Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
4021
Using statistical traffic analysis to calculate the confidential means of information transmission
Published 2021-01-01“…The article considers the modeling of security problems in the Internet as stochastic systems. This allows you to find flaws in existing security systems and offer new solutions. …”
Get full text
Article -
4022
You Take Care of the Drive, I Take Care of the Rule: A Traffic-Rule Awareness System Using Vehicular Sensors and Mobile Phones
Published 2012-12-01“…There are three advantages of vehicle regulation: (1) without worrying about violations of traffic rules and searching for traffic signs, drivers can pay more attention on emergency situations, such as jaywalking. (2) Many traffic violations are due to attention distraction; machines do not have the attention issues; therefore they can provide good traffic-rule obeying. (3) New traffic rules can be spread and applied more quickly and effectively through the Internet or Vehicular Ad hoc NETworks (VANETs). In this paper, we propose a novel traffic-rule awareness system using vehicular sensors and mobile phones. …”
Get full text
Article -
4023
How Does Students’ Knowledge About Information-Seeking Improve Their Behavior in Solving Information Problems?
Published 2023-03-01“…Conclusion – The study’s findings deepen the comprehension of how students’ information behaviors evolve, and indicate suitable interventions that could help to support students in performing more effective Internet searches.…”
Get full text
Article -
4024
INCLUSIÓN DIGITAL Y GÉNERO: INVESTIGACIÓN Y FORMACIÓN CLAVES DEL ÉXITO
Published 2025-01-01“…Sus conocimientos, capacidades y usos se centran en el acceso o búsqueda de información a través de Internet como recurso técnico. Por ello, es necesario diseñar acciones formativas para empoderar a este colectivo en el contexto laboral.…”
Get full text
Article -
4025
Howard S. Becker - Kanıt
Published 2022-04-01“…Günümüzde anket, mülakat, doküman incelemesi, kurumların tuttuğu istatistiki veriler gibi geleneksel veri toplama yöntemleri ve kaynaklarının yanı sıra büyük veri (big data) olarak adlandırılan internet temelli yeni veri kaynakları da bulunmaktadır. …”
Get full text
Article -
4026
Le portail des données naturalistes SILENE en région Provence-Alpes-Côte d’Azur
Published 2013-09-01“…SILENE est un portail internet de diffusion de données naturalistes développé en partenariat par plusieurs organismes producteurs et gestionnaires de données, les services de l’Etat et du Conseil Régional. …”
Get full text
Article -
4027
Sustainability through business model innovation and climate finance in developing countries
Published 2025-01-01“…However, challenges such as limited electricity access, exacerbated by electrification, impede sustainability progress. Furthermore, internet access and the poverty ratio negatively affect sustainability. …”
Get full text
Article -
4028
Exploring students’ narratives: Understanding self-efficacy in vocabulary mastery
Published 2025-01-01“…The study's findings showed that the widespread use of Internet tools for vocabulary acquisition gives credence to their classroom use. …”
Get full text
Article -
4029
Metric-based learning approach to botnet detection with small samples
Published 2023-10-01“…Botnets pose a great threat to the Internet, and early detection is crucial for maintaining cybersecurity.However, in the early stages of botnet discovery, obtaining a small number of labeled samples restricts the training of current detection models based on deep learning, leading to poor detection results.To address this issue, a botnet detection method called BT-RN, based on metric learning, was proposed for small sample backgrounds.The task-based meta-learning training strategy was used to optimize the model.The verification set was introduced into the task and the similarity between the verification sample and the training sample feature representation was measured to quickly accumulate experience, thereby reducing the model’s dependence on the labeled sample space.The feature-level attention mechanism was introduced.By calculating the attention coefficients of each dimension in the feature, the feature representation was re-integrated and the importance attention was assigned to optimize the feature representation, thereby reducing the feature sparseness of the deep neural network in small samples.The residual network design pattern was introduced, and the skip link was used to avoid the risk of model degradation and gradient disappearance caused by the deeper network after increasing the feature-level attention mechanism module.…”
Get full text
Article -
4030
Modeling and Analysis of Bifurcation in a Delayed Worm Propagation Model
Published 2013-01-01“…Consequently, time delay should be adjusted to be less than τ0 to ensure the stability of the system stable and better prediction of the scale and speed of Internet worm spreading. Finally, numerical and simulation experiments are presented to simulate the system, which fully support our analysis.…”
Get full text
Article -
4031
Coordinated UAV-UGV trajectory planning based on load balancing in IoT data collection
Published 2024-01-01“…To improve the efficiency of large-scale Internet of things (IoT) data collection, a coordinated trajectory planning algorithm for multiple aerial and ground vehicles based on load balancing region partitioning was proposed, where unmanned aerial vehicles (UAVs) acting as aerial base stations were dispatched to gather data from IoT devices and unmanned ground vehicles (UGVs) acting as mobile battery swap stations were used to compensate for the shortage of UAV’s energy.Aiming at shortening the mission completion time, the optimization task was to minimize the longest mission time among a fleet of UAV-UGVs, which was formulated as a variant of min-max multi-depot vehicle routing problem and solved from the load-balancing perspective.Specifically, the IoT devices were assigned to the UAV-UGVs’ service zones by a load-balancing region partition algorithm, based on which the trajectory planning problem of multiple UAV and UGV was reduced to several independent route planning problems for each UAV-UGV pair.Then, a cooperative trajectory planning strategy was developed to optimize the route in each service zone.Numerical results validate that the proposed algorithm outperforms the compared algorithms in terms of mission completion time and balancing degree.…”
