Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
4801
Information space as a factor of optimization of the future specialists’ self-education
Published 2021-12-01“…We consider this form as a complex functional system with its own logic of development and relatively independent stages of learning via the Internet. Changes in various fields of activity are observed daily, which increases the requirements for the quality of education of a competitive individual; the idea of online education using electronic information platforms that serve as a means of self-education of students at the university is analyzed. …”
Get full text
Article -
4802
Tantangan Sekolah di Indonesia dalam Membangun Kultur Sekolah di Era Digital: Kajian Literatur Sistematis
Published 2025-02-01“… Era digital merupakan era di mana perkembangan tekonologi begitu pesat, tekonologi digital mudah diakses kapan saja dan menjadi bagian yang tak terpisahkan dari kehidupan manusia. Internet dan teknologi digital sangat penting dalam kehidupan sehari-hari, karena keberadaannya mempengaruhi banyak aspek termasuk pada bidang pendidikan. …”
Get full text
Article -
4803
Hybridized triboelectric nanogenerators for simultaneously scavenging droplet and wind energies
Published 2025-01-01“…This work enables the harvesting of dispersed wind and droplet energy from the environment, providing new ideas and possibilities for online monitoring in remote areas and the construction of Internet of Things systems.…”
Get full text
Article -
4804
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
4805
Social media network public opinion emotion classification method based on multi-feature fusion and multi-scale hybrid neural network
Published 2025-01-01“…With the rapid development of the internet, an increasing number of users express their subjective opinions on social media platforms. …”
Get full text
Article -
4806
Contribuições das novas tecnologias no processo de autoformação docente: uma revisão bibliográfica
Published 2024-12-01“…A análise dos artigos e dissertação selecionada apontam que o computador, a internet, dispositivos móveis, os ambientes virtuais, as mídias e redes sociais quando mediadas e utilizadas como espaços de buscas pelos docentes, são meios para a autoformação docente. …”
Get full text
Article -
4807
IoT intrusion detection method for unbalanced samples
Published 2023-02-01“…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
Get full text
Article -
4808
Digital Transformation in Villages: A Policy Implementation Approach in Kajowair Village, Nusa Tenggara Timur
Published 2024-12-01“…Limited program socialization and reliance on orbit-based internet coverage impede broader community engagement and optimal service delivery. …”
Get full text
Article -
4809
Facebook addiction among medical students: prevalence and consequences
Published 2025-01-01“…Facebook addiction had a substantial association with uncontrollable Internet use, affection of study hours, and decrease in academic scores. …”
Get full text
Article -
4810
Design and Discussion on Information Management and Control System of Agricultural Machinery and Equipment
Published 2022-01-01“…This paper introduces the technologies required to realize the agricultural machinery operation management control system: Android development technology required to develop mobile phone positioning software, Internet map API for displaying location data, and construction of agricultural machinery resource allocation model for the realization of the scheduling module. …”
Get full text
Article -
4811
Autonomous, Multisensory Soil Monitoring System
Published 2025-01-01“…The primary objective is to develop an innovative soil monitoring system utilizing Internet of Things (IoT) technology. This system, equipped with intelligent sensors, will operate autonomously, collecting real-time data to identify key trends in soil conditions. …”
Get full text
Article -
4812
“Tele-everything” world and hybrid office model – new global trends after the COVID-19 pandemic
Published 2021-10-01“…The majority of work and household activities have been transferred to the Internet, and this has naturally led to the emergence of a new trend – “TV-everything” world.The rapid shift to a remote format and accelerated automation of processes have also changed attitudes to the previous management rules. …”
Get full text
Article -
4813
Boruta-grid-search least square support vector machine for NO2 pollution prediction using big data analytics and IoT emission sensors
Published 2025-01-01“…The purpose of this paper is to pre-process a relatively large data of NO2 from Internet of Thing (IoT) sensors with time-corresponding weather and traffic data and to use the data to develop NO2 prediction models using BA-GS-LSSVM and popular standalone algorithms to allow for a fair comparison. …”
Get full text
Article -
4814
Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination
Published 2024-04-01“…With the development of cloud computing and internet of things technology, verifiable computing has been widely used as a new computing technology. …”
Get full text
Article -
4815
Facial features of cartoon characters and their perceived attributes
Published 2025-01-01“…Abstract The aim of this study is to investigate the relationship between skeletal antero-posterior profile of popular family cartoon characters and their perceived personal characteristics. The Internet Movie DataBase (IMDB) was used to identify popular animated family movies released since 2000. …”
Get full text
Article -
4816
Credit Risk Assessment of Small and Medium-Sized Enterprises under the Financial Model of Online Supply Chain
Published 2022-01-01“…The rapid development of Internet technology meant that online supply chain finance has become an important source of small- and medium-sized enterprise (SME) finance. …”
Get full text
Article -
4817
Demarcation of the public and private in the interaction of the state and citizens on digital network platforms
Published 2021-10-01“…The empirical base was made up of a sociological study conducted to obtain information about the boundaries of privacy and publicity of personal data in the digital network space (n = 1 000 among the population over 18 years old living in metropolitan megacities and median regions by the level of informatization, 2020) and the results of Kaspersky Lab surveys conducted in 2019–2020.The conducted research allows us to assert that almost 2/3 of citizens have faced the misuse of confidential information on the Internet. Most of the respondents are aware that websites, social networks and search engines can collect data for web analytics. …”
Get full text
Article -
4818
Some aspects of foreign practice in counteracting premeditated murders by criminal police units
Published 2021-12-01“…The main ways to promote the participation of citizens in the provision of voluntary free police assistance in combating criminal offenses can be: a) the creation of appropriate social advertising, which must be distributed on the Internet; b) popularization of the volunteer movement and voluntary groups of student youth in higher education institutions; c) organization of media projects to cover information on the number of volunteer units in Ukraine and individual cities, the results of their activities, achievements and future plans, speeches by the Minister of Internal Affairs, National Police Chief and other leaders on the specifics of police cooperation with citizens and benefits law enforcement agencies with the public and more.…”
Get full text
Article -
4819
Explainable correlation-based anomaly detection for Industrial Control Systems
Published 2025-02-01“…The method is evaluated on the Secure Water Treatment (SWaT), Hardware-in-the-loop-based augmented ICS security (HIL-HAI), and Internet of Things Modbus dataset using precision, recall, and F-1 score metrics. …”
Get full text
Article -
4820
An IoT-Based Home Energy Management System over Dynamic Home Area Networks
Published 2015-10-01“…Therefore, this paper proposes an Internet of Things- (IoT-) based HEMS with lightweight photovoltaic (PV) system over dynamic home area networks (DHANs), which enables the construction of a HEMS to be more scalable, reusable, and interoperable. …”
Get full text
Article