Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
3661
Pengembangan Aplikasi Berlatih Membaca Cepat Berbahasa Inggris Berbasis Progressive Web App dengan Metode Prototyping
Published 2024-10-01“… Membaca merupakan proses memahami, menafsirkan, dan mengekstraksi informasi dari serangkaian kata yang memerlukan waktu. Melalui internet, akses membaca semakin luas dengan adanya konten seperti artikel, e-book, jurnal, dan lainnya yang mayoritas disajikan dalam bahasa Inggris. …”
Get full text
Article -
3662
Research Progress in Monitoring Technology of Cold Chain Logistics for Meat Products
Published 2025-02-01“…Advanced technologies like big data, the internet of things, and artificial intelligence are becoming widely used as Industry 4.0 technology, which develops quickly. …”
Get full text
Article -
3663
-
3664
-
3665
Smart tags based on the batteryless backscatter technology:applications and challenges
Published 2020-09-01“…Since the radio frequency identification (RFID) technology was put forward,it has been widely used in the transportation,logistics,industry and business due to its convenience and high efficiency.As a carrier for storing recognizable data,the RFID tags play a crucial role in the Internet of things (IoT).More and more functions and modules are embedded in the RFID tags and developed into smart tags in different application fields.Recently,wireless batteryless smart tags have arisen and grown rapidly with the development of the IoT and various emerging backscatter technologies.Wireless batteryless smart tags use the passive backscatter technology to harvest the energy and transmit information through radio frequency signals.Starting from the RFID technology,the history of the RFID and smart tags was introduced briefly,the differences between traditional smart tags and emerging wireless smart tags were compared,the advantages of wireless batteryless smart tags were concluded,several specific applications of it in different fields were listed,and the open challenges were analyzed.…”
Get full text
Article -
3666
AIoT: a taxonomy, review and future directions
Published 2021-08-01“…AIoT (artificial intelligence of things) is an integrated product of artificial intelligence (AI) and internet of things (IoT).Currently, it has been widely used in smart cities, smart homes, smart manufacturing, and driverless.However, the research of AIoT is still in its infancy, facing with many problems and challenges.In order to clarify the concept and provide possible solutions, a comprehensive survey was carried out on AIoT.Firstly, a clear definition of AIoT was provided, along with the brief introduction on its background and application scenarios.And then a novel cloud-edge-end hybrid AIoT architecture for intelligent information processing was constructed.Based on the research framework of AIoT, the research status and solutions were discussed, including AI integrated IoT data acquisition, complex event processing and coordination, cloud-edge-end integration, AI-enhanced IoT security and privacy, and AI-based applications, etc.Finally, it identified the open challenges and offers future research directions.…”
Get full text
Article -
3667
MARKETING STRATEGIES OF POLISH BANKS – EVALUATION ATTEMPT
Published 2013-12-01“…Various forms of distribution of banking products have developed, Internet channel being the one of the most intensely growing. …”
Get full text
Article -
3668
Digital solutions in the activities of small logistics enterprises (on the example of the Sverdlovsk region)
Published 2024-10-01“…The introduction of information technologies such as the Internet of Things, blockchain, sustainability technologies, robotization, big data analysis and artificial intelligence significantly allows to increase the efficiency of logistics companies, optimize routes and improve inventory management. …”
Get full text
Article -
3669
BANKALARDA HALKLA İLİŞKİLER FAALİYETLERİNİN PERFORMANSA ETKİSİ ve BİR UYGULAMA
Published 2012-06-01“…Bankaların halkla ilişkiler faaliyetlerinde en çok kullandıkları araçların sırasıyla, internet -Web sitesi, elektronik posta ve SMS mesajları olduğu görülmüştür. …”
Get full text
Article -
3670
Metaverso, Digital Twins e diritti fondamentali
Published 2024-07-01“…Il diritto deve affrontare la regolazione del metaverso, essendo alle porte la diffusione del web 4.0: la quarta generazione del World Wide Web che, utilizzando l'intelligenza artificiale e ambientale avanzata, l’Internet delle cose, le transazioni blockchain affidabili, i mondi virtuali e le funzionalità XR, permette agli oggetti e agli ambienti digitali e reali di integrarsi completamente e di comunicare tra loro; promette di consentire esperienze realmente intuitive e immersive, fondendo senza soluzione di continuità il mondo fisico e quello digitale. …”
Get full text
Article -
3671
The fiscalization of autonomy. State, indigenous peoples and accountability
Published 2019-09-01“…This paper shows part of the results of a research project conducted to identify the tensions and meeting points between state institutions of transparency, fiscalization and the allocation of resources and their instruments (platform for the open government, internet portals, rules of operation, among other) with institutions and community proceedings. …”
Get full text
Article -
3672
Design and implementation of low-cost hardware architecture for authentication encryption algorithm SM4-GCM
Published 2023-12-01“…The internet of things (IoT) has gained wide adoption across various industries, driving digitalization and intelligence in industry applications.However, the data collected by IoT devices in some industry applications may be closely linked to user privacy and property security.To ensure the security of such data, a cost-effective, multifunctional hardware architecture design based on the Chinese authenticated encryption algorithm SM4-GCM (Galois/Counter Mode) was proposed, which offered a balanced approach to performance, cost, and hardware-level data confidentiality and integrity assurance, and supported three operation modes: SM4-CTR, SM4-ECB, and SM4-GCM.The implementation results on the field programmable gate array (FPGA) development board demonstrate that the design requires only 1 761 look-up tables and 1 825 registers, occupies only 604 slices, and has a throughput rate of 39.78 Mbit/s@100 MHz.These results suggest that the proposed design can effectively meet the requirements of IoT data security applications.…”
