Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
3561
Research on distributed network intrusion detection system for IoT based on honeyfarm
Published 2024-01-01“…To solve the problems that the network intrusion detection system in the Internet of things couldn’t identify new attacks and has limited flexibility, a network intrusion detection system based on honeyfarm was proposed, which could effectively identify abnormal traffic and have continuous learning ability.Firstly, considering the characteristics of the convolutional block attention module, an abnormal traffic detection model was developed, focusing on both channel and spatial dimensions, to enhance the model’s recognition abilities.Secondly, a model training scheme utilizing federated learning was employed to enhance the model’s generalization capabilities.Finally, the abnormal traffic detection model at the edge nodes was continuously updated and iterated based on the honeyfarm, so as to improve the system’s accuracy in recognizing new attack traffic.The experimental results demonstrate that the proposed system not only effectively detects abnormal behavior in network traffic, but also continually enhances performance in detecting abnormal traffic.…”
Get full text
Article -
3562
6G oriented wireless communication channel characteristics analysis and modeling
Published 2020-03-01“…,global coverage,all spectrums and all applications,we comprehensively survey 6G related wireless channel measurements,channel characteristics,and channel models for all frequency bands and all scenarios.Millimeter wave (mmWave),terahertz (THz),optical band,satellite,unmanned aerial vehicle (UAV),maritime,underwater acoustic,high-speed train (HST),vehicle-to-vehicle (V2V),massive/ultra-massive multiple-input multiple-output (MIMO),orbital angular momentum (OAM),and industry Internet of things (IoT) communication channels were particularly investigated.The related 6G channel measurement and modeling results were also given.Finally,future research challenges on 6G channel measurements and modeling were pointed out.…”
Get full text
Article -
3563
ÜNİVERSİTE ÖĞRENCİLERİNİN SOSYAL MEDYA REKLAMLARINA İLİŞKİN ALGILARININ SATIN ALMA NİYETİ ÜZERİNDEKİ ETKİSİ: GAZİANTEP ÜNİVERSİTESİ ÖRNEĞİ
Published 2018-05-01“…İletişim teknolojileriningelişmesi ve internet kullanımının artmasıyla birlikte sosyal medya kavramıgünlük yaşantımızda sıklıkla kullandığımız bir kavram haline gelmiştir. …”
Get full text
Article -
3564
Consensus Congestion Control in Multirouter Networks Based on Multiagent System
Published 2017-01-01“…Due to the unbalance distribution of network resources and network traffic, congestion is an inherent property of the Internet. The consensus congestion controller based on the multiagent system theory is designed for the multirouter topology, which improves the performance of the whole networks. …”
Get full text
Article -
3565
Viralité et résistance aux discours de haine
Published 2024-12-01“…This explains the virality of violent content on the Internet. From this pint of view can the fight against hate speech use virality when its aim is to call for reflection? …”
Get full text
Article -
3566
The role of esthetic education in the harmonic development of pre-school children
Published 2017-10-01“…Because of the rapid growth of new technologies, usage on Internet, various gadgets and computers in all spheres of life, the need for esthetics is becoming weak. …”
Get full text
Article -
3567
GENETİĞİ DEĞİŞTİRİLMİŞ ORGANİZMALARA İLİŞKİN TARTIŞMALARIN TÜRK BASININDA ÇERÇEVELENMESİ
Published 2013-11-01“…Çalışmada, farklı bakış açılarına sahip Sabah, Hürriyet, Zaman ve Cumhuriyet gazetelerinin internet sitelerindeki arşivlerinde yapılan tarama sonucunda doğrudan konu ile ilgili toplam 368 habere ulaşılmış ve 368 haber ilk olarak çerçeve analizine temel oluşturması bakımından niceliksel olarak çözümlenmiştir. …”
Get full text
Article -
3568
Adaptive Human Behavior in a Two-Worm Interaction Model
Published 2012-01-01“…The complex interactions among internet worms have great impact on the dynamics of worms. …”
Get full text
Article -
3569
Active queue management algorithm focusing on fairness and low delay
Published 2017-05-01“…The popularity of delay sensitive applications and high throughput applications in the Internet made the caches of routers and switches larger,resulting in the high latency and high jitter rate of network traffic.With the growth of mobile applications based on the high bandwidth non-response flows,the network bottleneck resource utilization becomes more unbalanced,and the resources distribution of the whole network was difficult to be guaranteed.In order to alleviate these problems,considering the delay control and suppression of high bandwidth non-response flow,an active queue management algorithm focusing on fairness and low delay named FLDA was proposed based on Sample-Match,L-LRU cache and probabilistic packets dropping.Experimental results show that under the interference with high bandwidth non-responsive flows,FLDA can better maintain the queue stability,the fairness of resource utilization of the bottleneck link and the low delay.…”
Get full text
Article -
3570
Göçmenlerin Uyum Sağlama Sürecinde Yaşadıkları Çatışmalar ve Sayısal Topluluklar
Published 2018-01-01“…Oluşturulan bu topluluklar her zaman fiziksel olmamakta; zaman zaman bilgisayar ve İnternet tabanlı ortamlar kullanılarak da göç eden bireyler birbirlerine ulaşmaktadırlar. …”
Get full text
Article -
3571
Research Progress and Prospect of Reservoir Intelligent Operation
