Showing 3,721 - 3,740 results of 5,694 for search '"internet"', query time: 0.07s Refine Results
  1. 3721
  2. 3722

    Cooperative Downloading by Multivehicles in Urban VANET by Di Wu, Yingrong Bi, Jie Liang

    Published 2014-02-01
    “…In VANET (vehicular ad hoc network), RSUs (road side units) have limited coverage and high deployment cost, so they are deployed sparsely in urban area, which leads to blind zone (BZ) between adjacent RSUs, where vehicles cannot connect to Internet by RSUs. In this paper, we study how to use RSUs and vehicles to download big files cooperatively in BZ. …”
    Get full text
    Article
  3. 3723

    Intent-driven 6G radio access network by Yangcheng ZHOU, Shi YAN, Mugen PENG

    Published 2020-03-01
    “…To satisfy the requirements of full-spectrum,full-scenario and full-service networking in the future Internet of things,the intent-driven radio access network (ID-RAN) is proposed for the 6G wireless communication system to decrease the networking costs and save the labor expense,while enhancing the intelligent capabilities of the radio access network.Based on the artificial intelligence,network function virtualization and software-defined networking,the intents from applications,performance requirements and networking status can be translated to the configuration and optimization strategies by the proposed ID-RAN,which enables 6G work efficiently,flexibility and elastically.The system architecture of ID-RAN was proposed firstly,and then the principles and solutions of key techniques were formulated,including intent translation,conflict resolution,configuration trigger,performance evaluation and optimization.Meanwhile,the open software-defined hardware platform for ID-RAN was built,and the corresponding performances aimed for 6G were presented.…”
    Get full text
    Article
  4. 3724

    Web services QoS prediction via matrix completion with structural noise by Lei CHEN, Geng YANG, Zheng-yu CHEN, Fu XIAO, Jian XU

    Published 2015-06-01
    “…With the rapid development of service-oriented computing, more and more Web services with the same or similar function are deployed on the Internet. Usually, before selecting the most suitable service, users need to predict QoS of unused services from the service invoking history. …”
    Get full text
    Article
  5. 3725

    Empowering MNOs with AI in 5G era by Siyu PAN, Yunyong ZHANG, Rongfang ZHANG, Di ZHANG

    Published 2019-04-01
    “…As the next generation of telecommunication standard and technology,5G makes it possible for the network to support more advanced technologies like IoT,VR/AR,etc,due to its unique features,high bandwidth and low latency.Those mushrooming new application scenarios and service demand has been bringing MNOs (mobile network operators) huge opportunities as well as challenges.With the development of AI and machine learning technology,MNOs can not only upgrade their own business but also enter more fields with the advantage of “data tunnel” to provide customized solutions for consumers.How AI can empower the MNOs in 5G era from 5 aspects was represented.First of all,the possible challenges brought by 5G were introduced.What entailed was the necessity and feasibility.Then,3 points where MNOs could focus on to carry out AI technologies were discussed,as namely intelligent network,intelligent marketing and service and industrial internet.Finally,the possible difficulties faced by MNOs when applying AI technologies in the future were forecasted.…”
    Get full text
    Article
  6. 3726

    Improve security monitoring knowledge management in IoT applications based on user behavior analysis by Hossein Amoozad-Khalili

    Published 2023-09-01
    “…This article presents a way to monitor knowledge management as well as to store and retrieve user information in the Internet of Things. Using the proposed method, users can transfer their data to IoT storage servers with more security than similar methods without knowing how and where to store it. …”
    Get full text
    Article
  7. 3727

    Research on deep reinforcement learning based intelligent shop scheduling method by Zihui LUO, Chengling JIANG, Liang LIU, Xiaolong ZHENG, Huadong MA

    Published 2022-03-01
    “…The unprecedented prosperity of the industrial internet of things (IIoT) has opened up a new path for the traditional industrial manufacturing model.Intelligent shop scheduling is one of the key technologies to achieve the overall control and flexible production of the whole production process.It requires an effective plan with a minimum makespan to allocate multiple processes and multiple machines for production scheduling.Firstly, the shop scheduling problem was defined as a Markov decision process (MDP), and a shop scheduling model based on the pointer network was established.Secondly, the job scheduling process was regarded as a mapping from one sequence to another, and a new shop scheduling algorithm based on deep reinforcement learning (DRL) was proposed.By analyzing the convergence of the model under different parameter settings, the optimal parameters were determined.Experimental results on different scales of public data sets and actual production data sets show that the proposed DRL algorithm can obtain better performances.…”
    Get full text
    Article
  8. 3728

    Green virtual topology design algorithm based on constraint-based routing by Yuan-sheng WU, Bing GUO, Yan SHEN, Ji-he WANG, Xiao-bin LIU

    Published 2014-04-01
    “…To reduce the energy consumption of Internet core network, a formulation model for green virtual topology design (GVTD) problem was developed, which employs the following measures: traffic aggregation, network resources allocation on demand, virtual topology design dynamically and multi-granularity sleeping. …”
    Get full text
    Article
  9. 3729

    Evaluation of Crypto Assets in terms of Digital Legacy Dimension and Inheritance Tax by Burçin Bozdoğanoğlu

