期刊文献+
共找到4,996篇文章
< 1 2 250 >
每页显示 20 50 100
Analysis of Mobile and Internet Network Coverage: Propagation of Electromagnetic Waves and Concept of Digital Divide in Burundi
1
作者 Apollinaire Bigirimana Jérémie Ndikumagenge +2 位作者 Sami Tabbane Romeo Nibitanga Hassan Kibeya 《Open Journal of Antennas and Propagation》 2024年第1期1-18,共18页
Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is sti... Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is still a long process. 2G networks have developed the messaging service, which complements the already operational voice service. 2G technology has rapidly progressed to the third generation (3G), incorporating multimedia data transmission techniques. It then progressed to fourth generation (4G) and LTE (Long Term Evolution), increasing the transmission speed to improve 3G. Currently, developed countries have already moved to 5G. In developing countries, including Burundi, a member of the East African Community (ECA) where more than 80% are connected to 2G technologies, 40% are connected to the 3G network and 25% to the 4G network and are not yet connected to the 5G network and then still a process. The objective of this article is to analyze the coverage of 2G, 3G and 4G networks in Burundi. This analysis will make it possible to identify possible deficits in order to reduce the digital divide between connected urban areas and remote rural areas. Furthermore, this analysis will draw the attention of decision-makers to the need to deploy networks and coverage to allow the population to access mobile and Internet services and thus enable the digitalization of the population. Finally, this article shows the level of coverage, the digital divide and an overview of the deployment of base stations (BTS) throughout the country to promote the transformation and digital inclusion of services. 展开更多
关键词 Coverage of mobile Networks and internet Digital Divide Rural and Isolated Areas Antenna Connectivity and Digital Inclusion
下载PDF
UAV-assisted cooperative offloading energy efficiency system for mobile edge computing
2
作者 Xue-Yong Yu Wen-Jin Niu +1 位作者 Ye Zhu Hong-Bo Zhu 《Digital Communications and Networks》 SCIE CSCD 2024年第1期16-24,共9页
Reliable communication and intensive computing power cannot be provided effectively by temporary hot spots in disaster areas and complex terrain ground infrastructure.Mitigating this has greatly developed the applicat... Reliable communication and intensive computing power cannot be provided effectively by temporary hot spots in disaster areas and complex terrain ground infrastructure.Mitigating this has greatly developed the application and integration of UAV and Mobile Edge Computing(MEC)to the Internet of Things(loT).However,problems such as multi-user and huge data flow in large areas,which contradict the reality that a single UAV is constrained by limited computing power,still exist.Due to allowing UAV collaboration to accomplish complex tasks,cooperative task offloading between multiple UAVs must meet the interdependence of tasks and realize parallel processing,which reduces the computing power consumption and endurance pressure of terminals.Considering the computing requirements of the user terminal,delay constraint of a computing task,energy constraint,and safe distance of UAV,we constructed a UAV-Assisted cooperative offloading energy efficiency system for mobile edge computing to minimize user terminal energy consumption.However,the resulting optimization problem is originally nonconvex and thus,difficult to solve optimally.To tackle this problem,we developed an energy efficiency optimization algorithm using Block Coordinate Descent(BCD)that decomposes the problem into three convex subproblems.Furthermore,we jointly optimized the number of local computing tasks,number of computing offloaded tasks,trajectories of UAV,and offloading matching relationship between multi-UAVs and multiuser terminals.Simulation results show that the proposed approach is suitable for different channel conditions and significantly saves the user terminal energy consumption compared with other benchmark schemes. 展开更多
关键词 Computation offloading internet of things(IoT) mobile edge computing(MEC) Block coordinate descent(BCD)
下载PDF
Joint optimization of serving node selection and wireless resources allocation for transactions data in mobile blockchain enhanced Internet of Things
