Showing 3,781 - 3,800 results of 5,694 for search '"internet"', query time: 0.07s Refine Results
  1. 3781

    Study and Analysis of Barriers for Implementation of Industry 4.0 Technologies Using Spherical Fuzzy TOPSIS Method by Akshay Kumar, Chimata Murli Krishna

    Published 2025-01-01
    “…Drivers such as government initiatives, establishment of fast internet connectivity, job security, etc., are recommended in this research work for minimizing the effect of barriers.…”
    Get full text
    Article
  2. 3782

    The Effect of Governance on Donations: Evidence from Brazilian Environmental Nonprofit Organizations by Adonai José Lacruz, Alexandre Reis Rosa, Marcos Paulo Valadares de Oliveira

    Published 2023-01-01
    “…Data were collected predominantly from the documents available on the Internet, and the random sample consisted of 108 observations. …”
    Get full text
    Article
  3. 3783

    THE ANALYSIS OF INFORMATION TECHNOLOGIES USAGE FOR ACADEMIC PURPOSES IN ENGLISH LANGUAGE TEACHING AND LEARNING AT UNIVERSITAS BANGKA BELITUNG by Herland Franley Manalu

    Published 2019-08-01
    “…The harness of computers, internet, e-mail, multi-media and other IT tools is indispensable and has a great influence on the process of language teaching and learning in an effort to improve the quality of education and to produce best human resources that not only having good competence in foreign language but also possessing great capabilities in the use of Information Technology to face the Industrial Revolution 4.0 era. …”
    Get full text
    Article
  4. 3784
  5. 3785

    Tracer study of the psychology faculty of UIN Raden Fatah Palembang in 2018: satisfaction of alumni and stakeholders on the implementation of Islamic psychology study programs by Listya Istiningtyas, Lukmawati Lukmawati

    Published 2019-05-01
    “…Therefore, it still needs to be improved in a lecture, computer and internet facilities. Islamic Psychology Study Program Faculty of Psychology has fulfilled most of the expectations of stakeholders and alumni. …”
    Get full text
    Article
  6. 3786

    A new method for reducing 5G overlapping coverage of urban grid roads by Yejiang ZHANG, Jie CHEN, Yi LIU, Xingzheng LI, Fuyang LI, Jian HU

    Published 2024-01-01
    “…The 5G network for urban grid road scenes has entered a new stage of refined operation and maintenance.The main contradiction has also shifted from insufficient coverage to severe overlapping coverage of some road sections.5G overlapping coverage will have a significant impact on users’ basic services such as internet access and voice.The optimization of traditional road overlapping coverage has many problems, such as inconsistent standards, recurring problems, and low work efficiency.The concept of overlapping coverage contribution was proposed, and an algorithm for root cause analysis of overlapping coverage was designed based on expert experience.An IT platform for optimizing overlapping coverage problems was also developed.The practice has proven that this method can effectively reduce the 5G overlapping coverage rate of urban grid roads, help enterprises save network optimization costs, and truly achieve the goal of cost reduction and efficiency increase.…”
    Get full text
    Article
  7. 3787

    The gendered perspective of cyberbullying: The case of a rural University in Limpopo by Memory Mabika

    Published 2022-08-01
    “… The rapid advancement of Information and Communication Technologies (ICTs) has heightened misuse of internet-based technologies by young people. Besides increased integration due to availability and access to mobile communication technologies, students today indulge in cyberbullying where they harass, insult and stalk each other. …”
    Get full text
    Article
  8. 3788

    The Gen Z preferences in choosing museum destinations by Ichwan Masnadi

    Published 2024-12-01
    “…This is especially important in the digital age because Gen Z's decisions are largely impacted by internet information. Future studies should examine other visit decision elements and E-WOM in different circumstances. …”
    Get full text
    Article
  9. 3789

    Open access on a zero budget: a case study of Postcolonial Text by John Willinsky, Ranjini Mendis

    Published 2007-01-01
    “…A strong commitment to the principles of developing a new field of inquiry committed to global issues of access to knowledge, in combination with open source and Internet technologies, has lowered the barriers to the exercise of academic freedom on a modest, but nonetheless global scale.…”
    Get full text
    Article
  10. 3790

    Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis by Tongguang Ni, Xiaoqing Gu, Hongyuan Wang, Yu Li

    Published 2013-01-01
    “…Distributed denial of service (DDoS) attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. …”
    Get full text
    Article
  11. 3791

    Challenges and Countermeasures of International Commercial Dispute Resolution in the Digital Age by Zhi Qi

    Published 2024-12-01
    “…As an alternative method of dispute resolution, the development of the Online Dispute Resolution (ODR) is closely related to the Internet. However, the rapidity of technological updates, the lag of international rules, and the digital divide also bring challenges. …”
    Get full text
    Article
  12. 3792

    Efficient privacy-preserving decision tree classification protocol by Lichuan MA, Jiayi PENG, Qingqi PEI, Haojin ZHU

