Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
4621
Digital competences and collaborative skills among university students
Published 2025-01-01“…Resulting in the favorite place to use the Internet after home is any place because they have a device (mobile phone), which in the long term would bring consequences to visual and mental health. …”
Get full text
Article -
4622
A Large-Scale Spatio-Temporal Multimodal Fusion Framework for Traffic Prediction
Published 2024-09-01Get full text
Article -
4623
The potential of artificial intelligence (AI) to improve electronic word-of-mouth's (eWOM) efficacy
Published 2024-01-01“…Internet-mediated online communication, particularly with regard to a product, brand, or organization, is known as electronic word-of-mouth (eWOM). …”
Get full text
Article -
4624
Efektivitas Kerjasama Open Library Telkom University dengan Universidade Da Paz (Unpaz) Timor Leste dalam Bentuk E-Resources
Published 2024-11-01“…Apart from that, improving internet network facilities for UNPAZ.…”
Get full text
Article -
4625
Technical frames used for the online reporting of lesbian killings in South Africa
Published 2023-12-01“…South Africa remains one of the most dangerous places for women – lesbians in particular – to live freely and safely, where a culture of patriarchy and a lack of socio-economic opportunity are ubiquitous throughout its communities. While the Internet has given journalists a wider platform to provide insights about issues plaguing lesbians, there is very little information regarding the elements used in these online reports. …”
Get full text
Article -
4626
Dynamic Evolutionary Games and Coordination of Multiple Recycling Channels considering Online Recovery Platform
Published 2021-01-01“…In this paper, we build a closed-loop supply chain that consists of a manufacturer and a third-party recycler based on the development of “Internet Plus” recovery platform. We thoroughly analyze the model and its evolution by chaos theory, complex dynamics theory, and numerical simulation and introduce the adaptive method to control the chaos of the system. …”
Get full text
Article -
4627
INFLUENCING FACTORS OF E-GOVERNMENT SERVICES ADOPTION IN BOSNIA AND HERZEGOVINA
Published 2018-11-01“…Also, citizens’ adoption and usage of e-government services depend on citizens’ age, level of education and internet experience. The conclusion can be that successful e-government services implementation greatly depend on citizens’ adoption and usage of e-government services. …”
Get full text
Article -
4628
A Systematic Review of the Coopetition Relationship between Bike-Sharing and Public Transit
Published 2024-01-01“…The sharing economy, mobile Internet, and smartphones have been widely utilized in recent years to promote the development of bike-sharing services. …”
Get full text
Article -
4629
Y Kuşağının Girişimcilik Eğilimlerinin Kişilik Özellikleri Bakımından İncelenmesi: Selçuk Üniversitesi İİBF İşletme Öğrencileri Üzerine Bir Araştırma
Published 2023-04-01“…Y kuşağı kendinden önce gelen diğer kuşaklardan farklılaşarak, internet ve teknolojik gelişim öncesini ve sonrası bilen, girişimciliğe en yatkın olan bir kuşaktır. …”
Get full text
Article -
4630
A fair non-collateral consensus protocol based on Merkle tree for hierarchical IoT blockchain
Published 2025-01-01“…Abstract In recent years, there has been a growing interest among researchers in Internet of Things Blockchain (IoTB). A critical aspect of IoTB is its consensus protocol, which faces challenges such as limited bandwidth, energy constraints, and storage space restrictions. …”
Get full text
Article -
4631
Task Grid-Based Urban Environmental Information Release Mechanism for Mobile Crowd Sensing
Published 2022-01-01Get full text
Article -
4632
Preferable academic work forms of medical students in the era of digitalization
Published 2023-06-01“…The work showed that behind the variety of medical students’ attitudes on the effectiveness of different forms of education, there is a willingness of young people to move away from traditional methods of obtaining professional knowledge and skills, and they clearly have a complex request for new forms of teaching, including using the Internet and electronic resources. The assessment of various forms and teaching methods has noticeable differences depending on the affiliation of students to various faculties. …”
Get full text
Article -
4633
Kurikulum Pendidikan Islam di Amerika
Published 2018-12-01“…Akan tetapi dalam pengambilan sumber referensi banyak dari internet. Hal ini disebabkan sejauh ini artikel maupun buku yang membahas kurikulum di berbagai negara termasuk Amerika sangat jarang atau boleh dikatakan langka. …”
Get full text
