-
1
-
2
Does Intercity Transportation Accessibility Matter? Its Effects on Regional Network Centrality in South Korea
Published 2025-04-01Subjects: Get full text
Article -
3
Psychological Stress Identification and Evaluation Method Based on Mobile Human-Computer Interaction Equipment
Published 2022-01-01“…Through the BP of mobile human-computer interaction equipment, hereditary, genetic algorithms, and Hi-PLS regression method in the artificial neural network, the psychological pressure of college students is identified, evaluated, and predicted from three dimensions such as learning, life, and personal events. …”
Get full text
Article -
4
Research on mobile stroke unit based on 5G network technology
Published 2020-01-01“…,to connect and achieve healthy interaction with people,equipment,and resources related to health care,which can guarantee people's timely access to preven-tive and therapeutic medical services.The composition design,functional modules,implementation architecture,and innovative service models of 5G mobile stroke units were discussed.The combination of 5G network technology and mobile stroke units were analyzed,and the network requirements of 5G mobile stroke units was analyzed with spe-cific cases.…”
Get full text
Article -
5
Incentive mechanism based on auction model for mobile crowd sensing network
Published 2019-07-01“…The selfishness and uncertainty of user behaviors in the mobile crowd sensing network make them unwilling to participate in sensing activities,which may result to a lower sensing task completion rate.To deal with these problems,an incentive mechanism based on auction model was proposed.In order to maximize the utility of each user,the proposed incentive method based on reverse auction (IMRA) leveraged a task-centric method to choose winners,and payed them according to a critical-price strategy.Furthermore,the proposed user-bidirectional interaction incentive mechanism (UBIM) helped drop-out users (buyers) to transfer their unfinished tasks to new users.Simulation results show that,compared with TRAC and IMC-SS,IMRA can achieve a better performance in terms of average user utility and tasks coverage ratio,and the task completion ratio can also be improved by UBIM.…”
Get full text
Article -
6
An evolution model for the mobility of urban societal classes based on complex networks
Published 2025-01-01Get full text
Article -
7
The impact of geographic, mobility and social media ties on massive-scale regional public emotional interaction
Published 2025-06-01“…Notably, the easing of pandemic restrictions corresponded with a surge in positive emotional interactions in geographic and mobility ties. These findings underscore the role of physical and digital social networks, spanning geographic, mobility, and social media ties, in shaping public emotional interactions throughout different pandemic stages. …”
Get full text
Article -
8
Network analysis of interactions of rumination and anxiety on smartphone dependence symptoms
Published 2025-02-01Get full text
Article -
9
-
10
Dimensional reduction of an SIS epidemic network model with saturated treatment and human mobility
Published 2025-04-01“…Globalization and intensified socioeconomic activities have led to complex interconnected social networks that enhance global interactions while also increasing the risks of transmitting infectious diseases. …”
Get full text
Article -
11
Mobile target localization based on iterative tracing for underwater wireless sensor networks
Published 2020-07-01“…Aiming at the problem of the stratification effect of underwater acoustic waves, the long propagation delay of messages, as well as the mobility of sensor nodes, a mobile target localization scheme for underwater wireless sensor network is proposed based on iterative tracing. …”
Get full text
Article -
12
An Probability-Based Energy Model on Cache Coherence Protocol with Mobile Sensor Network
Published 2013-04-01“…Mobile sensor networks (MSNs) are widely used in various domains to monitor, record, compute, and interact the information within an environment. …”
Get full text
Article -
13
Mobile Secured IoT Sensors-Driven Network Using Efficient QoS Management
Published 2024-01-01“…To increase the trustworthiness of dynamic networks, mobile devices interact with intelligence with lightweight processing strategies. …”
Get full text
Article -
14
An Overview of Distributed Firewalls and Controllers Intended for Mobile Cloud Computing
Published 2025-02-01“…Mobile cloud computing (MCC) is a representation of the interaction between cloud computing and mobile devices, reshaping the utilisation of technology for consumers and businesses. …”
Get full text
Article -
15
Capturing city-transport interactions. An analysis on the urban rail network of Palermo (Italy)
Published 2024-07-01Get full text
Article -
16
Design and Simulation of Mobile Robots Operating Within Networked Architectures Tailored for Emergency Situations
Published 2025-06-01“…This paper presents a simulation approach for mobile robots designed to operate within networks intended for emergency response scenarios. …”
Get full text
Article -
17
Design and Implementation of Mobile Experiment Algorithm Designer Interface for Network Control System Laboratory
Published 2025-01-01“…This paper introduces the Mobile Client Interface (MCI), an Android application, that grants remote access and experimentation with the Networked Control System Laboratory (NCSLab) resources. …”
Get full text
Article -
18
Convolutional neural network for gesture recognition human-computer interaction system design.
Published 2025-01-01“…Addressing the challenge posed by the insufficient feature extraction capability of existing network models, which hampers gesture recognition accuracy and increases model inference time, this paper introduces a novel gesture recognition algorithm based on an enhanced MobileNet network. …”
Get full text
Article -
19
Research on intrusion response strategy based on static Bayesian game in mobile edge computing network
Published 2023-02-01“…In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion detection network structure suitable for mobile edge computing environment was proposed and an intrusion response decision model based on static Bayesian game was established to simulate the network interaction behavior between edge nodes and external intruders.The probability of attackers and defenders in the game process was predicted respectively.The influence of the system resource, the cost of intrusion response, the detection rate and false alarm rate were considered comprehensively by the intrusion response decision model.The response decision of the intrusion detection system was optimized on the basis of the considering both resource consumption of the intrusion detection and the privacy protection of the edge nodes.The factors that affected the decision-making of intrusion response were analyzed, and the experimental basis for the specific application was provided.…”
Get full text
Article -
20
Research on intrusion response strategy based on static Bayesian game in mobile edge computing network
Published 2023-02-01“…In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion detection network structure suitable for mobile edge computing environment was proposed and an intrusion response decision model based on static Bayesian game was established to simulate the network interaction behavior between edge nodes and external intruders.The probability of attackers and defenders in the game process was predicted respectively.The influence of the system resource, the cost of intrusion response, the detection rate and false alarm rate were considered comprehensively by the intrusion response decision model.The response decision of the intrusion detection system was optimized on the basis of the considering both resource consumption of the intrusion detection and the privacy protection of the edge nodes.The factors that affected the decision-making of intrusion response were analyzed, and the experimental basis for the specific application was provided.…”
Get full text
Article