Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
3541
MCKite: A Multi-Producer Multicast Scheme in Named Data Networking
Published 2015-12-01“…Named data networking(NDN)-a future internet architecture replacing hosts with named data as the core objects in the network layer and natively supports single producer- multi consumer multicast application pattern. …”
Get full text
Article -
3542
La nouvelle loi organique sur l’information de 2012 en Algérie : vers un ordre médiatique néo-autoritaire ?
Published 2012-10-01“…They have also democratized the use of Internet and have never stopped its access. Ultimately, we are in the presence of a neo-authoritarian media order where the motto is freedom of expression without freedom of the press.…”
Get full text
Article -
3543
Research on Basic Theory and Key Technology of Ultra-High-Speed, Ultra-Large-Capacity, Ultra-Long-Haul Optical Transmission
Published 2014-10-01“…Ultra-high-speed, ultra-large-capacity and ultra-long-haul(3U)optical transmission as a new mode of communication can greatly promote the next generation of optical internet and broadband mobile communication network development and technological progress, therefore 3U has become the focus of international high-tech intellectual property and competition ground. …”
Get full text
Article -
3544
Turkish Version of Self Concept and Identity Measure (SCIM): Psychometric Properties
Published 2016-12-01“…The participants of the study were internet users (n = 364). According to exploratory factor analysis results, Turkish version of SCIM (T-SCIM) consists of two factors (disturbed identity and consolidated identity). …”
Get full text
Article -
3545
Survey on research progress for compute first networking
Published 2021-10-01“…With the development of 5G and mobile Internet technology, cloud computing, edge computing and intelligent terminal devices have been developed rapidly.Computing resources indicate a trend of ubiquitous deployment.How to use ubiquitous computing resources efficiently and collaboratively has become a hot topic at present in network field.In this context, the concept of compute first networking (CFN) has been proposed and attracted wide attention.Its basic idea is to enhance utilization of computing resources and improve user experience of network services, by converging computing and network deeply as well as coordinating distributed computing resources.Firstly the background and research status of CFN were analyzed, and then basic structure, workflow, and key technologies about CFN were explicated.Finally, future research directions and challenges about CFN were summarized.…”
Get full text
Article -
3546
Research on space-air-ground integrated deterministic networking
Published 2023-11-01“…As the Internet evolves from a consumer network to a productive network, emerging industry applications necessitate differentiated and deterministic service quality assurance and communication capabilities that span all dimensions of time and space.How to realize the heterogeneous compatibility of ubiquitous multi-domain networks and support deterministic transmission between nodes in space-air-ground integrated network (SAGIN) has become a significant research problem.Firstly, the emerging full-domain 6G scenarios along with their requirements for deterministic services were analyzed.Then, the hierarchical space-air-ground integrated deterministic networking architecture, including global cooperative network management and control layer, multi-domain dynamic deterministic fusion layer, and ubiquitous heterogeneous deterministic networking layer, was proposed, and key technologies for fixed-mobile-satellite fusion networks in relevant scenarios were studied.Finally, the challenges and development trend of the space-air-ground integrated deterministic networking were presented.…”
Get full text
Article -
3547
Collaborative offloading computing scheme based on energy harvesting technology
Published 2024-06-01“…In recent years, the energy requirements for devices in internet of things (IoT) applications have increased, making energy harvesting (EH) technology an important way to alleviate the energy shortage problem in edge computing and extend the battery life of devices. …”
Get full text
Article -
3548
Does Intra-party Democracy Enhance Party Digitalisation? Evidence from the Spanish Socialist Workers‘ Party (2014–2024)
Published 2024-12-01“…The widespread use of the internet has facilitated this process, affecting the parties’ organisational structures. …”
Get full text
Article -
3549
Research on the invulnerability of regional network based on topology analysis
Published 2021-11-01“…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
Get full text
Article -
3550
A PLATAFORMIZAÇÃO DO CONTEÚDO CIENTÍFICO: ANÁLISE DO PORTAL DRAUZIO VARELLA NO TIKTOK.
