Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Information technology 4
- Internet marketing 4
- Social aspects 3
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Access control 1
- Advertising 1
- Attitudes 1
- BUSINESS & ECONOMICS / General 1
- BUSINESS & ECONOMICS / Public Relations 1
- Big data 1
- COMPUTERS / Internet / General 1
- Censorship 1
- Chirurgie orthopédique 1
- Cloud computing 1
- Collectors and collecting 1
-
3721
Control Theory-Based Load Balancing for Wireless Sensor Network
Published 2014-03-01Get full text
Article -
3722
Cooperative Downloading by Multivehicles in Urban VANET
Published 2014-02-01“…In VANET (vehicular ad hoc network), RSUs (road side units) have limited coverage and high deployment cost, so they are deployed sparsely in urban area, which leads to blind zone (BZ) between adjacent RSUs, where vehicles cannot connect to Internet by RSUs. In this paper, we study how to use RSUs and vehicles to download big files cooperatively in BZ. …”
Get full text
Article -
3723
Intent-driven 6G radio access network
Published 2020-03-01“…To satisfy the requirements of full-spectrum,full-scenario and full-service networking in the future Internet of things,the intent-driven radio access network (ID-RAN) is proposed for the 6G wireless communication system to decrease the networking costs and save the labor expense,while enhancing the intelligent capabilities of the radio access network.Based on the artificial intelligence,network function virtualization and software-defined networking,the intents from applications,performance requirements and networking status can be translated to the configuration and optimization strategies by the proposed ID-RAN,which enables 6G work efficiently,flexibility and elastically.The system architecture of ID-RAN was proposed firstly,and then the principles and solutions of key techniques were formulated,including intent translation,conflict resolution,configuration trigger,performance evaluation and optimization.Meanwhile,the open software-defined hardware platform for ID-RAN was built,and the corresponding performances aimed for 6G were presented.…”
Get full text
Article -
3724
Web services QoS prediction via matrix completion with structural noise
Published 2015-06-01“…With the rapid development of service-oriented computing, more and more Web services with the same or similar function are deployed on the Internet. Usually, before selecting the most suitable service, users need to predict QoS of unused services from the service invoking history. …”
Get full text
Article -
3725
Empowering MNOs with AI in 5G era
Published 2019-04-01“…As the next generation of telecommunication standard and technology,5G makes it possible for the network to support more advanced technologies like IoT,VR/AR,etc,due to its unique features,high bandwidth and low latency.Those mushrooming new application scenarios and service demand has been bringing MNOs (mobile network operators) huge opportunities as well as challenges.With the development of AI and machine learning technology,MNOs can not only upgrade their own business but also enter more fields with the advantage of “data tunnel” to provide customized solutions for consumers.How AI can empower the MNOs in 5G era from 5 aspects was represented.First of all,the possible challenges brought by 5G were introduced.What entailed was the necessity and feasibility.Then,3 points where MNOs could focus on to carry out AI technologies were discussed,as namely intelligent network,intelligent marketing and service and industrial internet.Finally,the possible difficulties faced by MNOs when applying AI technologies in the future were forecasted.…”
Get full text
Article -
3726
Improve security monitoring knowledge management in IoT applications based on user behavior analysis
Published 2023-09-01“…This article presents a way to monitor knowledge management as well as to store and retrieve user information in the Internet of Things. Using the proposed method, users can transfer their data to IoT storage servers with more security than similar methods without knowing how and where to store it. …”
Get full text
Article -
3727
Research on deep reinforcement learning based intelligent shop scheduling method
Published 2022-03-01“…The unprecedented prosperity of the industrial internet of things (IIoT) has opened up a new path for the traditional industrial manufacturing model.Intelligent shop scheduling is one of the key technologies to achieve the overall control and flexible production of the whole production process.It requires an effective plan with a minimum makespan to allocate multiple processes and multiple machines for production scheduling.Firstly, the shop scheduling problem was defined as a Markov decision process (MDP), and a shop scheduling model based on the pointer network was established.Secondly, the job scheduling process was regarded as a mapping from one sequence to another, and a new shop scheduling algorithm based on deep reinforcement learning (DRL) was proposed.By analyzing the convergence of the model under different parameter settings, the optimal parameters were determined.Experimental results on different scales of public data sets and actual production data sets show that the proposed DRL algorithm can obtain better performances.…”
Get full text
Article -
3728
Green virtual topology design algorithm based on constraint-based routing
