Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Economic development 5
- Economic conditions 4
- Information technology 4
- Internet marketing 4
- Social aspects 4
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Economic aspects 2
- Economic policy 2
- Education 2
- Education, Elementary 2
- Educational technology 2
- Globalization 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Law 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- Sociolinguistics 2
- Teaching 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Academic writing 1
- Access control 1
-
821
Development of unmanned remote smart rescue platform applying Internet of Things technology
Published 2018-06-01“…A new form of network has been created with the communication between objects in the Internet of Things environment. Users began to take interests in outdoor activities such as sports and leisure activities while sharing photographs and videos each other. …”
Get full text
Article -
822
To the Problem of Developing the Concept of Organising Social and Psychological-Pedagogical Work with Adolescents on the Internet
Published 2024-12-01“…The rapid development of digital technologies and the banalisation of the Internet in the practice of everyday life of children and adolescents provide not only new opportunities for self-realisation, but also confront new threats and risks in the digital environment. …”
Get full text
Article -
823
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01Get full text
Article -
824
İNTERNET SİTELERİNDEKİ HABERLERİN GÜNDEM BELİRMEDEKİ ETKİLERİ ÜZERİNE UYGULAMALI BİR ÇALIŞMA
Published 2014-05-01Subjects: “…gazetecilik; internet gazeteciği; internet'te marka; internet protokolü; haber…”
Get full text
Article -
825
Towards Exploration of Social in Social Internet of Vehicles Using an Agent-Based Simulation
Published 2019-01-01“…Internet of Vehicles (IoV) is turning out to be one of the first impressive examples of Internet of Things (IoT). …”
Get full text
Article -
826
Integration of Heterogeneous Devices and Communication Models via the Cloud in the Constrained Internet of Things
Published 2015-10-01“…As the Internet of Things continues to expand in the coming years, the need for services that span multiple IoT application domains will continue to increase in order to realize the efficiency gains promised by the IoT. …”
Get full text
Article -
827
Information technology application of nuclear power station commissioning under the background of internet+
Published 2017-03-01Subjects: “…internet+…”
Get full text
Article -
828
Secure communication approach for Internet of things based on C-RAN fronthaul compression
Published 2018-09-01Subjects: Get full text
Article -
829
AN APPLICATION OF UTAUT2 MODEL IN EXPLORING THE IMPACT OF QUALITY OF TECHNOLOGY ON MOBILE INTERNET
Published 2016-11-01Subjects: Get full text
Article -
830
Low Orbit Satellite Internet of Things Transmission Technology Based on LoRa
Published 2022-12-01Subjects: Get full text
Article -
831
Opportunities and Difficulties for Strategic Litigation to Advance Digital Rights in the Internet Audience Economy
Published 2024-08-01“…Internet tech giants are regulated by multiple overlapping yet distinct pieces of EU legislation that establish a range of substantive digital rights for internet users, and varying legal opportunity structures for strategic litigation within their enforcement architecture. …”
Get full text
Article -
832
Research and thinking on the application of agricultural Internet of things from the perspective of communication operators
Published 2018-12-01Subjects: “…agricultural Internet of things…”
Get full text
Article -
833
S-Vivaldi:a space repairing based Internet delay space embedding algorithm
Published 2012-03-01“…To counteract TIV’s influence on the Internet delay space models,an Internet delay space embedding algorithm based space repairing S-Vivaldi (scaling-Vivaldi) was proposed.S-Vivaldi firstly applied an exponent transformation on the delay matrix D,retrieved a matrix D'almost without TIV,and then embedded D'by the Vivaldi algorithm.The delay between any two nodes could be computed by a series of inverse transformation.Experimental results show that S-Vivaldi could improve the prediction accuracy apparently in the most case.…”
Get full text
Article -
834
Survey on cooperative fusion technologies with perception, communication and control coupled in industrial Internet
Published 2021-10-01Subjects: “…industrial Internet…”
Get full text
Article -
835
Mapping Internet Celebrity on TikTok: Exploring Attention Economies and Visibility Labours
Published 2021-01-01Subjects: Get full text
Article -
836
Recent advances on federated learning systems and the design for computing power Internet of things
Published 2024-12-01“…Computing power Internet of things (CPIoT) integrates Internet of things (IoT) devices with substantial computational resources to support data-intensive tasks, facilitating intelligent decision-making. …”
Get full text
Article -
837
Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles
Published 2021-06-01“…Identity authentication is the first line of defense for vehicles to access IoV (Internet of vehicles).However, the existing schemes cannot meet the requirements of efficient authentication of IoV well, nor can they realize fast anonymous traceability.In view of this, a bidirectional anonymous traceability group authentication protocol was proposed in IoV.In this protocol, a number of RSU (road side unit) were grouped quickly and dynamically.And the vehicles entering the RSU group were authenticated with the one-way trap gating property and semi-group property of Chebyshev chaotic map.When the vehicle switched between the RSU within a group, the reverse hash chain was used for fast handover authentication.In addition, the RSU within a group can trace anonymously and revoke the identity of malicious vehicles quickly by using blockchain, and can also freely change the ID of users who reveal their real identity.At the same time, the semantic security of the proposed protocol is proved by using the random predictor model.Finally, simulation results show the proposed scheme has good security and effectiveness.…”
Get full text
Article -
838
Controlling Embedded Systems Remotely via Internet-of-Things Based on Emotional Recognition
Published 2020-01-01Get full text
Article -
839
The Impact of the Internet of Things (IoT) on Healthcare Delivery: A Systematic Literature Review
Published 2023-09-01Subjects: Get full text
Article -
840