Showing 5,261 - 5,280 results of 5,694 for search '"internet"', query time: 0.08s Refine Results
  1. 5261

    LA REVISTA INTERUNIVERSITARIA DE FORMACIÓN DEL PROFESORADO (RIFOP). INDICADORES DE CALIDAD, RESULTADOS Y LÍNEA EDITORIAL. QUINCE AÑOS DE HISTORIA by José Emilio Palomero Pescador

    Published 2002-01-01
    “…También gracias a las numerosas búsquedas bibliográficas realizadas y a las posibilidades que hoy día ofrece la navegación a través de internet. En él se hace un análisis descriptivo de la RIFOP, así como numerosas valoraciones sobre su pasado, presente y futuro. …”
    Get full text
    Article
  2. 5262

    Feasibility of NepaDengue mobile application for dengue prevention and control: user and stakeholder perspectives in Nepal by Eggi Arguni, Anita Mahotra, Yuvraj Pokhrel, Tulsi Ram Thapa, Riris Ahmad Andono

    Published 2024-04-01
    “…However, specific barriers were identified, including concerns about sustained usability, illiteracy and limited access to the internet and smartphones. We suggested promoting the application, fostering government ownership and encouraging collaboration to enhance its reach and effective implementation.Conclusions The NepaDengue application has been perceived as a promising tool for dengue prevention and control in Nepal. …”
    Get full text
    Article
  3. 5263

    Community-engaged artificial intelligence research: A scoping review. by Tyler J Loftus, Jeremy A Balch, Kenneth L Abbott, Die Hu, Matthew M Ruppert, Benjamin Shickel, Tezcan Ozrazgat-Baslanti, Philip A Efron, Patrick J Tighe, William R Hogan, Parisa Rashidi, Michelle I Cardel, Gilbert R Upchurch, Azra Bihorac

    Published 2024-08-01
    “…All articles derived data from community settings, most commonly by leveraging existing datasets and sources that included community subjects, and often bolstered by internet-based data acquisition and subject recruitment. …”
    Get full text
    Article
  4. 5264

    Sports in Udmurt State Agrarian University (using the example of participation in various competitions from 1954 to 2024) by Rubtsova, Lyubov V., Zhuikov, Roman A., Vorotova, Maria S.

    Published 2024-12-01
    “…The research methods used: analysis of archival materials of the department and the University of UdGAU, historical essays by N. A. Solovyov and Internet sources. A literary reviewand other sources provided information about the team and personal performances of UdGAU athletes from 1954 to 2024. …”
    Get full text
    Article
  5. 5265

    The social media diet: A scoping review to investigate the association between social media, body image and eating disorders amongst young people. by Alexandra Dane, Komal Bhatia

    Published 2023-01-01
    “…Results on exposures (social media usage), outcomes (body image, eating disorders, disordered eating), mediators and moderators were synthesised using an integrated theoretical framework of the influence of internet use on body image concerns and eating pathology.…”
    Get full text
    Article
  6. 5266

    Desafios e dificuldades revelados na implementação de um ciclo de Lesson Study no contexto brasileiro by Mikaelle Barboza Cardoso, Marcilia Chagas Barreto

    Published 2023-09-01
    “…Entre os principais desafios e dificuldades, destacam-se: localização de uma escola-campo disponível para a realização da pesquisa com as características da LS; adequação do planejamento à efetiva disponibilidade de tempo dos professores que possuem altas demandas em diversas atividades na escola; infraestrutura deficiente das escolas; salas de aulas lotadas; conexão com a internet insuficiente. Palavras-chave: Lesson Study; Estudos de aulas; Dificuldades; Desafios. …”
    Get full text
    Article
  7. 5267

    Applications of unmanned vehicle systems for multi-spatial scale monitoring and management of aquatic ecosystems: A review by Xingzhen Liu, Long Ho, Stijn Bruneel, Peter Goethals