Article -
4634
La acción social colectiva queer durante el posacuerdo de paz en Colombia
Published 2024-02-01“…Metodológicamente, se rastreó información alojada en medios de comunicación, blogs de internet y páginas web respecto a la acción social colectiva queer dentro de las movilizaciones. …”
Get full text
Article -
4635
A novel and highly efficient botnet detection algorithm based on network traffic analysis of smart systems
Published 2022-03-01“…In smart systems, attackers can use botnets to launch different cyber attack activities against the Internet of Things. The traditional methods of detecting botnets commonly used machine learning algorithms, and it is difficult to detect and control botnets in a network because of unbalanced traffic data. …”
Get full text
Article -
4636
Novel continuous identity authentication method based on mouse behavior
Published 2022-10-01“…With the rapid development of Internet technologies, security issues have always been the hot topics.Continuous identity authentication based on mouse behavior plays a crucial role in protecting computer systems, but there are still some problems to be solved.Aiming at the problems of low authentication accuracy and long authentication latency in mouse behavior authentication method, a new continuous identity authentication method based on mouse behavior was proposed.The method divided the user’s mouse event sequence into corresponding mouse behaviors according to different types, and mined mouse behavior characteristics from various aspects based on mouse behaviors.Thereby, the differences in mouse behavior of different users can be better represented, and the authentication accuracy can be improved.Besides, the importance of mouse behavior features was obtained by the ReliefF algorithm, and on this basis, the irrelevant or redundant features of mouse behavior were removed by combining the neighborhood rough set to reduce model complexity and modeling time.Moreover binary classification was adopted.The algorithm performed the training of the authentication model.During identity authentication, the authentication model was used to obtain a classification score based on the mouse behavior collected each time, and then the user’s trust value was updated in combination with the trust model.When the user’s trust value fell below the threshold of the trust model, it might be judged as illegal user.The authentication effect of the proposed method was simulated on the Balabit and DFL datasets.The results show that, compared with the methods in other literatures, this method not only improves the authentication accuracy and reduces the authentication latency, but also has a certain robustness to the illegal intrusion of external users.…”
Get full text
Article -
4637
Argumentation and the “New Oratory”: the staging of the speaker in investor pitches in English
Published 2020-12-01“…The New Oratory marks a renewal of public speaking via formats that are typically uploaded to the Internet and place the focus on the “digital speaker”. …”
Get full text
Article -
4638
Skala adiksi media sosial: analisis validitas dan reliabilitas menggunakan rasch model
Published 2024-10-01“…Meningkatnya penggunaan internet untuk mengakses media sosial dapat menimbulkan risiko adiksi terhadap media sosial. …”
Get full text
Article -
4639
PUBLIC ADMINISTRATION AND SOCIAL SCIENCE DISCIPLINES: ANALYZING THE PROPINQUITY AND CONTRIBUTIONS
Published 2024-06-01“…In order to carry out this work, data were obtained largely from secondary sources from books, articles journals, Nigerian constitution, published and unpublished materials available as well as internet sources and it was analysed through discourse analyses from different perspectives of disciplinary evolution, development, scope, boundary, research, theory and practice, interrelationship among social sciences, It has been discovered inter-alia that the study and practice of public administration has been significantly influenced and shaped by various social science disciplines like political science, law, sociology, psychology, economics as it incorporates various ideas, concepts and principles in terms of policy formulation, implementation, evaluation as well as general human resource management. …”
Get full text
Article -
4640
Information needs research in Russia and Lithuania, 1965-2003
Published 2006-01-01“…The publications were retrieved from Lithuanian and Russian libraries or the Internet. <br /> <strong><br><b>Analysis.</b> </strong> The texts and, in cases when full-texts were not available, the abstracts were used for qualitative analysis assessing the relevance, content, concepts used and their change over time. …”
Get full text
Article