Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Economic development 5
- Economic conditions 4
- Information technology 4
- Internet marketing 4
- Social aspects 4
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Economic aspects 2
- Economic policy 2
- Education 2
- Education, Elementary 2
- Educational technology 2
- Globalization 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Law 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- Sociolinguistics 2
- Teaching 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Academic writing 1
- Access control 1
-
4321
Knowledge graph and data application:intelligent recommendation
Published 2019-08-01“…Knowledge graph technology is an emerging internet technology with good forward-looking and strong technological advancement,and has broad application prospects.Knowledge graph technology provides the ability to analyze problems from the “relationship” perspective.It can deeply mine data,transform natural language into computer language,and display the value of data to the greatest extent.It can serve intelligent search,intelligent recommendation,risk early warning,intelligent operation,intelligent customer service,public opinion monitoring,equipment early warning and other businesses,greatly improving the production efficiency of enterprises.The comprehensive clustering algorithm,SVD decomposition algorithm,commodity-based collaborative concerns recommendation algorithm,user-based collaborative concerns recommendation algorithm and commodity similarity algorithm were studied.Combined with recommendation strategy,an intelligent recommendation system based on knowledge graph data application was proposed.It proves the feasibility and deployability of the data application with knowledge graph as the basic tool,which can fully meet the user’s demand for information on the internet platform.…”
Get full text
Article -
4322
A NB-IoT access scheme based on Beta distribution
Published 2021-09-01“…As one of the emerging technologies of low-power wide-area Internet of things, narrow band Internet of things (NB-IoT) faces the pressure and challenge of massive connections of terminals.Aiming at practical application scenarios, a preamble allocation scheme based on Beta distribution was proposed.In this scheme, the energy consumption of each time slot device was firstly calculated.The equipment was divided into high energy consumption according to two grouping methods: average energy consumption and cumulative energy consumption.The preamble was assigned to the high-energy-consuming device group first, and the remaining preamble and the conflicting preamble of the high-energy-consuming device group were assigned to the low-energy-consuming device group.The simulation results show that compared with the traditional random allocation scheme, the proposed scheme can effectively improve the average access success rate and average throughput of the NB-IoT system, and can effectively reduce the back off time.…”
Get full text
Article -
4323
INTERAÇÕES E SOCIABILIDADES DIGITAIS NA SOCIEDADE INFORMACIONAL
Published 2019-06-01“…Nos anos 2000 a internet se transformou em uma ferramenta inovadora e essencial para o sujeito na era da comunicação. …”
Get full text
Article -
4324
Horseshoe Chaos in a 3D Neural Network with Different Activation Functions
Published 2013-01-01Get full text
Article -
4325
SİVAS İLİ İŞLETMELERİNİN WEB SİTELERİNİN DEĞERLENDİRİLMESİNE İLİŞKİN BİR ARAŞIRMA
Published 2016-05-01“…Dünyada ve Türkiye'de internet teknolojisi alanındaki gelişmeler, tüketici davranışlarını etkilemekte ve tüketim talebini değiştirmektedir. …”
Get full text
Article -
4326
SD-WAN tunnel technology and network constuction
Published 2021-01-01“…The status of SD-WAN technology was introduced, the SD-WAN advantages with traditional line were compared.The basic technical features of SD-WAN, the software definition network controllers of SD-WAN, security encryption and tenant isolation, the SD-WAN industry standards were described.The relevant technologies of SD-WAN main manufacturers were also analyzed, the tunnel technology used by SD-WAN was compared.And private IPSec tunnel , VxLAN over IPSec, NvGRE over IPSec, SSL tunnel network project used by the different companys was compared and analyzed, the optimized tunnel technology project was given, and optimizational suggestions on how to use tunnel technology to complete networking project were further put forwarded, combined with the advantages of Internet service product in establishing SD-WAN, the POP network and peer-to-peer networking solutions were given.Finally, it make future development prospect for SD-WAN standards, Internet service product and SD-WAN manufacturers trends.…”
