Showing 4,641 - 4,660 results of 5,694 for search '"internet"', query time: 0.07s Refine Results
  1. 4641

    The Current State and Needs of North American Movement Disorders Fellowship Programs by Ludy C. Shih, Daniel Tarsy, Michael S. Okun

    Published 2013-01-01
    “…Methods. A 31-item internet-based survey was formulated and distributed to academic movement disorders listed in the American Academy of Neurology (AAN) directory as having a movement disorders fellowship and to all National Parkinson Foundation Centers of Excellence and Care Centers in North America. …”
    Get full text
    Article
  2. 4642

    Self-Reported Nutrition Education Received by Australian Midwives before and after Registration by Jamila Arrish, Heather Yeatman, Moira Williamson

    Published 2017-01-01
    “…Continuing education often occurred through personal initiatives, such as the midwife enrolling in external courses or exploring issues on the Internet and with colleagues. The majority of participants indicated a need for increased nutrition education (94.2%, n=310) and guidelines tailored for them to provide nutrition advice (87.8%, n=289). …”
    Get full text
    Article
  3. 4643

    Community counseling strategies to improve mental health literacy by Sindi Ayudia Pama, Diana Septi Purnama, Anisa Siti Nurjanah, Naufal Alwan Adilah, Muhammad Fahli Zatrahadi, Ellya Roza

    Published 2023-03-01
    “…Data were collected using a community awareness instrument for mental health services, implemented through an internet-based survey hosted on the Sobat Konseling account. …”
    Get full text
    Article
  4. 4644

    DARE: A decentralized association rules extraction scheme for embedded data sets in distributed IoT devices by Márcio Alencar, Raimundo Barreto, Horácio Fernandes, Eduardo Souto, Richard Pazzi

    Published 2020-10-01
    “…In the context of smart home, it is very important to identify usage patterns of Internet of things (IoT) devices. Finding these patterns and using them for decision-making can provide ease, comfort, practicality, and autonomy when executing daily activities. …”
    Get full text
    Article
  5. 4645

    Evaluation of Paperless Electronic Data Entry and its Comparison with Manual Entry Method for Oral Health Assessment of Adults by Manu Batra, Deeksha Gijwani, Hansika Popli

    Published 2023-04-01
    “…Being offline system, it has an additional edge with no requirement of active internet to record or store the data.…”
    Get full text
    Article
  6. 4646

    Distributed Denial of Services (DDoS) attack detection in SDN using Optimizer-equipped CNN-MLP. by Sajid Mehmood, Rashid Amin, Jamal Mustafa, Mudassar Hussain, Faisal S Alsubaei, Muhammad D Zakaria

    Published 2025-01-01
    “…Denial-of-service (DoS) attacks continuously impact users and Internet service providers (ISPs). Because of its centralized design, distributed denial of service (DDoS) attacks on SDN are frequent and may have a widespread effect on the network, particularly at the control layer. …”
    Get full text
    Article
  7. 4647

    MARKETING TRENDS IN THE DATA ECONOMY (2024–2025) by Svetlana V. Koshevenko

    Published 2024-12-01
    “…Methodology in article methods of analysis, synthesis, study of scientific literature and Internet resources, as well as interviewing marketing specialists were used. …”
    Get full text
    Article
  8. 4648

    Pseudo-siamese network image tampering localization model based on reinforced samples by Jinwei WANG, Zihe ZHANG, Xiangyang LUO, Bin MA

    Published 2024-02-01
    “…With the continuous development of the internet, an increasing number of images have been tampered with on the network, accompanied by a growing range of techniques to cover up tampering traces.However, most current detection models neglect the impact of image post-processing on tamper detection algorithms, limiting their real-life applications.To address these issues, a general image tampering location model based on enhanced samples and the pseudo-twin network was proposed.The pseudo-twin network enabled the model to learn tampering features in real images.On one hand, by applying convolution constraints, the image content was suppressed, allowing the model to focus more on residual trace information of tampering.The two-branch structure of the network facilitated the comprehensive utilization of image feature information.By utilizing enhanced samples, the model could dynamically generate the most crucial pictures for learning tamper types, enabling targeted training of the model.This approach ensured that the model converged in all directions, ultimately obtaining the global optimal model.The idea of data enhancement was employed to automatically generate abundant tampered images and corresponding masks, effectively resolving the limited tampering dataset issue.Extensive experiments were conducted on four datasets, demonstrating the feasibility and effectiveness of the proposed model in pixel-level tamper detection.Particularly on the Columbia dataset, the algorithm achieves a 33.5% increase in F1 score and a 23.3% increase in MCC score.These results indicate that the proposed model harnesses the advantages of deep learning models and significantly improves the effectiveness of tamper location detection.…”
    Get full text
    Article
  9. 4649

    Development of Nursing Education in Line with Technological Developments in Health Care by Leila Valizadeh, Hossein Nemati

    Published 2024-12-01
    “…Some new technologies include virtual reality stimulation (VR), augmented reality (AR), Metaverse, blockchain technology, the Internet of Things (IoT), and artificial intelligence, which are used to provide opportunities to transfer information, improve learning, and reduce learning problems. …”
    Get full text
    Article
  10. 4650

    Digital Cognitive Behavioral Therapy for the Average Person in Developing Countries by Muhammad Abdullah, Muhammad Yahya Saeed

