Showing 3,821 - 3,840 results of 5,694 for search '"internet"', query time: 0.08s Refine Results
  1. 3821

    Continuous User Verification in Cloud Storage Services using Deep Learning by burhan albayati

    Published 2025-01-01
    “… Cloud storage services have become a new paradigm for storing data user over the Internet. Users can access these services using a simple authentication login. …”
    Get full text
    Article
  2. 3822

    Research and construction of new digital foundation for the fusion between IPv6 and 5G by LIN Chujian, JIAO Baochen, LIANG Zhelong, ZHU Yue, ZHAO Xing, LI Tao

    Published 2024-11-01
    “…Based on the current situation of the campus network of Nankai University, new generation information network technologies such as IPv6 and 5G were studied, a new basic network integrating Wi-Fi campus network and 5G private network based on IPv6 protocol, IPv6 adaptation and application pilot deployment of the information innovation platform was built, a new digital foundation integrating IPv6 and 5G for plug and play against IPv6 was carried out and constructed, a mature cloud network fusion solution for the deployment of smart campus business system and a new basic network environment and trusted computing resources for the training, technology research and innovation of professionals in the next generation Internet related disciplines were provided, and the digital transformation of university education was enabled.…”
    Get full text
    Article
  3. 3823

    Public interest in healthy lifestyle changes before and during the COVID-19 pandemic: Google Trends analysis by Seyma Trabzon, Pelin Ilhan, Havva Sert, Ali Sarıdas

    Published 2023-06-01
    “…During the pandemic, individuals started to use the internet to get information and protect their health. …”
    Get full text
    Article
  4. 3824

    Research on security of mobile payment for commercial bank by Xi CHEN, You-liang TIAN, Zhuo MA, Jian-feng MA

    Published 2014-11-01
    “…There is no doubt that mobile payment is the spotlight in Internet finance now.Although users can enjoy quick and convenient services,they have to face with more severe security problems at the same time:the attack incidents,such as cellphone Trojan and privacy leaks emerge endlessly.Lots of viruses which are designed for attacking financial payments can steal users’ personal information including account,password and verification code in the proceedings of remote payment and near field communication.Security issues have already seriously impeded the further development of the mobile payment market.To solve the above problems,discusses the security issues in mobile terminals,payments,network and interactive logic of banking business from financial institutions’ perspective was discussed systematically.In addition,current status of relevant security key technologies are summarized from academic research community and industry fields.Finally,based on related research achievements,the design of system architecture and suggestions for mobile payment security are proposed,which can guide the future development of commercial bank.…”
    Get full text
    Article
  5. 3825

    PROTOTYPE WIRELESS SENSOR NETWORK (WSN) SISTEM PENDETEKSI DINI KEBAKARAN HUTAN by Siswanto Siswanto, Sutarti Sutarti, Riyan Naufal Hays, Ardi Setyo Anggoro

    Published 2020-12-01
    “…Teknologi yang dapat digunakan adalah teknologi Wireless Sensor Network ( WSN) yang terhubung dengan sensor Mq2, sensor api, sensor suhu, dan terhubung ke internet melalui aplikasi Blynk yang terpasang pada Smartphone.sistem ini   akan memudahkan dalam memberikan informasi dimana terjadinya kebaran hutan sehingga penangan dalam mengatasi terjadi kebaran hutan akan menjadi lebih cepat.…”
    Get full text
    Article
  6. 3826
  7. 3827

    Kamuoyu ve Türk Dış Politikası Algısı: Selçuk Üniversitesi Örneği by Mehmet Büyükçiçek

    Published 2016-12-01
    “…Bu çalışmada 15-22 Mayıs 2016 tarihleri arasında Selçuk Üniversitesi Sosyal Bilimler Meslek Yüksek Okulu ile İktisadi ve İdari Bilimler Fakültesi öğrencileriyle internet üzerinden gerçekleştirilen bir anket çalışması ele alınmakta ve bu ankette verilen cevaplar değerlendirilmektedir. …”
    Get full text
    Article
  8. 3828

    Cybersecurity Attacks and Detection Methods in Web 3.0 Technology: A Review by Bandar Alotaibi

    Published 2025-01-01
    “…Web 3.0 marks the beginning of a new era for the internet, characterized by distributed technology that prioritizes data ownership and value expression. …”
    Get full text
    Article
  9. 3829

    Research on Scenarios and Modeling of Co-Frequency Interference Between NGSO Communication Constellation Systems by Wei LI, Kang YAN, Jingru GENG, Wen WANG

    Published 2021-03-01
    “…Aiming at the serious problem of frequency overlapping among non-geostationary satellite orbit (NGSO) communication constellation systems.The potential interference scenarios under multiple NGSO communication constellation systems sharing the same spectrum band was comprehensively analyzed, with the aid of analyzing frequency plan of typical constellation systems.Then the possibility of interference risk in each scenario was qualitatively evaluated.According to the characteristics of interference scenarios, the key parameters and models for the co-frequency interference analysis between the NGSO communication constellation systems were discussed, and the computing models of co-frequency interference based on three diff erent protect criterion were presented.Finally, challenges and key research directions of co-frequency interference analysis between NGSO communication constellation systems were pointed out.The research can provide a reference for the study of compatibility and coexistence between broadband Internet constellation systems.…”
    Get full text
    Article
  10. 3830

