Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
5121
Digital Twin-Empowered Robotic Arm Control: An Integrated PPO and Fuzzy PID Approach
Published 2025-01-01“…With rapid advancements in digital twin technology within the Industrial Internet of Things, integrating digital twins with industrial robotic arms presents a promising direction. …”
Get full text
Article -
5122
The implementation of a system of CardioQVARK to personalize treatment in terms of the digital ecosystem healthcare formation
Published 2019-02-01“…Testing and expert assessment practitioners showed that portable CardioQVARK system has a great potential in registration records electrocardiograms using a portable CardioQVARK monitor with data transmission on the Internet of a mobile operator through cloud service in annex CardioQvark Doctor. …”
Get full text
Article -
5123
Follow me y dame like: Hábitos de uso de Instagram de los futuros maestros
Published 2019-01-01“…Finalmente, algunos de los hábitos de uso de los futuros maestros se vinculan a prácticas de riesgo y a un uso abusivo de Internet. Conocer los hábitos de uso de esta población es esencial para reeducar sus comportamientos y que se conviertan en ejemplos de buen uso de la tecnología.…”
Get full text
Article -
5124
Modeling the gameplay actions of elite volleyball players and teams based on statistical match reports
Published 2023-12-01“…The data was extracted from open internet sources and converted into tables in CSV format. …”
Get full text
Article -
5125
An Overview and State of The Art in Reconfigurable Antennas with Their Applications
Published 2024-01-01“…This adaptability is essential in addressing the increasing demands of next-generation communication systems, including 5G/6G networks, cognitive radios, and the Internet of Things (IoT). By integrating technologies like PIN diodes, MEMS, and tunable materials, reconfigurable antennas can adjust to varying environmental and operational conditions, providing enhanced performance in terms of bandwidth, efficiency, and interference mitigation. …”
Get full text
Article -
5126
Software-Defined Radio-Based IEEE 802.15.4 SUN FSK Evaluation Platform for Highly Mobile Environments
Published 2024-01-01“…IEEE 802.15.4 smart utility network (SUN) frequency-shift keying (FSK) has attracted considerable attention as a wireless communication standard designed for use in essential applications required by Internet of Things (IoT) systems. However, longer transmission distances in highly mobile environments are required to support various applications in next-generation IoT systems, such as vehicle-to-everything, automated driving, and drone control systems. …”
Get full text
Article -
5127
Designing Development Readiness Indicators and Roadmap for Petaflops Scale Supercomputers
Published 2022-07-01“…Recently, supercomputers and high-performance computing (HPC) have caused significant progress in many fields, including industrial and research fields of artificial intelligence, data science, big data, Internet of Things, as well as large scale web applications. …”
Get full text
Article -
5128
FREEDOM OF THE INFORMATION SPACE. IS IT A REALITY OR ILLUSION?
Published 2015-05-01“…It requires a structured analytical thinking. 3) The open architecture of the Internet space allows creating new areas and communities. …”
Get full text
Article -
5129
Fast handover authentication scheme in 5G mobile edge computing scenarios
Published 2022-06-01“…The 5G internet of things brings the ultimate experience to users, but it also puts forward new challenges.Users’ requirements of ultra-low latency experience, access to business without sense during movement and security guarantee have attracted much attention.Mobile edge computing can meet the strict requirements of 5G with low latency, large connection and high bandwidth.As a computing paradigm with the coexistence of multi-trust domains, multi-entities and cross-trust domains are interconnected frequently.Identity authentication is particularly important for security protection.Through the research on the identity authentication mechanism under the existing edge computing paradigm, a lightweight fast handover authentication scheme based on pre-authentication was proposed.The proposed solution moved services and calculations from the cloud to the edge.Biometric fingerprint technology was used on the client side to defend against terminal theft attacks.Edge servers in different regions used pre-authentication scheme to meet fast switching requirements.The user and the edge server established a secure channel by negotiating a shared session key in real time, and the authentication scheme ensured lightweight operation with XOR and hash operation.The proposed scheme was evaluated from two aspects of security and performance.Theoretical design analysis and formal tool verification were carried out for security evaluation.The formal analysis tool, AVISPA, was used to verify the improved security of the proposed scheme in the presence of intruders.The performance was mainly evaluated from the computing cost and communication cost of the authentication scheme.The simulation results showed that the proposed scheme reduces communication cost, and the computational overhead can meet the needs of mobile terminals with limited resources.As the future work, the scheme will be improved from two aspects: one is to strengthen the scalability to ensure that users and edge servers can join and exit at any time, and the other one is to strengthen the universality of the scheme to meet the access deployment of third-party service providers.…”
