Journal articles on the topic 'Internet-transmitted content'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Internet-transmitted content.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Arya, Meenakshi S., Meenu Rani, and Charndeep Singh Bedi. "Improved Capacity Image Steganography Algorithm using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (December 1, 2016): 2735. http://dx.doi.org/10.11591/ijece.v6i6.10792.
Full textArya, Meenakshi S., Meenu Rani, and Charndeep Singh Bedi. "Improved Capacity Image Steganography Algorithm using 16-Pixel Differencing with n-bit LSB Substitution for RGB Images." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (December 1, 2016): 2735. http://dx.doi.org/10.11591/ijece.v6i6.pp2735-2741.
Full textПУЧКОВ, Олег Александрович. "THE PHYSICAL NATURE OF THE NETWORK SPACE AND LAW: SOME METHODOLOGICAL PROBLEMS." Rule-of-law state: theory and practice 17, no. 3(65) (October 22, 2021): 146–57. http://dx.doi.org/10.33184/pravgos-2021.3.12.
Full textSmith, Meghan, Emily Gertz, Sarah Alvarez, and Peter Lurie. "The Content and Accessibility of Sex Education Information on the Internet." Health Education & Behavior 27, no. 6 (December 2000): 684–94. http://dx.doi.org/10.1177/109019810002700603.
Full textN. Al-Wesabi, Fahd. "A Hybrid Intelligent Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet." Computers, Materials & Continua 66, no. 1 (2020): 195–211. http://dx.doi.org/10.32604/cmc.2020.012088.
Full textAL-WESABI, Fahd N. "Proposing High-Smart Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet." IEICE Transactions on Information and Systems E103.D, no. 10 (October 1, 2020): 2104–12. http://dx.doi.org/10.1587/transinf.2020edp7011.
Full textFlinn, Clodagh, Christina Koretsidou, and Finiki Nearchou. "Accessing Sexual Health Information Online: Content, Reasons and Practical Barriers in Emerging Adults." Youth 3, no. 1 (January 13, 2023): 107–24. http://dx.doi.org/10.3390/youth3010007.
Full textZeng, Meng, Ying Liu, and Geng Zhou. "Construction and Coping Strategies of Ideological and Political Education Evaluation System under the Background of Intelligent Internet of Things." Mobile Information Systems 2022 (September 26, 2022): 1–11. http://dx.doi.org/10.1155/2022/8937406.
Full textNaeem, Nor, Hassan, and Kim. "Compound Popular Content Caching Strategy in Named Data Networking." Electronics 8, no. 7 (July 10, 2019): 771. http://dx.doi.org/10.3390/electronics8070771.
Full textYokota, Rie, Tsuyoshi Okuhara, Haruka Ueno, Hiroko Okada, Emi Furukawa, and Takahiro Kiuchi. "Online Japanese-Language Information on Lifestyle Factors Associated With Reduced Fertility: Content Analysis." Journal of Medical Internet Research 22, no. 8 (August 25, 2020): e19777. http://dx.doi.org/10.2196/19777.
Full textABABNEH, Samer. "THE IMPACT OF ELECTRONICALLY TRANSMITTED WORD OF MOUTHE (E-WOM) ON THE MARKETING OF TOURISM SERVICES IN JORDAN: A CASE STUDY OF JERASH & AJLOUN CITIES." GeoJournal of Tourism and Geosites 43, no. 3 (September 30, 2022): 986–92. http://dx.doi.org/10.30892/gtg.43318-912.
Full textMcGlamery, Patrick, and Robert G. Cromley. "The Map Library’s Emerging Role in the Dissemination of Cartographic Information on the Internet." Cartographic Perspectives, no. 39 (June 1, 2001): 4–11. http://dx.doi.org/10.14714/cp39.605.