Get full text
Article -
4327
Study on evolution of NR duplex operation
Published 2022-10-01“…Subband non-overlapping full duplex (SBFD) at gNB side within a conventional TDD band was considered as a key feature of 5G-Advanced to fulfill the challenging requirements of low latency and high uplink throughput emerging in vertical industry and industrial internet.Meanwhile, gNB-to-gNB cross-link interference handling needed to be enhanced to enable different TDD configurations for both public network (Macro) and vertical network (Micro) applied in the same frequency band.With a thorough analysis on the interference characteristic in the potential deployment scenarios for both different TDD configurations and subband non-overlapping full duplex, various feasible interference handling schemes to fulfill the challenging deployment requirements for vertical industry and industrial internet were presented, and the feasibility of above duplex enhancement schemes was checked via link budget, simulation and proof-of-concept prototype.…”
Get full text
Article -
4328
MESLEK YÜKSEKOKULU ÖĞRENCİLERİNİN BAKIŞ AÇISIYLA E-TİCARET VE GÜVENİLİRLİĞİ: KUYUCAK MYO ÖRNEĞİ - E-COMMERCE AND ITS’ RELIABILITY FROM THE PERSPECTIVE OF VOCATIONAL SCHOOL STUDENTS...
Published 2017-10-01“…Dünya genelindehızlı bir şekilde artmakta olan internet kullanımı, hemen hemen hayatın her alanındakendini göstermektedir. …”
Get full text
Article -
4329
Program profilaktyki nadużywania Internetu i mediów elektronicznych: komunikat z badań ewaluacyjnych
Published 2021-09-01“… The paper describes the outcomes of evaluating the Internet and electronic media abuse prevention program conducted among 3rd-grade primary students. …”
Get full text
Article -
4330
An survey on application of artificial intelligence in 5G system
Published 2021-05-01“…With the continuous development of 5G, the era of the internet of everything is coming.Problems such as massive device connections, massive application requests, ultra-high network load and complex dynamic network environment pose great challenges to the optimization of 5G systems in the context of the internet of everything.Facing these challenges, artificial intelligence (AI) shows its unique advantages.Firstly, the advantages of deep learning driven AI algorithms in 5G system compared with conventional algorithms were briefly introduced.Then, the application of AI algorithms in multi-access edge computing (MEC) and mmWave massive multiple-input multiple-output (MIMO) system were described in detail, with advantages and disadvantages of each method being compared and analyzed.Finally, according to the existing research, the shortcomings of AI algorithms in 5G application scenarios were summarized and the future research directions were forecasted.…”
Get full text
Article -
4331
A survey on DNS attack detection and security protection
Published 2022-09-01“…With the gradual evolution of the traditional Internet to “Internet+”, the domain name system (DNS) had been continuously expanding from basic address resolution to new models such as comprehensive perception and reliable transmission.Due to the diverse functions and the extensive coverage of DNS in the new scenario, it will cause serious consequences once attacked.Therefore, the research on DNS attack detection and security protection continues and attracts more and more attention.Firstly, several common DNS attacks were introduced, including DNS spoofing, DNS covert channel, DNS distributed denial of service (DDoS) attack, DNS reflection amplification attacks, and malicious DGA domain names.Subsequently, these DNS attack detection technologies were systematically analyzed and summarized from the machine learning perspective.Then, the DNS security protection technologies were sorted out in decentralization, authenticated encryption and limited resolution.Finally, some future research directions were proposed.…”
Get full text
Article -
4332
Sharenting – skala i wielowymiarowość zjawiska (nierozważnego) ujawniania przez rodziców informacji o dzieciach w mediach społecznościowych
Published 2018-12-01“…There is a need of educational actions, directed to both parents and society, about the children’s security and safety of their privacy in the Internet. …”
Get full text
Article -
4333
Mega LEO Satellite Constellations Networking: Challenges and Key Technologies
