Suggested Topics within your search.
Suggested Topics within your search.
- Internet 6
- Economic development 5
- Economic conditions 4
- Information technology 4
- Internet marketing 4
- Social aspects 4
- 44.83 rheumatology, orthopedics 2
- Application software 2
- Computer-assisted instruction 2
- Economic aspects 2
- Economic policy 2
- Education 2
- Education, Elementary 2
- Educational technology 2
- Globalization 2
- History 2
- Internet in education 2
- Internet in public administration 2
- Law 2
- Orthopedics 2
- Psychological aspects 2
- Public administration 2
- Social media 2
- Sociolinguistics 2
- Teaching 2
- World Wide Web 2
- Abnormalities 1
- Abnormalities, Human 1
- Academic writing 1
- Access control 1
-
501
-
502
Research on Satellite Internet Security Protection Based on Zero Trust
Published 2021-09-01Subjects: Get full text
Article -
503
Key Issues in Development and Application of the Sky-Based Internet of Things
Published 2021-03-01Subjects: “…space-based internet of things…”
Get full text
Article -
504
Efficient and secure electronic evidence exchange scheme for internet of things
Published 2025-01-01Subjects: “…internet of things…”
Get full text
Article -
505
Online Internet Traffic Monitoring System Using Spark Streaming
Published 2018-03-01“…Owing to the explosive growth of Internet traffic, network operators must be able to monitor the entire network situation and efficiently manage their network resources. …”
Get full text
Article -
506
The results of the 10th Republican competition “Computer. Education. The Internet”
Published 2015-06-01Get full text
Article -
507
Intelligent power control for covert communication in cognitive Internet of things
Published 2020-03-01“…In order to solve the security problem of cognitive Internet of things (IoT),an intelligent power control algorithm of covert communication in cognitive IoT based on generative adversarial network was proposed.Firstly,the covert communication optimization problem in the cognitive IoT was transformed into a dynamic game between the cognitive IoT user and the eavesdropper.Then,the generator imitated the cognitive IoT user,while the discriminator imitated the eavesdropper.The generator and the discriminator were constructed by the three-layer neural network respectively.Through the two-person zero-sum game,the learning optimization process was realized to achieve the Nash equilibrium,and finally the covert power control scheme was obtained.The simulation results show that the proposed algorithm can not only obtain near-optimal covert power control scheme with rapid convergence ability,but also be more practical in the future cognitive IoT.…”
Get full text
Article -
508
Situation awareness via Internet of things and in-network data processing
Published 2017-01-01“…Computing on the edge of the Internet of things comprises among other tasks in-sensor signal processing and performing distributed data fusion and aggregation at network nodes. …”
Get full text
Article -
509
Manufacturing execution system of mineral processing based on Internet of things
Published 2018-03-01Subjects: “…internet of things…”
Get full text
Article -
510
Architecture modeling of satellite Internet simulation platform based on MBSE
Published 2024-09-01Subjects: “…satellite Internet…”
Get full text
Article -
511
Dual-architecture Internet supporting intelligent governance of cyber content
Published 2019-09-01Subjects: “…dual-architecture Internet…”
Get full text
Article -
512
New Multiple Access Technologies for Satellite Internet of Things System
Published 2023-09-01“…For satellite internet of things (IoT) scenarios with high propagation delay and the need to serve a larger number of users, firstly the shortcomings of IoT NTN in terms of technical solutions were analyzed, and then a new type of multi access solution called uncoordinated random access and NOMA transmission (URAT) was proposed.…”
Get full text
Article -
513
-
514
An Internet-Based Simulation Model for Nitrogen Management in Agricultural Settings
Published 2001-01-01“…Department of Agriculture (USDA) has developed an Internet-based nitrogen analysis tool. Based on the Nitrate Leaching and Economic Analysis Package (NLEAP), the Web site allows a user to conduct multiyear N simulation modeling specific to a crop field. …”
Get full text
Article -
515
Analysis and suggestions on inter-satellite laser communication of satellite Internet
Published 2024-02-01Subjects: “…satellite Internet…”
Get full text
Article -
516
LEO Satellite Internet of Things Access Technology Based on Beamforming
Published 2023-03-01“…The integration of terrestrial communication and satellite communication for internet of things (IoT) is the inevitable trend of the development of wireless communication network, to achieve the vision of the connection of everything.As a supplement to terrestrial IoT, satellite IoT can make up the fl aws of terrestrial IoT.However, with the expansion of IoT scale, it will be diffi cult for satellites to meet the communication needs of increasing number of IoT terminals, because the problem of limited satellite load will become increasingly prominent.Multiple-input multiple-output (MIMO) technology is the key technology of terrestrial 5G, and also an important research direction of satellite communication in the future 6G.The beamforming(BF) technology was introduced in MIMO into the low earth orbit (LEO) satellite based IoT, to made full use of spatial resources and signifi cantly improved system capacity.In view of the implementation conditions of BF technology and the characteristics of satellite IoT, several related issues were discussed, included channel model, BF criterions, load balancing access technology of one satellite and cooperative BF access technology of several satellites.…”
Get full text
Article -
517
Personality characteristics of students in the regulation of network activity
Published 2021-03-01Subjects: Get full text
Article -
518
-
519
A Scalable Approach to Internet of Things and Industrial Internet of Things Security: Evaluating Adaptive Self-Adjusting Memory K-Nearest Neighbor for Zero-Day Attack Detection
Published 2025-01-01Subjects: “…iInternet of Things…”
Get full text
Article -
520