3
作者 尹玉峰 WU Wenjun +3 位作者 GAO Yang JIN Kaiqi ZHANG Yanhua SUN Teng 《High Technology Letters》 EI CAS 2023年第2期181-193,共13页
With the increased emphasis on data security in the Internet of Things(IoT), blockchain has received more and more attention.Due to the computing consuming characteristics of blockchain, mobile edge computing(MEC) is ... With the increased emphasis on data security in the Internet of Things(IoT), blockchain has received more and more attention.Due to the computing consuming characteristics of blockchain, mobile edge computing(MEC) is integrated into IoT.However, how to efficiently use edge computing resources to process the computing tasks of blockchain from IoT devices has not been fully studied.In this paper, the MEC and blockchain-enhanced IoT is considered.The transactions recording the data or other application information are generated by the IoT devices, and they are offloaded to the MEC servers to join the blockchain.The practical Byzantine fault tolerance(PBFT) consensus mechanism is used among all the MEC servers which are also the blockchain nodes, and the latency of the consensus process is modeled with the consideration of characteristics of the wireless network.The joint optimization problem of serving base station(BS) selection and wireless transmission resources allocation is modeled as a Markov decision process(MDP), and the long-term system utility is defined based on task reward, credit value, the latency of infrastructure layer and blockchain layer, and computing cost.A double deep Q learning(DQN) based transactions offloading algorithm(DDQN-TOA) is proposed, and simulation results show the advantages of the proposed algorithm in comparison to other methods. 展开更多
关键词 internet of Things(IoT) mobile edge computing(MEC) blockchain deep reinforcement learning(DRL)
下载PDF
Edge Cloud Selection in Mobile Edge Computing(MEC)-Aided Applications for Industrial Internet of Things(IIoT)Services
4
作者 Dae-Young Kim SoYeon Lee +1 位作者 MinSeung Kim Seokhoon Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2049-2060,共12页
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im... In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method. 展开更多
关键词 Industrial internet of Things(IIoT)network IIoT service mobile edge computing(MEC) edge cloud selection MEC-aided application
下载PDF
Mobile Ad Hoc Network与Internet互联的技术研究 被引量:3
5
作者 胡中功 邹莉 沈斌 《武汉科技学院学报》 2005年第6期65-69,共5页
分析了移动IP和AODV协议的工作机理,对MANET与Internet互联的关键技术,包括协议转换、地址分配、网关发现、路由发现与数据传输等问题进行了详细的讨论,并对今后的研究工作进行了展望。
关键词 mobile AD HOC Network internet 移动IP AODV路由协议
下载PDF
Mobile Ad Hoc网络与Internet互联的综合网关发现方法 被引量:3
6
作者 胡中功 沈斌 邹莉 《武汉科技学院学报》 2005年第8期45-49,共5页
大量基于adhoc网络的移动应用得以开展以及被认可的一大挑战就在于其能否提供足够好Internet连接,本文实现了一种MobileAdHoc网络与Internet互联时的综合网关发现方法,由于综合了主动与被动网关发现方法的优点,同时允许中间移动节点解... 大量基于adhoc网络的移动应用得以开展以及被认可的一大挑战就在于其能否提供足够好Internet连接,本文实现了一种MobileAdHoc网络与Internet互联时的综合网关发现方法,由于综合了主动与被动网关发现方法的优点,同时允许中间移动节点解析全局连接信息并在必要的时候以之回复请求节点,因此在合理的开销下改善了移动节点多跳访问Internet的性能,用NS2进行的仿真结果说明了综合方法的有效性。 展开更多
关键词 mobile Ad HOC Network 网络互联 综合网关发现方法 NS2
下载PDF
Improved approach to enhanced Internet connectivity for mobile ad hoc networks
7
作者 沈斌 李波 石冰心 《Journal of Southeast University(English Edition)》 EI CAS 2007年第1期16-21,共6页
An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks.... An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks. The hybrid gateway discovery scheme that combined the advantages of a proactive and reactive gateway discovery approach is used to achieve high connectivity while keeping overhead costs low. By exchanging ad hoc on-demand distance vector (AODV) hello packet which includes additional fields named symmetric neighbor list and asymmetric neighbor list, unidirectional links are removed from route computation and broadcast storm can also be relieved simultaneously. Performance results using ns-2 simulations, under varying numbers of unidirectional links and node speeds, show that this improved Internet connectivity approach can provide better performance than others. 展开更多
关键词 mobile ad hoc networks internet connectivity gateway discovery unidirectional link broadcast storm
下载PDF
Mobile Agent技术在Internet中的应用 被引量:6
8
作者 赵春英 《微机发展》 2000年第6期20-22,共3页
本文分析了Internet应用所面临的问题 ,讨论了MobileAgent的概念和技术特点 ,论述了如何把MobileAgent技术应用到Internet中 ,解决其存在的问题。最后 ,简单介绍了目前MobileAgent技术的发展现状和研究趋势。
关键词 internet 人工智能 分布式计算 Mob:leAgent
下载PDF
Mobile Internet系统设计
9
