Showing 4,081 - 4,100 results of 5,694 for search '"internet"', query time: 0.09s Refine Results
  1. 4081

    mmWave radar based robust sign language recognition for the smart museum by Xuerong ZHAO, Xuan WANG, Tong LIU, Xia ZHENG, Yicheng JIANG

    Published 2023-08-01
    “…A smart museum is a new form of a museum, which uses devices or technologies including the Internet of things (IoT) and artificial intelligence (AI) to build the information interaction channels between people, things, and space.Sign language recognition not only assists the visitors who have hearing or speech impairment to visit the museum without barriers but also helps study the visitors’ natural gesture interaction.However, the methods based on cameras and wearable devices mayhave issues like privacy or usability when applied to museum spaces.Therefore, a robust sign language recognition method based on millimeter-wave radar was proposed.Different features of distance and velocity changes relative to the radar device were firstly extracted in this method, then a physical data enhancement method was adopted to expand the training data.Finally, a ResNet based on the pre-processed distance time features and Doppler time features was designed to further remove the environment-related information and perform feature fusion for classification.Experimental results show that this method can effectively recognize sign language and achieve an averaged recognition accuracy of over 90% when the testing environment and the user's location change, providing a new method for smart museum wireless sign language and gesture recognition.…”
    Get full text
    Article
  2. 4082

    Integration of Artificial Intelligence and Blockchain Technology in Healthcare and Agriculture by Sonali Vyas, Mohammad Shabaz, Prajjawal Pandit, L. Rama Parvathy, Isaac Ofori

    Published 2022-01-01
    “…By combining technologies such as the internet of things (IoT) and artificial intelligence (AI), innovative healthcare modifies and enhances traditional medical systems in terms of efficiency, service, and personalization. …”
    Get full text
    Article
  3. 4083

    Key Technologies and Discrete Dynamic Modeling Analysis of Online Travel Planning System Based on Big Data Scenario Aware Service by Yange Hao, Na Song

    Published 2021-01-01
    “…The key technology of online travel recommendation system has been widely concerned by many Internet experts. This paper studies and designs a scenario aware service model in online travel planning system and proposes an online travel planning recommendation model which integrates collaborative filtering and clustering personalized recommendation algorithm. …”
    Get full text
    Article
  4. 4084

    Mold Hysteria: Origin of the Hoax by Christopher Chang, M. Eric Gershwin

    Published 2005-01-01
    “…With the advent of the internet, as well as other advances in telecommunications, these issues eventually became part of a media frenzy, and all truths could be thrown out the window as issues became more and more decided upon by emotions and unfounded beliefs, rather than scientific data and logical thinking.…”
    Get full text
    Article
  5. 4085

    Context-aware learning-based access control method for power IoT by Zhenyu ZHOU, Zehan JIA, Haijun LIAO, Xiongwen ZHAO, Lei ZHANG

    Published 2021-03-01
    “…In view of the problems of severe access conflicts, high queue backlog, and low energy efficiency in the massive terminal access scenario of the power Internet of things (power IoT) in 6G era, a context-aware learning-based access control (CLAC) algorithm was proposed.The proposed algorithm was based on reinforcement learning and fast uplink grant technology, considering active state and dormant state of terminals, and the optimization objective was to maximize the total network energy efficiency under the long-term constraint of terminal access service quality requirements.Lyapunov optimization was used to decouple the long-term optimization objective and constraint, and the long-term optimization problem was transformed into a series of single time-slot independent deterministic sub-problems, which could be solved by the terminal state-aware upper confidence bound algorithm.The simulation results show that CLAC can improve the network energy efficiency while meeting the terminal access service quality requirements.Compared with the traditional fast uplink grant, CLAC can improve the average energy efficiency by 48.11%, increase the proportion of terminals meeting access service quality requirements by 54.95%, and reduce the average queue backlog by 83.83%.…”
    Get full text
    Article
  6. 4086

    Application Status and Analysis of Starlink Constellation by Yu WANG, Qing LI, Kejun LI, Changlin JIANG, Ye WANG, Yong JIANG, Mingwei XU