Published 2025-01-01“…Este artigo investiga a disseminação de informações científicas na internet, com foco nas informações relativas à área de Saúde. …”
Get full text
Article -
3551
-
3552
KOBİLERDE ELEKTRONİK TİCARETİN MARKA BİLİNİRLİĞİNE ETKİLERİ
Published 2009-12-01“…İşletmeler; bilgisayar teknolojilerini salt mühendislik alanında kullanmamakta; pazarlama etkinliklerinden, lojistik ve servis hizmetine kadar her aşamada bilgisayar ve iletişim teknolojilerinden yararlanmaktadır. Özellikle Internet’in “Elektronik İşletmecilik” ve “Elektronik Ticaret” uygulamalarında kullanılmasıyla birlikte, elektronik ortamda pazarlama faaliyetleri (e-marketing); küresel pazarlara girilmesinde, işletmenin ve sahip olduğu markaların bilinirliğinin artmasında ve işletmenin pazar payının artırılmasında önemli katkılar sağlamaktadır. …”
Get full text
Article -
3553
New media in the education of children with and without disabilities from the perspective of the knowledge and actions of their parents
Published 2018-05-01“…The two groups of interlocutors differed in terms of the extent to which they perceived Internet threats. A larger picture of this phenomenon emerges from the narrative of adults raising children with disability degree certificates, which points to the need to equalize opportunities and to keep pace with able peers, but creates many difficulties, including the already difficult process of educating children with developmental disorders. …”
Get full text
Article -
3554
The criminality of juveniles through the prism of criminologically significant manifestations of extremism
Published 2018-04-01“…The main tool that favors the involvement of juveniles in both general criminal and extremist activities is the Internet, which serves as a technology and means of transforming juvenile criminality into concrete criminal manifestations.…”
Get full text
Article -
3555
Design and implementation of software router supporting segment routing
Published 2017-02-01“…Segment routing (SR) is a routing mechanism proposed by IETF in recent years,which aims to make the IP/MPLS network service-oriented and more efficient.SR eliminates the complex control plane protocol (LDP/RSVP-TE) of the MPLS network,while SR implements the traffic engineering mechanism.Different from the explicit path in the RSVP tunnel which maintains the state of each flow in the middle of the tunnel,the explicit path based on SR only maintains the state of flow at the entrance border router of the SR domain.For this reason,SR improves the scalability of the network.Therefore the research of the SR mechanism is very important to the next generation internet.The realization mechanism of SR was studied,using the click router.The SR control plane subsystem based on PCE architecture and each module of MPLS-based SR data plane subsystem were implemented and deployed in practice to verify the feasibility of the software router in actual deployment.…”
Get full text
Article -
3556
Research on Design and Application of National Fitness System
Published 2021-01-01“…The perception layer mainly uses Internet of Things gateway, central machine, wireless perception node, and fitness data dashboard to obtain fitness data. …”
Get full text
Article -
3557
Workplace surveillance: examining current instruments, limitations and legal background issues
Published 2013-01-01“…To control and monitor employees, employers may take diverse surveillance instruments into consideration: examples may be time-tracking and access control systems, e-supported systems like chip cards, RFID (radio-frequency identification) chips, human implants, various biometric systems, computer surveillance, network monitoring software, GPS tracking, telecommunication, visual and Internet monitoring, as well as surveillance of detective agencies. …”
Get full text
Article -
3558
Attack Analysis Framework of Space-Integrated-Ground Information Network Based on Cybersecurity Knowledge Graph
Published 2021-09-01“…While realizing global coverage, random access, on-demand service, security and credibility, the space-integrated-ground information network(SGIN) is confronted with more complex and variable security threats.Compared with the internet, satellite network has a lot of diff erences, such as highly dynamic changes of topology, transfer protocol and data format.In terms of these questions, it was necessary to integrated the rule of satellite network attacks into the rules of APT attacks, developed the cybersecurity knowledge graph and the attack rules library to analyzed the attacks of the SGIN.The pattern of attack rules was expressed based on time-space data model, which was used to completed the attack chain when there were non-continuous missed data or false positives data.The attack analysis framework proposed in this paper could accurately perceived the security status of the SGIN in real time , and provided decision support for the SGIN.…”
Get full text
Article -
3559
Adopting an Improved Genetic Algorithm for Multi-Objective Service Composition Optimization in Smart Agriculture
Published 2024-12-01“… In order to modernize numerous areas, the Internet of Things (IoT) is an emerging paradigm that connects various intelligent physical objects. …”
Get full text
Article -
3560
TENDENCIES OF CHANGES IN MARKET BEHAVIOURSOF PHYSICALLY DISABLED CONSUMERS
Published 2015-12-01“…Additionally, continuous globalization and digitization determining the process of consumer behaviours are also important. Internet is more frequently chosen as an alternative method of a barrier-free cybernetic communication channel where consumers from different groups can interact in the marketplace. …”
Get full text
Article