Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
881
The shield of the screen: The role of anger on the development of social media addiction and internet gaming disorder
Published 2024-09-01Subjects: “…internet addiction…”
Get full text
Article -
882
Variable distance based D2D connection selection scheme in internet of vehicles
Published 2017-05-01Subjects: Get full text
Article -
883
Blockchain-driven distributed consensus mechanism in defensing Byzantine attack for the Internet of spectrum device
Published 2020-03-01Subjects: Get full text
Article -
884
Internet, nouvelles technologies et développement durable… la vie Green et connectée !
Published 2008-12-01Get full text
Article -
885
Diy-City and internet of things. A research hypothesis around interactive urban design
Published 2021-12-01Subjects: “…internet of things…”
Get full text
Article -
886
Improved ML-Based Technique for Credit Card Scoring in Internet Financial Risk Control
Published 2020-01-01“…With the rapid development of China’s Internet finance industry and the continuous growth of transaction amount in recent years, a variety of financial risks have increased, especially credit risk in the financial industry. …”
Get full text
Article -
887
İnternet ve Sosyal Ağların Siyasal Katılım Üzerine Etkisi- SDÜ Örnek Olayı
Published 2015-06-01Subjects: Get full text
Article -
888
Older adults’ Internet use behavior and its association with accelerometer-derived physical activity
Published 2025-02-01Subjects: Get full text
Article -
889
The creation of an Internet public sphere by South Africa's Independent Electoral Commission and Elections Canada
Published 2022-10-01“…In recent years much discourse on the media and democracy correlation has focused on the potential role of the Internet in facilitating political communication by establishing a virtual public sphere. …”
Get full text
Article -
890
Internet usage and environmental governance satisfaction in China: environmental pollution perception as a mediator
Published 2025-02-01Subjects: Get full text
Article -
891
Social wireless sensor network toward device-to-device interactive Internet of Things services
Published 2016-09-01“…With the proliferation of Internet of Things, a variety of services require that data should be delivered not to the fixed sinks but directly to operator-specified devices, such as actuators and inside sensor fields. …”
Get full text
Article -
892
Türkiye'de İnternet Gazeteciliği Açısından Yerel Basının Genel Görünümü ve Bölgeler Arası Bir Değerlendirme
Published 2013-11-01Subjects: “…i̇nternet gazeteciliği; internet ortamı; yerel basın.…”
Get full text
Article -
893
Halkla İlişkiler Bakış Açısından Kriz Durumlarında İnternetin Rolü ve İnternet Kriz Planlaması
Published 2013-11-01Subjects: “…i̇nternet; internet kriz planlaması; halkla ilişkiler…”
Get full text
Article -
894
-
895
Situation Description and Critical Technology Analysis of Public Emergency Call Service Based on Internet of Vehicle
Published 2014-11-01Subjects: “…internet of vehicle…”
Get full text
Article -
896
Ring-based efficient batch authentication and group key agreement protocol with anonymity in Internet of vehicles
Published 2023-06-01“…Aiming at the problem that the current batch authentication and key agreement protocol were relied on semi-trusted road side unit (RSU) and were not suitable for key update in large-scale Internet of vehicles (IoV), a ring-based efficient batch authentication and group key agreement protocol with anonymity in IoV was proposed.The anonymity was ensured by the pseudonym mechanism.The authentication key pairs were constructed by the chaotic map, and the batch authentication for many vehicles was quickly completed by a small number of bilinear maps.The joining and leaving of vehicles in large-scale IoV scenario were fully considered, a ring session group was efficiently constructed by using the semi-group property of chaotic maps, and a group key establishment and update mechanism suitable for large-scale vehicles was designed.In addition, a pseudonym update mechanism and an anonymous tracing mechanism were designed to ensure a more secure session process.At the same time, the BAN logic model was used to prove the semantic security of the protocol.The security analysis and simulation results show that the proposed protocol has multiple security attributes and certain efficiency advantages.…”
Get full text
Article -
897
Intrusion detection using synaptic intelligent convolutional neural networks for dynamic Internet of Things environments
Published 2025-01-01Subjects: Get full text
Article -
898
Research and practice of Internet traffic regulating strategy based on big data acquisition and analysis of flow
Published 2024-07-01Subjects: “…Internet traffic…”
Get full text
Article -
899
Entropy-based feature selection with applications to industrial internet of things (IoT) and breast cancer prediction
Published 2024-09-01“…More potentially, some significant applications of entropy-based FS to the Internet of Things (IoT) and breast cancer prediction are provided.…”
Get full text
Article -
900
Does Internet use help to achieve sustainable food consumption? Evidence from rural China
Published 2025-06-01Subjects: “…Internet use…”
Get full text
Article