Full textMeng, Naeem, Ali, Zikria, and Kim. "DCS: Distributed Caching Strategy at the Edge of Vehicular Sensor Networks in Information-Centric Networking." Sensors 19, no. 20 (October 11, 2019): 4407. http://dx.doi.org/10.3390/s19204407.
Full textTanseer, Iffrah, Nadia Kanwal, Mamoona Naveed Asghar, Ayesha Iqbal, Faryal Tanseer, and Martin Fleury. "Real-Time, Content-Based Communication Load Reduction in the Internet of Multimedia Things." Applied Sciences 10, no. 3 (February 8, 2020): 1152. http://dx.doi.org/10.3390/app10031152.
Full textVučurović, Milica N. "An ethnotaxonomic classification of cultural thought among internet porn users, interpreted in the context of Japanese animated pornography." Issues in Ethnology and Anthropology 11, no. 1 (April 18, 2016): 193. http://dx.doi.org/10.21301/eap.v11i1.9.
Full textMiruta, Radu-Dinel, Cosmin Stanuica, and Eugen Borcoci. "New Fields in Classifying Algorithms for Content Awareness." International Journal of Information Technology and Web Engineering 7, no. 2 (April 2012): 1–15. http://dx.doi.org/10.4018/jitwe.2012040101.
Full textYerpude, Samir, and Dr Tarun Kumar Singhal. "Internet of Things based Customer Relationship Management – A Research Perspective." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 444. http://dx.doi.org/10.14419/ijet.v7i2.7.10860.
Full textAl-Dailami, Abdulrahman, Chang Ruan, Zhihong Bao, and Tao Zhang. "QoS3: Secure Caching in HTTPS Based on Fine-Grained Trust Delegation." Security and Communication Networks 2019 (December 28, 2019): 1–16. http://dx.doi.org/10.1155/2019/3107543.
Full textCil, Ibrahim, Fahri Arisoy, and Hilal Kilinc. "Visibility of resources and assets in the shipyard through industrial internet of things." Global Journal of Computer Sciences: Theory and Research 11, no. 2 (October 31, 2021): 88–101. http://dx.doi.org/10.18844/gjcs.v11i2.5429.
Full textShafi, Yusra, and Satish Saini. "A Study of Content-Based Recognition of Speech Utterance." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 480–88. http://dx.doi.org/10.22214/ijraset.2022.41292.
Full textGuskova, Svetlana V. "Polemical nature of political discourse in the regional Internet space." Neophilology, no. 2 (2022): 358–68. http://dx.doi.org/10.20310/2587-6953-2022-8-2-358-368.
Full textMancheva, Rusanka. "The Cyberbullying Phenomenon – Contemporary Narrative Form of Aggression in the School." Postmodernism Problems 10, no. 1 (April 2, 2020): 41–61. http://dx.doi.org/10.46324/pmp2001041.
Full textAbdulazeez, Hiba K., and Nasser N. Khamiss. "AN EFFICIENT ADAPTATION OF UHD VIDEO STREAMING OVER INTERNET." Iraqi Journal of Information and Communications Technology 1, no. 1 (December 15, 2021): 121–33. http://dx.doi.org/10.31987/ijict.1.1.154.
Full textTaha, Miran, Jaime Lloret, Alejandro Canovas, and Laura Garcia. "Survey of Transportation of Adaptive Multimedia Streaming service in Internet." Network Protocols and Algorithms 9, no. 1-2 (June 30, 2017): 85. http://dx.doi.org/10.5296/npa.v9i1-2.12412.
Full textHadi, Ido Prijana. "Pengguna Media Interaktif Sebagai Kenyataan Maya: Studi Resepsi Khalayak Suarasurabaya.net Sebagai Media Interaktif." Jurnal ASPIKOM 1, no. 3 (July 15, 2011): 231. http://dx.doi.org/10.24329/aspikom.v1i3.22.
Full textPetrova, Yulia. "Meme language, its impact on digital culture and collective thinking." E3S Web of Conferences 273 (2021): 11026. http://dx.doi.org/10.1051/e3sconf/202127311026.
