Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
3781
Study and Analysis of Barriers for Implementation of Industry 4.0 Technologies Using Spherical Fuzzy TOPSIS Method
Published 2025-01-01“…Drivers such as government initiatives, establishment of fast internet connectivity, job security, etc., are recommended in this research work for minimizing the effect of barriers.…”
Get full text
Article -
3782
The Effect of Governance on Donations: Evidence from Brazilian Environmental Nonprofit Organizations
Published 2023-01-01“…Data were collected predominantly from the documents available on the Internet, and the random sample consisted of 108 observations. …”
Get full text
Article -
3783
THE ANALYSIS OF INFORMATION TECHNOLOGIES USAGE FOR ACADEMIC PURPOSES IN ENGLISH LANGUAGE TEACHING AND LEARNING AT UNIVERSITAS BANGKA BELITUNG
Published 2019-08-01“…The harness of computers, internet, e-mail, multi-media and other IT tools is indispensable and has a great influence on the process of language teaching and learning in an effort to improve the quality of education and to produce best human resources that not only having good competence in foreign language but also possessing great capabilities in the use of Information Technology to face the Industrial Revolution 4.0 era. …”
Get full text
Article -
3784
Vehicle Type Recognition Algorithm Based on Improved Network in Network
Published 2021-01-01Get full text
Article -
3785
Tracer study of the psychology faculty of UIN Raden Fatah Palembang in 2018: satisfaction of alumni and stakeholders on the implementation of Islamic psychology study programs
Published 2019-05-01“…Therefore, it still needs to be improved in a lecture, computer and internet facilities. Islamic Psychology Study Program Faculty of Psychology has fulfilled most of the expectations of stakeholders and alumni. …”
Get full text
Article -
3786
A new method for reducing 5G overlapping coverage of urban grid roads
Published 2024-01-01“…The 5G network for urban grid road scenes has entered a new stage of refined operation and maintenance.The main contradiction has also shifted from insufficient coverage to severe overlapping coverage of some road sections.5G overlapping coverage will have a significant impact on users’ basic services such as internet access and voice.The optimization of traditional road overlapping coverage has many problems, such as inconsistent standards, recurring problems, and low work efficiency.The concept of overlapping coverage contribution was proposed, and an algorithm for root cause analysis of overlapping coverage was designed based on expert experience.An IT platform for optimizing overlapping coverage problems was also developed.The practice has proven that this method can effectively reduce the 5G overlapping coverage rate of urban grid roads, help enterprises save network optimization costs, and truly achieve the goal of cost reduction and efficiency increase.…”
Get full text
Article -
3787
The gendered perspective of cyberbullying: The case of a rural University in Limpopo
Published 2022-08-01“… The rapid advancement of Information and Communication Technologies (ICTs) has heightened misuse of internet-based technologies by young people. Besides increased integration due to availability and access to mobile communication technologies, students today indulge in cyberbullying where they harass, insult and stalk each other. …”
Get full text
Article -
3788
The Gen Z preferences in choosing museum destinations
Published 2024-12-01“…This is especially important in the digital age because Gen Z's decisions are largely impacted by internet information. Future studies should examine other visit decision elements and E-WOM in different circumstances. …”
Get full text
Article -
3789
Open access on a zero budget: a case study of Postcolonial Text
Published 2007-01-01“…A strong commitment to the principles of developing a new field of inquiry committed to global issues of access to knowledge, in combination with open source and Internet technologies, has lowered the barriers to the exercise of academic freedom on a modest, but nonetheless global scale.…”
Get full text
Article -
3790
Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis
Published 2013-01-01“…Distributed denial of service (DDoS) attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. …”
Get full text
Article -
3791
Challenges and Countermeasures of International Commercial Dispute Resolution in the Digital Age
Published 2024-12-01“…As an alternative method of dispute resolution, the development of the Online Dispute Resolution (ODR) is closely related to the Internet. However, the rapidity of technological updates, the lag of international rules, and the digital divide also bring challenges. …”
Get full text
Article -
3792
Efficient privacy-preserving decision tree classification protocol
