Showing 821 - 840 results of 19,848 for search 'Alternet~', query time: 8.42s Refine Results
  1. 821

    Development of unmanned remote smart rescue platform applying Internet of Things technology by Jung Woo Kim, Sang Hun Sul, Jae Boong Choi

    Published 2018-06-01
    “…A new form of network has been created with the communication between objects in the Internet of Things environment. Users began to take interests in outdoor activities such as sports and leisure activities while sharing photographs and videos each other. …”
    Get full text
    Article
  2. 822

    To the Problem of Developing the Concept of Organising Social and Psychological-Pedagogical Work with Adolescents on the Internet by N.V. Bogdanovich, V.V. Delibalt

    Published 2024-12-01
    “…The rapid development of digital technologies and the banalisation of the Internet in the practice of everyday life of children and adolescents provide not only new opportunities for self-realisation, but also confront new threats and risks in the digital environment. …”
    Get full text
    Article
  3. 823
  4. 824

    İNTERNET SİTELERİNDEKİ HABERLERİN GÜNDEM BELİRMEDEKİ ETKİLERİ ÜZERİNE UYGULAMALI BİR ÇALIŞMA by Sedat Şimşek

    Published 2014-05-01
    Subjects: “…gazetecilik; internet gazeteciği; internet'te marka; internet protokolü; haber…”
    Get full text
    Article
  5. 825

    Towards Exploration of Social in Social Internet of Vehicles Using an Agent-Based Simulation by Kashif Zia, Arshad Muhammad, Abbas Khalid, Ahmad Din, Alois Ferscha

    Published 2019-01-01
    “…Internet of Vehicles (IoV) is turning out to be one of the first impressive examples of Internet of Things (IoT). …”
    Get full text
    Article
  6. 826

    Integration of Heterogeneous Devices and Communication Models via the Cloud in the Constrained Internet of Things by Floris Van den Abeele, Jeroen Hoebeke, Ingrid Moerman, Piet Demeester

    Published 2015-10-01
    “…As the Internet of Things continues to expand in the coming years, the need for services that span multiple IoT application domains will continue to increase in order to realize the efficiency gains promised by the IoT. …”
    Get full text
    Article
  7. 827
  8. 828
  9. 829
  10. 830
  11. 831

    Opportunities and Difficulties for Strategic Litigation to Advance Digital Rights in the Internet Audience Economy by Swee Leng Harris

    Published 2024-08-01
    “…Internet tech giants are regulated by multiple overlapping yet distinct pieces of EU legislation that establish a range of substantive digital rights for internet users, and varying legal opportunity structures for strategic litigation within their enforcement architecture. …”
    Get full text
    Article
  12. 832
  13. 833

    S-Vivaldi:a space repairing based Internet delay space embedding algorithm by Zhan-feng WANG, Ming CHEN, Chang-you XING, Hua-li BAI, Xiang-lin WEI

    Published 2012-03-01
    “…To counteract TIV’s influence on the Internet delay space models,an Internet delay space embedding algorithm based space repairing S-Vivaldi (scaling-Vivaldi) was proposed.S-Vivaldi firstly applied an exponent transformation on the delay matrix D,retrieved a matrix D'almost without TIV,and then embedded D'by the Vivaldi algorithm.The delay between any two nodes could be computed by a series of inverse transformation.Experimental results show that S-Vivaldi could improve the prediction accuracy apparently in the most case.…”
    Get full text
    Article
  14. 834
  15. 835
  16. 836

    Recent advances on federated learning systems and the design for computing power Internet of things by LU Jianfeng, QI Pan, PAN Linyu, LI Bing, CAO Shuqin, JIN Yan'an

    Published 2024-12-01
    “…Computing power Internet of things (CPIoT) integrates Internet of things (IoT) devices with substantial computational resources to support data-intensive tasks, facilitating intelligent decision-making. …”
    Get full text
    Article
  17. 837

    Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles by Haibo ZHANG, Hongwu HUANG, Kaijian LIU, Xiaofan HE

    Published 2021-06-01
    “…Identity authentication is the first line of defense for vehicles to access IoV (Internet of vehicles).However, the existing schemes cannot meet the requirements of efficient authentication of IoV well, nor can they realize fast anonymous traceability.In view of this, a bidirectional anonymous traceability group authentication protocol was proposed in IoV.In this protocol, a number of RSU (road side unit) were grouped quickly and dynamically.And the vehicles entering the RSU group were authenticated with the one-way trap gating property and semi-group property of Chebyshev chaotic map.When the vehicle switched between the RSU within a group, the reverse hash chain was used for fast handover authentication.In addition, the RSU within a group can trace anonymously and revoke the identity of malicious vehicles quickly by using blockchain, and can also freely change the ID of users who reveal their real identity.At the same time, the semantic security of the proposed protocol is proved by using the random predictor model.Finally, simulation results show the proposed scheme has good security and effectiveness.…”
    Get full text
    Article
  18. 838
  19. 839
  20. 840