6 servers,which was more deployable.…”
    Get full text
    Article
  4. 3524

    Firefly Optimization-Based Cooperative Localization Algorithm for Intelligent IoT by Cheng peng Liu, Bin Xia, Liye Zhang

    Published 2022-01-01
    “…To achieve effective connection between each node of the Internet of Things (IoT), there is a great demand of precise positioning. …”
    Get full text
    Article
  5. 3525

    Flow features and truth scale based single-ended objective assessment of perceived quality of VoIP service by CHENG Wei-qing1, GONG Jian1, DING Wei1

    Published 2008-01-01
    “…Talk experiments on the Internet by using VoIP software QQ and Skype was presented. …”
    Get full text
    Article
  6. 3526

    Class conditioning and class positioning in young people's everyday life with digital media by Danielsson Martin

    Published 2021-04-01
    “…Drawing on Bourdieusian theory and qualitative interview data from two research projects, I complicate the notion of Sweden as a universally wired media welfare state by showing how economic and cultural forces are structuring Internet access and digital media practice along the lines of preexisting social divisions. …”
    Get full text
    Article
  7. 3527

    Development of digital marketing technologies for promoting educational services of Russian universities in the context of global transformations by V. A. Yudina, M. A. Tanina, V. V. Bondarenko

    Published 2022-07-01
    “…Conclusions are formulated about the inclusion in the list of works on the development of the information component of the brand promotion of Russian universities of measures for search SEO optimization of university sites, more active use of SMM tools, the use of targeted, contextual advertising, positioning and placement of information on foreign Internet portals.…”
    Get full text
    Article
  8. 3528

    Of Evangelism or Merchandise? The Role of Selected Christian Faith-based Schools in Nigerian Education by Mobolaji Oyebisi Ajibade

    Published 2023-05-01
    “…The secondary source includes books, journal articles, the Internet, and structured questionnaires as tools for producing information. …”
    Get full text
    Article
  9. 3529

    Research on Virtual Machine Placement in Cloud Data Center by Yongbing Fan, Tian Chen, Nan Chen, Zhilan Huang, Cui'e Lv

    Published 2015-02-01
    “…The characteristics of virtual machine placement of the backbone internet and the related reference values to the engineering practice of the cloud datacenter were analyzed. …”
    Get full text
    Article
  10. 3530

    Quality of accounting and tax information in Brazil by Maysa Alves Correa Silva, Cíntia Siqueira Araújo Soares, João Estevão Barbosa Neto

    Published 2025-01-01
    “…The explanatory variables included economic complexity, tax dependence, manager qualifications, employee qualifications, transparency, and internet access. Results: The results demonstrated a significant relationship between the variables tax dependence, employee qualifications, and municipal transparency. …”
    Get full text
    Article
  11. 3531

    Determinants of Access and Farmers’ use of Information and Communication Technologies (1CTs) in Edo State, Nigeria by DN Okoedo-Okojie, FE Omoregbee

    Published 2013-07-01
    “…The results show that GSM is the only new ICT farmers have access to (mean= 2.66) and use regularly (mean =3.44) while they have little or no access to and use either computer, E- mail or internet. This poor farmers access to and use of new ICTs can limit the extent of agricultural information they can receive. …”
    Get full text
    Article
  12. 3532

    Segmentación del comprador online en México: un estudio con base en la frecuencia de compra electrónica by José Ignacio Azuela Flores, Magda Lizet Ochoa Hernández, Jannett Ayup González

    Published 2019-01-01
    “…Se examinan los patrones de consumo en internet. Con una muestra de 1 495 consumidores online, se exploran las distintas agrupaciones (tipologías) con base en su frecuencia de compra. …”
    Get full text
    Article
  13. 3533

    A general way to assign IPv6 trusted address under portal authentication by Jiang ZHOU, Hewu LI

    Published 2019-12-01
    “…As the network scale grows,it is especially important to fine-tune the network.In the next-generation Internet,embedding the user's trusted identity into the IPv6 address suffix to assign trusted addresses can further improve the traceability of network behavior.At present,many studies have attempted to embed the user’s identity information into IPv6 addresses based on portal authentication and DHCPv6,but the modification of DHCPv6 makes it not transparent to the terminal.A mechanism for trusted address assignment in IPv6 networks based on portal authentication was proposed.The collaboration between servers and software-defined networking (SDN) technology was used to realize the indirect assignment of IPv6 trusted addresses.Finally,a prototype system was implemented and its feasibility and performance were evaluated in the network of Nanjing Telecom in Jiangsu.The results show that the mechanism only brings little overhead and it is transparent to the terminal.…”
    Get full text
    Article
  14. 3534

    Humanization of Childbirth in Excellence Medicine by Xiomara Pujadas Ríos, Regino Oviedo Rodríguez, Francisco Montero Torres, Juan Francisco Pineda.

