Showing 4,161 - 4,180 results of 19,848 for search 'Alternet~', query time: 3.06s Refine Results
  1. 4161

    COVID-19 and Emergency Migration to Remote Teaching in a Public University in the Maldives: Challenges, Solutions, and Lessons Learned by Dheeba Moosa, Visama Hassan

    Published 2024-06-01
    “…The respondents most frequently cited unreliable internet connection (83.9%) and internet cost (76.8%), while 75% reported difficulty in motivating students and meeting their varied needs (64.3%). …”
    Get full text
    Article
  2. 4162
  3. 4163

    APT attack threat-hunting network model based on hypergraph Transformer by Yuancheng LI, Yukun LIN

    Published 2024-02-01
    “…To solve the problem that advanced persistent threat (APT) in the Internet of things (IoT) environment had the characteristics of strong concealment, long duration, and fast update iterations, it was difficult for traditional passive detection models to quickly search, a hypergraph Transformer threat-hunting network (HTTN) was proposed.The HTTN model had the function of quickly locating and discovering APT attack traces in IoT systems with long time spans and complicated information concealment.The input cyber threat intelligence (CTI) log graph and IoT system kernel audit log graph were encoded into hypergraphs by the model, and the global information and node features of the log graph were calculated through the hypergraph neural network (HGNN) layer, and then they were extracted for hyperedge position features by the Transformer encoder, and finally the similarity score was calculated by the hyperedge, thus the threat-hunting of APT was realized in the network environment of the Internet of things system.It is shown by the experimental results in the simulation environment of the Internet of things that the mean square error is reduced by about 20% compared to mainstream graph matching neural networks, the Spearman level correlation coefficient is improved by about 0.8%, and improved precision@10 is improved by about 1.2% by the proposed HTTN model.…”
    Get full text
    Article
  4. 4164

    Application of 5G to current differential protection of distribution network by Yuxiang LV, Yang YANG, Yawen DONG, Yucheng WANG

    Published 2020-02-01
    “…Driven by the strategy of grid as a Platform,Hub,and Sharing as well as the construction of Energy Internet and Ubiquitous power Internet of Things declared by Sate Grid Corporation of China,the intelligent distribution network evolves towards Distribution Internet of Things in a gridding and multi-source manner.The traditional distribution network protection and feeder automation barely meets the self-healing requirements of a strong distribution network.The current differential protection is prevailing due to its favorable quick-acting,sensitivity and selectivity.The existing communication solutions baring protection signals includes:fiber channel,230MHz/1.8GHz private wireless network,etc.However,the above methods are usually costly and perhaps with poor stability and low real-time performance.An realistic baring scheme for current differential protection of distribution network over the fifth generation communication system (5G) was proposed,where the of sampling data transmission between differential protection devices was realized based on 5G new radio technology.Thanks to the advantages of low latency,high capacity,security,etc.,5G-based differential protection can dynamically adjust the configuration to accommodate the topology changes,and thus can reduce the transformation and maintenance cost of distribution network.…”
    Get full text
    Article
  5. 4165

    A Front Water Recognition Method Based on Image Data for Off-Road Intelligent Vehicle by Haiwei Wang, Yibing Zhao

    Published 2020-01-01
    “…Off-road intelligent vehicle is an important application about Internet of Vehicles technology used in the transportation field, and the front obstacle recognition method is the key technology for off-road intelligent vehicle. …”
    Get full text
    Article
  6. 4166

    eDAAAS: Efficient distributed anonymous authentication and access in smart homes by An Braeken, Pawani Porambage, Milos Stojmenovic, Lambros Lambrinos

    Published 2016-12-01
    “…The smart home field has witnessed rapid developments in recent years. Internet of Things applications for the smart home are very heterogeneous and continuously increasing in number, making user management from a security perspective very challenging. …”
    Get full text
    Article
  7. 4167

    Online communities as childcare resources among households with young children in metropolitan areas in Japan by Mikoto Kukimoto

    Published 2020-03-01
    “…This paper examines the relation between the the role of the use of the Internet, online communities, and households with young children. …”
    Get full text
    Article
  8. 4168

