Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Economic development 5
- Economic conditions 4
- Information technology 4
- Internet marketing 4
- Social aspects 4
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Economic aspects 2
- Economic policy 2
- Education 2
- Education, Elementary 2
- Educational technology 2
- Globalization 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Law 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- Sociolinguistics 2
- Teaching 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Academic writing 1
- Access control 1
-
4201
A lightweight privacy preservation authentication protocol for IoMT using ECC based blind signature
Published 2025-01-01“…In the Internet of Medical Things (IoMT), medical devices are connected to the Internet of Things (IoT), allowing better tailored healthcare, faster hospital treatments, more affordable medical solutions, and more patient comfort. …”
Get full text
Article -
4202
SERVICE PERFORMANCE IMPROVEMENT DURING PANDEMIC COVID 19 USING INTEGRATED SERVQUAL AND SIX SIGMA: TELECOMMUNICATION AND INFORMATION INDUSTRY CASE APPLICATION
Published 2020-12-01“…The increase in users of the Wifi.id Corner internet service is not directly proportional to the service satisfaction obtained by the Wi-Fi.id Corner service. …”
Get full text
Article -
4203
Live Broadcasting of High Definition Audiovisual Content Using HDTV over Broadband IP Networks
Published 2008-01-01“…Internet2 and GEANT broadband telecommunication networks were selected as the most applicable technology to deliver such traffic workloads. …”
Get full text
Article -
4204
Analysis of digital tourism development strategies as promotion of water blow tourism Nusa Dua Bali
Published 2023-12-01“…This research aims to find out government policies, strategies and decisions in developing internet-based tourism (digital tourism) using tourism website data, internet reviews about tourism, and social networks related to the Water Blow Nusa Dua Bali tourism. …”
Get full text
Article -
4205
An IoT and Machine Learning-Based Model to Monitor Perishable Food towards Improving Food Safety and Quality
Published 2022-01-01“…This article describes a technique for monitoring perishable goods that is based on the Internet of Things and machine learning. Pictures are recorded using high-resolution cameras in this suggested architecture, and then these images are sent to a cloud server using Internet of Things devices. …”
Get full text
Article -
4206
The Relationship between Digital Marketing, Customer Engagement, and Purchase Intention via OTT Platforms
Published 2022-01-01“…The Internet and digital technologies have grown exponentially and have become a part of billions of people’s daily lives around the world. …”
Get full text
Article -
4207
Utilization of Kabale University Library Services by Academic Staff in Teaching and Research.
Published 2023“…The study used a descriptive research design with the aim of achieving the objectives of the study. the study used a sample population of 140 selected from the seven faculties of the university. both interview and questionnaire were used to collect data and findings indicated that the level of utilization of Kabale University library services is high, Problems experienced by the academic staff’s in utilizing the resources were many where most respondents suggested limited computers and internet connectivity within the library at the University and a big number of Solutions to the challenges experienced by the academic staff’s in utilizing the resources and the majority suggested providing enough computers and internet so as even the information that is not in the library can be traced on internet and finally the study recommended that In the current electronic environment, the computers with proper network facilities are most important source for finding out the relevant information.…”
Get full text
Thesis -
4208
Le vlog pour espace de communication
Published 2021-02-01“…At the junction of social networks and social media, internet users invest their viewing experience as a communication space where they are in quasi-interaction with the YouTuber and its internet community. …”
Get full text
Article -
4209
Architecture and service model of IoT enabled platform
Published 2017-11-01“…Existing successful IoT (internet of things) application cases concentrate on the vertical field of local scale and usually focused on closed loop applications,which leading to numerous application islet.Internet companies,traditional equipment manufacturers,cloud service providers,as well as other industrial giants have built an IoT ecosystem with the core of its own capabilities.Starting with key point of building IoT ecosystem,technology architecture and service model of IoT enabled platform was studied,the core function and key technology of platform was discussed,and the platform development trend was presented.…”
Get full text
Article -
4210
Healthy Living: Reliable Websites
Published 2016-02-01“…Older adults can readily access reliable information on the Internet by focusing on government and education sites. …”
Get full text
Article -
4211
Constrction of data driven-centric smart home intelligent operating system