Full textSarakutsa, Maria O., and Suliko V. Piliuk. "International legal regulation of rights and freedoms on the Internet." Analytical and Comparative Jurisprudence, no. 3 (February 20, 2022): 275–80. http://dx.doi.org/10.24144/2788-6018.2021.03.51.
Full textZakharchenko, Artem, and Edward Tsymbal. "Transformation of Viral Content in the Communication Process." Current Issues of Mass Communication, no. 17 (2015): 59–71. http://dx.doi.org/10.17721/2312-5160.2015.17.59-71.
Full textMa, Xue Chao, and Yan Bo Liu. "Research and Application of Information Hiding Algorithm." Applied Mechanics and Materials 672-674 (October 2014): 2009–12. http://dx.doi.org/10.4028/www.scientific.net/amm.672-674.2009.
Full textFRIEDLAND, GERALD, LARS KNIPPING, and ERNESTO TAPIA. "WEB BASED LECTURES PRODUCED BY AI SUPPORTED CLASSROOM TEACHING." International Journal on Artificial Intelligence Tools 13, no. 02 (June 2004): 367–82. http://dx.doi.org/10.1142/s0218213004001582.
Full textThabit, Reema, Nur Izura Udzir, Sharifah Md Yasin, Aziah Asmawi, Nuur Alifah Roslan, and Roshidi Din. "A Comparative Analysis of Arabic Text Steganography." Applied Sciences 11, no. 15 (July 26, 2021): 6851. http://dx.doi.org/10.3390/app11156851.
Full textGyimah, Seth Adjei. "Security During Transmission Of Data Using Web Steganography." Advances in Multidisciplinary and scientific Research Journal Publication 34 (December 30, 2022): 37–42. http://dx.doi.org/10.22624/aims/accrabespoke2022/v34p3.
Full textTian, Jing, Gang Xiong, Zhen Li, and Gaopeng Gou. "A Survey of Key Technologies for Constructing Network Covert Channel." Security and Communication Networks 2020 (August 5, 2020): 1–20. http://dx.doi.org/10.1155/2020/8892896.
Full textChiti, Francesco, Romano Fantacci, and Laura Pierucci. "Energy Efficient Communications for Reliable IoT Multicast 5G/Satellite Services." Future Internet 11, no. 8 (July 25, 2019): 164. http://dx.doi.org/10.3390/fi11080164.
Full textZhang, Yunsheng, and Xiaoping Meng. "Optimization of Self-Media Film and Television Content Production and Dissemination Paths under the Background of Artificial Intelligence." International Journal of Antennas and Propagation 2022 (September 8, 2022): 1–9. http://dx.doi.org/10.1155/2022/7983798.
Full textPappalardo, Martina, Antonio Virdis, and Enzo Mingozzi. "Energy-Optimized Content Refreshing of Age-of-Information-Aware Edge Caches in IoT Systems." Future Internet 14, no. 7 (June 28, 2022): 197. http://dx.doi.org/10.3390/fi14070197.
Full textBadr, Aymen Mudheher, Mohamed layth Talal, and Ghassan Sabeh. "Image in Image Steganography based on modified Advanced Encryption Standard and Lest Significant Bit Algorithms." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 26, no. 8 (October 15, 2018): 112–21. http://dx.doi.org/10.29196/jubpas.v26i8.1676.
Full textDebita, Grzegorz, Przemysław Falkowski-Gilski, Monika Zamłyńska, Marcin Habrych, Bogdan Miedziński, Teresa Kupczyk, and Bartosz Polnik. "Analysis of Video Transmission Capabilities in a Simulated OFDM-Based Supplementary BPL-PLC System." Energies 15, no. 10 (May 15, 2022): 3621. http://dx.doi.org/10.3390/en15103621.
