Showing 3,601 - 3,620 results of 5,694 for search '"internet"', query time: 0.07s Refine Results
  1. 3601

    Commenter et inciter à commenter les publications vidéo des chaînes de télévision sur Facebook : les cas de TF1, France 2 et M6 by Laurence Leveneur

    Published 2019-12-01
    “…If Facebook presents itself as an agora, it must be noted the weakness of the interactions between the administrators of the accounts studied and the Internet users, and the importance of social grouping exchanges.…”
    Get full text
    Article
  2. 3602

    A lightweight privacy-preserving truth discovery mechanism for IoT by Yingjie HE, Qiwei LI, Han SUN, Di GAO, Jianfeng DONG, Shuhua YANG

    Published 2021-05-01
    “…In order to solve diverse quality and privacy leakage of perceived data in fog-cloud integrated internet of things (IoT), a streaming encryption-based privacy-preserving truth discovery mechanism for IoT was proposed.Firstly, by utilizing shuffling and streaming encryption algorithms, the ground truths and the weights were anonymously updated on the cloud server and fog server, respectively, so that the collusion attacks between malicious attackers and cloud or fog servers could be resisted to defend against privacy leakage of IoT devices.Secondly, by adopting the Softmax function, the device weights were calculated on fog server, which reduces the error rate for calculating the ground truths.Finally, the theoretical analysis proved that the mechanism could protect privacy of the devices.And, the experimental results demonstrate that the proposed mechanism is an effective privacy-preserving trust discovery mechanism for large-scale IoT devices, which can outperform existing ones in computing efficiency.…”
    Get full text
    Article
  3. 3603

    Future architecture and evolution of communication network by Sheng ZHANG, Wei RONG

    Published 2018-07-01
    “…With the rapid development of the internet,the network bearer content is gradually transformed from a service based on connection-based information interaction to a service based on content sharing (video).The network transmits a large amount of redundant information,resulting in abnormal large-scale investment.And the quality of the service is difficult to guarantee,and it is urgent to study and construct a network that matches the business development.The content sharing connection relationship and the communication network architecture connection relationship were studied,and the two-dimensional poor time distribution or three-dimensional distribution and other implementation methods were explored.CDN was constructed to construct the content edge node,and the core network,wireless network,bearer network architecture and network element deployment were optimized.And space-based network such as satellite was considered to introduce to build a scale-free small hop network on the existing communication network to achieve matching of network architecture and content distribution.…”
    Get full text
    Article
  4. 3604

    Big Data Development Strategy for Telecom Operators by Yongjun Huang, Ming Feng, Shengyong Ding, Yongbing Fan

    Published 2013-03-01
    “…With the rapid deve1opment of internet and dramatic growth of mobi1e services, the storage and process of massive data are becoming a big cha11enge for te1ecom operators.Big data techno1ogies provide a new so1ution for the operators to mine massive data in depth as we11 as a new opportunity to provide better services for their customers.The app1icabi1ity of big data techno1ogies for operators were ana1yzed,based on the comprehensive ana1ysis of big data techno1ogies and te1ecom operators' data characteristics.The big data deve1opment strategy for te1ecom operators was discussed and a conceptua1 technica1 architecture was a1so proposed in order to push the app1ication of big data techno1ogies.…”
    Get full text
    Article
  5. 3605

    Fault-Tolerant Partition Resolvability of Cyclic Networks by Kamran Azhar, Sohail Zafar, Agha Kashif, Michael Onyango Ojiema

    Published 2021-01-01
    “…Figuring resolving partition of the graph is an intriguing inquest in graph theory as it has many applications such as sensor design, compound classification in chemistry, robotic navigation, and Internet network. The partition dimension is a graph parameter akin to the concept of metric dimension, and fault-tolerant partition dimension is an advancement in the line of research of partition dimension of the graph. …”
    Get full text
    Article
  6. 3606

    Unclonable dynamic k-times anonymous authentication by Xin LIU, Qiu-liang XU

    Published 2012-07-01
    “…In previous works of k-times anonymous authentication,two problems have not been properly solved:1)how to allow application providers to assign different maximal numbers of access for each user without weakened anonymity,and 2)how to protect against massive clone attacks mounted by malicious users.To overcome these obstacles,a revised scheme was proposed.It incorporated several crucial tools including the proof that a committed value is less than another committed value,dynamic accumulator,the method of cloning detection based on n-times show e-tokens,etc.The new scheme is proven secure in a new security model which was obtained by modifying the security model of Teranishi et al.Moreover,the registration protocol of the new scheme is concurrently-secure,so it is fit for the deployment in realistic asynchronous network setting(e.g.,Internet).…”
    Get full text
    Article
  7. 3607

    KÜÇÜK VE ORTA BÜYÜKLÜKTEKİ İŞLETMELERDE E-TİCARET by Haldun Soydal

    Published 2006-02-01
    “…Bu çalışmada, öncelikle KOBİkavramıaçıklandıktan sonra, Yeni Ekonomi’nin unsurlarıolan, internet, intranet, e-ticaret gibi unsurlar ele alınmışve daha sonra KOBİ’lerde e-ticaret uygulamalarıele alınmıştır.…”
    Get full text
    Article
  8. 3608

    Hybrid Intrusion Detection System for DDoS Attacks by Özge Cepheli, Saliha Büyükçorak, Güneş Karabulut Kurt

    Published 2016-01-01
    “…Distributed denial-of-service (DDoS) attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS), for detection of DDoS attacks. …”
    Get full text
    Article
  9. 3609

    Green city: An efficient task joint execution strategy for mobile micro-learning by Li Yang, Ruijuan Zheng, Junlong Zhu, Mingchuan Zhang, Ruoshui Liu, Qingtao Wu

