Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
3521
Research on network traffic classification based on machine learning and deep learning
Published 2021-03-01“…With the continuous development of Internet technology and the continuous expansion of network scale, there are many different types of applications , and various new applications have endlessly emerged.In order to ensure the quality of service (QoS) and ensure network security, accurate and fast traffic classification is an urgent problem for both operators and network managers.Firstly, the problem definition and performance metrics of network traffic classification were given.Then, the traffic classification methods based on machine learning and deep learning were introduced respectively, the advantages and disadvantages of these methods were analyzed, and the existing problems were expounded.Next, the related work by focusing on the three problems encountered elaborated and analyzed in traffic classification when considering online deployment: dataset, zero-day application identification and the cost of online deployment, and further discusses the challenges faced by the current network traffic classification researches.Finally, the next research direction of network traffic classification was prospected.…”
Get full text
Article -
3522
Cross-network access control mechanism for complex network environment
Published 2018-02-01“…Complex network environments,such as space-ground integrated networks,internet of things and complex private networks,have some typical characteristics,e.g.…”
Get full text
Article -
3523
IEEE 802.1x-based user identity-embedded IPv6 address generation scheme
Published 2019-12-01“…Embedding extensible user identities into IPv6 addresses not only provides the possibility of tracing the user identity and finely controlling the user behavior,but also helps to improve the security,auditability and credibility of the Internet.Current schemes that embed user identity within IPv6 address are hard to deploy in practice due to the complexity of DHCPv6 client development or the complicated management of temporary address.Considering the sequential logic between identity authentication and address allocation,a IEEE 802.1x-based user identity-embedded IPv6 address generation scheme was proposed.By conducting identity authentication using layer-2 mechanisms and then assigning IPv6 addresses,this scheme decoupled the process of identity authentication and address allocation,and avoided the limitation of developing new extended DHCPv6 clients for each operating system and maintaining temporary address leases on DHCPv6 servers,which was more deployable.…”
Get full text
Article -
3524
Firefly Optimization-Based Cooperative Localization Algorithm for Intelligent IoT
Published 2022-01-01“…To achieve effective connection between each node of the Internet of Things (IoT), there is a great demand of precise positioning. …”
Get full text
Article -
3525
Flow features and truth scale based single-ended objective assessment of perceived quality of VoIP service
Published 2008-01-01“…Talk experiments on the Internet by using VoIP software QQ and Skype was presented. …”
Get full text
Article -
3526
Class conditioning and class positioning in young people's everyday life with digital media
Published 2021-04-01“…Drawing on Bourdieusian theory and qualitative interview data from two research projects, I complicate the notion of Sweden as a universally wired media welfare state by showing how economic and cultural forces are structuring Internet access and digital media practice along the lines of preexisting social divisions. …”
Get full text
Article -
3527
Development of digital marketing technologies for promoting educational services of Russian universities in the context of global transformations
Published 2022-07-01“…Conclusions are formulated about the inclusion in the list of works on the development of the information component of the brand promotion of Russian universities of measures for search SEO optimization of university sites, more active use of SMM tools, the use of targeted, contextual advertising, positioning and placement of information on foreign Internet portals.…”
Get full text
Article -
3528
Of Evangelism or Merchandise? The Role of Selected Christian Faith-based Schools in Nigerian Education
Published 2023-05-01“…The secondary source includes books, journal articles, the Internet, and structured questionnaires as tools for producing information. …”
Get full text
Article -
3529
Research on Virtual Machine Placement in Cloud Data Center
Published 2015-02-01“…The characteristics of virtual machine placement of the backbone internet and the related reference values to the engineering practice of the cloud datacenter were analyzed. …”
Get full text
Article -
3530
Quality of accounting and tax information in Brazil
Published 2025-01-01“…The explanatory variables included economic complexity, tax dependence, manager qualifications, employee qualifications, transparency, and internet access. Results: The results demonstrated a significant relationship between the variables tax dependence, employee qualifications, and municipal transparency. …”
Get full text
Article -
3531
Determinants of Access and Farmers’ use of Information and Communication Technologies (1CTs) in Edo State, Nigeria
Published 2013-07-01“…The results show that GSM is the only new ICT farmers have access to (mean= 2.66) and use regularly (mean =3.44) while they have little or no access to and use either computer, E- mail or internet. This poor farmers access to and use of new ICTs can limit the extent of agricultural information they can receive. …”
Get full text
Article -
3532
Segmentación del comprador online en México: un estudio con base en la frecuencia de compra electrónica
Published 2019-01-01“…Se examinan los patrones de consumo en internet. Con una muestra de 1 495 consumidores online, se exploran las distintas agrupaciones (tipologías) con base en su frecuencia de compra. …”
Get full text
Article -
3533
A general way to assign IPv6 trusted address under portal authentication