Published 2024-12-01“…Owing to the advances in satellite manufacturing and rocket launch technology, the deployment of mega LEO constellations has become an important direction for the development of satellite Internet. Compared with traditional LEO constellations, new mega constellations, characterized by multi-orbit hybrid networking and stratified integration of satellites at different altitudes, exhibit new features such as a greater number of nodes and more dynamic topology. …”
Get full text
Article -
4334
5G/B5G oriented intelligent cloud network architecture
Published 2019-10-01“…The emergence of 5G/B5G technology has greatly improved the key capabilities of mobile networks including bandwidth,latency and connectivity.Faced with the prosperous development of mobile access side capabilities,the existing centralized architecture for internet cloud service was prone to bottlenecks and could not fully exploit the advantage of 5G/B5G.The technology named Network 5.0 was proposed to address the demand for data networks from future typical network applications through a complete set of innovative protocol systems and control management architecture.A new type of intelligent cloud network based on the protocol system of Network 5.0 was proposed,which could bridge the gap between the internet service model and 5G/B5G access capability through the deep integration of cloud network,and promote further the continuous evolution of the network.…”
Get full text
Article -
4335
Low power wake-up receiver and wake-up signal technology in 5G-Advanced
Published 2022-03-01“…Power consumption is critical for wearable and IoT (Internet of things) devices.Device standby with micro-watt level power consumption can be enabled by using low-power wake-up receiver/wake-up signal technology, which can increase the device battery life and are widely applicable to smart wearables, Internet of things, smart phones, etc.Study item on low power wake-up receiver and wake-up signal technology has been approved in 3GPP, and was considered as one of the iconic technologies for mobile devices in 5G-Advanced.Preliminary discussion on low power wake-up receiver and wake-up signal technology were provided, including use case and requirements, low power wake-up receiver structure, wake-up signal design, mobility and measurement aspects, co-existence with legacy system, anti-interference design.…”
Get full text
Article -
4336
Analysis of intention to purchase travel on the Web
Published 2019-01-01“…The Internet’s role in global market development merits more extensive research, which is especially true for Spain’s tourism industry because of its contribution to the national economy. …”
Get full text
Article -
4337
A Carrier Class IoT Service Architecture Integrating IMS with SWE
Published 2014-05-01“…Integrating the sensing capabilities of wireless sensor network (WSN) into the traditional telecom network is an important stage to realize future ubiquitous intelligence in the Internet of Things. Driven by the vision of service oriented architecture (SOA), this paper proposed a carrier class Internet of Things (IoT) service architecture named as MUSE. …”
Get full text
Article -
4338
Analysis and suggestions on the development of IoT technology
Published 2020-12-01“…The Internet of things (IoT) has been developing for a decade in China,which has rapidly evolved from the early sensor network technology,radio frequency identification (RFID) technology to the intelligent networking technology based on 5G.The Internet of everything is coming to our life.The application of IoT has also been gradually and comprehensively applied in from the area of financial IC card to the industry,government affairs,transportation,health care,education,and etc.The development of the IoT hot technologies represented by 5G and low-power wide-area network (LPWAN),and the deep integration of blockchain,edge computing and other technologies with the IoT,comprehensively promote the deep application of the IoT in the industry,which brings great development opportunities to all the industry.It was focused on the analysis of the status of 5G,IoT identification,edge computing,LPWAN,security technology,and etc.The development tendency of the IoT was also forecasted,and the corresponding policy suggestion to promote the development of IoT was put forward.…”
Get full text
Article -
4339
Um diálogo sobre o crivo de Eratóstenes: Relato de uma experiência com correio eletrônico
Published 2007-01-01“…A partir da resposta da professora, da continuação do diálogo e de buscas na Internet, o estudante produz um trabalho criativo sobre maneiras de encontrar números primos. …”
Get full text
Article -
4340
Passivity and Passification for Delay Fuzzy System Based on Delay Partitioning Approach
Published 2013-01-01Get full text
Article