作者 惠韶文 《计算机系统应用》 2000年第9期13-15,共3页
本文对Mobile Internet(车载Internet)系统的通信技术.信息服务实施等关键技术进行研究然后讨论了这类系统用户操作界面的设计特点。
关键词 mobile internet 车辆定位 GPS 系统设计
下载PDF
Dynamic Task Offloading for Digital Twin-Empowered Mobile Edge Computing via Deep Reinforcement Learning 被引量:2
10
作者 Ying Chen Wei Gu +2 位作者 Jiajie Xu Yongchao Zhang Geyong Min 《China Communications》 SCIE CSCD 2023年第11期164-175,共12页
Limited by battery and computing re-sources,the computing-intensive tasks generated by Internet of Things(IoT)devices cannot be processed all by themselves.Mobile edge computing(MEC)is a suitable solution for this pro... Limited by battery and computing re-sources,the computing-intensive tasks generated by Internet of Things(IoT)devices cannot be processed all by themselves.Mobile edge computing(MEC)is a suitable solution for this problem,and the gener-ated tasks can be offloaded from IoT devices to MEC.In this paper,we study the problem of dynamic task offloading for digital twin-empowered MEC.Digital twin techniques are applied to provide information of environment and share the training data of agent de-ployed on IoT devices.We formulate the task offload-ing problem with the goal of maximizing the energy efficiency and the workload balance among the ESs.Then,we reformulate the problem as an MDP problem and design DRL-based energy efficient task offloading(DEETO)algorithm to solve it.Comparative experi-ments are carried out which show the superiority of our DEETO algorithm in improving energy efficiency and balancing the workload. 展开更多
关键词 deep reinforcement learning digital twin internet of Things mobile edge computing
下载PDF
Intelligent Traffic Scheduling for Mobile Edge Computing in IoT via Deep Learning 被引量:1
11
作者 Shaoxuan Yun Ying Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第3期1815-1835,共21页
Nowadays,with the widespread application of the Internet of Things(IoT),mobile devices are renovating our lives.The data generated by mobile devices has reached a massive level.The traditional centralized processing i... Nowadays,with the widespread application of the Internet of Things(IoT),mobile devices are renovating our lives.The data generated by mobile devices has reached a massive level.The traditional centralized processing is not suitable for processing the data due to limited computing power and transmission load.Mobile Edge Computing(MEC)has been proposed to solve these problems.Because of limited computation ability and battery capacity,tasks can be executed in the MEC server.However,how to schedule those tasks becomes a challenge,and is the main topic of this piece.In this paper,we design an efficient intelligent algorithm to jointly optimize energy cost and computing resource allocation in MEC.In view of the advantages of deep learning,we propose a Deep Learning-Based Traffic Scheduling Approach(DLTSA).We translate the scheduling problem into a classification problem.Evaluation demonstrates that our DLTSA approach can reduce energy cost and have better performance compared to traditional scheduling algorithms. 展开更多
关键词 mobile Edge Computing(MEC) traffic scheduling deep learning internet of Things(IoT)
下载PDF
Research on Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing 被引量:5
12
作者 Weijin Jiang Yang Wang +3 位作者 Yirong Jiang Jiahui Chen Yuhui Xu Lina Tan 《China Communications》 SCIE CSCD 2019年第7期174-194,共21页
This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the per... This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large. 展开更多
关键词 mobile internet CLOUD COMPUTING mobile agent system SUBJECTIVE TRUST dynamic TRUST management
下载PDF
Relationships of loneliness and mobile phone dependence with Internet addiction in Japanese medical students 被引量:7
13
作者 Satoko Ezoe Masahiro Toda 《Open Journal of Preventive Medicine》 2013年第6期407-412,共6页
We investigated factors contributing to Internet addiction in 105 Japanese medical students. The subjects were administered by a self-reporting questionnaire designed to evaluate demographic factors, Internet addictio... We investigated factors contributing to Internet addiction in 105 Japanese medical students. The subjects were administered by a self-reporting questionnaire designed to evaluate demographic factors, Internet addiction, loneliness, health-related lifestyle factors, depressive state, patterns of behavior, and mobile phone dependence. Results of multivariate logistic regression analysis indicated that loneliness and mobile phone dependence were positively related to degree of addiction. Our findings suggest that Internet addiction is associated with loneliness and mobile phone dependence in Japanese students. 展开更多
