Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Economic development 5
- Economic conditions 4
- Information technology 4
- Internet marketing 4
- Social aspects 4
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Economic aspects 2
- Economic policy 2
- Education 2
- Education, Elementary 2
- Educational technology 2
- Globalization 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Law 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- Sociolinguistics 2
- Teaching 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Academic writing 1
- Access control 1
-
4501
Surgical Treatment of Atrial Fibrillation: A Review
Published 2011-01-01“…In addition, it will detail the new approaches to surgical ablation of atrial fibrillation that employ alternate energy sources.…”
Get full text
Article -
4502
Smart HVAC Control in IoT: Energy Consumption Minimization with User Comfort Constraints
Published 2014-01-01“…Smart grid is one of the main applications of the Internet of Things (IoT) paradigm. Within this context, this paper addresses the efficient energy consumption management of heating, ventilation, and air conditioning (HVAC) systems in smart grids with variable energy price. …”
Get full text
Article -
4503
Une terreur par l’image
Published 2011-09-01“…These novels, aside from the fact that they focus on the events of New York, share a character, or background: the media, represented by television, the internet and press photographs, intervene in the novels in a very significant way, testifying to the sheer force of the images. …”
Get full text
Article -
4504
Consumo y educación musical informal de estudiantes mexicanos a través de las TIC
Published 2015-04-01“…Los resultados obtenidos indican el uso de la radio y la televisión como medios para escuchar música diariamente, y un incremento en el uso de Internet para escuchar o descargar música.…”
Get full text
Article -
4505
Online Alışveriş Yapan Tüketicilerde Fiziksel Dağıtım Hizmet Kalitesinin E-Memnuniyet ve E-Sadakat Üzerindeki Etkisi
Published 2024-06-01“…Teknolojinin gelişmesi ile birlikte internet kullanımının artması sonucu insanlar geleneksel alışverişten e-ticarete yönelmişlerdir. …”
Get full text
Article -
4506
A Survey on Addressing IoT Security Issues by Embedding Blockchain Technology Solutions: Review, Attacks, Current Trends, and Applications
Published 2024-01-01“…By 2025, the Internet of Things (IoT) infrastructure is projected to encompass over 75 billion devices, facilitated by the increasing proliferation of intelligent applications. …”
Get full text
Article -
4507
La apertura universitaria a los espacios de formación virtual: Un reto a la autonomía estudiantil
Published 2002-05-01“… El objetivo de este artículo es presentar los logros y problemas experimentados por un grupo de 140 estudiantes de pedagogía tras la implementación de un curso impartido por Internet. Los datos provienen del análisis (de contenido) de entrevistas efectuadas a varios estudiantes, así como de correos electrónicos recibidos (n = 1614) y de la transcripción de "conversaciones" (en línea) bajo modalidad sincrónica (chat). …”
Get full text
Article -
4508
-
4509
Delay/Disruption Tolerant Networking Performance Characterization in Cislunar Relay Communication Architecture
Published 2025-01-01“…Future 7G/8G networks are expected to integrate both terrestrial Internet and space-based networks. Space networks, including inter-planetary Internet such as cislunar and deep-space networks, will become an integral part of future 7G/8G networks. …”
Get full text
Article -
4510
“It’s about finding and knowing myself”: Why Johannesburg-based South African Millennials consume self-help media
Published 2023-07-01“… Using semi-structured, in-depth interviews with a group of ten middle-class, internet-connected, South African millennials in Johannesburg, Gauteng this analysis explores the psychosocial gratifications derived from their self-declared active sourcing and consumption of self-help media texts. …”
Get full text
Article -
4511
Design of Wireless Nanosensor Networks for Intrabody Application
Published 2015-07-01“…Nanoscale devices are able to be included with Internet. This new communication paradigm, referred to as Internet of Nanothings (IoNT), demands very short-range connections among nanoscale devices. …”
Get full text
Article -
4512
High-performance directional fuzzing scheme based on deep reinforcement learning
