Showing 5,041 - 5,060 results of 5,694 for search '"internet"', query time: 0.10s Refine Results
  1. 5041

    Psychological and legal aspects of cyberbullying by O. L. Matsiuk, I. V. Maslyanikova

    Published 2023-12-01
    “…Increasing the use of the Internet has led to a growing number of cases of online harassment. …”
    Get full text
    Article
  2. 5042

    Next-Generation energy Management: Particle Density algorithm for residential microgrid optimization by Liang Wang, Nan Sun

    Published 2025-03-01
    “…The incorporation of Internet of Things (IoT) technology enables seamless communication, precise device control, and data-driven decision-making, empowering households to manage their energy loads more effectively and contribute to grid efficiency. …”
    Get full text
    Article
  3. 5043

    Utilizing MRAMs With Low Resistance and Limited Dynamic Range for Efficient MAC Accelerator by Sateesh, Kaustubh Chakarwar, Shubham Sahay

    Published 2024-01-01
    “…The recent advancements in data mining, machine learning algorithms and cognitive systems have necessitated the development of neuromorphic processing engines which may enable resource and computationally intensive applications on the internet-of-Things (IoT) edge devices with unprecedented energy efficiency. …”
    Get full text
    Article
  4. 5044

    Technological Evolution of Architecture, Engineering, Construction, and Structural Health Monitoring of Bridges in Peru: History, Challenges, and Opportunities by Carlos Cacciuttolo, Esteban Muñoz, Andrés Sotil

    Published 2025-01-01
    “…Finally, it is concluded that the integration of technologies of sensors, the IoT (Internet of Things), AI (artificial intelligence), UAVs (Unmanned Aerial Vehicles), remote sensing, BIM (Building Information Modeling), and DfMA (Design for Manufacturing and Assembly), among others, will allow for more safe, reliable, durable, productive, cost-effective, sustainable, and resilient bridge infrastructures in Peru in the face of climate change.…”
    Get full text
    Article
  5. 5045

    Robust Malware identification via deep temporal convolutional network with symmetric cross entropy learning by Jiankun Sun, Xiong Luo, Weiping Wang, Yang Gao, Wenbing Zhao

    Published 2023-08-01
    “…Abstract Recent developments in the field of Internet of things (IoT) have aroused growing attention to the security of smart devices. …”
    Get full text
    Article
  6. 5046

    Prediction and influence factors analysis of IP backbone network traffic based on Prophet model and variance reduction by Xuan Wei

    Published 2025-01-01
    “…Notably, four indices—Gross Domestic Product (GDP), per capita disposable income, per capita consumption expenditure, and the number of Internet broadband users—exhibit high correlation. …”
    Get full text
    Article
  7. 5047

    TRANSNATIONAL THREATS AND FOREIGN POLICY SHIFTS: INVESTIGATING THE IMPACT OF GLOBALIZATION ON WEST AFRICAN COUNTRIES by AHMED OLAWALE MOLIKI, NURUDEEN ABIDEMI AKANBI

    Published 2024-08-01
    “…Thus, sources of data in the conduct of the study were derived from journals, books, newspaper, institutional publications, and the internet. The paper adopted Complex Interdependence theory as a theoretical framework. …”
    Get full text
    Article
  8. 5048

    Web search results processing in an information support system for decision-making processes by S. F. Lipnitsky, L. V. Stepura

    Published 2024-09-01
    “…When solving problems of the web search results processing in a decision-making information support system, five main goals are pursued: the formation of an extended description of a problem situation, the synthesis of a search prescription, an Internet search for information about decisions made, the synthesis of a retelling of the information found, and an assessment of the quality of the found analogues of the decisions made.Methods. …”
    Get full text
    Article
  9. 5049

    New image encryption algorithm based on double chaotic system and compressive sensing by Yuguang YANG, Guodong CAO

    Published 2022-10-01
    “…Image encryption technology plays an important role in today’s multimedia applications and Internet information security transmission.However, most image encryption algorithms still have problems, for example, cipher images occupied high bandwidth during transmission, image encryption speed is slow, image encryption algorithms are not associated with plain image, and there is no complete ciphertext feedback mechanism.These problems all affect the security and easy use of image encryption algorithms.In order to solve the above problems, the compressive sensing technology and chaotic system were studied, and a new image encryption algorithm based on double chaotic system and compressive sensing with plaintext association was proposed.The plaintext image association key was used to associate the plain image hash value with the Logistic chaotic system parameters.Discrete wavelet transform, was used to sparse the plain image.Then the random measurement matrix was generated by the Logistic chaos system, and the image was encrypted once by combining the compressive sensing technique and the random measurement matrix to obtain the intermediate image.The intermediate image was hashed again, and the Rucklidge chaos system initial value was associated with the plain image hash value together.The Rucklidge chaotic system and encryption algorithm were used to control the intermediate image for secondary encryption and accordingly obtain the cipher image.The encryption algorithm was a new plaintext correlation encryption algorithm, which used the image’s own pixel value to control the scrambling of the intermediate image.It also enhanced the plaintext association and established a ciphertext feedback mechanism.Simulation results and performance analysis show that the algorithm has good encryption performance.The encrypted image can be compressed according to the compression ratio, effectively reducing the size of the cipher image.Moreover, it is resistant to common attacks such as known plaintext attack, selective plaintext attack and differential attack, which is better than other common image encryption algorithms.…”
    Get full text
    Article
  10. 5050