Published 2017-10-01“…From the background of the second half of the internet era,when constructing the smart home intelligent operating system,data-driven should be the foundation,and data evaluation should be the means.By using accurate and efficient data collection methods,the smart home intelligent operating system which adapted the development of future 5G,internet of things and artificial intelligence and other technology was built.Firstly,the characteristics and trends of the smart home business was introduced,and then the opinion of data was the foundation of smart home operation was explained.Finally,the future of data and smart home operation was introduced.…”
Get full text
Article -
4212
Research on the reverse analyses and monitoring data of Mirai malware botnet
Published 2017-08-01“…In recent years,with the rapid development of Internet of things(IoT),malwares have come into Internet of things,and botnet is the typical one.Malwares spreading through IoT vulnerable devices have emerged.The overall structure of Mirai botnet and the function of its components were introduced,such as bots and C&C server.The monitoring data obtained through active and passive way were analyzed.Based on that,the discovery methods and response modes on such kind of botnet malwares were discussed.…”
Get full text
Article -
4213
Perception of Advertisement in Visegrad Four Countries
Published 2011-06-01“…There were almost no statistically significant differences just in the area of Internet advertisement effectiveness where the first position of making electronic purchases due to Internet advertisement is held by Polish respondents.…”
Get full text
Article -
4214
Initial Understanding and Practice of Network Services and Compositions
Published 2013-08-01“…The current internet is simple in its fundamental interconnecting capability and is inflexible in its protocol architecture.Such a situation makes internet unable to well handle the variety of network applications' demands.Fortunately,a noval approach of so called“network service composition”can address the above problems.From the rationale of reductionism,the meanings of network services and their compositions were first explained.Several fundamental and key methods of network service composition were then presented,with relevent research projects shown.And finally,the ongoing work in the reconfigurable architecture of network infrastructures was introduced.…”
Get full text
Article -
4215
Brief History of Interlibrary Cooperations in Turkey and Today’s Applications
Published 2012-03-01“…Our world has changed so much in 42 years. The usage of Internet has gradually become widespread since the use of ARPANET for military purposes in 1969. …”
Get full text
Article -
4216
Sobre vivências poéticas no campo da mídia digital
Published 2016-01-01“…Para desarrollar la reflexión, se analiza el movimiento p oético Poetrix, centrándose en la propuesta estética de este grupo y sus formas de inserción y mantenimiento en internet.…”
Get full text
Article -
4217
A digital signature scheme based on shared key in intelligent terminal
Published 2017-02-01“…In traditional internet,digital certificate in USB key is the most mature technology of application security assurance.But it is difficult to use in mobile internet,because of the restriction of intelligent terminal interface.A digital signature scheme based on shared key in intelligent terminal was discussed to lower the threshold.The shared key supported multiple digital certificates,and was shared by multiple applications through the unified management.After that,the security of the scheme was analyzed,and a scheme integrated digital certificate and fingerprint identification was discussed to enhance user convenience.…”
Get full text
Article -
4218
WEB SİTESİMALİYETLERİNİN MUHASEBELEŞTİRİLMESİ
Published 2007-08-01“…Günlük hayatın her alanına giren internet, iletişimden araştırmaya, alışverişten reklama her alanda yerini almış, ticaretin ve pazarlamanın vazgeçilmez unsurlarından biri haline gelmiştir. …”
Get full text
Article -
4219
Entity-relation modeling and discovery for smart search
Published 2015-12-01“…Nowadays,by connecting the mobile networks,Internet of Things and the sensor networks to the Internet,the cyberspace has expanded to a ubiquitous space of human beings,machines and things.Combining with the technology of big data,the traditional search engines are evolving into their next generation—big search (or smart search).Entity-relation modeling and discovery are the key techniques to fulfill the vision of smart search.Approaches to model the entities and their relations in large scale by knowledge graph and knowledge warehouse,and ways to discovery new entities and the relations between them in the cyberspace are discussed.…”
Get full text
Article -
4220
Trustworthy identity system based on IPv6 source address validation
Published 2014-10-01“…In the Internet,there are no mechanisms to verify the identity of a message sender,resulting in a large number of forged identity attacks,such as phishing websites.By mapping the user identity into the rightmost 64 bit of the IPv6 address,this paper tries to make every message embedded with an identity,which lay a credible foundation for communications on the Internet.We design and realize a true identity communication system based on source address validation improvement,which can protect the privacy of the users,and ensure the verifiability and authenticity of the user identities.…”
Get full text
Article