    Published 2018-06-01
    “…Mobile micro-learning has received extensive attention in the research of smart cities because it is a novel fusion service mode of the mobile Internet, cloud computing, and micro-learning. However, due to the explosively increased applications of the mobile micro-learning and the limited resources of mobile terminals, an effective energy saving approach for mobile micro-learning is urgently required. …”
    Get full text
    Article
  10. 3610

    Automatic diagnosis of selected retinal diseases based on OCT B-scan by Tomasz Marciniak, Agnieszka Stankiewicz

    Published 2023-04-01
    “…The datasets of retinal images available on the Internet are discussed, with particular emphasis on datasets useful for learning artificial neural networks, allowing for the automatic classification process. …”
    Get full text
    Article
  11. 3611

    Uso de mapas históricos na pesquisa sobre a cidade de São Paulo. Predominância de mapas disponíveis digitalmente e mapas autorreferenciais by Eliane Kuvasney

    Published 2020-12-01
    “…It was observed, from a survey in the thesis bank of the University of São Paulo and surveys in the physical collections of public archives, that some easily accessible maps - because they were made available digitally - were naturalized, in the sense that they are treated as the truth of the territory within the periods in which they were produced and that others - absent from digital archives - can provide us with other narratives that are distant from that produced by the naturalization of cartographic series present in our imagination since before the use of the internet.…”
    Get full text
    Article
  12. 3612

    Modelling the Diffusion of Investment Decisions on Modular Social Networks by Xiaokang Cheng, Narisa Zhao

    Published 2020-01-01
    “…In this paper, we study the impact of the community structure of investor social networks on the diffusion of internet investment products. A two-stage diffusion model is proposed, and the clustering coefficient and modularity of an investor social network are considered. …”
    Get full text
    Article
  13. 3613

    Institutional foundations of digital transformation of business in economic sectors by P. M. Gureev, I. S. Prokhorova

    Published 2023-05-01
    “…The methodology of the research is based on the analysis of the development of the digital ecosystem of the Russian economy for the formation of cross-industry business cooperation based on Internet technologies. The indicative method and comparative analysis of the e-government rating based on the e-government development index were used as an analysis tool. …”
    Get full text
    Article
  14. 3614

    Survey on decentralized security-enhanced technologies for RPKI by QIN Chaoyi, ZHANG Yu, FANG Binxing

    Published 2024-07-01
    “…It not only enhances the security of the Internet border gateway protocol system, but also introduces centralization into the routing system. …”
    Get full text
    Article
  15. 3615

    El Mercadeo Directo by Mickie E. Swisher, James Sterns

    Published 2003-09-01
    “…Sin embargo, actualmente se está desarrollando el mercadeo directo por medio del Internet. This document is FCS7211-Span, one of a series of the Department of Family, Youth and Community Sciences, Florida Cooperative Extension Service, IFAS, University of Florida, Gainesville FL 32611. …”
    Get full text
    Article
  16. 3616

    LEADERSHIP STYLE AND NATIONAL SECURITY IN NIGERIA: AN ASSESSMENT OF EBELE GOOD LUCK JONATHAN AND MUHAMMADU BUHARI’S ADMINISTRATIONS by OLAYINKA BABATUNDE ADEBOGUN, JOSEPH OLATUNJI ODUNTAN, ABRAHAM EDEH

    Published 2023-12-01
    “…The study employed secondary data in gathering information from books, newspapers, Journals, magazines, and internet sources. Transformational Leadership theory was adopted in this study. …”
    Get full text
    Article
  17. 3617

    Fear of an Islamic Planet? Intermedial Exchange and the Rhetoric of Islamophobia by Stefan L. Brandt

    Published 2020-09-01
    “…The fears of a potential—or already ongoing—“Islamization of America” are kept alive through continual interaction between texts and images from hegemonic visual discourse, involving what I call “intermedial exchange” between literary texts, films, television shows, magazines, newspapers, and the Internet.…”
    Get full text
    Article
  18. 3618

    To Exist is a Form of Resistance by Sarah Allen, Aina Landsverk Hagen

    Published 2025-01-01
    “…The selected artists are all moving beyond a documentary ‘style’ protest image towards work which embraces collage, the internet and performance. In the public programme of the exhibition, workshop participants were invited to conceptualise the interconnectedness of feminist struggles and how to organise across borders. …”
    Get full text
    Article
  19. 3619

    L’œuvre en devenir by Jean-Paul Fourmentraux

    Published 2007-11-01
    “…In the digital age artistic work aims to conceive of interactive mechanisms as much as to produce forms of communication and exhibition where the public can be implicated into the process of the work. In this context, Internet sites, homepages, online workshops, mailing lists and discussion forums constitute renewed forms of sociability. …”
    Get full text
    Article
  20. 3620

    Certificate-based cross-domain authentication scheme with anonymity by Yongshan DING, Lixin LI, Zuohui LI

    Published 2018-05-01
    “…Considered the cross-domain authentication of mobile devices in the Internet of things,a certificate based anonymous cross-domain authentication scheme was proposed.First,combined with the characteristics of PKI and IBS,a certificate based signature (CBS) algorithm was proposed,and the security of the proposed CBS scheme was proved.The verification result of the signature in the algorithm was constant,which ensured the anonymity of the authentication entities in the cross-domain process.The algorithm does not contain pairing,and avoids complex certificate management in traditional PKI and the key escrow and distribution of IBS.Then a cross-domain authentication scheme for mobile devices was constructed by combining the proposed signature algorithm.The scheme ensures the anonymity of authentication at the same time.Finally,compared with other schemes,the scheme proposed is more secure and has less computation cost and communication cost.Moreover,the scheme is simple and efficient,and could be applied to the cross-domain authentication of mobile devices.…”
    Get full text
    Article