    Published 2011-11-01
    “…It includes the works of both national and international author as well as Internet and search results. The objective is to identify the specific changes that could be achieved in order to improve the experiences of women during childbirth as well as the development of tests and methods to promote these changes. …”
    Get full text
    Article
  15. 3535

    Design and implementation of NB-IoT based environmental temperature and humidity monitoring system by Minmin MAO, Jiaqi JU, Yuling OUYANG, Yan JIN

    Published 2021-12-01
    “…In view of the disadvantages of the traditional environmental monitoring system, such as high power consumption, high maintenance cost and no real-time monitoring, an environmental temperature and humidity monitoring system based on narrow band Internet of things (NB-IoT) technology was developed, which is mainly controlled by singlechip microcomputer.The work flow of the main controller and the working mode of the communication module were optimized to reduce the power consumption of the system.NB-IoT communication technology was utilized for data transmission to the cloud platform through the base station and core network.China Mobile IoT open platform (OneNET platform) was adopted to achieve the connection between the terminal device and the application, and expanded functions provided by the platform was used to design a mobile phone application to achieve the remote real-time monitoring of environmental parameters and improve the user’s convenience.…”
    Get full text
    Article
  16. 3536

    A survey on resource allocation in backscatter communication networks by Yongjun XU, Haoke YANG, Yinghui YE, Qianbin CHEN, Guangyue LU

    Published 2021-09-01
    “…With the development of Internet of things (IoT) technology, wireless networks have the characteristics of massive user access, high power consumption, and high capacity requirements.In order to meet the transmission requirements and reduce energy consumption, backscatter communication technology was considered to be one of the most effective solutions to the above problems.In the fact of complex network scenarios, the improvement of spectrum efficiency, system capacity, and energy management has become an urgent problem of resource allocation areas in backscatter communications.For this problem, resource allocation algorithms in backscatter communications were surveyed.Firstly, the basic concept and different network architectures of backscatter communication were introduced.Then, resource allocation algorithms in backscatter communication networks were analyzed according to different network types, optimization objectives, and the number of antennas.Finally, the challenges and future research trends of resource allocation problems in backscatter communication networks were prospected.…”
    Get full text
    Article
  17. 3537

    Bearing technology across the data center based on SDN by Hanjiang LIU, Liang OU, Wenhua CHEN, Hong TANG

    Published 2016-03-01
    “…The development of the internet industry and the rise of cloud computing have created requirements on interconnectivity across data center,and software defined network technology provides important means to solve the network bottleneck problem of data center interconnectivity.Firstly,several commonly used interconnectivity technologies across data center were introduced,and advantages of SDN technology were analyzed.Then,the operator solution of data center interconnectivity bearing technologies based on SDN was put forward,and implementation ideas of this solution were explained.It is a solution which can realize network virtualization across data center,and provide kinds of business functions,such as service customization of user,automatic accessing of network,isolation strategy between different virtual machine,traffic scheduling,the nearest access of user,disaster recovery and backup across data center.…”
    Get full text
    Article
  18. 3538

    Free-Market Censorship by Mark McNaught

    Published 2013-05-01
    “…In the US, the airwaves and the internet often include offensive, racist, unhinged, and violent rhetoric. …”
    Get full text
    Article
  19. 3539

    E-Ticaretin Enflasyona Etkileri: Türkiye Örneği by Hakan Eryüzlü

    Published 2020-11-01
    “…Bu çalışmada talep kaynaklı enflasyon sürecinin, gelişen teknoloji ve internet altyapısından etkilenerek özellikle E-ticaret hacminin artması ile etkilendiği varsayımı araştırılmıştır. …”
    Get full text
    Article
  20. 3540

    E-LEARNING CHALLENGES IN POLAND DURING THE COVID-19 PANDEMIC by Agieszka Parlińska

    Published 2020-06-01
    “…This new approach, and the purposeand added value of this study, is to enrich the knowledge of the use of new teaching and researchmethods gained during the Covid-19 pandemic and applicability to pandemics generally, as wellas continued use of these methods afterwards..To achieve the objective, the method of literature analysis and critique was used, as well as aratio analysis based on historical data from Statistics Poland (GUS), EUROSTAT and the author’sown first-hand observations as a university educator.The research results helped to formulate several conclusions regarding the factors whichinfluence effective e-learning, such as: internet access and quality; the availability of adequatesoftware, hardware and other tools; and the digital competence of teachers and students. …”
    Get full text
    Article