Get full text
Article -
5130
The Relationship between Sleep Quality and Smartphone Addiction among Adolescents
Published 2024-08-01“…Statistically signifiant diffrences were observed among adolescents concerning gender, grade, daily smartphone usage duration, internet accessibility, and the use of smartphones before bedtime, impacting both sleep quality and smartphone addiction (p lt; 0.05). …”
Get full text
Article -
5131
Assessing the Roles of Molecular Markers of Antimalarial Drug Resistance and the Host Pharmacogenetics in Drug-Resistant Malaria
Published 2022-01-01“…In this direction, literature was systematically reviewed to establish the role and importance of each of the two factors aforementioned in the etiology of drug-resistant malaria. Using Internet search engines such as Pubmed and Google, we looked for terms likely to give the desired information which we herein present. …”
Get full text
Article -
5132
Enhancing Cybersecurity and Privacy Protection for Cloud Computing-Assisted Vehicular Network of Autonomous Electric Vehicles: Applications of Machine Learning
Published 2024-12-01“…The combination of vehicles, the Internet, and cloud computing together to form vehicular cloud computing (VCC), vehicular edge computing (VEC), and vehicular fog computing (VFC) can facilitate the development of electric autonomous vehicles. …”
Get full text
Article -
5133
Network-Based Bag-of-Words Model for Text Classification
Published 2020-01-01“…The rapidly developing internet and other media have produced a tremendous amount of text data, making it a challenging and valuable task to find a more effective way to analyze text data by machine. …”
Get full text
Article -
5134
Complexity to Forecast Flood: Problem Definition and Spatiotemporal Attention LSTM Solution
Published 2020-01-01“…With significant development of sensors and Internet of things, researchers nowadays can easily know what happens in physical space by acquiring time-varying values of various factors. …”
Get full text
Article -
5135
Factors Affecting The Frequency and Amount of Purchase Value in Online Food Delivery Apps
Published 2024-09-01“…Indonesia itself has become one of the countries with the highest number of internet users utilizing online food delivery applications in the world. …”
Get full text
Article -
5136
Precise Crop Pest Detection Based on Co-Ordinate-Attention-Based Feature Pyramid Module
Published 2025-01-01Get full text
Article -
5137
Professional Development of University Educators in Artificial Intelligence: Current State
Published 2024-12-01“…The group of theoretical ones includes the analysis of scientific literature and Internet sources, study and generalization of advanced pedagogical experience, comparative analysis, content analysis, systematization. …”
Get full text
Article -
5138
Comparing green customer citizenship attitudes and behaviours in South Africa and South Korea
Published 2025-01-01“…Research design, approach and method: Independent samples of 513 consumers in South Africa and 292 consumers in South Korea responded to an invitation-only, Internet-based questionnaire that focussed on attitudinal and behavioural issues of green purchasing and green consumption. …”
Get full text
Article -
5139
A aplicação do e-marketing nas redes hoteleiras do Brasil
Published 2014-07-01“…O surgimento da Internet na década de 1960 e, sobretudo, sua popularização na década de 1990 proporcionou diferentes desenvolvimentos e aperfeiçoamentos na tecnologia da informação e comunicação (TIC) em âmbito global e revolucionou o comportamento dos indivíduos e das organizações quanto às formas tradicionais de compra e venda. …”
Get full text
Article -
5140
International Experience of Legal Regulation of Liability for Insult of Police Officers and Possibilities of Its Use in Ukraine
Published 2021-03-01“…Otherwise, the case will be considered in the usual way; the corpus delicti of such a crime may be recognized as qualified if such slander or insult is disseminated through the media or through the Internet. The current state of legal regulation of legal liability for insult and defamation of police officers in the Republic of Belarus, Kazakhstan, Poland, Germany, France and Spain is analyzed. …”
Get full text
Article