Showing 3,741 - 3,760 results of 5,694 for search '"internet"', query time: 0.09s Refine Results
  1. 3741

    EC-Structure: Establishing Consumption Structure through Mining E-Commerce Data to Discover Consumption Upgrade by Lin Guo, Dongliang Zhang

    Published 2019-01-01
    “…With the development of Internet economy, many scientific researchers focus on mining knowledge of consumer behavior using big data analysis technology. …”
    Get full text
    Article
  2. 3742

    Research on Wi-Fi indoor positioning technology based on knowledge graph by Jiandong LI, Jingjing YANG, Ming HUANG

    Published 2022-06-01
    “…Among the common Wi-Fi indoor positioning methods, most of the research focuses on the positioning accuracy, a little is on the application system to organize and process the existing indoor data efficiently in order to realize the indoor location service.To deal with these issues, the knowledge graph with the traditional indoor positioning technology was combined, and a practical positioning system was built with a variety of software development technologies.The system integrates the physical space and the information space.The information space includes indoor information acquisition, cloud services, information storage and computing parts.The physical space expresses the structure of the indoor space and data relationships.Finally, the WEBGL technology was used to display intuitive positioning and realize the visualization of indoor signal data and positioning results.The system has a complete data storage and use mechanism.After integrating the existing data information of the indoor internet of things equipment, it can provide users with room-level location services.The step-by-step positioning function of the system helps to reduce the time consumption of the system.…”
    Get full text
    Article
  3. 3743

    COMPONENT FOR REMOTE DATA AVAILABILITY BASED ON THE ESP32 MICROCONTROLLER, A WIRELESS INTERFACE AND THE HTTP PROTOCOL by David Alejandro Chentes Ramos, Thaily Blanco Baro, Fidel Ernesto Hernández Montero

    Published 2025-02-01
    “…On this server, software written in Python manages information and user accounts, while a web server provides internet access to the software, and a DNS server masks the IP address and assigns a domain name. …”
    Get full text
    Article
  4. 3744

    Hastanelerde Bir Tanıtım Aracı Olarak Web Siteleri: İzmir İli Eğitim Hastaneleri Ve Özel Hastanelerin Kurumsal Web Sitelerinin Kıyaslamalı Analizi by Burcu Öksüz, Nilay Yurdakul

    Published 2013-11-01
    “…Yeni bir iletişim aracı olarak internet, sağlık sektöründe yer alan hastanelerin de hedef kitlelere kolay ve hızlı bir şekilde ulaşmasında özel bir yere sahiptir. …”
    Get full text
    Article
  5. 3745

    A Study on the Influence of Interactivity on Behavior Intention in Platform B2C Model by Hao Sun

    Published 2022-01-01
    “…The progress of information technology and the popularity of the Internet have led to the rapid development of the network economy, and as a new shopping method, online shopping is gradually accepted and respected by consumers. …”
    Get full text
    Article
  6. 3746

    JOHN RAWLS’ THEORY OF DISTRIBUTIVE JUSTICE AND CHIEFTAINCY TUSSLES IN TAKUM LOCAL GOVERNMENT AREA OF TARABA STATE 1996-2023 by BAKO KEFAS, SAMUILA TIBWA ABWAGE, BONIFACE TIIVH STEPHEN

    Published 2024-07-01
    “…This paper adopted expos facto research design and gathered data through secondary sources like, books, journals articles, manuscripts, internet materials, conference papers etc, content analysis was used to analyse data gathered. …”
    Get full text
    Article
  7. 3747

    An exploration of the use of technology by congregations by S. Joubert, W. J. Schoeman

    Published 2015-12-01
    “… The internet, cell phones and, more broadly speaking, the social media, have changed the world over the past twenty years, resulting in what is called “the network society”. …”
    Get full text
    Article
  8. 3748

    Design and Implementation of Protocols Association Scbeme on Iu-PS Interface in TD-SCDMA Network by Rui Li, Zhizhong Zhang

    Published 2014-09-01
    “…The accuracy and feasibility of this protocol association scheme has been validated by the real network testing, and this scheme has the important significance to promote in the field of mobile Internet traffic analysis.…”
    Get full text
    Article
  9. 3749

    Heterogeneous federated bidirectional knowledge distillation transfer semi-supervised modulation recognition by Peihan QI, Yuanlei DING, Kai YIN, Jiabo XU, Zan LI

    Published 2023-11-01
    “…The large-scale deployment and rapid development of the new generation mobile communication system underpin the widespread application of a massive and diverse range of Internet of things (IoT) devices.However, the distributed application of IoT devices results to significant disparities in private data and substantial heterogeneity in local processing models, which severely limits the aggregation capability of global intelligent model.Therefore, to tackle the challenges of data heterogeneity, model heterogeneity, and insufficient labeling faced by intelligent modulation recognition in cognitive IoT, an algorithm was proposed for heterogeneous federated bidirectional semi-supervised modulation recognition, which incorporated bidirectional knowledge distillation.In the proposed algorithm, a public pseudo dataset was generated by variational autoencoder in the cloud for supporting uplink global knowledge distillation, and adaptively sharing to the local devices for downlink heterogeneous knowledge distillation, while integrating a semi-supervised algorithm within the distillation process.The simulation results indicate that the proposed algorithm outperforms current federated learning algorithms in terms of effectiveness and applicability in the field of communication signal processing.…”
    Get full text
    Article
  10. 3750