    Published 2023-06-01
    “…Starlink, asatellite broadband constellation operated by SpaceX, is currently the most influential and promising LEO broadband satellite constellation.With the expansion of the constellation deployment, its high-frequency launch and batch deployment of satellites, provision of diversified satellite broadband services, rapid growth of global user terminals, as well as potential support and capability enhancing for military are manifesting gradually.Firstiy, the current status of Starlink's on-orbit operations were analyzed, and its internet services with other satellite broadband service providers was compared.Then, the application characteristics and technical challenges of Starlink's inter-satellite laser links were focused on, and Starlink's military application progress and the evolution trend were discussed.Finally, the comprehensive application advantages Starlink offers, and technical challenges faced by Starlink were summarized, which could served as a stepping stone for the design of our country's satellite network.Overall, the construction and application of a mega LEO constellation like Starlink involves the chain integration of a series of component, ranging from satellite design and industrialized production, satellite launch facilities, constellation operation and maintenance, satellite networking, toglobal ground station supporting, rather than just the satellite platforms.…”
    Get full text
    Article
  7. 4087

    New forms of digital power on the web: dimensions of the sexual politics of Big Tech by Águeda Gómez Suárez, Rosa Mª Verdugo Matés

    Published 2024-12-01
    “…Although it initially appeared that the Internet would be a universal, decentralised, horizontal and egalitarian space, it has ultimately evolved into an ecosystem of vast domains controlled by major tech corporations. …”
    Get full text
    Article
  8. 4088

    Wearable respiratory sensors for health monitoring by Zhifu Yin, Yang Yang, Cong Hu, Jinzhe Li, Boyu Qin, Xue Yang

    Published 2024-02-01
    “…Along with the development of the Internet of Things and the medical drive for early detection and treatment, wearable devices will become increasingly important in the future. …”
    Get full text
    Article
  9. 4089

    Reasons, consequences, and prevention possibilities of financial crises by K. E. Volkov

    Published 2024-06-01
    “…Among the methodology used, it is necessary to distinguish the analysis of internet-resources corresponding to the subject of the study, their synthesis and generalisation. …”
    Get full text
    Article
  10. 4090

    Connection between the number of manifestations and promotional activities of local tourism organizations and hotels on the social network Facebook by Garabinović Dušan, Anđelić Slavica

    Published 2019-01-01
    “…Among the technologies mentioned, the Internet, and within it social networks, should be particularly emphasized. …”
    Get full text
    Article
  11. 4091

    What Competences Does the Regional Market of IT Specialists Want? Development and Approbation of Technology for Analysis of Current Vacancies in the Labor Market by A. E. Shukhman, L. S. Grishina, L. L. Legashev, D. I. Parfenov

    Published 2022-09-01
    “…Determining the relevant and in-demand knowledge and skills of specialists is possible on the basis of an analysis of vacancies posted on Internet job search portals. The study is aimed at development and approbation of the technology for analysis of current vacancies for IT specialists for further designing the content of additional vocational educational programs. …”
    Get full text
    Article
  12. 4092

    Do the Effects of ICT Use on Trip Generation Vary across Travel Modes? Evidence from Beijing by Chaoying Yin, Xiaoquan Wang, Chunfu Shao

    Published 2021-01-01
    “…Based on the data of 1022 respondents collected by a web-based questionnaire survey in Beijing, this study used a zero-inflated Poisson model to investigate the effects of ICT use on trip generation in different travel modes, in which ICT use was measured by both the time spent online and the Internet use frequency. The results indicated that the effects of ICT use on trip generation vary across auto, transit, and active trips. …”
    Get full text
    Article
  13. 4093

    UCAP:a PCL secure user authentication protocol in cloud computing by Xuefeng LI, Junwei ZHANG, Jianfeng MA

    Published 2018-08-01
    “…As the combine of cloud computing and Internet breeds many flexible IT services,cloud computing becomes more and more significant.In cloud computing,a user should be authenticated by a trusted third party or a certification authority before using cloud applications and services.Based on this,a protocol composition logic (PCL) secure user authentication protocol named UCAP for cloud computing was proposed.The protocol used a symmetric encryption symmetric encryption based on a trusted third party to achieve the authentication and confidentiality of the protocol session,which comprised the initial authentication phase and the re-authentication phase.In the initial authentication phase,the trusted third party generated a root communication session key.In the re-authentication phase,communication users negotiated a sub session key without the trusted third party.To verify the security properties of the protocol,a sequential compositional proof method was used under the protocol composition logic model.Compared with certain related works,the proposed protocol satisfies the PCL security.The performance of the initial authentication phase in the proposed scheme is slightly better than that of the existing schemes,while the performance of the re-authentication phase is better than that of other protocols due to the absence of the trusted third party.Through the analysis results,the proposed protocol is suitable for the mutual authentication in cloud computing.…”
    Get full text
    Article
  14. 4094