Get full text
Article -
4032
Fusing subjective and objective factors:a dynamic approach to evaluating reputation for IoT search
Published 2015-12-01“…Compared with the traditional Internet search,IoT search data center needs a higher data quality.In order to effectively motivate data owners to continuously provide higher quality data,the center needs pay the corresponding rewards to them according to the quality of data (QoD).As a result,QoD and the trustworthy evaluation become a basic problem for the development of IoT search.To address this problem and support data selection of IoT center,a dynamic reputation model was proposed to comprehensively assess the reputation of data owners.In detail,first,an approach to assessing the subjective and objective quality was proposed and mechanism of interactive discount and reputation attenuation was designed.Then,fusing subjective and objective factors,a novel dynamic reputation evaluation scheme was presented.Last,in order to get constraint relation of interaction times,discount,payment price,and data cost,an economic analysis based on signaling game was conducted.Experiment results show that the proposed approach can reflect dynamic change of QoD effectively,and provide the basis for data selection.It also can be adapted to real-time and dynamic of IoT search.…”
Get full text
Article -
4033
Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks
Published 2009-01-01“…The role of Internet Protocol (IP) is becoming more and more problematic especially with the new requirements of mobility and multihoming. …”
Get full text
Article -
4034
Differential fault attack on LiCi cipher
Published 2021-04-01“…LiCi lightweight block cipher is a new algorithm proposed in 2017.With advantages of small structure and low energy consumption, LiCi is more suitable for resource-constrained environments such as the internet of things (IoT).In the design document of LiCi, the ability of LiCi algorithm to resist differential attack and linear attack is analyzed, but the resistance of LiCi algorithm to differential fault attack has not been discussed.According to the permutation law of each round iteration of LiCi algorithm, 32-bit key can be recovered by injecting a single bit fault into the left half of the 31st round iteration combined with its differential property.According to the key choreography scheme of the LiCi algorithm, the same differential fault attack was performed on iterations 30th, 29th, 28th, 27th and 26th round to recover all the original keys.The attack requires a total of 48-bit faults, and the computational complexity is 2<sup>32</sup>, which indicates the LiCi algorithm is difficult to resist differential fault attacks.…”
Get full text
Article -
4035
E-Commerce as a Game Changer for Logistics in a Sustainable Context
Published 2023-01-01“…It is based on various data collection techniques such as document review, direct observation and archival records from secondary sources such as reports, studies, statistics and internet sources. Findings: E-commerce is not yet a game changer for sustainable logistics. …”
Get full text
Article -
4036
Amplifying the Yield of the Harvests through Wireless Sensor Network in Smart Agriculture
Published 2022-12-01“…Utilizing the fundamental standards of Internet and WSN innovation, accuracy farming frameworks considering the IOT innovation is clarified exhaustively particularly on the equipment design, network engineering what’s more programming process control of the accuracy water system framework. …”
Get full text
Article -
4037
Research on SDN Architecture and Security
Published 2013-03-01“…With the rapid deve1opment of c1oud computing and mobi1e internet, the features that network exhibits, such as diversity, dec1are for urgent requirements for sca1abi1ity, manageabi1ity and security of the data center.The SDN architecture shows a promising way of dea1ing with the above requirements of network through revo1utionary innovation of the traditiona1 network architecture, which attracts great interest of companies and research institutes.However, according to the recent research and progress of SDN, security prob1em has not been addressed, which wi11 be a significant issue.Based on the situation, the basis of SDN, inc1uding the origination, architecture, standardization work and standardized protoco1, were described, and the security issue was a1so ana1yzed.In the security part, the exhibiting new features of security prob1em for SDN, were ana1yzed, by 1isting the undergoing work, and then the security threats in SDN were conc1uded.Fina11y, a suggested architecture for security research of SDN was proposed.…”
Get full text
Article -
4038
THE OEDIPUS COMPLEX IN EUGENE O’NEILL’S DESIRE UNDER THE ELMS
Published 2022-10-01“…The writers got the main source of the data from the play, while the supporting data, the writers got from literary books, journals of English Literature, and the internet. Data were gathered then they were examined using the descriptive-analytic techniques. …”
Get full text
Article -
4039
Impact of Background Traffic on Speech Quality in VoWLAN
Published 2007-01-01“…The background traffic was generated by means of the accomplished Distributed Internet Traffic Generator (D-ITG). The impact of these types of traffic and traffic load on speech quality using the test sequence and speech sequences is the aim of this paper. …”
Get full text
Article -
4040
Sur les traces de John MacCrae, ou l’inscription dans l’espace public du souvenir d’un combattant de 1914-1918
Published 2015-09-01“…Considering the example of MacCrae will also enable us to reflect on both material and immaterial (internet) traces of memory and on how the circulation of iconic images leaves traces over time in public spaces. …”
Get full text
Article