Search results for "Internet."

showing 10 items of 2570 documents

Customer Views on Problems of Internet Shopping Using Mobile Devices: Results of Recent Survey

2021

Recent developments of information technologies have supported fast development of Internet shopping worldwide and also using mobile devices. Internet shopping creates convenience for customers, bigger selection of goods and services from one side, but also creates several challenges for companies as well as some problems for companies and customers from the other side. Active research on different aspects is done by businesses, academic researchers alone and in co-operation of business and academic researchers. The aim of research is to find recent ideas of customers on Internet shops and problems raised in Internet shopping using mobile devices and to compare the results with other countr…

ATM cardGoods and servicesDigital marketingbusiness.industryGeneral Earth and Planetary SciencesWord of mouthInformation technologyThe InternetAdvertisingBusinessMobile devicePersonally identifiable informationGeneral Environmental ScienceRegional Formation and Development Studies
researchProduct

Bezservera modulāra un mākonī bāzēta aplikaciju pārraudzīšanas ietvara izveide balstoties uz laC

2022

Darbā tiek veikta mākonī bāzētu bezservera AWS servisu izpēte un praktiska izmantošana 1NCE pārraudzības ietvara izveidē. Izveidotais mākonī bāzētais pārraudzības ietvars sastāv no trīs daļām un sešiem moduļiem. Tas nodrošina pilnīgu mājaslapu un API pārraudzību, kā arī integrāciju ar citiem servisiem. Pārraudzības ietvara AWS mākoņa infrastruktūra ir izveidota balstoties uz infrastruktūras kā koda ietvaru Terraform. Izpildes kods ir rakstīts JavaScript programmēšanas valodā. Pārraudzības ietvars nodrošina 1NCE darbībām svarīgu informāciju un atvieglo pakalpojuma līmeņa nolīgumu atbilstības analīzes darbu.

AWSmākonī bāzētslietu internetsDatorzinātneinfrastruktūra kā kodsbezservera
researchProduct

LINKED LIVES: RECEIVING AND GIVING HELP IN TECHNOLOGY USE IN LATER LIFE

2018

This study investigates how older people differ from younger people in terms of giving and receiving help in the use of a computer and a digital television. The analysis focuses on the effects of gender and health status. The data was derived from individual interviews (N=3,306) conducted in connection the Finnish Time Use Survey in 2009 and 2010. We employ logistic regression analysis to examine the relationship of health measures and background factors on giving and receiving help. The results show that people aged 55–64 (OR=3.9) and 65 or more (OR=4.4) received help in the use of these two technologies more often than the youngest age group (10–16). Respondents with a long-term disease (…

AbstractsHealth (social science)business.industryInternet privacySociologyLife-span and Life-course StudiesbusinessHealth Professions (miscellaneous)Innovation in Aging
researchProduct

Subjective Evaluation of Video on Demand Systems Using Different Network Connections

2009

Nowadays, society makes use of new technologies as they appear. Due to this boom, the use of resources via web is increasing notably. In of training and education cases, companies such as universities are offering tele-learning platforms to complement and facilitate the learning process. Some of these called e-learning platforms can have explanatory videos as a resource for training. For the codification of these videos, we have to use parameters which provide a trade-off between the video sizes to be transmitted that optimize bandwidth and video and audio quality. This paper presents a subjective study of the video quality on transmission depending on the types of users’ network access to …

Access networkMultimediaComputer scienceInteractive videoWireless networkbusiness.industryVideo qualitycomputer.software_genreResource (project management)ServerThe InternetSound qualitybusinesscomputer2009 First International Conference on Intensive Applications and Services
researchProduct

Impacto de la Sociedad del Conocimiento en la universidad y en la comunicación científica

2014

A la largo de las dos últimas décadas y como resultado de la introducción y uso intensivo de las tecnologías de la información y del conocimiento en general y de internet en particular, la universidad esta viviendo un proceso de transformación complejo que afecta a sus estructuras académicas y organizativas así como también a su concepción de metodología docente. Las TIC han evidenciado la necesidad de establecer estrategias de coherencia institucional en su uso y aplicación, así como la posibilidad de ampliar los ámbitos de acción institucional y el acceso masivo a la formación superior. Y todo ello pone de manifiesto el cambio existente de un modelo de formación basado en la transmisión d…

