Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
3641
IoT-based cloud monitoring system for building fires
Published 2025-01-01“…This paper presents an IoT (Internet of Things) based smart building fire cloud monitoring system to enhance fire safety in smart buildings. …”
Get full text
Article -
3642
AMC based IP microwave technology
Published 2020-09-01“…IP microwave technology is a new transmission technology,which uses IP technology to transmit data signals in the microwave field.It has the advantages of fast deployment rate,flexible installation,convenient transport and efficient data transmission,and has become a common ground wireless transmission system with large capacity.An environmental model of microwave transmission was proposed and discussed.The model used IP network as the return transmission,which was helpful for the development of general network of wireless access system.The prototype design of UHF band microwave/Internet protocol (IP) network interface was carried out,and the conversion of the three major functional modules in the network were described,to realize the broadband integrated services digital transmissions.The results show that the ground transmission signal (DTMB) can efficiently transmit on the IP network,and the monitoring/truncation of the microwave signal can significantly reduce the network throughput as needed.…”
Get full text
Article -
3643
Availability evaluation method for extended epidemic model and Markov chain based IoT
Published 2021-04-01“…To reflect the availability status of the Internet of things (IoT) under malware diffusion, an availability evaluation method of IoT based on the extended epidemic model SEIRD and Markov chain was proposed.According to actual states of IoT nodes, the classic epidemic model SIR was extended to establish the node state transition model SEIRD.From the dynamic change process of each state of IoT nodes, the dynamic probability equations of IoT nodes belonging to five states were constructed, the Markov matrix reflecting the state transition was obtained, and an availability calculation method of an IoT node was achieved.Taking typical star and cluster IoT topologies as examples, the availability evaluation methods of the whole IoT with different topologies were given.Experiments provide suggestions for administrators how to reasonably deploy the number of normal working nodes and routes.The research results have theoretical significance for improving IoT availability and promoting the successful IoT applications.…”
Get full text
Article -
3644
Charakterystyka postaci w szkole – między stereotypem a kreacją
Published 2017-03-01“…The aim of this performance is to present the results of empirical research carried out in secondary schools (against available research results of chosen “self-presentation genres” found in the Internet, such as blogs or IRC’s) in the form of quantitative-qualitative analysis of students’ abilities of the genre’s realization (complemented with the theoretical works in linguistics and linguistic efficiency development didactics) in a perspective of communicative competence’s development in this particular area. …”
Get full text
Article -
3645
Intelligent Control System Design of Ring Light via IOT Mobile Robot
Published 2023-01-01“…In the Internet of Things (IoT) era, the combination of mobile robots and IoT technology has realized the complementary advantages of the IoT and robots, which has brought new challenges and opportunities for the development and application of the IoT and mobile robots. …”
Get full text
Article -
3646
Threshold Accepting Heuristic for Fair Flow Optimization in Wireless Mesh Networks
Published 2014-01-01“…The fairness is modeled by allowing preferences with regard to distribution of Internet traffic between network participants. As aggregation operator we utilize weighted ordered weighted averaging (WOWA). …”
Get full text
Article -
3647
Discursive Power in the Hybrid Media System: The Case of Chinese Neologisms
Published 2024-09-01“…This study approaches this subject from a novel perspective by proposing that such power is inherent within neologisms or Internet buzzwords in the hybrid media system. This power is rampant and omnipotent, and is exercised voluntarily by some actors to accommodate to the mass media market’s demand for novelty or appeal. …”
Get full text
Article -
3648
Plongée dans les métaphores et représentations liquides de la société numérique
Published 2018-12-01“…The first part describes various employment of the “liquid” semantic field as it is mobilized both in technic lexicons, in collective imagination and in cognitive frameworks of Internet pionniers and current actors (1.). In a second part the analysis focuses on the way how the negative and cataclysmic narratives of digital society are discursively shaped and based on “liquid” depictions of opacity, leaks and uncontrolled floods of informations and money’s diversion (2.). …”
Get full text
Article -
3649
Implementasi Algoritme Morus V2 untuk Pengamanan Data Pada Perangkat Bluetooth Low Energy
Published 2022-12-01“…Pengamanan data merupan bagian penting dalam penerapan jaringan berbasis Internet of things (IoT). Sistem IoT membutuhkan sebuah protokol komunikasi, seperti Bluetooth Low Energy (BLE). …”
Get full text
Article -
3650
Effectiveness of Cognitive Behavioral Therapy Provided Through a Web Application for Subthreshold Depression, Subthreshold Insomnia, and Subthreshold Panic: Open-Labeled 6-Arm Rand...
