Showing 4,421 - 4,440 results of 4,508 for search '"The Forward"', query time: 0.15s Refine Results
  1. 4421

    Dynamic Rendezvous Based Routing Algorithm on Sparse Opportunistic Network Environment by Jiradett Kerdsri, Komwut Wipusitwarakun

    Published 2015-02-01
    “…Most routing algorithms employ a paradigm by which a node can keep the receiving messages, carrying the messages with them when moving and then forwarding the messages to the opportunistic meeting nodes when possible. …”
    Get full text
    Article
  2. 4422

    Covert Communication for Wireless Networks with Full-Duplex Multiantenna Relay by Ling Yang, Weiwei Yang, Liang Tang, Liwei Tao, Xingbo Lu, Zhengyun He

    Published 2022-01-01
    “…In the second stage, the relay decodes and forwards the covert information received in the first stage; at the same time, the relay uses zero-forcing beamforming to send interference signals to the warden to ensure covert transmission. …”
    Get full text
    Article
  3. 4423

    Guidance needed for using artificial intelligence to screen journal submissions for misconduct by Mohammad Hosseini, David B Resnik

    Published 2025-01-01
    “…In this Topic Piece, we offer the following guidance: (1) All cases of suspected misconduct identified by AI tools should be carefully reviewed by humans to verify accuracy and ensure accountability; (2) Journals/publishers that use AI tools to detect misconduct should use only well-tested and reliable tools, remain vigilant concerning forms of misconduct that cannot be detected by these tools, and stay abreast of advancements in technology; (3) Journals/publishers should inform authors about irregularities identified by AI tools and give them a chance to respond before forwarding allegations to their institutions in accordance with Committee on Publication Ethics guidelines; (4) Journals/publishers that use AI tools to detect misconduct should screen all relevant submissions and not just random/purposefully selected submissions; and (5) Journals should inform authors about their definition of misconduct, their use of AI tools to detect misconduct, and their policies and procedures for responding to suspected cases of misconduct.…”
    Get full text
    Article
  4. 4424

    A Probabilistic Protocol for Multihop Routing in VANETs by Junichiro Fukuyama

    Published 2010-01-01
    “…The proposed new protocol for multihop communication refers to a lookup table containing the precomputed data to decide a good packet forwarder quickly. We create a simulation testbed that seems challenging for all the existing multihop routing protocols for VANETs, in which we test ours. …”
    Get full text
    Article
  5. 4425

    ASSESSING THE SYNERGETIC EFFECT OF SELECTING THE OPTIMAL STRUCTURE OF A LOGISTICS CHAIN by Vitalii NAUMOV, Ihor TARAN, Zhumazhan ZHANBIROV, Batyrbek MUSSABAYEV, Zarina KONAKBAI

    Published 2024-09-01
    “…These stakeholders include freight owners, who initiate the delivery process, forwarders who manage and optimize deliveries, carriers who physically transport goods, and freight terminals that facilitate cargo handling and storage. …”
    Get full text
    Article
  6. 4426

    Distributed IOS-SM transmission scheme with joint antenna and IOS unit selection for high-speed railway scenario by Qingfeng DING, Song WANG

    Published 2023-04-01
    “…A distributed intelligent omni-surface (IOS) -assisted spatial modulation (SM) transmission scheme was proposed to address the problem of transmission rate degradation caused by the high signal penetration loss in closed carriages in the high-speed railway scenarios.Firstly, SM technology was utilized to ensure that the indexed information section was not affected by penetration loss.Then, to reduce the high path loss and power loss of the long-range IOS windows, the distributed IOS was selected by traversal algorithm according to the principle of maximizing the received signal-to-noise ratio, and the best IOS window was activated to transmit the SM modulated information.Finally, to reduce the impact of the missing direct view path gain on the overall system performance, the antenna removal principle and the sequential selection method were used to dynamically and selectively activate the receiving antenna and IOS unit under the power consumption model.The simulation results show that the proposed scheme is more suitable for the high-speed railway wireless communication scenario than the conventional relay-forwarding and reconfigurable intelligence surface -SM (RIS-SM) schemes.And with the power loss model, the distributed IOS-SM scheme chosen by the combined antenna and IOS unit is still able to guarantee high performance transmission of the system.…”
    Get full text
    Article
  7. 4427

    Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks by Hae Young Lee

    Published 2015-01-01
    “…Thus, the reports manipulated by compromised CHs will be discarded by forwarding nodes or rejected at base stations, so that real events on the fields cannot be properly reported to the users. …”
    Get full text
    Article
  8. 4428

    Topic-oriented measurement of microblogging network by Wei LIU, Li-hong WANG, Rui-guang LI

    Published 2013-11-01
    “…The first is that only a small portion of tweets has been forwarded broadly and the number of retweets follows the power-law distribution. …”
    Get full text
    Article
  9. 4429

    CC2: Defending Hybrid Worm on Mobile Networks with Two-Dimensional Circulation Control by Hailu Yang, Deyun Chen, Guanglu Sun, Xiaoyu Ding, Yu Xin

    Published 2019-01-01
    “…We also design an efficient worm signature forwarding strategy that enables most nodes in the network to reach an immune state before being infected by the worm. …”
    Get full text
    Article
  10. 4430

    SAFM: An Adaptive Socially Aware Feedback Mechanism in Delay Tolerant Sensor Networks by Yan Liu, Kun Wang, Guo Huang, Jin Qi, Yanfei Sun

    Published 2015-10-01
    “…In the feedback process, acknowledgements are forwarded to the nodes whose social link (SL) is higher than a given threshold α . …”
    Get full text
    Article
  11. 4431

    Fine-grained privacy operation control method for layout documents by Peijie YIN, Fenghua LI, Ben NIU, Haiyang LUO, Bin KUANG, Lingcui ZHANG

    Published 2023-05-01
    “…In view of the problem of privacy information disclosure caused by uncontrolled forwarding in the context of frequent exchange of privacy information, a fine-grained privacy operation control method for layout documents was proposed, which could achieve differentiated fine-grained privacy operation control according to the requirements of the sharer during the sharing process of privacy information.For the received multimodal layout document, the existing privacy operation control strategy was extracted, which combined the current sharer’s use attribute and the receiver’s privacy protection ability and other factors.The privacy operation control strategy was generated iteratively, and an abstract control strategy generation algorithm framework was given.Based on the iterative privacy operation control strategy and combined with specific operation scenarios, the differentiated data-masking control, exchange boundary control and local use control were carried out for different modes of information components, and the abstract privacy operation control algorithm framework was given.A prototype system for privacy operation control of OFD (open fixed-layout document) was developed to verify the above algorithms.The generation and delivery of iterative privacy operation control strategy based on friendship, as well as the differential data-masking control, exchange boundary control and local use control of OFD were implemented in the instant messaging system.…”
    Get full text
    Article
  12. 4432

    Performance Prediction for Higher Education Students Using Deep Learning by Shuping Li, Taotang Liu

    Published 2021-01-01
    “…Multiple updated hidden layers are used to design neural network automatically; number of nodes and hidden layers controlled by feed forwarding and backpropagation data are produced by previous cases. …”
    Get full text
    Article
  13. 4433

    Persevering Routing Technique Based on Event Occurrence Patterns for Wireless Sensor Networks by Majid Rafigh, Maghsoud Abbaspour

    Published 2012-05-01
    “…In the proposed method the nodes located around event path try to save their battery power by not participating in data packet forwarding to neighbor nodes. The simulation results show that the proposed method improves network lifetime by shifting the routing responsibility from sensing nodes to communication nodes, while maximizing the degree of coverage in the main path of event occurrence. …”
    Get full text
    Article
  14. 4434

