Showing 3,561 - 3,580 results of 5,694 for search '"internet"', query time: 0.07s Refine Results
  1. 3561

    Research on distributed network intrusion detection system for IoT based on honeyfarm by Hao WU, Jiajia HAO, Yunlong LU

    Published 2024-01-01
    “…To solve the problems that the network intrusion detection system in the Internet of things couldn’t identify new attacks and has limited flexibility, a network intrusion detection system based on honeyfarm was proposed, which could effectively identify abnormal traffic and have continuous learning ability.Firstly, considering the characteristics of the convolutional block attention module, an abnormal traffic detection model was developed, focusing on both channel and spatial dimensions, to enhance the model’s recognition abilities.Secondly, a model training scheme utilizing federated learning was employed to enhance the model’s generalization capabilities.Finally, the abnormal traffic detection model at the edge nodes was continuously updated and iterated based on the honeyfarm, so as to improve the system’s accuracy in recognizing new attack traffic.The experimental results demonstrate that the proposed system not only effectively detects abnormal behavior in network traffic, but also continually enhances performance in detecting abnormal traffic.…”
    Get full text
    Article
  2. 3562

    6G oriented wireless communication channel characteristics analysis and modeling by Chengxiang WANG, Jie HUANG, Haiming WANG, Xiqi GAO, Xiaohu YOU, Yang HAO

    Published 2020-03-01
    “…,global coverage,all spectrums and all applications,we comprehensively survey 6G related wireless channel measurements,channel characteristics,and channel models for all frequency bands and all scenarios.Millimeter wave (mmWave),terahertz (THz),optical band,satellite,unmanned aerial vehicle (UAV),maritime,underwater acoustic,high-speed train (HST),vehicle-to-vehicle (V2V),massive/ultra-massive multiple-input multiple-output (MIMO),orbital angular momentum (OAM),and industry Internet of things (IoT) communication channels were particularly investigated.The related 6G channel measurement and modeling results were also given.Finally,future research challenges on 6G channel measurements and modeling were pointed out.…”
    Get full text
    Article
  3. 3563

    ÜNİVERSİTE ÖĞRENCİLERİNİN SOSYAL MEDYA REKLAMLARINA İLİŞKİN ALGILARININ SATIN ALMA NİYETİ ÜZERİNDEKİ ETKİSİ: GAZİANTEP ÜNİVERSİTESİ ÖRNEĞİ by Hasan Aksoy, Ayşe Gür

    Published 2018-05-01
    “…İletişim teknolojileriningelişmesi ve internet kullanımının artmasıyla birlikte sosyal medya kavramıgünlük yaşantımızda sıklıkla kullandığımız bir kavram haline gelmiştir. …”
    Get full text
    Article
  4. 3564

    Consensus Congestion Control in Multirouter Networks Based on Multiagent System by Xinhao Yang, Sheng Xu, Ze Li

    Published 2017-01-01
    “…Due to the unbalance distribution of network resources and network traffic, congestion is an inherent property of the Internet. The consensus congestion controller based on the multiagent system theory is designed for the multirouter topology, which improves the performance of the whole networks. …”
    Get full text
    Article
  5. 3565

    Viralité et résistance aux discours de haine by Béatrice Turpin

    Published 2024-12-01
    “…This explains the virality of violent content on the Internet. From this pint of view can the fight against hate speech use virality when its aim is to call for reflection? …”
    Get full text
    Article
  6. 3566

    The role of esthetic education in the harmonic development of pre-school children by Helen V. Butina

    Published 2017-10-01
    “…Because of the rapid growth of new technologies, usage on Internet, various gadgets and computers in all spheres of life, the need for esthetics is becoming weak. …”
    Get full text
    Article
  7. 3567

