Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
5041
Psychological and legal aspects of cyberbullying
Published 2023-12-01“…Increasing the use of the Internet has led to a growing number of cases of online harassment. …”
Get full text
Article -
5042
Next-Generation energy Management: Particle Density algorithm for residential microgrid optimization
Published 2025-03-01“…The incorporation of Internet of Things (IoT) technology enables seamless communication, precise device control, and data-driven decision-making, empowering households to manage their energy loads more effectively and contribute to grid efficiency. …”
Get full text
Article -
5043
Utilizing MRAMs With Low Resistance and Limited Dynamic Range for Efficient MAC Accelerator
Published 2024-01-01“…The recent advancements in data mining, machine learning algorithms and cognitive systems have necessitated the development of neuromorphic processing engines which may enable resource and computationally intensive applications on the internet-of-Things (IoT) edge devices with unprecedented energy efficiency. …”
Get full text
Article -
5044
Technological Evolution of Architecture, Engineering, Construction, and Structural Health Monitoring of Bridges in Peru: History, Challenges, and Opportunities
Published 2025-01-01“…Finally, it is concluded that the integration of technologies of sensors, the IoT (Internet of Things), AI (artificial intelligence), UAVs (Unmanned Aerial Vehicles), remote sensing, BIM (Building Information Modeling), and DfMA (Design for Manufacturing and Assembly), among others, will allow for more safe, reliable, durable, productive, cost-effective, sustainable, and resilient bridge infrastructures in Peru in the face of climate change.…”
Get full text
Article -
5045
Robust Malware identification via deep temporal convolutional network with symmetric cross entropy learning
Published 2023-08-01“…Abstract Recent developments in the field of Internet of things (IoT) have aroused growing attention to the security of smart devices. …”
Get full text
Article -
5046
Prediction and influence factors analysis of IP backbone network traffic based on Prophet model and variance reduction
Published 2025-01-01“…Notably, four indices—Gross Domestic Product (GDP), per capita disposable income, per capita consumption expenditure, and the number of Internet broadband users—exhibit high correlation. …”
Get full text
Article -
5047
TRANSNATIONAL THREATS AND FOREIGN POLICY SHIFTS: INVESTIGATING THE IMPACT OF GLOBALIZATION ON WEST AFRICAN COUNTRIES
Published 2024-08-01“…Thus, sources of data in the conduct of the study were derived from journals, books, newspaper, institutional publications, and the internet. The paper adopted Complex Interdependence theory as a theoretical framework. …”
Get full text
Article -
5048
Web search results processing in an information support system for decision-making processes
Published 2024-09-01“…When solving problems of the web search results processing in a decision-making information support system, five main goals are pursued: the formation of an extended description of a problem situation, the synthesis of a search prescription, an Internet search for information about decisions made, the synthesis of a retelling of the information found, and an assessment of the quality of the found analogues of the decisions made.Methods. …”
Get full text
Article -
5049
New image encryption algorithm based on double chaotic system and compressive sensing
Published 2022-10-01“…Image encryption technology plays an important role in today’s multimedia applications and Internet information security transmission.However, most image encryption algorithms still have problems, for example, cipher images occupied high bandwidth during transmission, image encryption speed is slow, image encryption algorithms are not associated with plain image, and there is no complete ciphertext feedback mechanism.These problems all affect the security and easy use of image encryption algorithms.In order to solve the above problems, the compressive sensing technology and chaotic system were studied, and a new image encryption algorithm based on double chaotic system and compressive sensing with plaintext association was proposed.The plaintext image association key was used to associate the plain image hash value with the Logistic chaotic system parameters.Discrete wavelet transform, was used to sparse the plain image.Then the random measurement matrix was generated by the Logistic chaos system, and the image was encrypted once by combining the compressive sensing technique and the random measurement matrix to obtain the intermediate image.The intermediate image was hashed again, and the Rucklidge chaos system initial value was associated with the plain image hash value together.The Rucklidge chaotic system and encryption algorithm were used to control the intermediate image for secondary encryption and accordingly obtain the cipher image.The encryption algorithm was a new plaintext correlation encryption algorithm, which used the image’s own pixel value to control the scrambling of the intermediate image.It also enhanced the plaintext association and established a ciphertext feedback mechanism.Simulation results and performance analysis show that the algorithm has good encryption performance.The encrypted image can be compressed according to the compression ratio, effectively reducing the size of the cipher image.Moreover, it is resistant to common attacks such as known plaintext attack, selective plaintext attack and differential attack, which is better than other common image encryption algorithms.…”