    Enhanced Invisibility and Robustness of Digital Image Watermarking Based on DWT-SVD by Ali Alzahrani

    Published 2022-01-01
    “…The propagation of digital media over the Internet has helped improve digitization, which has given an excessive lead to copyright issues. …”
    Get full text
    Article
  11. 3751

    A Recommendation System for University Discussion Committees by Zaid Mundher, Manar Talat Ahmad

    Published 2024-11-01
    “…The concept of recommendation systems is based on saving users' time and effort while using the Internet for browsing, shopping, or other web activities. …”
    Get full text
    Article
  12. 3752

    Autoencoder neural network-based abnormal data detection in edge computing enabled large-scale IoT systems by Tianqi YU, Yongxu ZHU, Xianbin WANG

    Published 2018-12-01
    “…Given the advantages of low cost and easy deployment,large-scale Internet of things (IoT) has been deployed for environment monitoring pervasively.Within such systems,cloud platform is typically utilized as a remote data and control center.However,tremendous amount of data uploading and processing induce huge challenges on bandwidth load and real-time data gathering.In order to overcome these challenges,edge computing enabled IoT system architecture was proposed for environmental monitoring.As the intermediate layer,local processing could be supported for end devices with low latency and assist with preliminary analysis to offload computational tasks from cloud and the amount of data uploading could be reduced.Based on this system architecture,an autoencoder neural network-based abnormal data detection scheme was developed newly.Performance evaluation has been conducted based on the practical oceanic atmospheric data.Simulation results indicate that the proposed scheme can accurately detect the abnormal data by fully exploiting the spatial data correlation.…”
    Get full text
    Article
  13. 3753

    Le musée, c’est la laïcité en acte by Jean-Louis Déotte

    Published 2015-06-01
    “…Les attaques diffusées sur Internet par « l’État islamique » contre les œuvres muséales, contre le patrimoine anté-islamique, contre le tourisme, rappellent que les liens entre la foi et les télécommunications sont indissociables. …”
    Get full text
    Article
  14. 3754

    L’hybridation dans l’enseignement universitaire pour repenser l’articulation entre cours magistraux et travaux dirigés by Caroline Ladage

    Published 2016-06-01
    “…We present a case study built on an experimental investigation in a situation where originally face-to-face teaching was predominant and to which an online activity has been added to provide a tutorial class using Internet as a teaching infrastructure based on a pedagogy of inquiry and a peer review course design. …”
    Get full text
    Article
  15. 3755

    Digital transformation of the textile process chain – state-of-the-art by Robert Nafz, Caroline Schinle, Christian Kaiser, Yordan K. Kyosev

    Published 2022-09-01
    “… New digital technologies, the internet age, and ever-increasing customer expectations are changing industries worldwide. …”
    Get full text
    Article
  16. 3756

    Питання вибору платформи розробки IoT на основі вимог міжнародних стандартів з кібернетичної безпеки... by Валерій Мазуренко

    Published 2023-06-01
    “… Інтернет речей (IoT – Internet of Things) безперервно збільшує свою присутність в  нашому житті. …”
    Get full text
    Article
  17. 3757

    Uwarunkowania rozwoju systemów ERP w przedsiębiorstwach by Dariusz Strzębicki

    Published 2017-07-01
    “…Artykuł oparto na przeglądzie literatury z zakresu wdrażania systemów klasy ERP oraz na dostępnych w sieci Internet danych wtórnych. Analiza wykazała, że współczesne systemy ERP w coraz większym stopniu przyczyniają się do coraz większej automatyzacji procesów oraz są w coraz większym stopniu nakierowane na rozwój integracji zewnętrznej przedsiębiorstw. …”
    Get full text
    Article
  18. 3758

    The use of big data in interdisciplinary research on example of the Greater Mediterranean macroregion by O. V. Yarmak, T. V. Zharkova, D. G. Sarkisov

    Published 2022-09-01
    “…Among the main problems and threats, the authors consider the following: personal data confidentiality breach, and increased data manipulation for political purposes, the emergence of illegitimate forms of citizens self-organisation, the transition of Internet users to anonymous accounts due to the practice of “privatization” of personal data by non-state and terrorist groups in regional spaces, preventing the qualitative collection of data. …”
    Get full text
    Article
  19. 3759

    Job Scheduling with Efficient Resource Monitoring in Cloud Datacenter by Shyamala Loganathan, Saswati Mukherjee

    Published 2015-01-01
    “…Cloud computing is an on-demand computing model, which uses virtualization technology to provide cloud resources to users in the form of virtual machines through internet. Being an adaptable technology, cloud computing is an excellent alternative for organizations for forming their own private cloud. …”
    Get full text
    Article
  20. 3760

    Blockchain efficient Byzantine fault tolerance consensus algorithm for IIoT by LI Fengqi, SONG Qingqing, XU Hui, DU Xuefeng, GAO Jialong, TONG Ning, WANG Deguang

    Published 2024-05-01
    “…Considering the malicious risks associated with diverse terminals in the industrial Internet of things (IIoT), a practical Byzantine fault tolerant (PBFT) efficient consensus algorithm based on credit score and dynamic double layer (CD-PBFT) was proposed to meet the requirements of high efficiency and security fault tolerance in the consensus process. …”
    Get full text
    Article