    La imagen y el cine en la enseñanza de la historia económica by Joan Miguel Tejedor Estupiñán, Mónica Zoraya Gaitán Divantoque

    Published 2018-01-01
    “…En la primera parte se describe el contexto de la educación en Colombia en lo que se refiere a la catedra de Historia Económica, en la segunda parte, se describe el modelo de enseñanza de la historia económica a través del cine, en la tercera parte se presenta un listado de films para complementar el proceso de enseñanza de la historia económica, en la cuarta parte se enumeran algunos recursos didácticos y fuentes de investigación que ofrece la internet, y finalmente se presentan las conclusiones.…”
    Get full text
    Article
  15. 4095

    MRR scheduling based cognitive LTE-R eNode B and type of service value priority queue management strategy by Hongyu DENG, Yiming WANG, Cheng WU

    Published 2018-06-01
    “…Cognitive radio technology was used to build cognitive radio networks in long-term evolution railway communication systems,and cognitive base station network architecture and MRR scheduling algorithms were proposed to improve the spectrum utilization of railway dedicated networks.In particular,the FIFO policy for cognitive LTE-R base stations in a single vehicle gateway causes excessive delay in real-time services of secondary users,and a cognitive LTE-R base station queue management strategy based on priority of service types was proposed.This strategy gave priority to sending packets with large service type values to the queue,so as to achieve the purpose of prioritizing real-time services.Simulation results show that under the premise of ensuring the normal communication of vehicles,the constructed cognitive base station can provide passengers with additional internet access links,and at the same time,improve the spectrum utilization rate of the LTE-R communication system.In addition,the cognitive base station queue management strategy based on service type value priority can effectively reduce the delay of passenger real-time services.…”
    Get full text
    Article
  16. 4096

    The sociological measurement of individual adaptive potential in media ecosystem by O. A. Grimov

    Published 2024-01-01
    “…The basis of the author’s approach is the consideration of the individual as the main subject of media activity practices that actualise the personal resources of Internet users associated with their readiness for effective communication, for production and consumption of media content in modern institutional conditions of the media ecosystem (considering existing risks and limitations). …”
    Get full text
    Article
  17. 4097

    Exploration of English Teachers' Instructional Communities of Practice: A Multiple Case Study by Jenny P Arabis

    Published 2025-02-01
    “…Despite these efforts, lack of internet access among students emerged as a significant challenge, requiring teachers to provide additional support outside of regular hours, often through text and messaging platforms. …”
    Get full text
    Article
  18. 4098

    Basotho learners’ challenges affect effective learning in a rural high school during the COVID-19 era by Mofokeng Mantwa

    Published 2024-09-01
    “…The narrative results indicated that Basotho learners encountered various challenges, including failure of learners to attend online classes, absenteeism, poor internet connection, and declining performance. They experienced academic pressure, inadequate curriculum coverage, a knowledge gap in the next grade, and the learners transitioning to virtual learning. …”
    Get full text
    Article
  19. 4099

    AODV protocol for acoustic-radio integrated network based on location information and energy balance by Nongyu WEI, Zilong JIANG, Fangjiong CHEN

    Published 2023-03-01
    “…Different from terrestrial internet of things (IoT) applications, marine IoT applications need to solve the problem of information interaction between surface network and underwater network.The key to solve this problem is to design a proper routing scheme.An ad hoc on-demand distance vector for acoustic-radio integrated network (AR-AODV) was proposed based on location information and energy balance.The protocol enables surface radio links to forward more information data, so as to reduce the burden of underwater communication network and improve the overall performance.In the proposed protocol, the forwarding priority of the buoy nodes was higher than that of the underwater nodes.When the source node needs to send data, it enters the route discovery phase, i.e., the node uses its position and energy information as the heuristic information to calculate the forwarding probability and broadcast route request (RREQ) packets.When the destination node receives an RREQ packet, it sent an RREP packet to update the pheromone and select the optimal path based on the pheromone.Compared with AODV protocol, AR-AODV protocol has significantly improved the performance in terms of transmission success rate, transmission delay, throughput, energy conversion rate and routing packet forwarding times.…”
    Get full text
    Article
  20. 4100

    Analysis effectiveness of online learning during the COVID-19 pandemic by Yudis Ghifari, Diva Aulia Amanda, Angga Hadiapurwa

    Published 2022-12-01
    “…Another point that shows the ineffectiveness of online learning is that many issues occur during online learning sessions, for example, internet connection issues, limited interaction, lack of literacy skills, and lack of motivation and productivity of students in its implementation. …”
    Get full text
    Article