    Research on MIX-based anonymous communications by LU Tian-bo, CHENG Xiao-ming, ZHANG Bing

    Published 2007-01-01
    “…Privacy and anonymity on the Internet are gaining increasing attention from both the scientific and the large Internet user community in recent years.Privacy does not only mean the confidentiality of information,but also mean not revealing who is communicating with whom,and how often.After describing the technology of MIX,a survey of ano-nymity technologies based on it was given.Finally WonGoo,a scalable and practical decentralized peer-to-peer protocol was presented that provides strong anonymity and high efficiency with layered encryption and random forwarding.…”
    Get full text
    Article
  9. 4169

    The role of ICT in Arab spring movements by Mark I. Wilson, Kenneth E. Corey

    Published 2012-10-01
    “…Over the past 25 years, social movements have actively sought out and used new information and communication technologies (ICT), such as the Internet and mobile phones, to give voice to their concerns. …”
    Get full text
    Article
  10. 4170

    Android security reinforcing scheme of intelligent terminal based on certificate chain authentication mechanism by Jiaren JIANG, GLiu JIAN, Weiqing WANG

    Published 2017-02-01
    “…With the prosperous development of information technologies and mobile internet popularity of information-based on a global basis,it is necessary to analyze and research the security problems for Android,which is one of the most important technologies in the emerging field of mobile internet and intelligent terminals.The certificate chain authentication mechanism played a critical role as protecting the core of the terminals against some intrusion attacks in the security phases.…”
    Get full text
    Article
  11. 4171
  12. 4172

    Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy by Amelia Dwi Rochani, Ari Kusyanti, Fariz Andri Bakhtiar

    Published 2022-12-01
    “… Kondisi Internet of Things saat ini yang cenderung tanpa menggunakan fitur keamanan dapat menjadi tantangan untuk realisasi Internet of things terutama di bidang privasi dan kerahasiaan data, khususnya pada modul sensorik berdaya rendah yaitu Bluetooth Low Energy. …”
    Get full text
    Article
  13. 4173

    Rancang Bangun Electronic Customer Relationship Management pada Sistem Informasi Hotel dengan Framework of Dynamic CRM by Siti Monalisa, Jukhri Syahputra Bacin

    Published 2020-02-01
    “…Internet memberikan manfaat sebagai interaksi sosial yang mampu mengantarkan banyak kemudahan komunikasi maupun informasi. …”
    Get full text
    Article
  14. 4174
  15. 4175
  16. 4176

    KÜLTÜREL DİPLOMASİ: KURAM VE PRATİKTEKİ ÇERÇEVESİ by Aslı Yağmurlu

    Published 2019-07-01
    “…İnternet sitelerinden elde edilen veriler sonucunda sanat, eğitim ve profesyonel ilişkiler başlıkları kültürel diplomasinin alt başlıkları olarak ortaya çıkmıştır.…”
    Get full text
    Article
  17. 4177

    Hubungan Health Anxiety dan Cyberchondria: Sebuah Tinjauan Literatur Naratif by Putu Angita Gayatri, Atika Dian Ariana

    Published 2024-06-01
    “…Cyberchondria didefinisikan sebagai pencarian berlebihan atau berulang untuk informasi terkait kesehatan di internet yang mengakibatkan tekanan dan/atau kecemasan. …”
    Get full text
    Article
  18. 4178

    Dynamical Model about Rumor Spreading with Medium by Xiaxia Zhao, Jianzhong Wang

    Published 2013-01-01
    “…Nowadays, with the emergence of the internet, rumors can be spread by instant messengers, emails, or publishing. …”
    Get full text
    Article
  19. 4179
  20. 4180

    Design of Energy-Efficient Protocol Stack for Nanocommunication Using Greedy Algorithms by Iqra Iqbal, Mohsin Nazir, Aneeqa Sabah

    Published 2022-01-01
    “…This revolutionary transition is bringing Internet of Things (IoT) to Internet of Nanothings (IoNT). …”
    Get full text
    Article