    GENETİĞİ DEĞİŞTİRİLMİŞ ORGANİZMALARA İLİŞKİN TARTIŞMALARIN TÜRK BASININDA ÇERÇEVELENMESİ by Seyhan Aksoy

    Published 2013-11-01
    “…Çalışmada, farklı bakış açılarına sahip Sabah, Hürriyet, Zaman ve Cumhuriyet gazetelerinin internet sitelerindeki arşivlerinde yapılan tarama sonucunda doğrudan konu ile ilgili toplam 368 habere ulaşılmış ve 368 haber ilk olarak çerçeve analizine temel oluşturması bakımından niceliksel olarak çözümlenmiştir. …”
    Get full text
    Article
  8. 3568

    Adaptive Human Behavior in a Two-Worm Interaction Model by Li-Peng Song, Xie Han, Dong-Ming Liu, Zhen Jin

    Published 2012-01-01
    “…The complex interactions among internet worms have great impact on the dynamics of worms. …”
    Get full text
    Article
  9. 3569

    Active queue management algorithm focusing on fairness and low delay by Cheng-long SU, Guang JIN, Xian-liang JIANG, Jun NIU

    Published 2017-05-01
    “…The popularity of delay sensitive applications and high throughput applications in the Internet made the caches of routers and switches larger,resulting in the high latency and high jitter rate of network traffic.With the growth of mobile applications based on the high bandwidth non-response flows,the network bottleneck resource utilization becomes more unbalanced,and the resources distribution of the whole network was difficult to be guaranteed.In order to alleviate these problems,considering the delay control and suppression of high bandwidth non-response flow,an active queue management algorithm focusing on fairness and low delay named FLDA was proposed based on Sample-Match,L-LRU cache and probabilistic packets dropping.Experimental results show that under the interference with high bandwidth non-responsive flows,FLDA can better maintain the queue stability,the fairness of resource utilization of the bottleneck link and the low delay.…”
    Get full text
    Article
  10. 3570

    Göçmenlerin Uyum Sağlama Sürecinde Yaşadıkları Çatışmalar ve Sayısal Topluluklar by Taner Kızılhan, Sezen Ünlü, Kemal Elciyar

    Published 2018-01-01
    “…Oluşturulan bu topluluklar her zaman fiziksel olmamakta; zaman zaman bilgisayar ve İnternet tabanlı ortamlar kullanılarak da göç eden bireyler birbirlerine ulaşmaktadırlar. …”
    Get full text
    Article
  11. 3571

    Research Progress and Prospect of Reservoir Intelligent Operation by WANG Sen, WANG Xiayu, JIA Wenhao, NI Xiaokuan, LIU Xia

    Published 2023-01-01
    “…Reservoir operation is an important tool to adapt to climate changes and prevent floods and droughts.With the continuously advancing digitization,a new generation of information technology has begun to integrate with traditional reservoir operations.Based on 445 references collected by CNKI from 2000 to 2023 and 412 references in the core collection database of Web of Science,this paper employs CiteSpace to analyze the status and trend of intelligent operation research.Meanwhile,it systematically sorts out two types of operation technologies including model building and model solving,and six types of information technologies containing knowledge graphs,the internet of things,big data,cloud platform,artificial intelligence,and digital twins.Finally,the intelligent operation provides new ideas for reservoir group operation in river basins,but it still needs further breakthroughs in fields such as thorough perception,data mining,universal model building,and intelligent decision-making.…”
    Get full text
    Article
  12. 3572

    Fußballlinguistik als Forschungsbereich der Sportlinguistik – Neue wissenschaftliche Perspektiven by Jakub Dzidek

    Published 2025-02-01
    “…In the next section, attention is given to the motivations and research areas of the articles, which cover a range of consensual situations (Internet, language of fans, language of commentators, women’s football, etc.). …”
    Get full text
    Article
  13. 3573

    Semi-Markov decision process based congestion control algorithm for video transmission by Bo TIAN, Yi-min YANG, Shu-ting CAI

