Suggested Topics within your search.
Suggested Topics within your search.
- Leadership 2
- Moral and ethical aspects 2
- African literature 1
- Arthritis 1
- Arthritis, Rheumatoid 1
- CRAFTS & HOBBIES / Pottery & Ceramics 1
- CRAFTS & HOBBIES / Reference 1
- Constitutional law 1
- Delivery of Health Care 1
- Derecho de familia 1
- Diagnostic Imaging 1
- Domestic relations 1
- Economic policy 1
- Ego (Psychology) 1
- History and criticism 1
- Imaging 1
- Journalistic ethics 1
- Magnetic Resonance Imaging 1
- Mental Health 1
- Nursing 1
- Osteoarthritis 1
- Photojournalism 1
- Potters' wheels 1
- Pottery 1
- Proposal Writing 1
- Psychiatric Nursing 1
- Psychological aspects 1
- Public health 1
- Social policy 1
- Technique 1
-
4421
Dynamic Rendezvous Based Routing Algorithm on Sparse Opportunistic Network Environment
Published 2015-02-01“…Most routing algorithms employ a paradigm by which a node can keep the receiving messages, carrying the messages with them when moving and then forwarding the messages to the opportunistic meeting nodes when possible. …”
Get full text
Article -
4422
Covert Communication for Wireless Networks with Full-Duplex Multiantenna Relay
Published 2022-01-01“…In the second stage, the relay decodes and forwards the covert information received in the first stage; at the same time, the relay uses zero-forcing beamforming to send interference signals to the warden to ensure covert transmission. …”
Get full text
Article -
4423
Guidance needed for using artificial intelligence to screen journal submissions for misconduct
Published 2025-01-01“…In this Topic Piece, we offer the following guidance: (1) All cases of suspected misconduct identified by AI tools should be carefully reviewed by humans to verify accuracy and ensure accountability; (2) Journals/publishers that use AI tools to detect misconduct should use only well-tested and reliable tools, remain vigilant concerning forms of misconduct that cannot be detected by these tools, and stay abreast of advancements in technology; (3) Journals/publishers should inform authors about irregularities identified by AI tools and give them a chance to respond before forwarding allegations to their institutions in accordance with Committee on Publication Ethics guidelines; (4) Journals/publishers that use AI tools to detect misconduct should screen all relevant submissions and not just random/purposefully selected submissions; and (5) Journals should inform authors about their definition of misconduct, their use of AI tools to detect misconduct, and their policies and procedures for responding to suspected cases of misconduct.…”
Get full text
Article -
4424
A Probabilistic Protocol for Multihop Routing in VANETs
Published 2010-01-01“…The proposed new protocol for multihop communication refers to a lookup table containing the precomputed data to decide a good packet forwarder quickly. We create a simulation testbed that seems challenging for all the existing multihop routing protocols for VANETs, in which we test ours. …”
Get full text
Article -
4425
ASSESSING THE SYNERGETIC EFFECT OF SELECTING THE OPTIMAL STRUCTURE OF A LOGISTICS CHAIN
Published 2024-09-01“…These stakeholders include freight owners, who initiate the delivery process, forwarders who manage and optimize deliveries, carriers who physically transport goods, and freight terminals that facilitate cargo handling and storage. …”
Get full text
Article -
4426
Distributed IOS-SM transmission scheme with joint antenna and IOS unit selection for high-speed railway scenario
Published 2023-04-01“…A distributed intelligent omni-surface (IOS) -assisted spatial modulation (SM) transmission scheme was proposed to address the problem of transmission rate degradation caused by the high signal penetration loss in closed carriages in the high-speed railway scenarios.Firstly, SM technology was utilized to ensure that the indexed information section was not affected by penetration loss.Then, to reduce the high path loss and power loss of the long-range IOS windows, the distributed IOS was selected by traversal algorithm according to the principle of maximizing the received signal-to-noise ratio, and the best IOS window was activated to transmit the SM modulated information.Finally, to reduce the impact of the missing direct view path gain on the overall system performance, the antenna removal principle and the sequential selection method were used to dynamically and selectively activate the receiving antenna and IOS unit under the power consumption model.The simulation results show that the proposed scheme is more suitable for the high-speed railway wireless communication scenario than the conventional relay-forwarding and reconfigurable intelligence surface -SM (RIS-SM) schemes.And with the power loss model, the distributed IOS-SM scheme chosen by the combined antenna and IOS unit is still able to guarantee high performance transmission of the system.…”
Get full text
Article -
4427
Method for Detecting Manipulated Compilation of Sensing Reports in Wireless Sensor Networks
Published 2015-01-01“…Thus, the reports manipulated by compromised CHs will be discarded by forwarding nodes or rejected at base stations, so that real events on the fields cannot be properly reported to the users. …”
Get full text
Article -
4428
Topic-oriented measurement of microblogging network
Published 2013-11-01“…The first is that only a small portion of tweets has been forwarded broadly and the number of retweets follows the power-law distribution. …”
Get full text
Article -
4429
CC2: Defending Hybrid Worm on Mobile Networks with Two-Dimensional Circulation Control
Published 2019-01-01“…We also design an efficient worm signature forwarding strategy that enables most nodes in the network to reach an immune state before being infected by the worm. …”
Get full text
Article -
4430
SAFM: An Adaptive Socially Aware Feedback Mechanism in Delay Tolerant Sensor Networks
Published 2015-10-01“…In the feedback process, acknowledgements are forwarded to the nodes whose social link (SL) is higher than a given threshold α . …”
Get full text
Article -
4431
Fine-grained privacy operation control method for layout documents