    Published 2025-03-01
    “…The systematic analysis highlights the gap in UVS applications for multi-spatial scale monitoring and reveals significant opportunities for integrating UVS with Artificial Intelligence (AI), machine learning, and Internet of Things (IoT) technologies, which are improving UVS integration, security, and efficiency, and enabling better resource management and navigation accuracy. …”
    Get full text
    Article
  8. 5268

    Prevalence and determinants of pregnancy termination for childbearing women using the modified Poisson regression model: a cross-sectional study of the Tanzania Demographic and Hea... by Sizwe Vincent Mbona, Retius Chifurira, Bonginkosi Duncan Ndlovu, Anisha Ananth

    Published 2025-01-01
    “…In particular, women’s age, level of education, marital status, history of pregnancy losses, wealth status, attempt to delay or avoid getting pregnant outside the ideal birth spacing, and recent internet use, total children ever born, desire for more children, were significantly associated with pregnancy termination. …”
    Get full text
    Article
  9. 5269

    CDR-Detector: a chronic disease risk prediction model combining pre-training with deep reinforcement learning by Shaofu Lin, Shiwei Zhou, Han Jiao, Mengzhen Wang, Haokang Yan, Peng Dou, Jianhui Chen

    Published 2024-12-01
    “…Abstract Chronic disease risk prediction based on electronic health record (EHR) is an important research direction of Internet healthcare. Current studies mainly focused on developing well-designed deep learning models to predict the disease risk based on large-scale and high-quality longitudinal EHR data. …”
    Get full text
    Article
  10. 5270

    Improving the special motor qualities of experienced female volleyball players living on the territory of martial law by Sergii Iermakov, Roman Boichuk, Yevheniia Strelnykova, Krzysztof Wnorowski, Sofia Zakharova

    Published 2022-12-01
    “….); availability of electricity and means of communication (mobile, Internet); availability of means of life support (drinking water, food). …”
    Get full text
    Article
  11. 5271

    Küresel Tehditler Karşısında Bireyi ve Toplumu Korumada Ailenin Rolüne Psiko-Sosyal Bir Bakış by Ali Akdoğan, Tuba Akdoğan

    Published 2024-06-01
    “…Sonuç olarak bireyi ve toplumu tehdit eden faktörlerin öncelikle internet, telefon, tablet, televizyon gibi teknolojik aletler, cinsiyetsizleştirme, LGBT propagandaları ve akran zorbalığı olduğu görülmüştür. …”
    Get full text
    Article
  12. 5272

    Research on network risk assessment based on attack graph of expected benefits-rate by Wenfu LIU, Jianmin PANG, Xin ZHOU, Nan LI, Feng YUE

    Published 2022-08-01
    “…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
    Get full text
    Article
  13. 5273

    Küreselleşmenin Yoksulluk Üzerine Etkisi: Türkiye Örneği by Başak Karşıyakalı, Gökhan Ersoy

    Published 2022-04-01
    “…Taşımacılığın gelişmesi, iletişim, elektronik, internet, ulaşım gibi bilgi ve iletişim teknolojilerinin yaygınlaşması, bilgiye erişimin kolay hale gelmesi ve bu hizmetlerin ucuzlaması, hizmet sektörünün dünya genelinde öne çıkarak ekonomik hasılanın önemli bir bileşeni haline gelmesine neden olmuştur. …”
    Get full text
    Article
  14. 5274

    Implementation of the Project “Community Police Officer”: Real Actions to Bring Police Service Closer to People (on the example of Kharkiv oblast) by M. V. Holub

