Showing 4,801 - 4,820 results of 5,694 for search '"internet"', query time: 0.07s Refine Results
  1. 4801

    Information space as a factor of optimization of the future specialists’ self-education by Elena A. Mingazheva

    Published 2021-12-01
    “…We consider this form as a complex functional system with its own logic of development and relatively independent stages of learning via the Internet. Changes in various fields of activity are observed daily, which increases the requirements for the quality of education of a competitive individual; the idea of online education using electronic information platforms that serve as a means of self-education of students at the university is analyzed. …”
    Get full text
    Article
  2. 4802

    Tantangan Sekolah di Indonesia dalam Membangun Kultur Sekolah di Era Digital: Kajian Literatur Sistematis by La Musa, Siti Irene Astuti Dwiningrum, Juniar Sinaga

    Published 2025-02-01
    “… Era digital merupakan era di mana perkembangan tekonologi begitu pesat, tekonologi digital mudah diakses kapan saja dan menjadi bagian yang tak terpisahkan dari kehidupan manusia. Internet dan teknologi digital sangat penting dalam kehidupan sehari-hari, karena keberadaannya mempengaruhi banyak aspek termasuk pada bidang pendidikan. …”
    Get full text
    Article
  3. 4803

    Hybridized triboelectric nanogenerators for simultaneously scavenging droplet and wind energies by Chaosheng Hu, Chengmin Bao, Yang Liu, Yingzhan Yan, Yingzhan Yan, Yanan Bai, Qian Xu, Qian Xu

    Published 2025-01-01
    “…This work enables the harvesting of dispersed wind and droplet energy from the environment, providing new ideas and possibilities for online monitoring in remote areas and the construction of Internet of Things systems.…”
    Get full text
    Article
  4. 4804

    Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU

    Published 2022-06-01
    “…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
    Get full text
    Article
  5. 4805

    Social media network public opinion emotion classification method based on multi-feature fusion and multi-scale hybrid neural network by Yuan Yao, Xi Chen, Peng Zhang

    Published 2025-01-01
    “…With the rapid development of the internet, an increasing number of users express their subjective opinions on social media platforms. …”
    Get full text
    Article
  6. 4806

    Contribuições das novas tecnologias no processo de autoformação docente: uma revisão bibliográfica by Hannah Vitória de Souza Santos, Danielle Juliana Silva Martins

    Published 2024-12-01
    “…A análise dos artigos e dissertação selecionada apontam que o computador, a internet, dispositivos móveis, os ambientes virtuais, as mídias e redes sociais quando mediadas e utilizadas como espaços de buscas pelos docentes, são meios para a autoformação docente. …”
    Get full text
    Article
  7. 4807

    IoT intrusion detection method for unbalanced samples by ANTONG P, Wen CHEN, Lifa WU

    Published 2023-02-01
    “…In recent years, network traffic increases exponentially with the iteration of devices, while more and more attacks are launched against various applications.It is significant to identify and classify attacks at the traffic level.At the same time, with the explosion of Internet of Things (IoT) devices in recent years, attacks on IoT devices are also increasing, causing more and more damages.IoT intrusion detection is able to distinguish attack traffic from such a large volume of traffic, secure IoT devices at the traffic level, and stop the attack activity.In view of low detection accuracy of various attacks and sample imbalance at present, a random forest based intrusion detection method (Resample-RF) was proposed, which consisted of three specific methods: optimal sample selection algorithm, feature merging algorithm based on information entropy, and multi-classification greedy transformation algorithm.Aiming at the problem of unbalanced samples in the IoT environment, an optimal sample selection algorithm was proposed to increase the weight of small samples.Aiming at the low efficiency problem of random forest feature splitting, a feature merging method based on information entropy was proposed to improve the running efficiency.Aiming at the low accuracy problem of random forest multi-classification, a multi-classification greedy transformation method was proposed to further improve the accuracy.The method was evaluated on two public datasets.F1 reaches 0.99 on IoT-23 dataset and 1.0 on Kaggle dataset, both of which have good performance.The experimental results show that the proposed model can effectively identify the attack traffic from the massive traffic, better prevent the attack of hackers on the application, protect the IoT devices, and thus protect the related users.…”
    Get full text
    Article
  8. 4808

    Digital Transformation in Villages: A Policy Implementation Approach in Kajowair Village, Nusa Tenggara Timur by Beatrix Brightany Hieng, Ni Putu Anik Prabawati

    Published 2024-12-01
    “…Limited program socialization and reliance on orbit-based internet coverage impede broader community engagement and optimal service delivery. …”
    Get full text
    Article
  9. 4809

    Facebook addiction among medical students: prevalence and consequences by Eman Fouad Mohamed, Amany Elshabrawy Mohamed, Amira Mohamed Youssef, Mohammad Gamal Sehlo, Eman Seif Alnasr Soliman, Abdallah Saad Ibrahim

    Published 2025-01-01
    “…Facebook addiction had a substantial association with uncontrollable Internet use, affection of study hours, and decrease in academic scores. …”
    Get full text
    Article
  10. 4810

    Design and Discussion on Information Management and Control System of Agricultural Machinery and Equipment by Ling Ma