    Published 2014-08-01
    “…Due to the problem that the congestion control algorithm of transmission control protocol (TCP) cannot meet the requirements of quality of experience for Internet video transmission, a semi-Markov decision process based conges-tion control algorithm for video transmission was proposed. …”
    Get full text
    Article
  14. 3574

    Dysfunctional Consumer Behavior: Proposition of a Measurement Scale by Marília Lara Marcondes Machado de Oliveira, Andres Rodriguez Veloso

    Published 2015-01-01
    “…The data was collected over the Internet (Amazon Turk) and the statistical meth ods used for the scale development were cluster and discriminant analysis. …”
    Get full text
    Article
  15. 3575

    Enhanced SDIoT Security Framework Models by Seongho Choi, Jin Kwak

    Published 2016-05-01
    “…Following the recent increase in the interest in IoT (Internet of Things) environment, devices that provide various services are being developed. …”
    Get full text
    Article
  16. 3576

    Design and Implementation of DPI-Based User's Bebavior Perception System in LTE Network by Jian Wang, Zhizhong Zhang, Yunlong Luo

    Published 2014-07-01
    “…Aiming at the traditional monitoring system with poor user perception and insufficient statistical capacity, the proposed system achieved user's behavior refined analysis which combined protocol decoding and services call/transaction detail records(xDR)synthesis method with the advantages of current prevailing internet behavior analysis technologies—deep packet inspection(DPI)technique and focused crawler technology. …”
    Get full text
    Article
  17. 3577

    An evaluation of New Zealand political party Websites. by Matthew Conway, Dan Dorner

    Published 2004-01-01
    “…Using a coding scheme that measured 50 different criteria numerically, providing for objective evaluation and comparison, the study found that New Zealand political parties were not using the Internet effectively, mainly because most were using their Websites for information provision, yet were not providing the tools required to make this information as accessible as possible. …”
    Get full text
    Article
  18. 3578

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  19. 3579

    Efficient pairing-free CP-ABE based on ordered binary decision diagram by Sheng DING, Jin CAO, Hui LI

    Published 2019-12-01
    “…To improve the computational efficiency of ABE,its access structure was optimized and a pairing-free CP-ABE scheme based on ordered binary decision diagram (OBDD) was proposed.Based on the elliptic curve cryptography,the complex bilinear pairing operation in traditional CP-ABE was replaced with the relatively lightweight scalar multiplication,thus the overall computation overhead was reduced.And OBDD was used as the access structure of CP-ABE,which can not only represent any Boolean expression about attributes,but also support both positive and negative attributes.The length of the key was independent of the number of attributes and the length of the ciphertext was only related to the number of valid paths in the access policy.The security and performance analysis show that the scheme can resist chosen plaintext attack under the decisional Diffie-Hellman (DDH) assumption,and the computation efficiency can meet the practical application requirements of Internet of things.…”
    Get full text
    Article
  20. 3580

    Automatic prediction for IP backbone network traffic by Xuan WEI, Ke RUAN, Xiaoying HUANG, Xun CHEN, Cancan HUANG

    Published 2020-08-01
    “…Efficient and reliable network traffic prediction is the basis of network planning and capacity expansion construction.Currently,there is no integral theoretical model to describe internet traffic.Most of the industry designs simplified and operable prediction models.Firstly,according to the characteristics of China Telecom’s IP backbone network traffic and its planning requirements,the IP backbone network traffic was analyzed and forecasted by using the multi-factor regression model and the function adaptive mode of time series.The characteristics,advantages,disadvantages and applicable scenarios of these two models were compared based on simulation of a large number of actual network data.A set of principles and methods for selecting prediction model and optimizing parameters were proposed.Then,an automatic forecasting system with the high performance of dealing with hundreds of time series was built to greatly simplify and improve the traffic prediction efficiency.Finally,the development orientation of network capacity extension and key points of future IP traffic prediction were prospected.…”
    Get full text
    Article