Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
661
Information technology application of nuclear power station commissioning under the background of internet+
Published 2017-03-01Subjects: “…internet+…”
Get full text
Article -
662
Secure communication approach for Internet of things based on C-RAN fronthaul compression
Published 2018-09-01Subjects: Get full text
Article -
663
AN APPLICATION OF UTAUT2 MODEL IN EXPLORING THE IMPACT OF QUALITY OF TECHNOLOGY ON MOBILE INTERNET
Published 2016-11-01Subjects: Get full text
Article -
664
Low Orbit Satellite Internet of Things Transmission Technology Based on LoRa
Published 2022-12-01Subjects: Get full text
Article -
665
Opportunities and Difficulties for Strategic Litigation to Advance Digital Rights in the Internet Audience Economy
Published 2024-08-01“…Internet tech giants are regulated by multiple overlapping yet distinct pieces of EU legislation that establish a range of substantive digital rights for internet users, and varying legal opportunity structures for strategic litigation within their enforcement architecture. …”
Get full text
Article -
666
Research and thinking on the application of agricultural Internet of things from the perspective of communication operators
Published 2018-12-01Subjects: “…agricultural Internet of things…”
Get full text
Article -
667
S-Vivaldi:a space repairing based Internet delay space embedding algorithm
Published 2012-03-01“…To counteract TIV’s influence on the Internet delay space models,an Internet delay space embedding algorithm based space repairing S-Vivaldi (scaling-Vivaldi) was proposed.S-Vivaldi firstly applied an exponent transformation on the delay matrix D,retrieved a matrix D'almost without TIV,and then embedded D'by the Vivaldi algorithm.The delay between any two nodes could be computed by a series of inverse transformation.Experimental results show that S-Vivaldi could improve the prediction accuracy apparently in the most case.…”
Get full text
Article -
668
Survey on cooperative fusion technologies with perception, communication and control coupled in industrial Internet
Published 2021-10-01Subjects: “…industrial Internet…”
Get full text
Article -
669
Mapping Internet Celebrity on TikTok: Exploring Attention Economies and Visibility Labours
Published 2021-01-01Subjects: Get full text
Article -
670
Recent advances on federated learning systems and the design for computing power Internet of things
Published 2024-12-01“…Computing power Internet of things (CPIoT) integrates Internet of things (IoT) devices with substantial computational resources to support data-intensive tasks, facilitating intelligent decision-making. …”
Get full text
Article -
671
Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles
Published 2021-06-01“…Identity authentication is the first line of defense for vehicles to access IoV (Internet of vehicles).However, the existing schemes cannot meet the requirements of efficient authentication of IoV well, nor can they realize fast anonymous traceability.In view of this, a bidirectional anonymous traceability group authentication protocol was proposed in IoV.In this protocol, a number of RSU (road side unit) were grouped quickly and dynamically.And the vehicles entering the RSU group were authenticated with the one-way trap gating property and semi-group property of Chebyshev chaotic map.When the vehicle switched between the RSU within a group, the reverse hash chain was used for fast handover authentication.In addition, the RSU within a group can trace anonymously and revoke the identity of malicious vehicles quickly by using blockchain, and can also freely change the ID of users who reveal their real identity.At the same time, the semantic security of the proposed protocol is proved by using the random predictor model.Finally, simulation results show the proposed scheme has good security and effectiveness.…”
Get full text
Article -
672
Controlling Embedded Systems Remotely via Internet-of-Things Based on Emotional Recognition
Published 2020-01-01Get full text
Article -
673
The Impact of the Internet of Things (IoT) on Healthcare Delivery: A Systematic Literature Review
Published 2023-09-01Subjects: Get full text
Article -
674
-
675
Internet Addiction Effect on Quality of Life: A Systematic Review and Meta-Analysis
Published 2021-01-01“…Due to the use of different methodologies, tools, and measurements, the positive or negative impact of Internet use on human life quality is accompanied by a series of ambiguities and uncertainties. …”
Get full text
Article -
676
Enhanced group communication in constrained application protocol–based Internet-of-things networks
Published 2018-04-01“…As a lot of sensors are connected to the Internet, many works have been made to support group communication for constrained application protocol. …”
Get full text
Article -
677
Internet, amigos y bacterias: la alargada sombra de Stanley Milgram
Published 2003-01-01Get full text
Article -
678
AI augmented edge and fog computing for Internet of Health Things (IoHT)
Published 2025-01-01Subjects: Get full text
Article -
679
V-BAG: A virtual bandwidth aggregation scheme for Internet of Things data
Published 2017-04-01“…In order to meet the two crucial requirements of Internet of Things (support of a large number of Internet of Things devices and low power consumption), this article proposes a novel and efficient virtual bandwidth aggregation scheme for Internet of Things data. …”
Get full text
Article -
680
Developing an On-Demand Cloud-Based Sensing-as-a-Service System for Internet of Things
Published 2016-01-01“…The increasing number of Internet of Things (IoT) devices with various sensors has resulted in a focus on Cloud-based sensing-as-a-service (CSaaS) as a new value-added service, for example, providing temperature-sensing data via a cloud computing system. …”
Get full text
Article