Get full text
Article -
3673
Urban Road Landscape Design and Digital Twin Simulation Modeling Analysis
Published 2022-01-01“…The first step is to get data from the internet. A map-matching technique is also given in this section of preprocessing. …”
Get full text
Article -
3674
Digital twin based intelligent urban traffic forecasting and guidance strategy
Published 2023-03-01“…As the technology of ubiquitous Internet of things and artificial intelligence improves by leaps and bounds, the transportation system revolution is flourishing and bringing new opportunities and challenges.Considering the defect in the existing navigation system, and the neglect of the temporal and spatial characteristics of traffic flow, the macro traffic network and micro vehicle network were modeled and their coupling relationship was mined.Then, a digital twin based urban traffic forecasting and guidance method was proposed to alleviate the problem of traffic congestion.The spatial-temporal traffic flow information was predicted through the diffusion convolution recurrent neural network, which was explicitly applied to the vehicle path planning decision.On this basis, a spatial-temporal collaborative deep reinforcement learning method was proposed to implement the future-oriented collaborative path planning of vehicles.It also guided the underlying vehicle twins to select the optimal strategy for the real world.With SUMO for simulation verification, the experimental results show that the proposed method is significantly better than the existing algorithms in improving the travel completion ratio and congestion relief, and can improve the efficiency of urban traffic travel.…”
Get full text
Article -
3675
Joint Pricing and Purchasing Decisions for the Dual-Channel Newsvendor Model with Partial Information
Published 2014-01-01“…The newsvendor in our model simultaneously distributes a single product through traditional retail and Internet. A robust optimization approach that maximizes the worst-case profit is adapted under the aforementioned conditions to model demand uncertainty and linear clearing functions that characterize the relationship between demand and prices. …”
Get full text
Article -
3676
Open access to scientific publications - an analysis of the barriers to change
Published 2004-01-01“…One of the effects of the Internet is that the dissemination of scientific publications in a few years has migrated to electronic formats. …”
Get full text
Article -
3677
Sequential Uniformly Reweighted Sum-Product Algorithm for Cooperative Localization in Wireless Networks
Published 2014-08-01Get full text
Article -
3678
Research on pairing-free certificateless batch anonymous authentication scheme for VANET
Published 2017-11-01“…To solve the problem of security and efficiency of anonymous authentication in vehicular ad hoc network,a pairing-free certificateless batch anonymous authentication scheme was proposed.The public and private keys and pseudonyms were jointly generated by the trusted third party and vehicle,so the system security didn't depend on the tamper device.The scheme can realize authentication,anonymity,traceability,unforgeability,forward or backward security,and so on.Furthermore,under the random oracle model,the scheme can resist Type I and Type II attacks.Because there is no need to use certificates during authentication,the system storage load is effectively reduced.At the same time,the scheme realizes the batch message authentication on the basis of pairing-free operation,so the authentication efficiency is improved.Therefore,the scheme has important theoretical significance and application value in the resource-limited internet of things or embedded environment.…”
Get full text
Article -
3679
Wi-freshness: research on CSI-based pork freshness detecting system
Published 2023-06-01“…Effective and rapid detection of pork freshness is important for pork quality.However, traditional sensory evaluation methods are too subjective, physical and chemical analysis methods are time-consuming and destructive.Recently, radio frequency is widely used in the field of location, material identification and human body monitoring, while, the meat freshness detection is ignored.A real-time, non-destructive and low-cost system for pork freshness detecting based on channel state information (CSI) was proposed.It is a new application of internet of things in the field of fresh agricultural products based on ubiquitous network (commercial Wi-Fi).The proposed Wi-freshness consists of four modules: CSI data sensing, data pre-processing, detection modelling and freshness detection.Considering the need for Wi-freshness data characteristic value processing is not much, and high demand for real-time prediction characteristics, a detection model based broad learning system (BLS) was proposed.Experiment shows that Wi-freshness system can achieve more than 93% detection accuracy.…”
Get full text
Article -
3680
Design of polling access control protocol in WSN based on FPGA
Published 2016-10-01“…MAC(media access control) protocol is a direct link between physical and network layer,which is one of the key protocols to ensure high efficient communication.According to the characteristics of WSN (wireless sensor network) nodes,the design and implementation of polling access control protocol based on FPGA (field programmable gate array) were presented for the first time.The design made full use of the characteristics of flexibility and reconfigurability of FPGA.The method of combination of the hardware circuit description language Verilog HDL and the principle diagram was adopted,using Quartus II 8.0 to carry on the synthesis and routing,testing in the DE2.The design has the characteristics of good real-time,high reliability,strong portability,and can effectively reduce the transmission delay and improve the bus utilization.The designed system can be widely used in WSN,software radio network,ad hoc networks,military integrated service network,mobile communications networks,Internet of things as well as other fields.…”
Get full text
Article