Published 2023-05-01“…In view of the problem of privacy information disclosure caused by uncontrolled forwarding in the context of frequent exchange of privacy information, a fine-grained privacy operation control method for layout documents was proposed, which could achieve differentiated fine-grained privacy operation control according to the requirements of the sharer during the sharing process of privacy information.For the received multimodal layout document, the existing privacy operation control strategy was extracted, which combined the current sharer’s use attribute and the receiver’s privacy protection ability and other factors.The privacy operation control strategy was generated iteratively, and an abstract control strategy generation algorithm framework was given.Based on the iterative privacy operation control strategy and combined with specific operation scenarios, the differentiated data-masking control, exchange boundary control and local use control were carried out for different modes of information components, and the abstract privacy operation control algorithm framework was given.A prototype system for privacy operation control of OFD (open fixed-layout document) was developed to verify the above algorithms.The generation and delivery of iterative privacy operation control strategy based on friendship, as well as the differential data-masking control, exchange boundary control and local use control of OFD were implemented in the instant messaging system.…”
Get full text
Article -
4432
Performance Prediction for Higher Education Students Using Deep Learning
Published 2021-01-01“…Multiple updated hidden layers are used to design neural network automatically; number of nodes and hidden layers controlled by feed forwarding and backpropagation data are produced by previous cases. …”
Get full text
Article -
4433
Persevering Routing Technique Based on Event Occurrence Patterns for Wireless Sensor Networks
Published 2012-05-01“…In the proposed method the nodes located around event path try to save their battery power by not participating in data packet forwarding to neighbor nodes. The simulation results show that the proposed method improves network lifetime by shifting the routing responsibility from sensing nodes to communication nodes, while maximizing the degree of coverage in the main path of event occurrence. …”
Get full text
Article -
4434
Offloading strategy with edge optimization of time delay and energy consumption in integrated satellite-terrestrial relay network
Published 2022-09-01“…The integrated satellite-terrestrial relay network (ISTRN) is a necessary part of the next-generation wireless communication system, and has important practical significance for accelerating the construction of my country's air-space-terrestrial integrated network system.In the traditional ISTRN architecture, a large amount of signaling needs to be forwarded to the ground control center for processing, which increases the delay of network control and management.A new cloud fog computing architecture was proposed, which constructs a sub-regional edge fog computing layer between the ground access and the central cloud to improve the flexibility of business flow management and control.Under the cloud network framework, a Q-learning based edge computing offloading strategy was designed, and the offloading performance was evaluated by time delay and energy consumption.Simulation results show that, compared with Min-min algorithm and backtracking algorithm, Q-learning based computational offload algorithm has better performance in terms of time delay and energy consumption, and can achieve a balance between the joint optimization of time delay and energy consumption.…”
Get full text
Article -
4435
Trade-offs involved in the choice of cloud service configurations when building secure, scalable, and efficient Internet-of-Things networks
Published 2020-02-01“…The results were obtained from a smart home Internet-of-Things prototype system in which data records from in-home sensors are transmitted wirelessly to an in-home hub, which forwards them to a cloud web service for storage and analysis. …”
Get full text
Article -
4436
Lightweight load-balanced and authentication scheme for a cluster-based wireless sensor network
Published 2021-02-01“…The simulation results show that compared with other similar schemes, this scheme has higher packet forwarding rate, longer network life, and lower overhead. …”
Get full text
Article -
4437
Reception of the political news narratives in readers’ responses: multimodality and intertextuality
Published 2024-12-01“…The proposed article approaches this problem from the perspective of cognitive linguistics that studies conceptual grounds for verbally delivered information. The article forwards and tests a novel methodological framework, which posits a cognitive ontology of the information, featured verbally and visually, as the feasible grounds for tracking regularities in the simultaneous dynamics of the three narrative aspects. …”
Get full text
Article -
4438
Countermeasures to Avoid Noncooperation in Fully Self-Organized VANETs
Published 2014-01-01“…Besides, the limitation in the resources of mobile devices is an additional obstacle in the forwarding problem, and the content of the information generated by individual nodes must be considered inherently unreliable. …”
Get full text
Article -
4439
INTERACTION OF IRREGULARITIES IN THE STANDARD OF SURVEYING AND CARTOGRAPHIC DOCUMENTATION WITH RAIL TRANSPORT PROBLEMS: A CASE STUDY
Published 2023-09-01“…The authors’ position on the irregularities was forwarded to an infrastructure manager. The irregularities that occur significantly contribute to the limitations of surveying and cartographic documentation harmonization, and these have an impact on fully functional rail transport. …”
Get full text
Article -
4440
Multicriteria-Based Location Privacy Preservation in Vehicular Ad Hoc Networks
Published 2018-01-01“…We have used the idea of the phantom node as the next forwarder for data dissemination. The phantom node (vehicle) hides the identity of actual source node thus preserving the location privacy. …”
Get full text
Article