    Published 2024-12-01
    “…However, in developing countries, several hindrances such as lack of technology, digital illiteracy, inadequate internet connectivity, and cultural barriers deter the average person from effectively using DCBT. …”
    Get full text
    Article
  11. 4651

    Movie scene segmentation using object detection and set theory by Ijaz Ul Haq, Khan Muhammad, Tanveer Hussain, Soonil Kwon, Maleerat Sodanil, Sung Wook Baik, Mi Young Lee

    Published 2019-06-01
    “…Movie data has a prominent role in the exponential growth of multimedia data over the Internet, and its analysis has become a hot topic with computer vision. …”
    Get full text
    Article
  12. 4652

    Automatic Algorithm for Fractal Plant Art Image Similarity Feature Generation by Zhizhe Liu, Luo Sun

    Published 2021-01-01
    “…With the popularity of smart devices and the Internet, the volume of multimedia data is growing rapidly, and content-based image retrieval (CBIR) can search for similar images from large-scale images to realize the utilization of the data. …”
    Get full text
    Article
  13. 4653

    الأرشفة الالکترونیة للأطروحات العلمیة فی مکتبات جامعات مکة المکرمة والمدینة المنورة : دراسة وصفیة تحلیلیة... by د. عبد الرحمن غالب دبور

    Published 2016-01-01
    “…The results show that the project of e-achieving began first in the libraryof Islamic university in the year 1426 (Hejri), we find that the Om Al Qurauniversity had started to Electronic Archiving project in the year 1427 (Hejri), andthe project of e-achieving of Taibah university began in the year 1431 (Hejri)where the project for both of these universities are library staff for each university.The study found the motive of the application of the e-archiving in the University.The evolution of the systems, including the mechanism in the area of Librariesand Information Sciences, the demand of the beneficiaries, and then to be madeavailable online through the Internet and providing time and effort. It was alsosuggested that a researcher to develop the electronic archiving of thesis in threeuniversities through supported an integrated plan to apply the electronic archivingof thesis.…”
    Get full text
    Article
  14. 4654

    Meta's Challenge with Olives and Watermelon: The Case of Blocking Posts About Gaza by Nuran Kızmaz Öztürk

    Published 2024-12-01
    “…Recently, Israel's attack on Gaza and the massive genocide in the region have caused a great resonance on the internet and social media. The aim of this study is to examine the censorship mechanisms applied by social media platforms during Israel's attacks on Gaza. …”
    Get full text
    Article
  15. 4655

    The new media as monitors of democracy by Dumisani Moyo

    Published 2022-10-01
    “…However, the advent of new communications technologies, such as the Internet and mobile phones, has ushered in a new era of political communication where citizens actively participate both in the election campaign and the monitoring processes. …”
    Get full text
    Article
  16. 4656

    Comparative Analysis of Nextcloud and Owncloud Performance as Infrastructure as a Service (IaaS) Based Cloud Storage by Prita Haryani, Renna Yanwastika Ariyana, Iqbal Abdul Majid, Fx. Guntur Putra Susanto

    Published 2024-12-01
    “…Utilizing cloud storage has emerged as a solution to these issues, enabling data to be easily accessed from anywhere via an internet connection. Numerous cloud storage applications now feature advanced functionalities; however, each cloud storage company varies regarding access speed, storage capacity, security, and costs. …”
    Get full text
    Article
  17. 4657

    BioUniWA – WEB SERVICES GENERATION SYSTEM AND PIPELINES FOR UNIFIED ACCESS TO RESOURCES IN THE FIELD OF BIOINFORMATICS by E. G. Komyshev, M. A. Genaev, K. V. Gunbin, D. A. Afonnikov

    Published 2015-01-01
    “…We have designed a tool that greatly simplifies the annotation of computing modules and schemes of pipelines, as well as their publication via Internet.BioUniWA is distributed under a free GNU general public license. …”
    Get full text
    Article
  18. 4658

    A New Multiple-Distribution GAN Model to Solve Complexity in End-to-End Chromosome Karyotyping by Yirui Wu, Xiao Tan, Tong Lu

    Published 2020-01-01
    “…With significant development of Internet of medical things (IoMT) and cloud-fog-edge computing, medical industry is now involving medical big data to improve quality of service in patient care. …”
    Get full text
    Article
  19. 4659

    Balancing Long Lifetime and Satisfying Fairness in WBAN Using a Constrained Markov Decision Process by Yingqi Yin, Fengye Hu, Ling Cen, Yu Du, Lu Wang

    Published 2015-01-01
    “…As an important part of the Internet of Things (IOT) and the special case of device-to-device (D2D) communication, wireless body area network (WBAN) gradually becomes the focus of attention. …”
    Get full text
    Article
  20. 4660

    Postgraduate Professional Education in China: The State and Development Trends by S. S. Donetskaya, Bing Wang

    Published 2021-11-01
    “…The Chinese Government plays a primary role in establishing a competitive national system of postgraduate education.Based on data from the Ministry of Education of China, official statistics, publications that are publicly available on the Chinese Internet, and scientific articles published in leading world publications, the article shows how the number of universities training undergraduates and doctoral students, the number and structure of students in various specialties have changed over the past decade. …”
    Get full text
    Article