Published 2021-08-01“…To provide privacy-preserving decision tree classification services in the Internet of things (IoT) big data scenario, an efficient privacy-preserving decision tree classification protocol was proposed by adopting the secure multiparty computation framework into the classification model.The entire protocol consisted of three parts: the original decision tree model mixing, the Boolean share-based privacy-preserving comparing, and the 1-out-of-n oblivious transfer-based classification result obtaining.Via the proposed protocol, the service providers could protect the parameters of their decision tree models and the users were able to derive the classification result without exposing their privately hold data.Through a concrete security analysis, the proposed protocol was proved to be secure against semi-honest adversaries.By implementing the proposed protocol on various practical decision tree models from open datasets, the classification accuracy and the average time cost for completing one privacy-preserving classification service were evaluated.After compared with existing related works, the performance superiority of the proposed protocol is demonstrated.…”
Get full text
Article -
3793
The Debate Between Realism and Formalism in Contemporary International Law (Emphasizing the Procedure of the International Court of Justice)
Published 2024-03-01“…In this research, with a descriptive-analytical method and using the library method and using reliable internet sources to collect data, an attempt has been made to answer the question that contemporary international law is at the crossroads between realism and legal formalism Which way is it going and what method does the International Court of Justice, follow in issuing its opinions? …”
Get full text
Article -
3794
Safety and Privacy Considerations for Mobile Application Design in Digital Healthcare
Published 2015-10-01“…This paper presents a case study on security and privacy implications on the design of a mobile application in digital health, the DeStress Assistant (DeSA) app, which utilizes sensing technologies and capabilities of the Internet of Things (IoT). An analysis of the applicable legislative framework is provided and selected challenges encountered during the app design are discussed, which are related with the practical implications of provisions of the international and national legislation for software applications in general as well as medical devices and handling of sensitive data in particular. …”
Get full text
Article -
3795
التصنیف العنکبوتى للأرشیفات : دراسة تقییمیة للأرشیفات الوطنیة العربیة على الانترنت فى ضوء اسلوب القیاسات العنکبوتیة...
Published 2020-09-01“…The study concludes somerecommendations targeting sending the Arab national archives ranks higher andsupporting their functions and services on the Internet.…”
Get full text
Article -
3796
An Audit Risk Model Based on Improved BP Neural Network Data Mining Algorithm
Published 2022-01-01“…In the era of big data and the Internet, enterprises generate a large amount of data in their daily operations. …”
Get full text
Article -
3797
A Multimodal Discourse Analysis on Street Graffities about Indonesian Police
Published 2025-02-01“…The data of this research are collected through the internet, as the real graffities have been erased from the real-life locations. …”
Get full text
Article -
3798
Research on reconfigurable service carrying network active protection algorithms
Published 2012-08-01“…To construct reconfigurable service carrying network (RSCN) in reconfigurable flexible network (RFNet) infrastructure could provide traffic specific communication services for different end users.This could effectively solve the puzzle faced by traditional Internet infrastructure.Because of the blight of network failure,active protection problems of RSCN were discussed.Mathematics model of RSCN active protection issues were established.To avoid enormous influence because of important resource failure,a resource stress factor (RSF) awareness main link construction algorithm named RSF-aware MLCA was proposed.To improve success running ratio and reduce network link failure loss of RSCN,a RSCN protection link construction algorithm named RPLCA was implemented.Considering of the two sub-algorithms,RSCN active protection algorithm named RAPA was designed.The efficiency of algorithms was evaluated by emulation experiments according to RSCN success running ratio and main link utilization ratio and average network link failure loss under several scenarios.…”
Get full text
Article -
3799
Analysis of the impact of financial inclusion and FinTech on youth labour force participation in the MENA region
Published 2024-12-01“…The results show that young people with higher education levels, higher incomes, mobile phones and Internet access are more likely to be included in the traditional and digital financial systems. …”
Get full text
Article -
3800
Tata kelola pemerintahan dinamis pada implementasi kebijakan inovasi pelayanan
Published 2024-03-01“…Researchers propose creating and sharing SOPs, hiring IT leaders, training personnel, monitoring, evaluating, maintaining website servers, and improving workplace internet speed as needed.…”
Get full text
Article