关键词 internet ADDICTION mobile PHONE Dependence LONELINESS DEPRESSION Medical Students
下载PDF
Mobile Agents on Internet 被引量:2
14
作者 Zhou, Shun Zhu, Chunyan Ying, Shi 《Wuhan University Journal of Natural Sciences》 EI CAS 1998年第1期20-26,共7页
Mobile agents is becoming a prosperous research field due to recent prevalence of Internet andJava. Although it brings great challenges to traditional distributed processing technologies, its attractive advantages sti... Mobile agents is becoming a prosperous research field due to recent prevalence of Internet andJava. Although it brings great challenges to traditional distributed processing technologies, its attractive advantages stimulate us to further the work on it with great ardor. This paper presents the basic concepts aboutthe Inchoate technique and describes current research status on it. Major obstacles and their possible solutions are discussed. 展开更多
关键词 AGENT mobile computing internet distributed processing
下载PDF
The transition from traditional banking to mobile internet finance:an organizational innovation perspective-a comparative study of Citibank and ICBC 被引量:21
15
作者 Zhuming Chen Yushan Li +1 位作者 Yawen Wu Junjun Luo 《Financial Innovation》 2017年第1期146-161,共16页
The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected ... The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected to overturn the traditional banking business model,forcing banks to upgrade and transform.This study adopts a comparative case study method to contrast and analyze the Industrial and Commercial Bank of China(ICBC)and Citibank.It analyzes the strategies,organizations,HR systems,and product innovations adopted by these two banks in response to the impact of FinTech.This paper proposes an“electric vehicle”mode for ICBC and an“airplane mode”for Citibank.Further,it describes the difficulties encountered by the Chinese banking industry and proposes some feasible ways to upgrade.“Technology power”will become the core competitive concept for the financial institutions of the future. 展开更多
关键词 mobile internet finance Traditional banks Upgrade and transformation Organizational innovation Technology power
下载PDF
A Wireless Intrusion Alerts Clustering Method for Mobile Internet 被引量:2
16
作者 CHEN Guanlin WU Ying 《China Communications》 SCIE CSCD 2016年第4期108-118,共11页
With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of... With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of wireless intrusion alerts clustering method for mobile Internet. This paper proposes a Wireless Intrusion Alert Clustering Method(WIACM) based on the information of the mobile terminal. The method includes alert formatting, alert reduction and alert classification. By introducing key information of the mobile terminal device, this method aggregates the original alerts into hyper alerts. The experimental results show that WIACM would be appropriate for real attack scenarios of mobile Internet, and reduce the amount of alerts with more accuracy of alert analysis. 展开更多
关键词 mobile internet wireless intrusion alert clustering network security
下载PDF
Design and Realization of Cloth Order System on Mobile Internet 被引量:1
17
作者 张利 邵世煌 +2 位作者 曾献辉 蒲芳 尹美华 《Journal of Donghua University(English Edition)》 EI CAS 2002年第3期111-114,共4页
Based on the analysis of developing target, function and constitution of cloth order system under wap gateway, the mobile communication principle of cloth order system under wap gateway is given out. The implementatio... Based on the analysis of developing target, function and constitution of cloth order system under wap gateway, the mobile communication principle of cloth order system under wap gateway is given out. The implementation method for information communication of cloth order system are elaborated by using programming technology of active server page (ASP)3.0 and wireless markup language (WML). The browsing and inquiry of cloth information, sending and receiving of cloth order can be easily realized by the developed order system on mobile internet according to user’s requirements. 展开更多
关键词 CLOTH order system WAP gateway active SERVER pages mobile internet.
