Showing 3,541 - 3,560 results of 5,694 for search '"internet"', query time: 0.07s Refine Results
  1. 3541

    MCKite: A Multi-Producer Multicast Scheme in Named Data Networking by Yu Zhang, Yanbin Sun, Hongli Zhang

    Published 2015-12-01
    “…Named data networking(NDN)-a future internet architecture replacing hosts with named data as the core objects in the network layer and natively supports single producer- multi consumer multicast application pattern. …”
    Get full text
    Article
  2. 3542

    La nouvelle loi organique sur l’information de 2012 en Algérie : vers un ordre médiatique néo-autoritaire ? by Chérif Dris

    Published 2012-10-01
    “…They have also democratized the use of Internet and have never stopped its access. Ultimately, we are in the presence of a neo-authoritarian media order where the motto is freedom of expression without freedom of the press.…”
    Get full text
    Article
  3. 3543

    Research on Basic Theory and Key Technology of Ultra-High-Speed, Ultra-Large-Capacity, Ultra-Long-Haul Optical Transmission by Shaohua Yu, Qi Yang, Daojun Xue, Zhixue He, Cai Li

    Published 2014-10-01
    “…Ultra-high-speed, ultra-large-capacity and ultra-long-haul(3U)optical transmission as a new mode of communication can greatly promote the next generation of optical internet and broadband mobile communication network development and technological progress, therefore 3U has become the focus of international high-tech intellectual property and competition ground. …”
    Get full text
    Article
  4. 3544

    Turkish Version of Self Concept and Identity Measure (SCIM): Psychometric Properties by Emine Inan, Ozden Yalcinkaya Alkar

    Published 2016-12-01
    “…The participants of the study were internet users (n = 364). According to exploratory factor analysis results, Turkish version of SCIM (T-SCIM) consists of two factors (disturbed identity and consolidated identity). …”
    Get full text
    Article
  5. 3545

    Survey on research progress for compute first networking by Qingmin JIA, Rui DING, Hui LIU, Chen ZHANG, Renchao XIE

    Published 2021-10-01
    “…With the development of 5G and mobile Internet technology, cloud computing, edge computing and intelligent terminal devices have been developed rapidly.Computing resources indicate a trend of ubiquitous deployment.How to use ubiquitous computing resources efficiently and collaboratively has become a hot topic at present in network field.In this context, the concept of compute first networking (CFN) has been proposed and attracted wide attention.Its basic idea is to enhance utilization of computing resources and improve user experience of network services, by converging computing and network deeply as well as coordinating distributed computing resources.Firstly the background and research status of CFN were analyzed, and then basic structure, workflow, and key technologies about CFN were explicated.Finally, future research directions and challenges about CFN were summarized.…”
    Get full text
    Article
  6. 3546

    Research on space-air-ground integrated deterministic networking by Guoyu PENG, Shuo WANG, Guizhen LI, Yuhan WEN, Tao HUANG

    Published 2023-11-01
    “…As the Internet evolves from a consumer network to a productive network, emerging industry applications necessitate differentiated and deterministic service quality assurance and communication capabilities that span all dimensions of time and space.How to realize the heterogeneous compatibility of ubiquitous multi-domain networks and support deterministic transmission between nodes in space-air-ground integrated network (SAGIN) has become a significant research problem.Firstly, the emerging full-domain 6G scenarios along with their requirements for deterministic services were analyzed.Then, the hierarchical space-air-ground integrated deterministic networking architecture, including global cooperative network management and control layer, multi-domain dynamic deterministic fusion layer, and ubiquitous heterogeneous deterministic networking layer, was proposed, and key technologies for fixed-mobile-satellite fusion networks in relevant scenarios were studied.Finally, the challenges and development trend of the space-air-ground integrated deterministic networking were presented.…”
    Get full text
    Article
  7. 3547

    Collaborative offloading computing scheme based on energy harvesting technology by WANG Jun, ZHAO Haodong

    Published 2024-06-01
    “…In recent years, the energy requirements for devices in internet of things (IoT) applications have increased, making energy harvesting (EH) technology an important way to alleviate the energy shortage problem in edge computing and extend the battery life of devices. …”
    Get full text
    Article
  8. 3548

    Does Intra-party Democracy Enhance Party Digitalisation? Evidence from the Spanish Socialist Workers‘ Party (2014–2024) by Alberto Díaz-Montiel

    Published 2024-12-01
    “…The widespread use of the internet has facilitated this process, affecting the parties’ organisational structures. …”
    Get full text
    Article
  9. 3549

    Research on the invulnerability of regional network based on topology analysis by Changqing AN, Yujia LIU, Hui WANG, Zhiyan ZHENG, Tao YU, Jilong WANG

    Published 2021-11-01
    “…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
    Get full text
    Article
  10. 3550

    A PLATAFORMIZAÇÃO DO CONTEÚDO CIENTÍFICO: ANÁLISE DO PORTAL DRAUZIO VARELLA NO TIKTOK. by Gabriela Martin, Carolina Frazon Terra

    Published 2025-01-01
    “…Este artigo investiga a disseminação de informações científicas na internet, com foco nas informações relativas à área de Saúde. …”
    Get full text
    Article
  11. 3551
  12. 3552