    A Novel Oil Spill Dataset Augmentation Framework Using Object Extraction and Image Blending Techniques by Farkhod Akhmedov, Halimjon Khujamatov, Mirjamol Abdullaev, Heung-Seok Jeon

    Published 2025-01-01
    “…For this, we proposed three key approaches, including oil spill dataset creation from an internet source, labeled oil spill regions extracted for blending with a background image, and the creation of a Gradio web application for simplifying the oil spill dataset generation process.…”
    Get full text
    Article
  11. 5051

    IDEALIZATION OF REALITY THROUGH PHOTOS IN SOCIAL NETWORKS by Svetlana M. Maltseva, Natalia A. Nikitina, Ekaterina S. Surovegina

    Published 2024-12-01
    “…The authors conclude that the aestheticization of reality using photos on social networks has become a common practice that significantly affects how people perceive and position themselves on the Internet. The photo has ceased to be personal, confidential, and has moved into the public sphere, which is directly related to the imposition of standards and cliches. …”
    Get full text
    Article
  12. 5052

    About a concept of creating a social network users information aggregation and data processing system by L. V. Rudikova, O. R. Myslivec

    Published 2019-02-01
    “…To do this, the system has a module for collecting and converting information from third-party Internet sources and sending them to the database. …”
    Get full text
    Article
  13. 5053

    Identification of Fake Comments in E-Commerce Based on Triplet Convolutional Twin Network and CatBoost Model by Juanjuan Peng

    Published 2025-01-01
    “…The continuous progress of Internet technology has promoted the maturity of online shopping market. …”
    Get full text
    Article
  14. 5054

    Haber Sitelerinin Mobil Görünümleri: Örnek Bir İnceleme by Hakan Aydın, Burak Somuncu

    Published 2024-06-01
    “…İletişim teknolojilerindeki gelişmeler ve internet kullanımın artması sonucunda ortaya çıkan ve toplumda yaygın bir şekilde kullanılmaya başlayan mobil aygıtlar, insanlar tarafından habere ulaşmada kullanılan başat araçlardan biri konumuna gelmiştir. …”
    Get full text
    Article
  15. 5055

    Are there also negative effects of social support? A qualitative study of patients with inflammatory bowel disease by Alexander Palant, Wolfgang Himmel

    Published 2019-01-01
    “…This process also happens in online support groups and increases anxiety when exchanging with other people on the internet. Before motivating ill people to seek contact with others, they should know about the negative effects of social support.…”
    Get full text
    Article
  16. 5056

    Saúde emocional e pandemia: percepção docente e discente do curso de administração by Andrieli de Fátima Paz Nunes, Beatriz Leite Gustmann de Castro, Greice Eccel Pontelli, Vania Medianeira Flores Costa, Jordana Marques Kneipp

    Published 2023-03-01
    “…Assim, as perspectivas futuras remetem para o ensino híbrido, mudança comportamental e utilização massiva da internet na realização das atividades. O presente estudo, contribui com a literatura da gestão emocional diante de cenários de eventos adversos, bem como com a inserção de políticas públicas educacionais, a fim de atender a comunidade acadêmica. …”
    Get full text
    Article
  17. 5057

    Development and implementation of an electronic health record system for use in humanitarian emergencies, disaster response, and conflict zones. by Sarah D Draugelis, Erik C Brown, Donald A Donahue, Justin Hickman, Sean G Smith, Philip Sutherland, George A Yendewa, Amir M Mohareb

    Published 2025-01-01
    “…It was operationalized in settings with and without internet connectivity. We analyzed data on fEMR usage since inception until October 2022 to estimate the number of patients served by the system. …”
    Get full text
    Article
  18. 5058

    Healthcare access, attitudes and behaviours among Navajo adults during the COVID-19 pandemic: a cross-sectional study by Robin B Harris, Carmenlita Chief, Heidi E Brown, Rachelle L Begay, Priscilla R Sanderson, Breanna Lameman

    Published 2024-07-01
    “…There were no significant differences in allopathic or traditional medical care experiences from before and during the pandemic. Despite limited internet access, 28.8% chose a telehealth appointment and 42% expressed satisfaction with their experience. …”
    Get full text
    Article
  19. 5059

    Psiko-Politika Çağının Aktivizmi by Filiz Aydoğan Boschele, Eylül Buse Bülbül

    Published 2024-12-01
    “…Yeni iletişim teknolojileri, geleneksel medyanın sınırlarını aşarak kullanıcılara, içerik ve bilgi üzerinde daha fazla kontrol ve üretkenlik imkânı tanır. Ayrıca, bireylerin internet ortamında bireysel kimliklerinden sıyrılarak kolektif bir kimlik oluşturmasına olanak sağlar. …”
    Get full text
    Article
  20. 5060

    Going beyond cognitive approach to behavioral stream in economic sciences: Behavioristic and evolutionary perspectives by Dominika Korzeniowska, Łukasz Sułkowski

    Published 2020-01-01
    “…A narrative literature review of scientific databases by means of Internet search engines based on the combinations of relevant keywords was used. …”
    Get full text
    Article