Showing 441 - 460 results of 568 for search '"Bill ', query time: 0.06s Refine Results
  1. 441

    Are robots coming to take the jobs of dental support staff? Ai applications in business management of dental practices by Alessandro Quaranta, Wang Lai Hui

    Published 2024-04-01
    “…By exploring current AI applications— including scheduling, billing, patient communication, inventory management, and marketing—the study assesses the benefits and challenges of AI adoption. …”
    Get full text
    Article
  2. 442

    Edge computing business model and key solutions for its landing and deployment by Yuan ZHAO, Bing XIN, Hongyuan MA, Lifeng CHEN

    Published 2020-09-01
    “…Edge computing is an innovation of network architecture and business model for operators.5G edge computing node is composed of 5G UPF and edge computing platform.It can be deployed at different levels of the network based on the demand for bandwidth,delay and local streaming.In the perspective of 5G application scenarios,depending on edge computing can meet the customer needs of differentiated vertical industries and seize the market opportunities,which is a sharp tool for operators to enter the vertical industry.The business model,billing scheme,landing deployment strategy and scheme of edge computing deployment were mainly studied,including business scenario,infrastructure,hardware system,site selection methodology,construction scheme,peripheral networking scheme,etc.…”
    Get full text
    Article
  3. 443
  4. 444

    A survey of mobile edge computing by Zishu LI, Renchao XIE, Li SUN, Tao HUANG

    Published 2018-01-01
    “…Mobile edge computing (MEC) technology integrates IT service environment and cloud computing technology at the edge of the network,improving the capacities of computing and storage of the edge of network,reducing network operation and service delivery delay and further enhancing the quality of experience (QoE) of users.Thus,MEC has attracted extensive attention and has been added in the 5G standard as a key technology.Firstly,the basic concept,reference architecture and technical advantages of MEC were introduced,and the current research state of MEC were summarized from three perspectives:academia,industry and standard setting.Then,the key enablers,application scenarios and specific deployment methods of MEC were introduced in detail.Finally,the existing problems of MEC,such as mobility,security and billing,as well as privacy protection,were discussed.…”
    Get full text
    Article
  5. 445

    Using Community-Based Social Marketing to Improve Energy Equity Programs by Marianne Schmink, Emily Ott, Paul Monaghan, Lee Hayes Byron, Alane Humrich, Jennison Kipp, Wendell Porter, Matthew Williams, Kimberly Davis, Fiona Hogan

    Published 2022-02-01
    “… This new 5-page publication of the UF/IFAS Department of Agricultural Education and Communication is part of a series that will help Extension agents, nonprofits, agency personnel and all types of community development practitioners to better understand the issue of high utility bills among low-income residents, the “energy equity gap” and what they can do to help. …”
    Get full text
    Article
  6. 446

    Assessing the impact of energy coaching with smart technology interventions to alleviate energy poverty by Joseph Llewellyn, Titus Venverloo, Fabio Duarte, Carlo Ratti, Cecilia Katzeff, Fredrik Johansson, Daniel Pargman

    Published 2025-01-01
    “…On average homes reduced monthly electricity consumption by 62 kWh (33%), gas by 41 m3 (42%), bills by €104 (53%) and percentage of income spent on energy from 10.1% to 5.3%.…”
    Get full text
    Article
  7. 447
  8. 448
  9. 449

    Secure and efficient token based roaming authentication scheme for space-earth integration network by Kaiping XUE, Yongjin MA, Jia’nan HONG, Jie XU, Qingyou YANG

    Published 2018-05-01
    “…Aiming at the problem of prolongation and instability of satellite and terrestrial physical communication links in the space-earth integration network,a two-way token based roaming authentication scheme was proposed.The scheme used the characteristics of the computing capability of the satellite nodes in the network to advance the user authentication process from the network control center (NCC) to the access satellite.The satellite directly verified the token issued by the NCC to verify the user's identity.At the same time,the token mechanism based on the one-way accumulator achieved the user's dynamic join,lightweight user self-service customization and billing,and the introduction of Bloom Filter enabled effective user revocation and malicious access management.Compared with the existing scheme,the scheme can guarantee the security of roaming authentication and significantly reduce the calculation and communication overhead of the authentication and key negotiation process.…”
    Get full text
    Article
  10. 450

