Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
3881
Prospects for University’s Open Educational Resources
Published 2019-09-01“…As a result of the survey, it was found that 60% of lecturers at Russian universities distribute their own educational materials on the Internet during the educational process for the convenience of students.…”
Get full text
Article -
3882
Si Substrate Backside—An Emerging Physical Attack Surface for Secure ICs in Flip Chip Packaging
Published 2024-01-01“…An attacker measures SCs using probes as well as antennas and correlates them with secret information, such as secret key bytes, used in a cryptographic processor or analog quantities at the frontend of Internet of Things (IoT) gadgets. This article defines and elucidates the emerging threats of Si-substrate backside attacks on flipped IC chips, demonstrates attacks and proposes countermeasures.…”
Get full text
Article -
3883
An access scheme based on the random access occasion dynamic allocation
Published 2022-06-01“…With the rapid development of the internet of things (IoT), the application of machine type communication (MTC) in life has grown substantially, and the deployment of machine type devices (MTD) has become more and more intensive.In this case, if there is an unexpected situation such as a power outage and a network failure, a large-scale MTD will initiate access to the base station at the same time when the device is powered on.When the device accesses the base station, it needs to complete the downlink synchronization, system message receiving, random access (RA) and other processes.However, the preamble resources that can be allocated by the base station are limited and cannot meet such a huge access demand, which causes network congestion and affects the access probability and access delay of the device.In order to alleviate the access conflict of RA, a dynamic random access occasion (RO) adjustment scheme was proposed based on the uplink and downlink subframes and physical random access channel (PRACH) configuration, and time-based part of the MTD with high delay requirements allocates specific preamble resources.The simulation results show that this scheme can effectively improve the throughput of the system and reduce the access delay of the device.…”
Get full text
Article -
3884
A Service Based Adaptive U-Learning System Using UX
Published 2014-01-01“…In the cloud computing environment, a learning service application can provide a business module or process to the user via the internet. This research focuses on providing the learning material and processes of courses by learning units using the services in a ubiquitous computing environment. …”
Get full text
Article -
3885
Advanced Data Delivery Strategy Based on Multiperceived Community with IoT in Social Complex Networks
Published 2020-01-01“…With the advent of 5G communication standards, the number of 5G base stations increases steadily, and the number of mobile terminals and IoT (Internet of Things) devices increases sharply, which sharps a large number of IoT devices and forms a complex network. …”
Get full text
Article -
3886
-
3887
Research on cross-domain trustable blockchain based decentralized DNS architecture
Published 2020-04-01“…The domain name system (DNS) is an important internet infrastructure.However,current DNS utilizes centralized hierarchical structure with severe dependence on root server,which causes defects such as the risk of single-point failure and the abuse of central rights.Designing new decentralized DNS mainly focuses on transforming the domain name system from a single trust domain which relies on the center to multiple trust domains with the top-level domain name as the root parallel to each other,but also faces cross-domain credible challenges.To design a cross-domain trusted architecture,the concept of separating control and analysis was adopted,and a dual-blockchain DNS architecture was proposed.At data layer,a novel cross-domain verification was designed based on a one-way accumulator verification scheme,with the time complexity of the verification process O(N) reducing to O(1) nearly.The CDBFT algorithm was proposed by combining the DPoS mechanism and the BFT algorithm,whose average throughput reaches 736 TPS.The theoretical derivation and experimental results have demonstrated the advantages of this new DNS architecture on security,performance,and scalability.…”
Get full text
Article -
3888
Web-search and address distribution of information on the basis of modeling of verbal associations
Published 2019-09-01“…A mathematical model is proposed for the processes of websites scanning and addressing (selective) distribution of the text information found after the request of users in the form of their information profiles, i. e. accumulated archives of relevant Internet publications. The functional components of such an information system are three subsystems: the subsystem of texts indexing, user archives and short messages; web page scanning subsystem; the subsystem of address distribution of texts and short messages to users. …”
Get full text
Article -
3889
MEDYANIN KRİTİK VE SÜREĞEN DÖNEMECİ: ÜNİVERSİTE ÖĞRENCİLERİNİN GÖZÜNDEN MEDYA HABERLERİNİN GÜVENİLİRLİĞİ
Published 2014-03-01“…Üniversite öğrencilerinin haber alma ihtiyacını karşılamak adına haftalık en sık kullandıkları medya olarak internet, sosyal medya ve televizyon ilk üç sırada yer almaktadır. …”
Get full text
Article -
3890
Automation of Presentation Record Production Based on Rich-Media Technology Using SNT Petri Nets Theory
Published 2015-01-01“…Rich-media describes a broad range of digital interactive media that is increasingly used in the Internet and also in the support of education. …”
Get full text
Article -
3891
A Hybrid Genetic-Simulated Annealing Algorithm for the Location-Inventory-Routing Problem Considering Returns under E-Supply Chain Environment
Published 2013-01-01“…Meanwhile, the return ratio in Internet sales was significantly higher than in the traditional business. …”
Get full text
Article -
3892
Social media marketing influence on Boutique Hotel customers’ purchase intention in Malaysia
Published 2021-07-01“…As of January 2020, global social media users have exceeded 3.8 billion, accounting for 49% of the world’s total population. Internet and social media have become an indispensable part of people’s daily lives worldwide. …”
Get full text
Article -
3893
Taxi Efficiency Measurements Based on Motorcade-Sharing Model: Evidence from GPS-Equipped Taxi Data in Sanya
Published 2018-01-01“…To unlock the potential of Internet of Vehicles (IoV) in Intelligent Transportation Systems (ITS), it was vital to make efficiency measurements. …”
Get full text
Article -
3894
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
Published 2021-01-01“…Abstract With the flourishing development of the Internet of Things (IoT), the electronic health system (EHS) as a leading technology has attracted widespread attention. …”
Get full text
Article -
3895
Parties in the digital jungle
Published 2022-02-01“…The development of digital technology, Internet communications and social media affects all areas of public life. …”
Get full text
Article -
3896
Articulating Factors Defining RMS Delay Spread in LV PLC Networks
Published 2010-01-01“…With the recent developments in the field of digital communications, current interest is to exploit this medium for wideband communications for several applications such as Internet access, home networking, and in-vehicle data communication. …”
Get full text
Article -
3897
Willingness to protect bird species depends on individual respondents' demographic and species traits
Published 2025-01-01“…On the species trait level based on the 141 species, cuteness, coloration, and internet salience were positively related to WTP, and presence at feeders, eBird entries, and global abundance were negatively related to WTP. …”
Get full text
Article -
3898
خدمات المعلومات المتاحة فى مواقع مراکز البحوث المصریة على شبکة الانترنت : دراسة تجریبیة
Published 2019-10-01“…The study concluded that there are seven Egyptian research centersOn the Internet, and they provide 21 services to their usersThe most important results of the study:1. …”
Get full text
Article -
3899
Tangible digital storytelling and phygital reality: benefits for inclusion and cooperation in young children
Published 2023-12-01“…With personal computers, mobile phones, tablets, and the Internet, technology is used in all spheres, affecting our daily lives greatly. …”
Get full text
Article -
3900
Turkish Mathematics and Science Teachers’ Technology Use in Their Classroom Instruction: Findings from TIMSS 2011
Published 2016-07-01“…In 69.6% of the mathematics classes and in 41.5% of the science classes, students had computer(s) available to use during lessons and in computer available classes, computers were generally connected to internet. Students rarely engaged in computer activities, such as exploring principles and concepts, practicing skills and procedures, looking up ideas and information, doing experiments, processing and analyzing data. …”
Get full text
Article