Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Economic development 5
- Economic conditions 4
- Information technology 4
- Internet marketing 4
- Social aspects 4
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Economic aspects 2
- Economic policy 2
- Education 2
- Education, Elementary 2
- Educational technology 2
- Globalization 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Law 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- Sociolinguistics 2
- Teaching 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Academic writing 1
- Access control 1
-
4161
COVID-19 and Emergency Migration to Remote Teaching in a Public University in the Maldives: Challenges, Solutions, and Lessons Learned
Published 2024-06-01“…The respondents most frequently cited unreliable internet connection (83.9%) and internet cost (76.8%), while 75% reported difficulty in motivating students and meeting their varied needs (64.3%). …”
Get full text
Article -
4162
-
4163
APT attack threat-hunting network model based on hypergraph Transformer
Published 2024-02-01“…To solve the problem that advanced persistent threat (APT) in the Internet of things (IoT) environment had the characteristics of strong concealment, long duration, and fast update iterations, it was difficult for traditional passive detection models to quickly search, a hypergraph Transformer threat-hunting network (HTTN) was proposed.The HTTN model had the function of quickly locating and discovering APT attack traces in IoT systems with long time spans and complicated information concealment.The input cyber threat intelligence (CTI) log graph and IoT system kernel audit log graph were encoded into hypergraphs by the model, and the global information and node features of the log graph were calculated through the hypergraph neural network (HGNN) layer, and then they were extracted for hyperedge position features by the Transformer encoder, and finally the similarity score was calculated by the hyperedge, thus the threat-hunting of APT was realized in the network environment of the Internet of things system.It is shown by the experimental results in the simulation environment of the Internet of things that the mean square error is reduced by about 20% compared to mainstream graph matching neural networks, the Spearman level correlation coefficient is improved by about 0.8%, and improved precision@10 is improved by about 1.2% by the proposed HTTN model.…”
Get full text
Article -
4164
Application of 5G to current differential protection of distribution network
Published 2020-02-01“…Driven by the strategy of grid as a Platform,Hub,and Sharing as well as the construction of Energy Internet and Ubiquitous power Internet of Things declared by Sate Grid Corporation of China,the intelligent distribution network evolves towards Distribution Internet of Things in a gridding and multi-source manner.The traditional distribution network protection and feeder automation barely meets the self-healing requirements of a strong distribution network.The current differential protection is prevailing due to its favorable quick-acting,sensitivity and selectivity.The existing communication solutions baring protection signals includes:fiber channel,230MHz/1.8GHz private wireless network,etc.However,the above methods are usually costly and perhaps with poor stability and low real-time performance.An realistic baring scheme for current differential protection of distribution network over the fifth generation communication system (5G) was proposed,where the of sampling data transmission between differential protection devices was realized based on 5G new radio technology.Thanks to the advantages of low latency,high capacity,security,etc.,5G-based differential protection can dynamically adjust the configuration to accommodate the topology changes,and thus can reduce the transformation and maintenance cost of distribution network.…”
Get full text
Article -
4165
A Front Water Recognition Method Based on Image Data for Off-Road Intelligent Vehicle
Published 2020-01-01“…Off-road intelligent vehicle is an important application about Internet of Vehicles technology used in the transportation field, and the front obstacle recognition method is the key technology for off-road intelligent vehicle. …”
Get full text
Article -
4166
eDAAAS: Efficient distributed anonymous authentication and access in smart homes
Published 2016-12-01“…The smart home field has witnessed rapid developments in recent years. Internet of Things applications for the smart home are very heterogeneous and continuously increasing in number, making user management from a security perspective very challenging. …”
Get full text
Article -
4167
Online communities as childcare resources among households with young children in metropolitan areas in Japan
Published 2020-03-01“…This paper examines the relation between the the role of the use of the Internet, online communities, and households with young children. …”
Get full text
Article -
4168
Research on MIX-based anonymous communications
Published 2007-01-01“…Privacy and anonymity on the Internet are gaining increasing attention from both the scientific and the large Internet user community in recent years.Privacy does not only mean the confidentiality of information,but also mean not revealing who is communicating with whom,and how often.After describing the technology of MIX,a survey of ano-nymity technologies based on it was given.Finally WonGoo,a scalable and practical decentralized peer-to-peer protocol was presented that provides strong anonymity and high efficiency with layered encryption and random forwarding.…”
Get full text
Article -
4169
The role of ICT in Arab spring movements
Published 2012-10-01“…Over the past 25 years, social movements have actively sought out and used new information and communication technologies (ICT), such as the Internet and mobile phones, to give voice to their concerns. …”
Get full text
Article -
4170
Android security reinforcing scheme of intelligent terminal based on certificate chain authentication mechanism
Published 2017-02-01“…With the prosperous development of information technologies and mobile internet popularity of information-based on a global basis,it is necessary to analyze and research the security problems for Android,which is one of the most important technologies in the emerging field of mobile internet and intelligent terminals.The certificate chain authentication mechanism played a critical role as protecting the core of the terminals against some intrusion attacks in the security phases.…”
Get full text
Article -
4171
-
4172
Implementasi Algoritma Mickey 2.0 untuk Mengamankan Komunikasi Data pada Perangkat Bluetooth Low Energy
Published 2022-12-01“… Kondisi Internet of Things saat ini yang cenderung tanpa menggunakan fitur keamanan dapat menjadi tantangan untuk realisasi Internet of things terutama di bidang privasi dan kerahasiaan data, khususnya pada modul sensorik berdaya rendah yaitu Bluetooth Low Energy. …”
Get full text
Article -
4173
Rancang Bangun Electronic Customer Relationship Management pada Sistem Informasi Hotel dengan Framework of Dynamic CRM
Published 2020-02-01“…Internet memberikan manfaat sebagai interaksi sosial yang mampu mengantarkan banyak kemudahan komunikasi maupun informasi. …”
Get full text
Article -
4174
Effects of image compression on face image manipulation detection: A case study on facial retouching
Published 2021-05-01Get full text
Article -
4175
Risk assessment of rail transit systems with variable renewable energy based on uncertain random theory
Published 2025-03-01Get full text
Article -
4176
KÜLTÜREL DİPLOMASİ: KURAM VE PRATİKTEKİ ÇERÇEVESİ
Published 2019-07-01“…İnternet sitelerinden elde edilen veriler sonucunda sanat, eğitim ve profesyonel ilişkiler başlıkları kültürel diplomasinin alt başlıkları olarak ortaya çıkmıştır.…”
Get full text
Article -
4177
Hubungan Health Anxiety dan Cyberchondria: Sebuah Tinjauan Literatur Naratif
Published 2024-06-01“…Cyberchondria didefinisikan sebagai pencarian berlebihan atau berulang untuk informasi terkait kesehatan di internet yang mengakibatkan tekanan dan/atau kecemasan. …”
Get full text
Article -
4178
Dynamical Model about Rumor Spreading with Medium
Published 2013-01-01“…Nowadays, with the emergence of the internet, rumors can be spread by instant messengers, emails, or publishing. …”
Get full text
Article -
4179
Model Predictive Control for Continuous-Time Singular Jump Systems with Incomplete Transition Rates
Published 2015-01-01Get full text
Article -
4180
Design of Energy-Efficient Protocol Stack for Nanocommunication Using Greedy Algorithms
Published 2022-01-01“…This revolutionary transition is bringing Internet of Things (IoT) to Internet of Nanothings (IoNT). …”
Get full text
Article