    The Public Participation in the Drafting of Legislation in Hungary by László Vértesy

    Published 2016-11-01
    “…The general consultation is mandatory and open for the public, all draft bills, governmental decrees and ministerial decrees drafted by ministries are to be published on the Government’s webpage. …”
    Get full text
    Article
  11. 451

    A Novel Approach Based on Machine Learning, Blockchain, and Decision Process for Securing Smart Grid by Nabil Tazi Chibi, Omar Ait Oualhaj, Wassim Fassi Fihri, Hassan El Ghazi

    Published 2024-01-01
    “…Smart Grids (SGs) rely on advanced technologies, generating significant data traffic across the network, which plays a crucial role in various tasks such as electricity consumption billing, actuator activation, resource optimization, and network monitoring. …”
    Get full text
    Article
  12. 452

    Advanced energy management strategy for microgrids with integrated battery storage and renewable generation by El Ganaoui Mourlan Ouafae, Miliani El Hadj, Moussadeq Meryem, Kabalan Bilal

    Published 2025-01-01
    “…The integration of this EMS results in significant benefits, with approximately 12% savings in electricity bills compared to a reference strategy.…”
    Get full text
    Article
  13. 453

    E-invoice authenticity verification scheme based on signature verification by Rongna XIE, Weihua MAO, Guozhen SHI

    Published 2019-12-01
    “…With the rapid development of network and information technology,paperless and electronic have become the development trend of today's economic life.As a consumption certificate,electronic invoices have become more and more demanding in e-commerce.The existing electronic invoice verification method is to inquire the invoice information in the national electronic account base according to the invoice number,invoice code,billing date,and amount,and realize the function of comparison inquiry,and can not detect the fraudulent behavior of issuing invoices by non-issuing institutions,and cannot guarantee the full legality and authenticity of electronic invoices.Aiming at the above problems,a verification scheme for electronic invoice authenticity based on signature authentication was proposed.By verifying the signature of the tax agency,the legality verification of the blank electronic invoice is verified,and the digital signature of the seller is verified to determine the authenticity of the invoiced content.Ensure that the electronic invoices passed for verification are true and reliable.…”
    Get full text
    Article
  14. 454

    BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid by Wei Ren, Jun Song, Min Lei, Yi Ren

    Published 2011-01-01
    “…They are public key based scheme (PKS), password based scheme (PWS) and billed value-based scheme (BVS). BVS can achieve forward and backward security and only relies on hash functions. …”
    Get full text
    Article
  15. 455
  16. 456

    Analysis of energy poverty in the Republic of Croatia by Andrea Babić, Dubravka Maras

    Published 2024-06-01
    “…Energy poverty is generally defined as a situation in which households do not have enough disposable income to pay the bills for the energy needed in their household. The main factors that influence the appearance of energy poverty are primarily insufficient household incomes, the energy prices and their availability in a particular area, and the quality of housing units. …”
    Get full text
    Article
  17. 457
  18. 458
  19. 459

    Domestic Interest Rate and Capital Inflows Policy in Nigeria by Innocent Chile Nzeh, Uche Collins Nwogwugwu, Maria Chinecherem Uzonwanne, Chika Priscilla Imoagwu, Edwin Udochukwu Nwachukwu

    Published 2024-12-01
    “…Using a monthly dataset from 2010M1 to 2021M3 and the ARDL estimation technique, total sterilization serves as a proxy for sterilization policy, while the treasury bills rate proxies the domestic interest rate. Findings reveal that sterilization policy has a positive and significant impact on domestic interest rates in both the short-run and long-run. …”
    Get full text
    Article
  20. 460

    L’autorité internationale des fonds marins, l’environnement et le juge by Jean-Pierre Beurier

    Published 2015-09-01
    “…The XIth part has been modified concerning the international seabed regime, but the International seabed Authority has been created and has produced numerous bills about mineral resources management. The Authority delivers the exploration or exploitation authorizations and is in charge of their control. …”
    Get full text
    Article