Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security 3
- Security measures 3
- Prevention 2
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Security / General 1
- Civil rights 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Crime prevention 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Information technology 1
- Internal security 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Moral and ethical aspects 1
- National security 1
- POLITICAL SCIENCE / International Relations / General 1
- POLITICAL SCIENCE / Political Freedom & Security / International Security 1
- POLITICAL SCIENCE / Political Freedom & Security / Terrorism 1
- Security measures 1
- Security, International 1
- Social media 1
- Technology 1
-
641
Research on information extraction methods for historical classics under the threshold of digital humanities
Published 2022-11-01“…Digital humanities aims to use modern computer network technology to help traditional humanities research.Classical Chinese historical books are the important basis for historical research and learning, but since their writing language is classical Chinese, it is quite different from the vernacular Chinese in grammar and meaning, so it is not easy to read and understand.In view of the above problems, the solution to extract entities and relations in historical books based on pre-trained models was proposed to obtain the rich information contained in historical texts effectively.The model usedmulti-level pre-training tasks instead of BERT's original pre-training tasks to fully capture semantic information.And the model added some structures such as convolutional layers and sentence-level aggregations on the basis of the BERT model to optimize the generated word representation further.Then, in view of the scarcity of classical Chinese annotation data, a crowdsourcing system for the task of labeling historical classics was constructed, high-quality, large-scale entity and relation data was obtained and the classical Chinese knowledge extraction dataset was constructed.So it helped to evaluate the performance of the model and fine-tune the model.Experiments on the dataset constructed in this paper and on the GulianNER dataset demonstrated the effectiveness of the model proposed in this paper.…”
Get full text
Article -
642
Waiting Time Control Chart for M/G/1 Retrial Queue
Published 2024-09-01“…Retrial queues are used extensively to model many practical problems in service systems, call centers, data centers, and computer network systems. The average waiting time is the main observable characteristic of the retrial queues. …”
Get full text
Article -
643
Neuronal adaptation translates stimulus gaps into a population code.
Published 2014-01-01“…Here we study the transition to a population code for auditory gap stimuli both in neurophysiological recordings and in a computational network model. Independent component analysis (ICA) of experimental data from the inferior colliculus of Mongolian gerbils reveals that the network encodes different gap sizes primarily with its population firing rate within 30 ms after the presentation of the gap, where longer gap size evokes higher network activity. …”
Get full text
Article -
644
Three-Way Merging Algorithm for Structured Data
Published 2025-01-01“…This also means that the user must be constantly connected to the data source via a computer network. As a result, each user always has instant access to up-to-date data. …”
Get full text
Article -
645
Assessment methodology for security of an automated control system of critical information infrastructure against DDoS attacks based on Monte Carlo simulation
Published 2023-05-01“…A possible direction for further research is to study the issue of computer network security, taking into account the features of a specific topology.…”
Get full text
Article -
646
The role of the Internet in the modern life of children and teenagers: analysis of a sociological survey
Published 2023-03-01“…Achievements in the field of technology, which serve as the foundation of the emerging modern information society, have led to the rapid development of the Internet – a global computer network. The Internet is a mean of social communication that has both positive and negative effects on the global community. …”
Get full text
Article -
647
Dynamic QoS-aware intelligent edge computing resource management algorithm for body area networks
Published 2024-12-01“…The existing resource allocation methods in edge computing network are difficult to efficiently and flexibly support dynamic QoS of multi-source heterogeneous tasks in BAN. …”
Get full text
Article -
648
PREVENTION OF DEVIANT BEHAVIOUR OF MINORS IN THE TERRITORY OF THE STAVROPOL KRAI: A MODERN LEGAL AND INSTITUTIONAL ANALYSIS
Published 2021-09-01“…Today, the negative influence of the media, social networks, computer network games especially determines the deviant behavior of adolescents. …”
Get full text
Article -
649
«Potok» – distributed platform for modeling digital twins of the GLONASS
Published 2024-03-01“…The technical implementation of the platform consists of a distributed computing network, a repository of computer models, as well as a node for modelling session management. …”
Get full text
Article -
650
Networked Time and the ‘Common Ruin of the Contending Classes’
Published 2013-08-01“…This is a logic that functions at the global level and operates at computer network driven speeds, incorporating in its wake not only the polity, but economy and society, too. …”
Get full text
Article -
651
Understanding the Energy Transition by Analyzing the IT Revolution. An Infrastructural Reading to Direct Design Approaches Toward Energy Sustainability
Published 2024-06-01“…Thus, the analysis aims to analyze the limitations and potentials of the logical architecture models of the computer network, which have already been addressed and solved in the past, to reread the macro-strategies of current energy policies, based on the one hand on a technocratic vision that works on sources and infrastructure (that we can define as client server) and on the other hand on cooperation between actors and society (that we can define as peer to peer). …”
Get full text
Article -
652
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01“…About 32% of these companies have the controls at the level of computer network, 22% of them have the control at the operating system level, while 38% have the control at the software application level. …”
Get full text
Article -
653
Real Time Application for Automatic Object and 3D Position Detection and Sorting with Robotic Manipulator
Published 2020-08-01“…The information is therefore sent to the robot to create a path through a server-to-client connection over a computer network in real time.…”
Get full text
Article -
654
Regional experience in organizing the protection of minors from a destructive information environment (by the example of non-central regions)
Published 2023-03-01“…Achievements in the field of new technologies, on which the formation of the modern information society is based, have led to the rapid development of the global computer network Internet. The Internet as a means of social communication has both a positive impact on the world community and has negative consequences. …”
Get full text
Article -
655
Ensuring Privacy and Security on Banking Websites in Malaysia: A Cookies Scanner Solution
Published 2023-09-01“…When users use a computer network, their data will be saved by the web server as cookies, including their private information. …”
Get full text
Article -
656
A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services
Published 2024-12-01“…Fog computing is an emerging technology that extends the capability and efficiency of cloud computing networks by acting as a bridge among the cloud and the device. …”
Get full text
Article -
657
-
658
-
659
Digraph Spectral Clustering with Applications in Distributed Sensor Validation
Published 2014-07-01Get full text
Article -
660
Integrating genomic and pathological characteristics to enhance prognostic precision in advanced NSCLC
Published 2025-08-01Get full text
Article