    Published 2024-06-01
    “…Internet technology, which has become an indispensable part of human life after the acceleration of the digitalisation process, shopping applications, social media accounts, cloud computing and finally cryptocurrencies with blockchain technology have opened the doors to an almost completely digital world. …”
    Get full text
    Article
  10. 3730

    Students’ Socio-Cultural Competence Formation in Project Activity (Examplified by the Foreign Language Teaching) by N. G. Murayeva

    Published 2015-02-01
    “…The author argues that its introduction into the higher school training process can promote the students’ interest to the different culture and mentality, and their readiness for the cross-cultural dialog over the internet.…”
    Get full text
    Article
  11. 3731

    Músicos, productores y audiencias, cercanía desde la mediación social y tecnológica en Colombia by Sandra Velásquez, Tatiana López, Fabián Valverde

    Published 2018-07-01
    “…News about the death of this industry, the concentration of majors, copyright problems, download platforms, different audio devices, the increase of independent productions and the multinational organizations on internet, sonorities known outside their place of origin and the musicians’ new work forms without barriers of space and time, are subjects of analysis in the academia, in the media, on musicians’ encounters, and costumers’ conversations. …”
    Get full text
    Article
  12. 3732

    Consumer behavior change during the biometric payment technology implementation by l. G. Akhmaeva

    Published 2022-03-01
    “…Based on a scientific and Internet information sources the review and analysis of the activities of large Russian and foreign companies, providing the biometric payment service, on examples its implementation in retail and banking, are carried out. …”
    Get full text
    Article
  13. 3733

    Rekruttering af deltagere til online spørgeskemaundersøgelser om kriminelle aktiviteter by Thomas Friis Søgaard, Nina Tvede Korshøj, Vibeke Asmussen Frank

    Published 2022-10-01
    “…English abstract Internet-mediated research methods are increasingly used to access hidden crime-involved populations such as drug users and drug dealers. …”
    Get full text
    Article
  14. 3734

    Teacher Readiness for Digital Transformation by Hamimah Turrohmah, Suryanto Suryanto

    Published 2023-11-01
    “…However, there are obstacles in carrying out teacher activities using digital devices and media such as virtual media, web- based learning platforms, and the use of IoT (Internet of Things) caused by low adaptability. In overcoming this, the school's efforts are to provide digital literacy supplies and provide adequate digital technology. …”
    Get full text
    Article
  15. 3735

    Propagation of Computer Virus under Human Intervention: A Dynamical Model by Chenquan Gan, Xiaofan Yang, Wanping Liu, Qingyi Zhu, Xulong Zhang

    Published 2012-01-01
    “…Based on these results and a parameter analysis, some appropriate measures for eradicating the spread of computer virus across the Internet are recommended.…”
    Get full text
    Article
  16. 3736

    Vertical handoff research based on cognitive self-selection decision tree by Cun-qun FAN, Shang-guang WANG, Qi-bo SUN, Hua ZOU, Fang-chun YANG

    Published 2013-11-01
    “…In heterogeneous wireless network environments, users need to access to the internet anytime, anywhere, even in a high-speed moving process. …”
    Get full text
    Article
  17. 3737

    Energy efficiency maximization resource allocation algorithm in wireless-powered backscatter communication network by Yongjun XU, Bowen GU, Qianbin CHEN, Jinzhao LIN

    Published 2020-10-01
    “…In order to alleviate the energy consumption problem caused by the increasing number of Internet of things (IoT) nodes,an energy-efficient (EE) maximization based resource allocation algorithm was proposed for multi-carrier wireless-powered backscatter communication network.Firstly,a multivariable and nonlinear resource allocation model was formulated to jointly optimize transmit power,transmission time,reflection coefficient,and energy-harvesting allocation coefficient,where the maximum transmit power constraint of the power station and the minimum harvested energy constraint at the backscatter device were considered.Then,the original non-convex optimization problem was transformed into a convex one which was solved by using Dinkelbach’s method and the variable substitution approach.Furthermore,the analytical solution of the resource allocation problem was obtained based on Lagrange dual theory.Simulation results verify that the proposed algorithm has better EE by comparing it with the existing algorithm under pure backscatter mode and algorithm under the harvested-then-transmit mode.…”
    Get full text
    Article
  18. 3738

    MILITARY INTERVENTIONSAND THE NIGERIA FOURTH REPUBLIC: A REFLECTION DISCOURSE by Stella Ughulu Eghoikhunu, Ihaza Kayode

    Published 2023-08-01
    “…The paper used secondary data from newspapers and the internet. The qualitative method of analysis was used for this study. …”
    Get full text
    Article
  19. 3739
  20. 3740

    Digital marketing: does it impact on increasing the profit of MSMEs in Aceh? by Marjulin Marjulin

    Published 2023-12-01
    “…Modern market/consumer-oriented marketing concepts, or the marketing revolution manifested as an online marketplace, evolved in tandem with the rise of the internet. This study aims to develop knowledge by verifying whether the concept of using Digital Marketing in MSMEs in Aceh can increase operating profit. …”
    Get full text
    Article