Full textKaziaba, Viktoria, and Dana Barmina. "Linguistic Characteristics of the Captions to Internet Posts of English-Speaking Influencers." Vestnik Volgogradskogo gosudarstvennogo universiteta. Serija 2. Jazykoznanije, no. 3 (July 2022): 176–91. http://dx.doi.org/10.15688/jvolsu2.2022.3.14.
Full textBedari, Aseel, Song Wang, and Wencheng Yang. "A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks." Sensors 22, no. 19 (October 7, 2022): 7609. http://dx.doi.org/10.3390/s22197609.
Full textG, Anil Reddy, Balakathikeyan B, Sri Ram S, Dr R. P. S. Manikandan, Dr S. Prakash, and Mr B. Varun Kumar. "Automatic Water Saving Irrigation System Using IoT." International Journal for Research in Applied Science and Engineering Technology 10, no. 2 (February 28, 2022): 1157–60. http://dx.doi.org/10.22214/ijraset.2022.40469.
Full textVladimir I., Karasik, and Slyshkin Gennady G. "Modern discourse developmental trends." Current Issues in Philology and Pedagogical Linguistics, no. 1(2021) (March 25, 2021): 14–31. http://dx.doi.org/10.29025/2079-6021-2021-1-14-31.
Full textDevi, Kilari Jyothsna, Priyanka Singh, Jatindra Kumar Dash, Hiren Kumar Thakkar, José Santamaría, Musalreddy Venkata Jayanth Krishna, and Antonio Romero-Manchado. "A New Robust and Secure 3-Level Digital Image Watermarking Method Based on G-BAT Hybrid Optimization." Mathematics 10, no. 16 (August 21, 2022): 3015. http://dx.doi.org/10.3390/math10163015.
Full textYerpude, Samir, Tarun Kumar Singhal, and Hiren Rajeshkumar Rathod. "Achieving Service Process Excellence With Connected Customer." International Journal of Information Systems and Supply Chain Management 12, no. 1 (January 2019): 66–80. http://dx.doi.org/10.4018/ijisscm.2019010104.
Full textCivila, Sabina, Luis M. Romero-Rodríguez, and Amparo Civila. "The Demonization of Islam through Social Media: A Case Study of #Stopislam in Instagram." Publications 8, no. 4 (December 1, 2020): 52. http://dx.doi.org/10.3390/publications8040052.
Full textKanupuru, Priyanka, and Uma Reddy Nadig Vijayendra Reddy. "Multi Node Based Smart Monitoring System with Motor Dry Run Avoidance for Sustainable Agriculture." Instrumentation Mesure Métrologie 20, no. 1 (February 28, 2021): 39–47. http://dx.doi.org/10.18280/i2m.200106.
Full textSreenivasulu, Vallamchetty, and Mohammed Abdul Wajeed. "Image Based Classification of Rumor Information from the Social Network Platform." Traitement du Signal 38, no. 5 (October 31, 2021): 1413–21. http://dx.doi.org/10.18280/ts.380516.
Full textDuan, Yingjie, Hong Ni, and Xiaoyong Zhu. "Reliable Multicast Based on Congestion-Aware Cache in ICN." Electronics 10, no. 13 (June 30, 2021): 1579. http://dx.doi.org/10.3390/electronics10131579.
Full textAyoob, Noor Kadhim, Asraa Abdullah Hussein, and Rusul Mohammed Neamah. "A new method for watermarking color images using virtual hiding and El-Gamal ciphering." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (December 1, 2021): 5251. http://dx.doi.org/10.11591/ijece.v11i6.pp5251-5258.
Full textDeMers, Gerard, Christopher Kahn, Per Johansson, Colleen Buono, Octav Chipara, William Griswold, and Theodore Chan. "Secure Scalable Disaster Electronic Medical Record and Tracking System." Prehospital and Disaster Medicine 28, no. 5 (June 26, 2013): 498–501. http://dx.doi.org/10.1017/s1049023x13008686.
Full text