Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Economic development 5
- Economic conditions 4
- Information technology 4
- Internet marketing 4
- Social aspects 4
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Economic aspects 2
- Economic policy 2
- Education 2
- Education, Elementary 2
- Educational technology 2
- Globalization 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Law 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- Sociolinguistics 2
- Teaching 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Academic writing 1
- Access control 1
-
4541
Pastoralisme et frugalité numérique : évaluation des usages chez les ménages pastoraux au Sénégal
Published 2024-04-01“…Toutefois, l’accès au téléphone et à l’internet semble très variable et conditionne l’intérêt du numérique pour le pastoralisme. …”
Get full text
Article -
4542
E-business tools adoption and export performance: Empirical evidence from Croatian companies
Published 2019-01-01“…Several distinct aspects of e-business tools adoption were examined, namely e-mail usage, internet usage in market research, promotion, e-commerce, and e-payment possibilities. …”
Get full text
Article -
4543
Study on the Evaluation Standard of Construction Quality for Asphalt Pavement Based on the Intelligent Sensing Aggregate
Published 2021-01-01“…The traditional evaluation method of construction quality for asphalt pavement has gradually lagged behind the pace of development of the road industry. Big data, Internet of Things (IoT), and intelligent sensing technology have been reflected in the field of road engineering, but these technologies also have technical shortcomings in terms of applicability, durability, real-time performance, and portability in practice. …”
Get full text
Article -
4544
Optimal Capacity Allocation of Large-Scale Wind-PV-Battery Units
Published 2014-01-01Get full text
Article -
4545
A Modified TODIM Based on Compromise Distance for MAGDM with q-Rung Orthopair Trapezoidal Fuzzy Numbers
Published 2021-01-01“…In this method, a new q-rung orthopair trapezoidal fuzzy weighted aggregating (q-ROTrFWA) operator is developed to integrate individual decision matrices into the collective decision matrix, and a q-rung orthopair trapezoidal fuzzy distance measure-based compromise approach is proposed to determine the relative dominance degree of alternatives. It is worth to mention that the modified TODIM method not only expands the freedom of decision makers but also allows decision makers to choose the appropriate risk preference parameter. …”
Get full text
Article -
4546
Exploring pre-service English teachers’ digital competence in creating interactive instructional materials
Published 2024-06-01“…They also reported several challenges encountered while creating the teaching materials, which mostly related to resources, such as internet connectivity and subscription access to the PACIFIC software. …”
Get full text
Article -
4547
A New Method of Image Steganography Using 7th Bit of a Pixel as Indicator by Introducing the Successive Temporary Pixel in the Gray Scale Image
Published 2018-01-01“…As the internet has become the medium for transferring the sensitive information, the security of the transferred message has become the utmost priority. …”
Get full text
Article -
4548
Open Educational Resources in the Development of Digital Learning Environment
Published 2020-12-01“…The educational materials free available at the Internet are the part of the digital environment, which are combined into the concept of open educational resources (OER). …”
Get full text
Article -
4549
Game Theoretic Request Scheduling with Queue Priority in Video Sensor Networks
Published 2014-03-01Get full text
Article -
4550
Risk and protective factors associated with adolescent depression in Singapore: a systematic review
Published 2025-01-01“…Further research should focus on current and prospective interventions to improve mental health literacy, targeting sleep duration, internet use and gaming, and mitigating the risk of depression in patients with chronic disease in the primary care and community setting.…”
Get full text
Article -
4551
The Moderating Influence of Project Scope on Leadership Skills, Stakeholder Management, and Execution of Fibre Optic Infrastructure
Published 2020-01-01“…Telecommunication and Internet service enterprise has drastically evolved in the last 10 years across the globe. …”
Get full text
Article -
4552
The Influence of Physical Tuning Technology on Voice Over LTE (VoLTE)
Published 2024-09-01“…Currently, LTE technology is only used for faster internet data activities. Unfortunately, phone calls still rely on second-generation (2G) or third-generation (3G) networks. …”
Get full text
Article -
4553
Short-term power prediction of photovoltaic power station based on long short-term memory-back-propagation
Published 2019-10-01Get full text
Article -
4554
„Nowe” problemy wychowawcze w dobie „nowych” mediów
Published 2012-12-01“…For many of them the Internet became an addiction which already requires treatment and therapy. …”
Get full text
Article -
4555
Network traffic control using traffic shaping techniques
Published 2024-01-01“…In this way, the operational characteristics of certain business systems as well as the quality of residential internet/iptv services could be compromised. One of the standard approaches to solving such a kind of problems is related to the concept of traffic management that includes 1) Traffic Policing techniques, as well as 2) Traffic Shaping techniques. …”
Get full text
Article -
4556
PROFILES AND PREFERENCES OF ON-LINE MILLENIAL SHOPPERS IN BULGARIA
Published 2014-05-01“…The most important reason why Bulgarian young people shop online is the pursuit of unique products not locally available, followed by convenience and better pricing, and their favorite category of internet purchases is “Apparel and Accessories.” Bulgarian millennials are using the internet to shop for trendy fashion and to obtain a variety of brands that are unavailable locally. …”
Get full text
Article -
4557
An overview of fake news detection: From a new perspective
Published 2025-01-01“…With the rapid development and popularization of Internet technology, the propagation and diffusion of information become much easier and faster. …”
Get full text
Article -
4558
Predictors, prevalence, and patterns of cyberbullying among school-going children and adolescents
Published 2023-07-01“…The Cyberbullying Online Aggression Survey Instrument (COASI), Strength and Difficulties Questionnaire (SDQ), Coping with Cyberbullying Questionnaire (CWCBQ), and Internet usage pattern were administered to collect the data. …”
Get full text
Article -
4559
Multiple redundant flow fingerprint model based on time slots
Published 2023-02-01“…With the increasingly widespread use of the Internet, various network security problems are frequently exposed, while the “patching” style security enhancement mechanisms cannot effectively prevent the growing security risks.The researchers in the field of network security believe that the future Internet architecture should take security as a basic attribute to provide the native security support which is also called as endogenous safety and security.In order to support the data trustworthiness of endogenous security, a time-slot based multiple redundant flow fingerprint model was designed and implemented based on the research of the watermark (or fingerprint) mechanism.The proposed model used only three time slot intervals and operated the packets within the specified time slots, so that the fingerprint can be embedded without conflicting with the adjacent bit operations.Redundant coding was introduced to improve the fingerprint robustness, and the behaviors such as jitter or malicious disruptions by attackers in the network were considered.Furthermore, the impacts of delayed interference, spam packet interference and packet loss interference were analyzed.The analytical results show that the robustness of the fingerprint model improves with increasing redundant bits when the packet distribution in the network stream is given.Besides, in order to reduce the consumption of time and space and improve the efficiency and accuracy of packet operations, a flow fingerprinting prototype system was designed and implemented based on the kernel, and its efficiency and robustness were evaluated.The experimental result show that the model has high robustness.Additionally, the application scenario of the model was elaborated, which can effectively detect man-in-the-middle attacks and prevent network identity spoofing with the help of the flow fingerprinting model.…”
Get full text
Article -
4560
Survey of deterministic service assurance technology in time sensitive networking
Published 2024-08-01“…With the rapid development of information technology, new types of services such as remote surgery and high-precision robot control in the Internet of things and industrial Internet have necessitated new requirements for end-to-end latency. …”
Get full text
Article