    Published 2022-01-01
    “…This paper introduces the technologies required to realize the agricultural machinery operation management control system: Android development technology required to develop mobile phone positioning software, Internet map API for displaying location data, and construction of agricultural machinery resource allocation model for the realization of the scheduling module. …”
    Get full text
    Article
  11. 4811

    Autonomous, Multisensory Soil Monitoring System by Valentina-Daniela Băjenaru, Simona-Elena Istrițeanu, Paul-Nicolae Ancuța

    Published 2025-01-01
    “…The primary objective is to develop an innovative soil monitoring system utilizing Internet of Things (IoT) technology. This system, equipped with intelligent sensors, will operate autonomously, collecting real-time data to identify key trends in soil conditions. …”
    Get full text
    Article
  12. 4812

    “Tele-everything” world and hybrid office model – new global trends after the COVID-19 pandemic by E. V. Vasilieva

    Published 2021-10-01
    “…The majority of work and household activities have been transferred to the Internet, and this has naturally led to the emergence of a new trend – “TV-everything” world.The rapid shift to a remote format and accelerated automation of processes have also changed attitudes to the previous management rules. …”
    Get full text
    Article
  13. 4813

    Boruta-grid-search least square support vector machine for NO2 pollution prediction using big data analytics and IoT emission sensors by Habeeb Balogun, Hafiz Alaka, Christian Nnaemeka Egwim

    Published 2025-01-01
    “…The purpose of this paper is to pre-process a relatively large data of NO2 from Internet of Thing (IoT) sensors with time-corresponding weather and traffic data and to use the data to develop NO2 prediction models using BA-GS-LSSVM and popular standalone algorithms to allow for a fair comparison. …”
    Get full text
    Article
  14. 4814

    Verifiable computation scheme of batch matrix multiplication based on triple perturbation and linear combination by ZHANG Tianpeng, REN Zhiyu, DU Xuehui, WANG Haichao

    Published 2024-04-01
    “…With the development of cloud computing and internet of things technology, verifiable computing has been widely used as a new computing technology. …”
    Get full text
    Article
  15. 4815

    Facial features of cartoon characters and their perceived attributes by Asma Ashari, Lee Win Jo, Joshua Peh, Graham Oliver

    Published 2025-01-01
    “…Abstract The aim of this study is to investigate the relationship between skeletal antero-posterior profile of popular family cartoon characters and their perceived personal characteristics. The Internet Movie DataBase (IMDB) was used to identify popular animated family movies released since 2000. …”
    Get full text
    Article
  16. 4816

    Credit Risk Assessment of Small and Medium-Sized Enterprises under the Financial Model of Online Supply Chain by Shengli Chen, Dong Wang, Zheng Wan

    Published 2022-01-01
    “…The rapid development of Internet technology meant that online supply chain finance has become an important source of small- and medium-sized enterprise (SME) finance. …”
    Get full text
    Article
  17. 4817

    Demarcation of the public and private in the interaction of the state and citizens on digital network platforms by V. V. Zotov

    Published 2021-10-01
    “…The empirical base was made up of a sociological study conducted to obtain information about the boundaries of privacy and publicity of personal data in the digital network space (n = 1 000 among the population over 18 years old living in metropolitan megacities and median regions by the level of informatization, 2020) and the results of Kaspersky Lab surveys conducted in 2019–2020.The conducted research allows us to assert that almost 2/3 of citizens have faced the misuse of confidential information on the Internet. Most of the respondents are aware that websites, social networks and search engines can collect data for web analytics. …”
    Get full text
    Article
  18. 4818

    Some aspects of foreign practice in counteracting premeditated murders by criminal police units by Ye. S. Khyzhniak

    Published 2021-12-01
    “…The main ways to promote the participation of citizens in the provision of voluntary free police assistance in combating criminal offenses can be: a) the creation of appropriate social advertising, which must be distributed on the Internet; b) popularization of the volunteer movement and voluntary groups of student youth in higher education institutions; c) organization of media projects to cover information on the number of volunteer units in Ukraine and individual cities, the results of their activities, achievements and future plans, speeches by the Minister of Internal Affairs, National Police Chief and other leaders on the specifics of police cooperation with citizens and benefits law enforcement agencies with the public and more.…”
    Get full text
    Article
  19. 4819

    Explainable correlation-based anomaly detection for Industrial Control Systems by Ermiyas Birihanu, Imre Lendák

    Published 2025-02-01
    “…The method is evaluated on the Secure Water Treatment (SWaT), Hardware-in-the-loop-based augmented ICS security (HIL-HAI), and Internet of Things Modbus dataset using precision, recall, and F-1 score metrics. …”
    Get full text
    Article
  20. 4820

    An IoT-Based Home Energy Management System over Dynamic Home Area Networks by Jongbae Kim, Jinsung Byun, Daebeom Jeong, Myeong-in Choi, Byeongkwan Kang, Sehyun Park

    Published 2015-10-01
    “…Therefore, this paper proposes an Internet of Things- (IoT-) based HEMS with lightweight photovoltaic (PV) system over dynamic home area networks (DHANs), which enables the construction of a HEMS to be more scalable, reusable, and interoperable. …”
    Get full text
    Article