Published 2023-04-01“…With the continuous growth and advancement of the Internet and information technology, continuous growth and advancement of the Internet and information technology.Nevertheless, these applications’ vulnerabilities pose a severe threat to information security and users’ privacy.Fuzzing was widely used as one of the main tools for automatic vulnerability detection due to its ease of vulnerability recurrence and low false positive errors.It generates test cases randomly and executes the application by optimization in terms of coverage or sample generation to detect deeper program paths.However, the mutation operation in fuzzing is blind and tends to make the generated test cases execute the same program path.Consequently, traditional fuzzing tests have problems such as low efficiency, high randomness of inputs generation and limited pertinence of the program structure.To address these problems, a directional fuzzing based on deep reinforcement learning was proposed, which used deep reinforcement learning networks with information obtained by staking program to guide the selection of the inputs.Besides, it enabled fast approximation and inspection of the program paths that may exist vulnerabilities.The experimental results showed that the proposed approach had better performance than the popular fuzzing tools such as AFL and AFLGO in terms of vulnerability detection and recurrence on the LAVA-M dataset and real applications like LibPNG and Binutils.Therefore, the approach can provide support for further vulnerability mining and security research.…”
Get full text
Article -
4513
Double layer federated security learning architecture for artificial intelligence of things
Published 2024-12-01“…In order to overcome the performance and security challenges of using federated learning for joint training among multiple institutions in the context of intelligent Internet of Things, a two-level federated security learning architecture was proposed for intelligent Internet of Things. …”
Get full text
Article -
4514
5G value plane, the next generation of BSS/OSS consolidated architecture
Published 2022-05-01“…With the development of the mobile communication and Internet technology, the traditional communication business has been developed from voice communication services to diversified and personalized information services, and the value chain structure of the communication industry has been changed from the mobile network operator (MNO)-centered mode to the user experience-centered mode.With the concept of “content-driven”, Internet content providers update their products actively to satisfy the users’ needs, which results in a rapid increase in the market share, while the MNOs are gradually being “pipelined” in the industry value chain.In the process of the digital transformation, MNOs have achieved the on-demand scheduling, flexible adaptation, and rapid deployment by reconfiguring and abstracting 5G network functions, and have enhanced the user experience using a user centric operation model based on the business support system (BSS)/operation support system(OSS)(BO) consolidation to ultimately achieve the enhancement in the value chain.On the basis of reviewing the development of the communication industry’s value chain, the challenges for MNOs to promote their values were analyzed.Meanwhile, a 5G value plane architecture based on embedded services in 5G networks was proposed, and the typical application scenarios were given.Path suggestions for the evolution of the 5G value plane were provided, which help MNOs to build the next generation of BSS/ OSS consolidation.…”
Get full text
Article -
4515
CSN: The Conceptually Manageable Sensor Network
Published 2015-03-01“…For those emerging applications such as Internet of Things, the flexible, scalable, and interoperable, collaborating sensor networks are crucial. …”
Get full text
Article -
4516
Bifurcation of a Fractional-Order Delayed Malware Propagation Model in Social Networks
Published 2019-01-01“…In recent years, with the rapid development of the Internet and the Internet of Things, network security is urgently needed. …”
Get full text
Article -
4517
The study of social perceptions about Armenia by digital technologies
Published 2020-02-01“…The results of content analysis of Internet sources, as well as publications and cinematic sources on the topic of social representations about Armenia have been presented. …”
Get full text
Article -
4518
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01“… In recent days, increasing numbers of Internet and wireless network users have helped accelerate the need for encryption mechanisms and devices to protect user data sharing across an unsecured network. …”
Get full text
Article -
4519
Nefret Söylemi Mecrası Olarak Sosyal Medya: Ekşi Sözlük’te “Bizim Çocuklar” Örneği
Published 2023-08-01“…Nefret söylemi kavramı ile günlük hayatta sıklıkla karşılaşılmakta ve bu durum sıradanlaşmış bir hal almaktadır. İnternet dünyasındaki gelişmeler ve yeni medyanın kullanıcılara sağladığı imkanlar neticesinde günlük hayatta yer edinen nefret söylemi çevrimiçi dolaşıma sokulmakta, yeniden üretilmekte ve niceliği artarak yayılmaktadır. …”
Get full text
Article -
4520
A Study on Digital Game Addictions of Adolescents in the Covid-19 Pandemic
Published 2022-05-01“…The concept of digital game addiction has become an important issue that needs to be studied, depending on the increase in the time spent on the internet today, where technology and internet usage times are increasing rapidly. …”
Get full text
Article