    Published 2021-08-01
    “…To provide privacy-preserving decision tree classification services in the Internet of things (IoT) big data scenario, an efficient privacy-preserving decision tree classification protocol was proposed by adopting the secure multiparty computation framework into the classification model.The entire protocol consisted of three parts: the original decision tree model mixing, the Boolean share-based privacy-preserving comparing, and the 1-out-of-n oblivious transfer-based classification result obtaining.Via the proposed protocol, the service providers could protect the parameters of their decision tree models and the users were able to derive the classification result without exposing their privately hold data.Through a concrete security analysis, the proposed protocol was proved to be secure against semi-honest adversaries.By implementing the proposed protocol on various practical decision tree models from open datasets, the classification accuracy and the average time cost for completing one privacy-preserving classification service were evaluated.After compared with existing related works, the performance superiority of the proposed protocol is demonstrated.…”
    Get full text
    Article
  13. 3793

    The Debate Between Realism and Formalism in Contemporary International Law (Emphasizing the Procedure of the International Court of Justice) by Sepanta Mojtahedzadeh

    Published 2024-03-01
    “…In this research, with a descriptive-analytical method and using the library method and using reliable internet sources to collect data, an attempt has been made to answer the question that contemporary international law is at the crossroads between realism and legal formalism Which way is it going and what method does the International Court of Justice, follow in issuing its opinions? …”
    Get full text
    Article
  14. 3794

    Safety and Privacy Considerations for Mobile Application Design in Digital Healthcare by Mojca Volk, Janez Sterle, Urban Sedlar

    Published 2015-10-01
    “…This paper presents a case study on security and privacy implications on the design of a mobile application in digital health, the DeStress Assistant (DeSA) app, which utilizes sensing technologies and capabilities of the Internet of Things (IoT). An analysis of the applicable legislative framework is provided and selected challenges encountered during the app design are discussed, which are related with the practical implications of provisions of the international and national legislation for software applications in general as well as medical devices and handling of sensitive data in particular. …”
    Get full text
    Article
  15. 3795

    التصنیف العنکبوتى للأرشیفات : دراسة تقییمیة للأرشیفات الوطنیة العربیة على الانترنت فى ضوء اسلوب القیاسات العنکبوتیة... by د. عبد الرحمن فراج

    Published 2020-09-01
    “…The study concludes somerecommendations targeting sending the Arab national archives ranks higher andsupporting their functions and services on the Internet.…”
    Get full text
    Article
  16. 3796

    An Audit Risk Model Based on Improved BP Neural Network Data Mining Algorithm by Wenjia Niu, Lihua Zhao, Peiyao Jia, Jiankun Chu

    Published 2022-01-01
    “…In the era of big data and the Internet, enterprises generate a large amount of data in their daily operations. …”
    Get full text
    Article
  17. 3797

    A Multimodal Discourse Analysis on Street Graffities about Indonesian Police by Rifpan Putra Afriansyah, Eva Tuckyta Sari Sujatna, Nani Darmayanti

    Published 2025-02-01
    “…The data of this research are collected through the internet, as the real graffities have been erased from the real-life locations. …”
    Get full text
    Article
  18. 3798

    Research on reconfigurable service carrying network active protection algorithms by Ning QI, Bin-qiang WANG, Zhi-ming WANG

    Published 2012-08-01
    “…To construct reconfigurable service carrying network (RSCN) in reconfigurable flexible network (RFNet) infrastructure could provide traffic specific communication services for different end users.This could effectively solve the puzzle faced by traditional Internet infrastructure.Because of the blight of network failure,active protection problems of RSCN were discussed.Mathematics model of RSCN active protection issues were established.To avoid enormous influence because of important resource failure,a resource stress factor (RSF) awareness main link construction algorithm named RSF-aware MLCA was proposed.To improve success running ratio and reduce network link failure loss of RSCN,a RSCN protection link construction algorithm named RPLCA was implemented.Considering of the two sub-algorithms,RSCN active protection algorithm named RAPA was designed.The efficiency of algorithms was evaluated by emulation experiments according to RSCN success running ratio and main link utilization ratio and average network link failure loss under several scenarios.…”
    Get full text
    Article
  19. 3799

    Analysis of the impact of financial inclusion and FinTech on youth labour force participation in the MENA region by Elmasmari Hanane, Amaghouss Jabrane

    Published 2024-12-01
    “…The results show that young people with higher education levels, higher incomes, mobile phones and Internet access are more likely to be included in the traditional and digital financial systems. …”
    Get full text
    Article
  20. 3800

    Tata kelola pemerintahan dinamis pada implementasi kebijakan inovasi pelayanan by Ira Patriani

    Published 2024-03-01
    “…Researchers propose creating and sharing SOPs, hiring IT leaders, training personnel, monitoring, evaluating, maintaining website servers, and improving workplace internet speed as needed.…”
    Get full text
    Article