下载PDF
Mobile Internet Applications:Impact on Future Wireless Communications System 被引量:1
18
作者 Gao Youjun Yang Ning +1 位作者 Cui Chunfeng Kimba Dit Adamou Boubacar 《China Communications》 SCIE CSCD 2012年第4期20-25,共6页
Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order ... Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order to support the mobile Internet application efficiently in future,the issues including the impact on the Long Term Evolution (LTE-A) system and some potential solutions for performance optimization are studied.Based on the trace data model of IM traffic,the performacne evaluaiton of LTE-A system shows that some specific configuration machanisms can play an important role in improving network system efficiency in the case of IM traffic. 展开更多
关键词 mobile internet traffic LTE-A system performance optimization mobile QQ
下载PDF
Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing 被引量:1
19
作者 Weijin Jiang Yang Wang +4 位作者 Yirong Jiang Yuhui Xu Jiahui Chen Lina Tan Guo Liang 《Computers, Materials & Continua》 SCIE EI 2020年第1期123-136,共14页
In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management... In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management of mobile agent system in mobile cloud computing environment,the Human Trust Mechanism(HTM)is used to study the subjective trust formation,trust propagation and trust evolution law,and the subjective trust dynamic management algorithm(MASTM)is proposed.Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data,the public trust host selection algorithm is given.The isolated malicious host algorithm and the integrated trust degree calculation algorithm realize the function of selecting the trusted cluster and isolating the malicious host,so as to enhance the security interaction between the mobile agent and the host.Given algorithm simulation and verification were carried out to prove its feasibility and effectiveness. 展开更多
关键词 Cloud computing mobile agent system subjective trust objective trust dynamic trust management mobile internet
下载PDF
Changes of Mobile Internet Ecosystem Structure and Suggestions for Regulatory Policy 被引量:1
20
作者 ZHANG Jing 《China Communications》 SCIE CSCD 2014年第1期60-68,共9页
The mobile Intemet industry has exp- erienced dramatic changes as plenty of new applications and business models emerged. This study conducts a qualitative review on the changes through adopting business ecosystem app... The mobile Intemet industry has exp- erienced dramatic changes as plenty of new applications and business models emerged. This study conducts a qualitative review on the changes through adopting business ecosystem approaches. An analytical framework is estab- lished for reviewing the structure of mobile Internet business ecosystem. Then the core value, key actors, and inter-firm relationships of the mobile Internet ecosystem in the past and in the present are compared. It is found that the ecosystem structure has shifted from an MNO-centric model to a polycentric one with highly expanded value sources and di- versified keystone players. Accordingly some suggestions for regulatory policy makers are provided in terms of the roles of mobile Inter- net in social welfare improvement, the call for a convergent regulatory system, and chal- lenges for information security regulation. 展开更多
关键词 mobile internet business ecosys- tem PLATFORM regulatory policy
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部