Get full text
Article -
5050
A Novel Oil Spill Dataset Augmentation Framework Using Object Extraction and Image Blending Techniques
Published 2025-01-01“…For this, we proposed three key approaches, including oil spill dataset creation from an internet source, labeled oil spill regions extracted for blending with a background image, and the creation of a Gradio web application for simplifying the oil spill dataset generation process.…”
Get full text
Article -
5051
IDEALIZATION OF REALITY THROUGH PHOTOS IN SOCIAL NETWORKS
Published 2024-12-01“…The authors conclude that the aestheticization of reality using photos on social networks has become a common practice that significantly affects how people perceive and position themselves on the Internet. The photo has ceased to be personal, confidential, and has moved into the public sphere, which is directly related to the imposition of standards and cliches. …”
Get full text
Article -
5052
About a concept of creating a social network users information aggregation and data processing system
Published 2019-02-01“…To do this, the system has a module for collecting and converting information from third-party Internet sources and sending them to the database. …”
Get full text
Article -
5053
Identification of Fake Comments in E-Commerce Based on Triplet Convolutional Twin Network and CatBoost Model
Published 2025-01-01“…The continuous progress of Internet technology has promoted the maturity of online shopping market. …”
Get full text
Article -
5054
Haber Sitelerinin Mobil Görünümleri: Örnek Bir İnceleme
Published 2024-06-01“…İletişim teknolojilerindeki gelişmeler ve internet kullanımın artması sonucunda ortaya çıkan ve toplumda yaygın bir şekilde kullanılmaya başlayan mobil aygıtlar, insanlar tarafından habere ulaşmada kullanılan başat araçlardan biri konumuna gelmiştir. …”
Get full text
Article -
5055
Are there also negative effects of social support? A qualitative study of patients with inflammatory bowel disease
Published 2019-01-01“…This process also happens in online support groups and increases anxiety when exchanging with other people on the internet. Before motivating ill people to seek contact with others, they should know about the negative effects of social support.…”
Get full text
Article -
5056
Saúde emocional e pandemia: percepção docente e discente do curso de administração
Published 2023-03-01“…Assim, as perspectivas futuras remetem para o ensino híbrido, mudança comportamental e utilização massiva da internet na realização das atividades. O presente estudo, contribui com a literatura da gestão emocional diante de cenários de eventos adversos, bem como com a inserção de políticas públicas educacionais, a fim de atender a comunidade acadêmica. …”
Get full text
Article -
5057
Development and implementation of an electronic health record system for use in humanitarian emergencies, disaster response, and conflict zones.
Published 2025-01-01“…It was operationalized in settings with and without internet connectivity. We analyzed data on fEMR usage since inception until October 2022 to estimate the number of patients served by the system. …”
Get full text
Article -
5058
Healthcare access, attitudes and behaviours among Navajo adults during the COVID-19 pandemic: a cross-sectional study
Published 2024-07-01“…There were no significant differences in allopathic or traditional medical care experiences from before and during the pandemic. Despite limited internet access, 28.8% chose a telehealth appointment and 42% expressed satisfaction with their experience. …”
Get full text
Article -
5059
Psiko-Politika Çağının Aktivizmi
Published 2024-12-01“…Yeni iletişim teknolojileri, geleneksel medyanın sınırlarını aşarak kullanıcılara, içerik ve bilgi üzerinde daha fazla kontrol ve üretkenlik imkânı tanır. Ayrıca, bireylerin internet ortamında bireysel kimliklerinden sıyrılarak kolektif bir kimlik oluşturmasına olanak sağlar. …”
Get full text
Article -
5060
Going beyond cognitive approach to behavioral stream in economic sciences: Behavioristic and evolutionary perspectives
Published 2020-01-01“…A narrative literature review of scientific databases by means of Internet search engines based on the combinations of relevant keywords was used. …”
Get full text
Article