    KOBİLERDE ELEKTRONİK TİCARETİN MARKA BİLİNİRLİĞİNE ETKİLERİ by Halil Elibol

    Published 2009-12-01
    “…İşletmeler; bilgisayar teknolojilerini salt mühendislik alanında kullanmamakta; pazarlama etkinliklerinden, lojistik ve servis hizmetine kadar her aşamada bilgisayar ve iletişim teknolojilerinden yararlanmaktadır. Özellikle Internet’in “Elektronik İşletmecilik” ve “Elektronik Ticaret” uygulamalarında kullanılmasıyla birlikte, elektronik ortamda pazarlama faaliyetleri (e-marketing); küresel pazarlara girilmesinde, işletmenin ve sahip olduğu markaların bilinirliğinin artmasında ve işletmenin pazar payının artırılmasında önemli katkılar sağlamaktadır. …”
    Get full text
    Article
  13. 3553

    New media in the education of children with and without disabilities from the perspective of the knowledge and actions of their parents by Justyna Siemionow

    Published 2018-05-01
    “…The two groups of interlocutors differed in terms of the extent to which they perceived Internet threats. A larger picture of this phenomenon emerges from the narrative of adults raising children with disability degree certificates, which points to the need to equalize opportunities and to keep pace with able peers, but creates many difficulties, including the already difficult process of educating children with developmental disorders. …”
    Get full text
    Article
  14. 3554

    The criminality of juveniles through the prism of criminologically significant manifestations of extremism by E.V. Demidova-Petrova

    Published 2018-04-01
    “…The main tool that favors the involvement of juveniles in both general criminal and extremist activities is the Internet, which serves as a technology and means of transforming juvenile criminality into concrete criminal manifestations.…”
    Get full text
    Article
  15. 3555

    Design and implementation of software router supporting segment routing by Xiaomin GAO, Xuejing LIU, Jiawei LI, Hongbin LUO, Ping DONG

    Published 2017-02-01
    “…Segment routing (SR) is a routing mechanism proposed by IETF in recent years,which aims to make the IP/MPLS network service-oriented and more efficient.SR eliminates the complex control plane protocol (LDP/RSVP-TE) of the MPLS network,while SR implements the traffic engineering mechanism.Different from the explicit path in the RSVP tunnel which maintains the state of each flow in the middle of the tunnel,the explicit path based on SR only maintains the state of flow at the entrance border router of the SR domain.For this reason,SR improves the scalability of the network.Therefore the research of the SR mechanism is very important to the next generation internet.The realization mechanism of SR was studied,using the click router.The SR control plane subsystem based on PCE architecture and each module of MPLS-based SR data plane subsystem were implemented and deployed in practice to verify the feasibility of the software router in actual deployment.…”
    Get full text
    Article
  16. 3556

    Research on Design and Application of National Fitness System by Shengyou Wang

    Published 2021-01-01
    “…The perception layer mainly uses Internet of Things gateway, central machine, wireless perception node, and fitness data dashboard to obtain fitness data. …”
    Get full text
    Article
  17. 3557

    Workplace surveillance: examining current instruments, limitations and legal background issues by Ulrike Hugl

    Published 2013-01-01
    “…To control and monitor employees, employers may take diverse surveillance instruments into consideration: examples may be time-tracking and access control systems, e-supported systems like chip cards, RFID (radio-frequency identification) chips, human implants, various biometric systems, computer surveillance, network monitoring software, GPS tracking, telecommunication, visual and Internet monitoring, as well as surveillance of detective agencies. …”
    Get full text
    Article
  18. 3558

    Attack Analysis Framework of Space-Integrated-Ground Information Network Based on Cybersecurity Knowledge Graph by Yulu QI, Rong JIANG, Xing RONG, Aiping LI

    Published 2021-09-01
    “…While realizing global coverage, random access, on-demand service, security and credibility, the space-integrated-ground information network(SGIN) is confronted with more complex and variable security threats.Compared with the internet, satellite network has a lot of diff erences, such as highly dynamic changes of topology, transfer protocol and data format.In terms of these questions, it was necessary to integrated the rule of satellite network attacks into the rules of APT attacks, developed the cybersecurity knowledge graph and the attack rules library to analyzed the attacks of the SGIN.The pattern of attack rules was expressed based on time-space data model, which was used to completed the attack chain when there were non-continuous missed data or false positives data.The attack analysis framework proposed in this paper could accurately perceived the security status of the SGIN in real time , and provided decision support for the SGIN.…”
    Get full text
    Article
  19. 3559

    Adopting an Improved Genetic Algorithm for Multi-Objective Service Composition Optimization in Smart Agriculture by Shalini Sharma, Bhupendra Kumar Pathak, Rajiv Kumar

    Published 2024-12-01
    “… In order to modernize numerous areas, the Internet of Things (IoT) is an emerging paradigm that connects various intelligent physical objects. …”
    Get full text
    Article
  20. 3560

    TENDENCIES OF CHANGES IN MARKET BEHAVIOURSOF PHYSICALLY DISABLED CONSUMERS by Magdalena Maciaszczyk

    Published 2015-12-01
    “…Additionally, continuous globalization and digitization determining the process of consumer behaviours are also important. Internet is more frequently chosen as an alternative method of a barrier-free cybernetic communication channel where consumers from different groups can interact in the marketplace. …”
    Get full text
    Article