Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
4641
The Current State and Needs of North American Movement Disorders Fellowship Programs
Published 2013-01-01“…Methods. A 31-item internet-based survey was formulated and distributed to academic movement disorders listed in the American Academy of Neurology (AAN) directory as having a movement disorders fellowship and to all National Parkinson Foundation Centers of Excellence and Care Centers in North America. …”
Get full text
Article -
4642
Self-Reported Nutrition Education Received by Australian Midwives before and after Registration
Published 2017-01-01“…Continuing education often occurred through personal initiatives, such as the midwife enrolling in external courses or exploring issues on the Internet and with colleagues. The majority of participants indicated a need for increased nutrition education (94.2%, n=310) and guidelines tailored for them to provide nutrition advice (87.8%, n=289). …”
Get full text
Article -
4643
Community counseling strategies to improve mental health literacy
Published 2023-03-01“…Data were collected using a community awareness instrument for mental health services, implemented through an internet-based survey hosted on the Sobat Konseling account. …”
Get full text
Article -
4644
DARE: A decentralized association rules extraction scheme for embedded data sets in distributed IoT devices
Published 2020-10-01“…In the context of smart home, it is very important to identify usage patterns of Internet of things (IoT) devices. Finding these patterns and using them for decision-making can provide ease, comfort, practicality, and autonomy when executing daily activities. …”
Get full text
Article -
4645
Evaluation of Paperless Electronic Data Entry and its Comparison with Manual Entry Method for Oral Health Assessment of Adults
Published 2023-04-01“…Being offline system, it has an additional edge with no requirement of active internet to record or store the data.…”
Get full text
Article -
4646
Distributed Denial of Services (DDoS) attack detection in SDN using Optimizer-equipped CNN-MLP.
Published 2025-01-01“…Denial-of-service (DoS) attacks continuously impact users and Internet service providers (ISPs). Because of its centralized design, distributed denial of service (DDoS) attacks on SDN are frequent and may have a widespread effect on the network, particularly at the control layer. …”
Get full text
Article -
4647
MARKETING TRENDS IN THE DATA ECONOMY (2024–2025)
Published 2024-12-01“…Methodology in article methods of analysis, synthesis, study of scientific literature and Internet resources, as well as interviewing marketing specialists were used. …”
Get full text
Article -
4648
Pseudo-siamese network image tampering localization model based on reinforced samples
Published 2024-02-01“…With the continuous development of the internet, an increasing number of images have been tampered with on the network, accompanied by a growing range of techniques to cover up tampering traces.However, most current detection models neglect the impact of image post-processing on tamper detection algorithms, limiting their real-life applications.To address these issues, a general image tampering location model based on enhanced samples and the pseudo-twin network was proposed.The pseudo-twin network enabled the model to learn tampering features in real images.On one hand, by applying convolution constraints, the image content was suppressed, allowing the model to focus more on residual trace information of tampering.The two-branch structure of the network facilitated the comprehensive utilization of image feature information.By utilizing enhanced samples, the model could dynamically generate the most crucial pictures for learning tamper types, enabling targeted training of the model.This approach ensured that the model converged in all directions, ultimately obtaining the global optimal model.The idea of data enhancement was employed to automatically generate abundant tampered images and corresponding masks, effectively resolving the limited tampering dataset issue.Extensive experiments were conducted on four datasets, demonstrating the feasibility and effectiveness of the proposed model in pixel-level tamper detection.Particularly on the Columbia dataset, the algorithm achieves a 33.5% increase in F1 score and a 23.3% increase in MCC score.These results indicate that the proposed model harnesses the advantages of deep learning models and significantly improves the effectiveness of tamper location detection.…”
Get full text
Article -
4649
Development of Nursing Education in Line with Technological Developments in Health Care
Published 2024-12-01“…Some new technologies include virtual reality stimulation (VR), augmented reality (AR), Metaverse, blockchain technology, the Internet of Things (IoT), and artificial intelligence, which are used to provide opportunities to transfer information, improve learning, and reduce learning problems. …”
Get full text
Article -
4650
Digital Cognitive Behavioral Therapy for the Average Person in Developing Countries
Published 2024-12-01“…However, in developing countries, several hindrances such as lack of technology, digital illiteracy, inadequate internet connectivity, and cultural barriers deter the average person from effectively using DCBT. …”
Get full text
Article -
4651
Movie scene segmentation using object detection and set theory
Published 2019-06-01“…Movie data has a prominent role in the exponential growth of multimedia data over the Internet, and its analysis has become a hot topic with computer vision. …”
Get full text
Article -
4652
Automatic Algorithm for Fractal Plant Art Image Similarity Feature Generation
Published 2021-01-01“…With the popularity of smart devices and the Internet, the volume of multimedia data is growing rapidly, and content-based image retrieval (CBIR) can search for similar images from large-scale images to realize the utilization of the data. …”
Get full text
Article -
4653
الأرشفة الالکترونیة للأطروحات العلمیة فی مکتبات جامعات مکة المکرمة والمدینة المنورة : دراسة وصفیة تحلیلیة...