    System classification and certification of electronic trading platforms by T. R. Torpishchev

    Published 2024-02-01
    “…As an approbation, the certification of the Ozon marketplace (Internet Resheniya) has been carried out. On the basis of public reporting, an appendix with the main economic indicators has been completed. …”
    Get full text
    Article
  11. 3831

    El net.art feminista como herramienta identitaria, política y emancipadora del sujeto femenino by Maria Chamón Gómez

    Published 2025-01-01
    “… El movimiento artístico net.art, situado en la etapa de la internet temprana, de finales del s. XX y principios del s. …”
    Get full text
    Article
  12. 3832

    Challenges of distance English teaching: Narrative analysis of Iranian mainstream EFL teachers’ lived experiences by Fakharzadeh Mehrnoosh, Naderi Mohammad Hassan

    Published 2022-12-01
    “…The thematic narrative analysis yielded ten themes: non-customized platforms, material-related issues, connection/internet issues, pedagogical problems, evaluation problems, insufficiency of teachers’ knowledge of technology, unmet expectations, physical absence of teacher/student, student-related issues, and dealing with negative emotions. …”
    Get full text
    Article
  13. 3833

    Uwarunkowania rozwoju systemów ERP w przedsiębiorstwach by Dariusz Strzębicki

    Published 2017-07-01
    “…Artykuł oparto na przeglądzie literatury z zakresu wdrażania systemów klasy ERP oraz na dostępnych w sieci Internet danych wtórnych. Analiza wykazała, że współczesne systemy ERP w coraz większym stopniu przyczyniają się do coraz większej automatyzacji procesów oraz są w coraz większym stopniu nakierowane na rozwój integracji zewnętrznej przedsiębiorstw. …”
    Get full text
    Article
  14. 3834

    The Effects of Sport on Coexistence And Globalization by Kemal Yavuz Ataman

    Published 2020-09-01
    “…A global and single culture is aimed. However, Internet and social media tools provide with opportunities also for local cultures. …”
    Get full text
    Article
  15. 3835

    IoT-based river water quality monitoring by Soheil Fakheri, Nenad Komazec, Hashem Saberi Najafi

    Published 2023-12-01
    “…This paper, named IoT-based river water quality monitoring, gives the outcome of quality river water with the advantage of various advanced techniques, the Internet of Things, and Wireless Sensor Networks (WSNs). …”
    Get full text
    Article
  16. 3836

    The Strategic Measures for the Industrial Security of Small and Medium Business by Chang-Moo Lee

    Published 2014-01-01
    “…The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. …”
    Get full text
    Article
  17. 3837

    Game theory based forwarding control method for social network by Fangfang SHAN, Hui LI, Hui ZHU

    Published 2018-03-01
    “…With the rapid development of mobile communication and internet technology,the social network has become one of the mainstream social means used in people’s daily social life.To maintain and strengthen relationships with friends,users may share personal behavior and feelings through social networks.Forwarding these contents may result in privacy leakage.To help publishers make proper data forwarding decision,the benefits of both sides of the forwarding operation were analyzed,and a game theory based forwarding control method for social network was proposed which could effectively prevent dishonest data forwarding operation.By analyzing the benefits of both sides of forwarding operation and considering historical information,the probability of dishonest data forwarding operation was calculated and it was compared with the threshold set by publisher to make the forwarding decision.The procedure and framework of the game theory based forwarding control method was introduced.The benefits of both sides were defined and analyzed.The game play scenario was presented.Some results of experiments are shown to support that the method is effective and it can protect the security of content in social network.…”
    Get full text
    Article
  18. 3838

    Dual time scale resource allocation for RAN slicing in software-defined oriented polymorphic IoV by Weijing QI, Qingyang SONG, Lei GUO

    Published 2022-04-01
    “…To effectively meet the differentiated quality of service (QoS) requirements of various vehicular applications, a dual time scale resource allocation algorithm for radio access network (RAN) slicing in software-defined polymorphic Internet of vehicles (IoV) was proposed.Considering the constraints of the minimum rate requirement of enhanced mobile broadband (eMBB) slice users, vehicle-to-vehicle (V2V) link reliability, the maximum power of nodes, the maximum number of RBs, a joint optimization problem of caching, spectrum, power allocation was formulated, with the aim of minimizing the average delay of ultra-reliable and low-latency communication (URLLC) slice users.By using the Hungarian algorithm, linear integer programming method and the double deep Q-Learning network (DDQN) algorithm, the original NP-hard problem was solved in dual time scales.The simulation results show that the proposed algorithm is superior to the traditional algorithm in ensuring the QoS requirements of different slice users and improving the spectrum utilization.…”
    Get full text
    Article
  19. 3839

    A Prerecognition Model for Hot Topic Discovery Based on Microblogging Data by Tongyu Zhu, Jianjun Yu

    Published 2014-01-01
    “…The microblogging is prevailing since its easy and anonymous information sharing at Internet, which also brings the issue of dispersing negative topics, or even rumors. …”
    Get full text
    Article
  20. 3840

    Classification and Visual Design Analysis of Network Expression Based on Big Data Multimodal Intelligence Technology by Zou Ping, Yueyan Liu

    Published 2022-01-01
    “…The rapid development of the Internet in modern society has promoted the development of many different network platforms. …”
    Get full text
    Article