Published 2023-01-01“…Reservoir operation is an important tool to adapt to climate changes and prevent floods and droughts.With the continuously advancing digitization,a new generation of information technology has begun to integrate with traditional reservoir operations.Based on 445 references collected by CNKI from 2000 to 2023 and 412 references in the core collection database of Web of Science,this paper employs CiteSpace to analyze the status and trend of intelligent operation research.Meanwhile,it systematically sorts out two types of operation technologies including model building and model solving,and six types of information technologies containing knowledge graphs,the internet of things,big data,cloud platform,artificial intelligence,and digital twins.Finally,the intelligent operation provides new ideas for reservoir group operation in river basins,but it still needs further breakthroughs in fields such as thorough perception,data mining,universal model building,and intelligent decision-making.…”
Get full text
Article -
3572
Fußballlinguistik als Forschungsbereich der Sportlinguistik – Neue wissenschaftliche Perspektiven
Published 2025-02-01“…In the next section, attention is given to the motivations and research areas of the articles, which cover a range of consensual situations (Internet, language of fans, language of commentators, women’s football, etc.). …”
Get full text
Article -
3573
Semi-Markov decision process based congestion control algorithm for video transmission
Published 2014-08-01“…Due to the problem that the congestion control algorithm of transmission control protocol (TCP) cannot meet the requirements of quality of experience for Internet video transmission, a semi-Markov decision process based conges-tion control algorithm for video transmission was proposed. …”
Get full text
Article -
3574
Dysfunctional Consumer Behavior: Proposition of a Measurement Scale
Published 2015-01-01“…The data was collected over the Internet (Amazon Turk) and the statistical meth ods used for the scale development were cluster and discriminant analysis. …”
Get full text
Article -
3575
Enhanced SDIoT Security Framework Models
Published 2016-05-01“…Following the recent increase in the interest in IoT (Internet of Things) environment, devices that provide various services are being developed. …”
Get full text
Article -
3576
Design and Implementation of DPI-Based User's Bebavior Perception System in LTE Network
Published 2014-07-01“…Aiming at the traditional monitoring system with poor user perception and insufficient statistical capacity, the proposed system achieved user's behavior refined analysis which combined protocol decoding and services call/transaction detail records(xDR)synthesis method with the advantages of current prevailing internet behavior analysis technologies—deep packet inspection(DPI)technique and focused crawler technology. …”
Get full text
Article -
3577
An evaluation of New Zealand political party Websites.
Published 2004-01-01“…Using a coding scheme that measured 50 different criteria numerically, providing for objective evaluation and comparison, the study found that New Zealand political parties were not using the Internet effectively, mainly because most were using their Websites for information provision, yet were not providing the tools required to make this information as accessible as possible. …”
Get full text
Article -
3578
Research and practice of SASE cloud security
Published 2022-01-01“…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
Get full text
Article -
3579
Efficient pairing-free CP-ABE based on ordered binary decision diagram
Published 2019-12-01“…To improve the computational efficiency of ABE,its access structure was optimized and a pairing-free CP-ABE scheme based on ordered binary decision diagram (OBDD) was proposed.Based on the elliptic curve cryptography,the complex bilinear pairing operation in traditional CP-ABE was replaced with the relatively lightweight scalar multiplication,thus the overall computation overhead was reduced.And OBDD was used as the access structure of CP-ABE,which can not only represent any Boolean expression about attributes,but also support both positive and negative attributes.The length of the key was independent of the number of attributes and the length of the ciphertext was only related to the number of valid paths in the access policy.The security and performance analysis show that the scheme can resist chosen plaintext attack under the decisional Diffie-Hellman (DDH) assumption,and the computation efficiency can meet the practical application requirements of Internet of things.…”
Get full text
Article -
3580
Automatic prediction for IP backbone network traffic
Published 2020-08-01“…Efficient and reliable network traffic prediction is the basis of network planning and capacity expansion construction.Currently,there is no integral theoretical model to describe internet traffic.Most of the industry designs simplified and operable prediction models.Firstly,according to the characteristics of China Telecom’s IP backbone network traffic and its planning requirements,the IP backbone network traffic was analyzed and forecasted by using the multi-factor regression model and the function adaptive mode of time series.The characteristics,advantages,disadvantages and applicable scenarios of these two models were compared based on simulation of a large number of actual network data.A set of principles and methods for selecting prediction model and optimizing parameters were proposed.Then,an automatic forecasting system with the high performance of dealing with hundreds of time series was built to greatly simplify and improve the traffic prediction efficiency.Finally,the development orientation of network capacity extension and key points of future IP traffic prediction were prospected.…”
Get full text
Article