Published 2019-12-01“…As the network scale grows,it is especially important to fine-tune the network.In the next-generation Internet,embedding the user's trusted identity into the IPv6 address suffix to assign trusted addresses can further improve the traceability of network behavior.At present,many studies have attempted to embed the user’s identity information into IPv6 addresses based on portal authentication and DHCPv6,but the modification of DHCPv6 makes it not transparent to the terminal.A mechanism for trusted address assignment in IPv6 networks based on portal authentication was proposed.The collaboration between servers and software-defined networking (SDN) technology was used to realize the indirect assignment of IPv6 trusted addresses.Finally,a prototype system was implemented and its feasibility and performance were evaluated in the network of Nanjing Telecom in Jiangsu.The results show that the mechanism only brings little overhead and it is transparent to the terminal.…”
Get full text
Article -
3534
Humanization of Childbirth in Excellence Medicine
Published 2011-11-01“…It includes the works of both national and international author as well as Internet and search results. The objective is to identify the specific changes that could be achieved in order to improve the experiences of women during childbirth as well as the development of tests and methods to promote these changes. …”
Get full text
Article -
3535
Design and implementation of NB-IoT based environmental temperature and humidity monitoring system
Published 2021-12-01“…In view of the disadvantages of the traditional environmental monitoring system, such as high power consumption, high maintenance cost and no real-time monitoring, an environmental temperature and humidity monitoring system based on narrow band Internet of things (NB-IoT) technology was developed, which is mainly controlled by singlechip microcomputer.The work flow of the main controller and the working mode of the communication module were optimized to reduce the power consumption of the system.NB-IoT communication technology was utilized for data transmission to the cloud platform through the base station and core network.China Mobile IoT open platform (OneNET platform) was adopted to achieve the connection between the terminal device and the application, and expanded functions provided by the platform was used to design a mobile phone application to achieve the remote real-time monitoring of environmental parameters and improve the user’s convenience.…”
Get full text
Article -
3536
A survey on resource allocation in backscatter communication networks
Published 2021-09-01“…With the development of Internet of things (IoT) technology, wireless networks have the characteristics of massive user access, high power consumption, and high capacity requirements.In order to meet the transmission requirements and reduce energy consumption, backscatter communication technology was considered to be one of the most effective solutions to the above problems.In the fact of complex network scenarios, the improvement of spectrum efficiency, system capacity, and energy management has become an urgent problem of resource allocation areas in backscatter communications.For this problem, resource allocation algorithms in backscatter communications were surveyed.Firstly, the basic concept and different network architectures of backscatter communication were introduced.Then, resource allocation algorithms in backscatter communication networks were analyzed according to different network types, optimization objectives, and the number of antennas.Finally, the challenges and future research trends of resource allocation problems in backscatter communication networks were prospected.…”
Get full text
Article -
3537
Bearing technology across the data center based on SDN
Published 2016-03-01“…The development of the internet industry and the rise of cloud computing have created requirements on interconnectivity across data center,and software defined network technology provides important means to solve the network bottleneck problem of data center interconnectivity.Firstly,several commonly used interconnectivity technologies across data center were introduced,and advantages of SDN technology were analyzed.Then,the operator solution of data center interconnectivity bearing technologies based on SDN was put forward,and implementation ideas of this solution were explained.It is a solution which can realize network virtualization across data center,and provide kinds of business functions,such as service customization of user,automatic accessing of network,isolation strategy between different virtual machine,traffic scheduling,the nearest access of user,disaster recovery and backup across data center.…”
Get full text
Article -
3538
Free-Market Censorship
Published 2013-05-01“…In the US, the airwaves and the internet often include offensive, racist, unhinged, and violent rhetoric. …”
Get full text
Article -
3539
E-Ticaretin Enflasyona Etkileri: Türkiye Örneği
Published 2020-11-01“…Bu çalışmada talep kaynaklı enflasyon sürecinin, gelişen teknoloji ve internet altyapısından etkilenerek özellikle E-ticaret hacminin artması ile etkilendiği varsayımı araştırılmıştır. …”
Get full text
Article -
3540
E-LEARNING CHALLENGES IN POLAND DURING THE COVID-19 PANDEMIC
Published 2020-06-01“…This new approach, and the purposeand added value of this study, is to enrich the knowledge of the use of new teaching and researchmethods gained during the Covid-19 pandemic and applicability to pandemics generally, as wellas continued use of these methods afterwards..To achieve the objective, the method of literature analysis and critique was used, as well as aratio analysis based on historical data from Statistics Poland (GUS), EUROSTAT and the author’sown first-hand observations as a university educator.The research results helped to formulate several conclusions regarding the factors whichinfluence effective e-learning, such as: internet access and quality; the availability of adequatesoftware, hardware and other tools; and the digital competence of teachers and students. …”
Get full text
Article