    Published 2020-12-01
    “…The author has suggested appropriate measures for more effective promotion of this project, in particular: to initiate for the Department of the National Police of Ukraine to take measures aimed at creating a legal base that can ensure the effective operation of community police officers according to the legal point of view, as well as their interaction with other law enforcement agencies, introducing relevant amendments into existing regulatory documents; to prepare propositions in regard to these provisions; to develop routes and time of foot patrol by community police officers of the assigned territory, taking into account the analysis of street offenses, the location of places visited by a significant number of residents of the united territorial communities and other features of a particular united community; to make propositions for the creation of a “basic” united territorial communities in Kharkiv oblast, in terms of community police officers’ activities, to initiate and provide assistance to the Department of Preventive Activities of the Main Directorate of the National Police in Kharkiv oblast in organizing and conducting practical classes with this category of employees with visiting the specified united territorial communities; to introduce training of community police officers on the basis of Kharkiv National University of Internal Affairs, to prepare appropriate educational and methodical material; to improve the work of community police officers to ensure effective exchange of information, opportunities to quickly make decisions in case of complications, create an Internet group in the application “Telegram”, which should include police officers working within the pilot project “Community Police Officer”.…”
    Get full text
    Article
  15. 5275

    Designing a Parent Training Model to Prevent Cyber Space Risks in Students by Seyed Majid Karimi, Seyed Mohammadbagher Jafari, Gholamreza Sharifi Rad, Ali Akbar Khoshgoftar Moghadam

    Published 2024-01-01
    “…Objective: A principal challenge associated with technological advancement pertains to the cultural and societal detriments that ensue as a consequence. The advent of the Internet and social networking platforms, coupled with an increase in individual liberties, has enabled swift access to a plethora of diverse and frequently unethical content available online. …”
    Get full text
    Article
  16. 5276

    Desigualdades (online) como obstáculo à democracia digital: o caso do portal e-Cidadania by Christiana Soares de Freitas, Letícia Pereira de Alcântara, Samuel Barros

    Published 2022-11-01
    “…O acúmulo desse capital, em específico, é observado nas sociedades contemporâneas e exige do indivíduo a obtenção de aparatos materiais - como acesso a artefatos tecnológicos, conexão à internet - e de elementos imateriais, como elementos sociotécnicos e educacionais que permitam ao indivíduo a aquisição de habilidades digitais indispensáveis na contemporaneidade. …”
    Get full text
    Article
  17. 5277

    Percepción y Aceptación del B-Learning en Matemáticas para Ingeniería por Estudiantes: Un Enfoque Basado en TAM by Elia Trejo, Natalia Trejo Trejo

    Published 2024-06-01
    “…La facilidad de condiciones, incluyendo el acceso a internet y el apoyo docente, influyó positivamente en la percepción de utilidad y facilidad de uso del b-learning. …”
    Get full text
    Article
  18. 5278

    Payload State Prediction Based on Real-Time IoT Network Traffic Using Hierarchical Clustering with Iterative Optimization by Hao Zhang, Jing Wang, Xuanyuan Wang, Kai Lu, Hao Zhang, Tong Xu, Yan Zhou

    Published 2024-12-01
    “…IoT (Internet of Things) networks are vulnerable to network viruses and botnets, while facing serious network security issues. …”
    Get full text
    Article
  19. 5279

    Evaluation of Machine Learning Algorithms for NB-IoT Module Energy Consumption Estimation Based on Radio Channel Quality by Dusan Bortnik, Vladimir Nikic, Srdjan Sobot, Dejan Vukobratovic, Ivan Mezei, Milan Lukic

    Published 2025-01-01
    “…In this study, we propose a method to estimate energy consumption in battery-powered Narrowband Internet of Things (NB-IoT) devices using the statistical data available from the NB-IoT modem, thereby circumventing the need for additional circuitry to measure battery voltage or current consumption. …”
    Get full text
    Article
  20. 5280

    Smart Home Security: An Efficient Multi-Factor Authentication Protocol by Ghazaleh Sarbishaei, Amir Masoud Aminian Modarres, Farahnaz Jowshan, Fateme Zahra Khakzad, Hasti Mokhtari

    Published 2024-01-01
    “…In this article, we considered a typical architecture for smart homes based on the Internet of Things (IoT) and studied various recent authentication protocols presented for this scenario. …”
    Get full text
    Article