Access to informationSociology of scientific knowledgebusiness.industryICTSThe InternetOrganizational structureGeneral knowledgeSociologyPublic relationsAccess to Higher EducationbusinessCompetence (human resources)EducationRELIEVE - Revista Electrónica de Investigación y Evaluación Educativa
researchProduct

2021

Functional proprioceptive information is required to allow an individual to interact with the environment effectively for everyday activities such as locomotion and object manipulation. Specifically, research suggests that application of compression garments could improve proprioceptive regulation of action by enhancing sensorimotor system noise in individuals of different ages and capacities. However, limited research has been conducted with samples of elderly people thus far. This study aimed to examine acute effects of wearing knee-length socks (KLS) of various compression levels on ankle joint position sense in community-dwelling, older adults. A total of 26 participants (12 male and 14…

Acute effectsmedicine.medical_specialtyMultidisciplinaryProprioceptioncomputer.internet_protocolbusiness.industryJoint position sense030229 sport sciencesCompression (physics)Barefoot03 medical and health sciences0302 clinical medicineSOCKSPhysical medicine and rehabilitationmedicine.anatomical_structureMedicineAnklebusinesscomputer030217 neurology & neurosurgeryBalance (ability)PLOS ONE
researchProduct

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct

Utility-based resource allocations in multi-hop wireless networks

2011

It is well known that CSMA (Carrier Sense Multiple Access) protocols exhibit very poor performance in case of multi-hop transmissions, because of inter-link interference due to imperfect carrier sensing. Since ad-hoc networks based on multihop packet deliveries are becoming more and more common in different application and networking scenarios, different medium access control extensions are currently considered for improving the channel utilization efficiency. In this paper, we propose a simple approach based on preallocating temporal slots in which different sets of nodes are allowed to contend for the channel access, which can significantly improve CSMA performance with limited signaling …

Ad-hoc Networks; Distributed Resource Allocation; Game theory; Sensor NetworksSettore ING-INF/04 - Automatica[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Ad-hoc Networksad hoc wireless networks allocations networksSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSData_CODINGANDINFORMATIONTHEORYSensor NetworksDistributed Resource AllocationGame theory
researchProduct

Using adaptive fuzzy-neural control to minimize response time in cluster-based web systems

2005

We have developed content-aware request distribution algorithm called FARD which is a client-and-server-aware, dynamic and adaptive distribution policy in cluster-based Web systems. It assigns each incoming request to the server with the least expected response time. To estimate the expected response times it uses the fuzzy estimation mechanism. The system is adaptive as it uses a neural network learning ability for its adaptation. Simulations based on traces from the 1998 World Cup show that when we consider the response time, FARD can be more effective than the state-of-the-art content-aware policy LARD.

Adaptive controlArtificial neural networkComputer sciencebusiness.industryAdaptive systemResponse timeThe InternetFuzzy control systemArtificial intelligenceAdaptation (computer science)businessFuzzy logic
researchProduct

An efficient adaptive strategy for searching in peer-to-peer networks

2005

One of the main technical challenges in Peer-to-Peer (P2P) networks is how to efficiently locate desired resources. Although structured systems, based on distributed hash tables, can achieve fair effectiveness, they are not suitable for widely deployed Internet applications. In fact, this kind of systems shows many severe limitations, such as ignoring the autonomous nature of peers, and supporting only weakly semantic functions. Unstructured P2P networks are more attractive for real applications, since they can avoid both the limitations of centralized systems, and the drawbacks of structured approaches. However, their search algorithms are usually based on inefficient flooding schemes, tha…

Adaptive strategiesGeneral Computer ScienceExploitbusiness.industryComputer scienceDistributed computingPeer-to-peercomputer.software_genreNetwork topologyHash tableFlooding (computer networking)Search algorithmThe InternetbusinesscomputerMultiagent and Grid Systems
researchProduct