Published 2016-01-01“…The results show that the project of e-achieving began first in the libraryof Islamic university in the year 1426 (Hejri), we find that the Om Al Qurauniversity had started to Electronic Archiving project in the year 1427 (Hejri), andthe project of e-achieving of Taibah university began in the year 1431 (Hejri)where the project for both of these universities are library staff for each university.The study found the motive of the application of the e-archiving in the University.The evolution of the systems, including the mechanism in the area of Librariesand Information Sciences, the demand of the beneficiaries, and then to be madeavailable online through the Internet and providing time and effort. It was alsosuggested that a researcher to develop the electronic archiving of thesis in threeuniversities through supported an integrated plan to apply the electronic archivingof thesis.…”
Get full text
Article -
4654
Meta's Challenge with Olives and Watermelon: The Case of Blocking Posts About Gaza
Published 2024-12-01“…Recently, Israel's attack on Gaza and the massive genocide in the region have caused a great resonance on the internet and social media. The aim of this study is to examine the censorship mechanisms applied by social media platforms during Israel's attacks on Gaza. …”
Get full text
Article -
4655
The new media as monitors of democracy
Published 2022-10-01“…However, the advent of new communications technologies, such as the Internet and mobile phones, has ushered in a new era of political communication where citizens actively participate both in the election campaign and the monitoring processes. …”
Get full text
Article -
4656
Comparative Analysis of Nextcloud and Owncloud Performance as Infrastructure as a Service (IaaS) Based Cloud Storage
Published 2024-12-01“…Utilizing cloud storage has emerged as a solution to these issues, enabling data to be easily accessed from anywhere via an internet connection. Numerous cloud storage applications now feature advanced functionalities; however, each cloud storage company varies regarding access speed, storage capacity, security, and costs. …”
Get full text
Article -
4657
BioUniWA – WEB SERVICES GENERATION SYSTEM AND PIPELINES FOR UNIFIED ACCESS TO RESOURCES IN THE FIELD OF BIOINFORMATICS
Published 2015-01-01“…We have designed a tool that greatly simplifies the annotation of computing modules and schemes of pipelines, as well as their publication via Internet.BioUniWA is distributed under a free GNU general public license. …”
Get full text
Article -
4658
A New Multiple-Distribution GAN Model to Solve Complexity in End-to-End Chromosome Karyotyping
Published 2020-01-01“…With significant development of Internet of medical things (IoMT) and cloud-fog-edge computing, medical industry is now involving medical big data to improve quality of service in patient care. …”
Get full text
Article -
4659
Balancing Long Lifetime and Satisfying Fairness in WBAN Using a Constrained Markov Decision Process
Published 2015-01-01“…As an important part of the Internet of Things (IOT) and the special case of device-to-device (D2D) communication, wireless body area network (WBAN) gradually becomes the focus of attention. …”
Get full text
Article -
4660
Postgraduate Professional Education in China: The State and Development Trends
Published 2021-11-01“…The Chinese Government plays a primary role in establishing a competitive national system of postgraduate education.Based on data from the Ministry of Education of China, official statistics, publications that are publicly available on the Chinese Internet, and scientific articles published in leading world publications, the article shows how the number of universities training undergraduates and doctoral students, the number and structure of students in various specialties have changed over the past decade. …”
Get full text
Article