    Offloading strategy with edge optimization of time delay and energy consumption in integrated satellite-terrestrial relay network by Meinan ZHANG, Mingqi ZHANG, Fei DING, Hengheng ZHUANG, Hairong MA

    Published 2022-09-01
    “…The integrated satellite-terrestrial relay network (ISTRN) is a necessary part of the next-generation wireless communication system, and has important practical significance for accelerating the construction of my country's air-space-terrestrial integrated network system.In the traditional ISTRN architecture, a large amount of signaling needs to be forwarded to the ground control center for processing, which increases the delay of network control and management.A new cloud fog computing architecture was proposed, which constructs a sub-regional edge fog computing layer between the ground access and the central cloud to improve the flexibility of business flow management and control.Under the cloud network framework, a Q-learning based edge computing offloading strategy was designed, and the offloading performance was evaluated by time delay and energy consumption.Simulation results show that, compared with Min-min algorithm and backtracking algorithm, Q-learning based computational offload algorithm has better performance in terms of time delay and energy consumption, and can achieve a balance between the joint optimization of time delay and energy consumption.…”
    Get full text
    Article
  15. 4435

    Trade-offs involved in the choice of cloud service configurations when building secure, scalable, and efficient Internet-of-Things networks by Amitabh Mishra, Thomas Reichherzer, Ezhil Kalaimannan, Norman Wilde, Ruben Ramirez

    Published 2020-02-01
    “…The results were obtained from a smart home Internet-of-Things prototype system in which data records from in-home sensors are transmitted wirelessly to an in-home hub, which forwards them to a cloud web service for storage and analysis. …”
    Get full text
    Article
  16. 4436

    Lightweight load-balanced and authentication scheme for a cluster-based wireless sensor network by Jiliang Zhou, Ziqiang Lin

    Published 2021-02-01
    “…The simulation results show that compared with other similar schemes, this scheme has higher packet forwarding rate, longer network life, and lower overhead. …”
    Get full text
    Article
  17. 4437

    Reception of the political news narratives in readers’ responses: multimodality and intertextuality by Svitlana Zhabotynska

    Published 2024-12-01
    “…The proposed article approaches this problem from the perspective of cognitive linguistics that studies conceptual grounds for verbally delivered information. The article forwards and tests a novel methodological framework, which posits a cognitive ontology of the information, featured verbally and visually, as the feasible grounds for tracking regularities in the simultaneous dynamics of the three narrative aspects. …”
    Get full text
    Article
  18. 4438

    Countermeasures to Avoid Noncooperation in Fully Self-Organized VANETs by Jezabel Molina-Gil, Pino Caballero-Gil, Cándido Caballero-Gil

    Published 2014-01-01
    “…Besides, the limitation in the resources of mobile devices is an additional obstacle in the forwarding problem, and the content of the information generated by individual nodes must be considered inherently unreliable. …”
    Get full text
    Article
  19. 4439

    INTERACTION OF IRREGULARITIES IN THE STANDARD OF SURVEYING AND CARTOGRAPHIC DOCUMENTATION WITH RAIL TRANSPORT PROBLEMS: A CASE STUDY by Arkadiusz KAMPCZYK, Katarzyna ROMBALSKA

    Published 2023-09-01
    “…The authors’ position on the irregularities was forwarded to an infrastructure manager. The irregularities that occur significantly contribute to the limitations of surveying and cartographic documentation harmonization, and these have an impact on fully functional rail transport. …”
    Get full text
    Article
  20. 4440

    Multicriteria-Based Location Privacy Preservation in Vehicular Ad Hoc Networks by Haleem Farman, Bilal Jan, Muhammad Talha, Abi Zar, Huma Javed, Murad Khan, Aziz Ud Din, Kijun Han

    Published 2018-01-01
    “…We have used the idea of the phantom node as the next forwarder for data dissemination. The phantom node (vehicle) hides the identity of actual source node thus preserving the location privacy. …”
    Get full text
    Article