Published 2025-02-01“…MethodsParticipants aged 18-70 years from internet research monitors were categorized into SD, SI, and SP groups based on screening assessment. …”
Get full text
Article -
3651
Examining the Impact of Cognitive and Emotional Factors on Consumer Behavioral Responses in Online Behavioral Advertising
Published 2024-03-01“…Objective With the rapid advancement of technology, it has become possible to track consumers' behavior on the Internet. Consequently, marketers can tailor advertisements to align with consumers' needs and characteristics. …”
Get full text
Article -
3652
Fault tolerant & priority basis task offloading and scheduling model for IoT logistics
Published 2025-01-01“…The Internet of Things (IoT) has connected millions of devices to the internet for communication and computation purposes. …”
Get full text
Article -
3653
Metode Drive Test sebagai Monitoring Unjuk Kerja Jaringan Nirkabel pada Gedung - Gedung di Lingkungan Universitas Papua
Published 2020-12-01“… Universitas Papua telah memberikan layanan internet yang di bagikan pada setiap gedung fakultas dengan Wi-Fi sebagai media berbagi, dalam penelitian ini kegiatan yang dilakukan yaitu mengamati dan menganalisis kualitas jaringan Wi-Fi yang telah tersedia. …”
Get full text
Article -
3654
Enhancing Learners’ Engagement and Performance in Learning through E-Resources and Services: National Open University of Nigeria Students as Beneficiaries
Published 2024-12-01“…The study equally revealed some of the factors undermining the use of e-resources including inadequate power supply, poor internet connectivity, lack of technology competence and limited access to computer terminals, etc. …”
Get full text
Article -
3655
Adopsi E-Commerce oleh Konsumen Milenial Pada Produk UMKM Di Kota Subang Menggunakan Model UTAUT In Consumer Contex
Published 2020-10-01“…Hasil ini bisa menjadi referensi pelaku UMKM untuk mengembangkan pemasaran dengan mengggunakan media sosial karena konsumen milenial memiliki fasilitas untuk mengakses internet dalam aktifitasnya serta mudah dipengaruhi oleh lingkungan sosialnya. …”
Get full text
Article -
3656
Sentiment Analysis Twitter Bahasa Indonesia Berbasis WORD2VEC Menggunakan Deep Convolutional Neural Network
Published 2020-02-01“…Media sosial sebagai media informasi dan komunikasi mulai berkembang pesat sejak internet mudah diakses. Orang dengan mudah menyatakan pendapat, ekspresi, opini, dan informasi melalui tulisan pada media sosial. …”
Get full text
Article -
3657
Enhancing Learners’ Engagement and Performance in Learning through E-Resources and Services: National Open University of Nigeria Students as Beneficiaries
Published 2024-12-01“…The study equally revealed some of the factors undermining the use of e-resources including inadequate power supply, poor internet connectivity, lack of technology competence and limited access to computer terminals, etc. …”
Get full text
Article -
3658
Les voyages reproductifs vers la Tunisie : l’intime au prisme des pratiques de l’assistance médicale à la procréation
Published 2023-07-01“…They preserve intimacy and anonymity allowing Internet users affected by infertility to share their experiences and express their suffering without fear of being stigmatised. …”
Get full text
Article -
3659
Enhancing Learners’ Engagement and Performance in Learning through E-Resources and Services: National Open University of Nigeria Students as Beneficiaries
Published 2024-12-01“…The study equally revealed some of the factors undermining the use of e-resources including inadequate power supply, poor internet connectivity, lack of technology competence and limited access to computer terminals, etc. …”
Get full text
Article -
3660
Tantangan dan Strategi Pencegahan Konflik akibat Intoleransi dan Radikalisme di Era Digital untuk Mewujudkan Keamanan Nasional
Published 2024-12-01“…The internet and social media have become effective platforms for spreading extremist ideologies, strengthening polarization, and creating “echo chambers” that reinforce radicalism. …”
Get full text
Article