Showing 361 - 380 results of 5,694 for search '"internet"', query time: 0.08s Refine Results
  1. 361
  2. 362

    Tecbnology Evolution Strategy of Video Service Based on Open Internet by Qing Xiao, Siwei Wang

    Published 2015-04-01
    “…Video service is an important service for telecom operators.The advantages and disadvantages among IPTV,OTT TV and IPTV+OTT convergent architecture were compared,then the evolution direction of video service technology architecture of telecom operators was presented.Internet-1ike IPTV is either open and intelligent like OTT TV,or easy to operate and differentiated on service like IPTV.The evolution strategies of some key technologies,such as video codec,stream transportation,CDN,multicast,user interface,and end-to-end quality assurance,were proposed.…”
    Get full text
    Article
  3. 363

    Secure Bootstrapping and Rebootstrapping for Resource-Constrained Thing in Internet of Things by Seung Wook Jung, Souhwan Jung

    Published 2015-08-01
    “…In Internet of Things, secure key establishment and building trust relationship between the thing and the home gateway (or the controller) in home network or Body Area Network are extremely important. …”
    Get full text
    Article
  4. 364
  5. 365
  6. 366

    Large-scale duplicate image retrieval technical research for the internet by Shu-peng WANG, Ming CHEN, Guang-jun WU

    Published 2014-12-01
    “…For the typical social media application on the internet,a large-scale distributed duplicate image retrieval ap-proach based on random projection and the block DCT coefficients was proposed.On the basis of Hadoop,this approach exploited image signatures generated by random projection mapping to retrieve HBase efficiently.And candidate images with high-recall were achieved.Then in order to improve the retrieval precision,the block DCT coefficients were used to further filter candidate images.For 12 million images,experimental results showed that with our approach the recall ratio reached 98%,the precision ratio reached 93.2%,and the average retrieval time was 6.7s when H=2 and T=150.…”
    Get full text
    Article
  7. 367

    Geleneksel Habercilikten İnternet Haberciliğine Geçiş Sürecinde Spor Basını by Mete Kazaz

    Published 2013-11-01
    Subjects: “…geleneksel habercilik; i̇nternet haberciliği; spor basını…”
    Get full text
    Article
  8. 368

    A survey of key issues of URLLC in industrial internet of things by Han WANG, Lei DIAO, Mengling WANG, Xin RONG, Jiamin LI, Xiaohu YOU

    Published 2022-05-01
    “…In the age of 6G internet of things, massive terminal devices are connected intelligently to explore environmental information to improve life quality and create a more intelligent world.With the development of economic society and industry, the number of industrial nodes in the industrial internet of things (IIoT) grows at an significant speed.The real-time transmission and exchange of information between these industrial nodes puts forward higher requirements for communication delay and reliability.Under limited time-frequency resources and strict communication quality requirements, in order to ensure ultra-reliable and low-latency communication (URLLC) of massive terminals in IIoT, it is necessary to analyze the existing key problems from the aspects of low delay, reliability, energy efficiency, spectrum efficiency and scalability.In the scenario of IIoT, combined with the characteristics and requirements of URLLC, the key issues of communication in IIoT were studied, including challenges and opportunities in active user detection, random access, resource allocation and convergence of communication and computation.After summarizing and analyzing the key issues and existing technologies, the future research direction was proposed.…”
    Get full text
    Article
  9. 369
  10. 370
  11. 371

    Internet traffic classification method based on behavior feature learning by Zhen LIU, Ruoyu WANG

    Published 2016-06-01
    Subjects: “…internet traffic classification…”
    Get full text
    Article
  12. 372
  13. 373

    Analysis of Terminal Security Issue and Solution in Mobile Internet Era by Liyun Yan, Xinzhang Yang, Gang Lu, Shaoxin Hou

    Published 2014-12-01
    “…Currently, security has been regarded as one of the greatest problems in the development of mobile Internet, the end-to-end security of mobile internet involves three dimensions: cloud security, pipe security, terminal security. …”
    Get full text
    Article
  14. 374
  15. 375

    Potential and methods of wireless communications for Internet of things based on UAV by Qingheng SONG, Fuchun ZHENG

    Published 2019-03-01
    “…In the absence of terrestrial infrastructure for Internet of things (IoT),an effective low-cost wireless connection can be provided by an unmanned aerial vehicle (UAV) based wireless communication platform.Compared with the terrestrial IoT communication platform,the low-altitude UAV wireless communication system enjoys the advantage of rapid deployment,low cost,on-demand deployment,flexible configuration and better communication channel quality due to short-range line-of-sight links.On the other hand,several new challenges must be overcome due to the high mobility and energy consumption limitations of UAV.An overview of UAV enabled IoT wireless communication was provided,including the air-to-ground channel model,the power consumption model,as well as the applications in UAV based data dissemination/collection and relay,with particular reference to the new opportunities and solutions in these application areas.…”
    Get full text
    Article
  16. 376

    Halkla İlişkiler Aracı Olarak İnternet ve Markaya Katkısı by Mehmet Fidan

    Published 2013-11-01
    Subjects: “…i̇nternet; halkla ilişkiler; marka…”
    Get full text
    Article
  17. 377
  18. 378
  19. 379
  20. 380

    An English Online Homework Tutoring System Supported by Internet Database by Huanxiang Hao

    Published 2021-01-01
    “…Therefore, this paper designs an Internet-based online tutoring platform for college English teaching, which is accelerated by using the K-means clustering algorithm. …”
    Get full text
    Article