Suggested Topics within your search.
Showing 301 - 320 results of 541 for search 'Selfiee~', query time: 1.79s Refine Results
  1. 301
  2. 302
  3. 303
  4. 304
  5. 305

    The international leader and his moral code according to the theory of realism by Monika M. Brzezińska

    Published 2020-05-01
    “…The more versatile the values, the greater the chance of peace, but because a realistic leader is characterized by untenable and selfish morality, which is neither lasting nor certain. …”
    Get full text
    Article
  6. 306
  7. 307
  8. 308

    Anonymous and authenticated routing protocol for mobile ad hoc networks by LI Xiao-qing, LI Hui, MA Jan-feng

    Published 2009-01-01
    “…Aimed at the anonymous of open environment of mobile ad hoc networks was not considered in the routing protocol of ARAN, and it was a low efficiency protocol in searching a routing.An new anonymous and authenticated routing protocol for mobile ad hoc networks(AARAN) was presented, It made use of hash function, signature and Hello message.The protocol can effectively ensure the anonymous of the networks, avoid launching a routing request repeat-edly, so it improves the efficiency, and the protocol can availably account for the harm which is caused by selfish nodes.…”
    Get full text
    Article
  9. 309
  10. 310
  11. 311

    Exploring the multidimensional nature of the psychopathy construct in social media context: Insights from Instagram by Mojtaba Elhami Athar

    Published 2025-03-01
    “…To address this gap in the literature, the current study examined the relationships between multiple dimensions of the psychopathy construct, as measured by the Youth Psychopathic Traits Inventory – Short Version (YPI-S), and indices of cybercrime, cyber abuse, sadfishing, Instagram addiction, and Instagram activity metrics (daily time spent, frequency of sharing stories/posts, and selfie-sharing), as well as indices of successful online careers in the context of Instagram. …”
    Get full text
    Article
  12. 312
  13. 313
  14. 314

    Incentive mechanism enables efficient fog network by Beibei WANG, Fei SHEN, Xujie LI, Huihui XU, Chongchong ZHANG

    Published 2019-03-01
    “…In order to improve the resource utilization and service quality of the fog network,as well as ensure the reliability and security of heterogeneous fog nodes,a reasonable incentive mechanism was required.The introduction of incentive mechanism can effectively motivate the service enthusiasm of fog network equipment and reduce the malicious or selfish behavior of the equipment.Firstly,the research significance of the fog computing was proposed,and the characteristics as well as the application scenarios of fog networks were given.Secondly,the system architecture of the fog network was introduced.Then the incentive mechanism was integrated with the resource sensing technology and the task offloading technology in the fog network,and further examples were presented to show the important role of the incentive mechanism in the fog network.…”
    Get full text
    Article
  15. 315
  16. 316
  17. 317

    Trust evaluation routing protocol to enforce cooperation in mobile ad hoc networks by Zhi-jun XU, Qi HU, Yu-jun ZHANG, Xin-ming YE

    Published 2012-07-01
    “…Mobile ad hoc networks(MANET)were based on the assumption that all participants cooperate and forward packets for others.Unfortunately,selfish nodes might be not willing to cooperate and refuse to forward packets.A trust evaluation routing protocol based on DSR (TDSR) was proposed to enforce cooperation and encourage forwarding packets in MANET.The trust value was used to evaluate packet forwarding behaviors.The nodes with low packet forwarding rate were excluded by the node and path trust evaluation.These nodes must wait some time for recovery.Simulation results show that TDSR has obviously higher packet delivery ratio than DSR in face of non-cooperated nodes at the expense of the performance degradation on the delay.…”
    Get full text
    Article
  18. 318
  19. 319
  20. 320