Published 2014-04-01“…To reduce the energy consumption of Internet core network, a formulation model for green virtual topology design (GVTD) problem was developed, which employs the following measures: traffic aggregation, network resources allocation on demand, virtual topology design dynamically and multi-granularity sleeping. …”
Get full text
Article -
3729
Evaluation of Crypto Assets in terms of Digital Legacy Dimension and Inheritance Tax
Published 2024-06-01“…Internet technology, which has become an indispensable part of human life after the acceleration of the digitalisation process, shopping applications, social media accounts, cloud computing and finally cryptocurrencies with blockchain technology have opened the doors to an almost completely digital world. …”
Get full text
Article -
3730
Students’ Socio-Cultural Competence Formation in Project Activity (Examplified by the Foreign Language Teaching)
Published 2015-02-01“…The author argues that its introduction into the higher school training process can promote the students’ interest to the different culture and mentality, and their readiness for the cross-cultural dialog over the internet.…”
Get full text
Article -
3731
Músicos, productores y audiencias, cercanía desde la mediación social y tecnológica en Colombia
Published 2018-07-01“…News about the death of this industry, the concentration of majors, copyright problems, download platforms, different audio devices, the increase of independent productions and the multinational organizations on internet, sonorities known outside their place of origin and the musicians’ new work forms without barriers of space and time, are subjects of analysis in the academia, in the media, on musicians’ encounters, and costumers’ conversations. …”
Get full text
Article -
3732
Consumer behavior change during the biometric payment technology implementation
Published 2022-03-01“…Based on a scientific and Internet information sources the review and analysis of the activities of large Russian and foreign companies, providing the biometric payment service, on examples its implementation in retail and banking, are carried out. …”
Get full text
Article -
3733
Rekruttering af deltagere til online spørgeskemaundersøgelser om kriminelle aktiviteter
Published 2022-10-01“…English abstract Internet-mediated research methods are increasingly used to access hidden crime-involved populations such as drug users and drug dealers. …”
Get full text
Article -
3734
Teacher Readiness for Digital Transformation
Published 2023-11-01“…However, there are obstacles in carrying out teacher activities using digital devices and media such as virtual media, web- based learning platforms, and the use of IoT (Internet of Things) caused by low adaptability. In overcoming this, the school's efforts are to provide digital literacy supplies and provide adequate digital technology. …”
Get full text
Article -
3735
Propagation of Computer Virus under Human Intervention: A Dynamical Model
Published 2012-01-01“…Based on these results and a parameter analysis, some appropriate measures for eradicating the spread of computer virus across the Internet are recommended.…”
Get full text
Article -
3736
Vertical handoff research based on cognitive self-selection decision tree
Published 2013-11-01“…In heterogeneous wireless network environments, users need to access to the internet anytime, anywhere, even in a high-speed moving process. …”
Get full text
Article -
3737
Energy efficiency maximization resource allocation algorithm in wireless-powered backscatter communication network
Published 2020-10-01“…In order to alleviate the energy consumption problem caused by the increasing number of Internet of things (IoT) nodes,an energy-efficient (EE) maximization based resource allocation algorithm was proposed for multi-carrier wireless-powered backscatter communication network.Firstly,a multivariable and nonlinear resource allocation model was formulated to jointly optimize transmit power,transmission time,reflection coefficient,and energy-harvesting allocation coefficient,where the maximum transmit power constraint of the power station and the minimum harvested energy constraint at the backscatter device were considered.Then,the original non-convex optimization problem was transformed into a convex one which was solved by using Dinkelbach’s method and the variable substitution approach.Furthermore,the analytical solution of the resource allocation problem was obtained based on Lagrange dual theory.Simulation results verify that the proposed algorithm has better EE by comparing it with the existing algorithm under pure backscatter mode and algorithm under the harvested-then-transmit mode.…”
Get full text
Article -
3738
MILITARY INTERVENTIONSAND THE NIGERIA FOURTH REPUBLIC: A REFLECTION DISCOURSE
Published 2023-08-01“…The paper used secondary data from newspapers and the internet. The qualitative method of analysis was used for this study. …”
Get full text
Article -
3739
Network Anomaly Detection System with Optimized DS Evidence Theory
Published 2014-01-01Get full text
Article -
3740
Digital marketing: does it impact on increasing the profit of MSMEs in Aceh?
Published 2023-12-01“…Modern market/consumer-oriented marketing concepts, or the marketing revolution manifested as an online marketplace, evolved in tandem with the rise of the internet. This study aims to develop knowledge by verifying whether the concept of using Digital Marketing in MSMEs in Aceh can increase operating profit. …”
Get full text
Article