期刊文献+
共找到664篇文章
< 1 2 34 >
每页显示 20 50 100
Analysis of Mobile and Internet Network Coverage: Propagation of Electromagnetic Waves and Concept of Digital Divide in Burundi
1
作者 Apollinaire Bigirimana Jérémie Ndikumagenge +2 位作者 Sami Tabbane Romeo Nibitanga Hassan Kibeya 《Open Journal of Antennas and Propagation》 2024年第1期1-18,共18页
Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is sti... Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is still a long process. 2G networks have developed the messaging service, which complements the already operational voice service. 2G technology has rapidly progressed to the third generation (3G), incorporating multimedia data transmission techniques. It then progressed to fourth generation (4G) and LTE (Long Term Evolution), increasing the transmission speed to improve 3G. Currently, developed countries have already moved to 5G. In developing countries, including Burundi, a member of the East African Community (ECA) where more than 80% are connected to 2G technologies, 40% are connected to the 3G network and 25% to the 4G network and are not yet connected to the 5G network and then still a process. The objective of this article is to analyze the coverage of 2G, 3G and 4G networks in Burundi. This analysis will make it possible to identify possible deficits in order to reduce the digital divide between connected urban areas and remote rural areas. Furthermore, this analysis will draw the attention of decision-makers to the need to deploy networks and coverage to allow the population to access mobile and Internet services and thus enable the digitalization of the population. Finally, this article shows the level of coverage, the digital divide and an overview of the deployment of base stations (BTS) throughout the country to promote the transformation and digital inclusion of services. 展开更多
关键词 coverage of mobile networks and internet Digital Divide Rural and Isolated Areas Antenna Connectivity and Digital Inclusion
在线阅读 下载PDF
Offloading Mobile Data from Cellular Networks Through Peer-to-Peer WiFi Communication:A Subscribe-and-Send Architecture 被引量:1
2
作者 芦效峰 HUI Pan Pietro Lio 《China Communications》 SCIE CSCD 2013年第6期35-46,共12页
Currently cellular networks do not have sufficient capacity to accommodate the exponential growth of mobile data requirements.Data can be delivered between mobile terminals through peer-to-peer WiFi communications(e.g... Currently cellular networks do not have sufficient capacity to accommodate the exponential growth of mobile data requirements.Data can be delivered between mobile terminals through peer-to-peer WiFi communications(e.g.WiFi direct),but contacts between mobile terminals are frequently disrupted because of the user mobility.In this paper,we propose a Subscribe-and-Send architecture and an opportunistic forwarding protocol for it called HPRO.Under Subscribe-and-Send,a user subscribes contents on the Content Service Provider(CSP) but does not download the subscribed contents.Some users who have these contents deliver them to the subscribers through WiFi opportunistic peer-to-peer communications.Numerical simulations provide a robust evaluation of the forwarding performance and the traffic offloading performance of Subscribe-and-Send and HPRO. 展开更多
关键词 mobile internet cellular networks offioad opportunistic routing delay tolerant networks peer-to-peer WiFi
在线阅读 下载PDF
Localized Coverage Connectivity Based on Shape and Area Using Mobile Sensor Robots in Wireless Sensor Networks 被引量:1
3
作者 Rajaram Pichamuthu Prakasam Periasamy 《Circuits and Systems》 2016年第8期1962-1975,共15页
A wireless sensor network (WSN) is spatially distributing independent sensors to monitor physical and environmental characteristics such as temperature, sound, pressure and also provides different applications such as... A wireless sensor network (WSN) is spatially distributing independent sensors to monitor physical and environmental characteristics such as temperature, sound, pressure and also provides different applications such as battlefield inspection and biological detection. The Constrained Motion and Sensor (CMS) Model represents the features and explain k-step reach ability testing to describe the states. The description and calculation based on CMS model does not solve the problem in mobile robots. The ADD framework based on monitoring radio measurements creates a threshold. But the methods are not effective in dynamic coverage of complex environment. In this paper, a Localized Coverage based on Shape and Area Detection (LCSAD) Framework is developed to increase the dynamic coverage using mobile robots. To facilitate the measurement in mobile robots, two algorithms are designed to identify the coverage area, (i.e.,) the area of a coverage hole or not. The two algorithms are Localized Geometric Voronoi Hexagon (LGVH) and Acquaintance Area Hexagon (AAH). LGVH senses all the shapes and it is simple to show all the boundary area nodes. AAH based algorithm simply takes directional information by locating the area of local and global convex points of coverage area. Both these algorithms are applied to WSN of random topologies. The simulation result shows that the proposed LCSAD framework attains minimal energy utilization, lesser waiting time, and also achieves higher scalability, throughput, delivery rate and 8% maximal coverage connectivity in sensor network compared to state-of-art works. 展开更多
关键词 Localized coverage Wireless Senor Network Automatic Detection Framework Geometric Voronoi Polygon Acquaintance Area Polygons Environment Monitoring mobile Sensor Robots
在线阅读 下载PDF
Improved approach to enhanced Internet connectivity for mobile ad hoc networks
4
作者 沈斌 李波 石冰心 《Journal of Southeast University(English Edition)》 EI CAS 2007年第1期16-21,共6页
An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks.... An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks. The hybrid gateway discovery scheme that combined the advantages of a proactive and reactive gateway discovery approach is used to achieve high connectivity while keeping overhead costs low. By exchanging ad hoc on-demand distance vector (AODV) hello packet which includes additional fields named symmetric neighbor list and asymmetric neighbor list, unidirectional links are removed from route computation and broadcast storm can also be relieved simultaneously. Performance results using ns-2 simulations, under varying numbers of unidirectional links and node speeds, show that this improved Internet connectivity approach can provide better performance than others. 展开更多
关键词 mobile ad hoc networks internet connectivity gateway discovery unidirectional link broadcast storm
在线阅读 下载PDF
An Asynchronous Clustering and Mobile Data Gathering Schema Based on Timer Mechanism in Wireless Sensor Networks 被引量:8
5
作者 Jin Wang Yu Gao +2 位作者 Wei Liu Wenbing Wu Se-Jung Lim 《Computers, Materials & Continua》 SCIE EI 2019年第3期711-725,共15页
Recently,Wireless sensor networks(WSNs)have become very popular research topics which are applied to many applications.They provide pervasive computing services and techniques in various potential applications for the... Recently,Wireless sensor networks(WSNs)have become very popular research topics which are applied to many applications.They provide pervasive computing services and techniques in various potential applications for the Internet of Things(IoT).An Asynchronous Clustering and Mobile Data Gathering based on Timer Mechanism(ACMDGTM)algorithm is proposed which would mitigate the problem of“hot spots”among sensors to enhance the lifetime of networks.The clustering process takes sensors’location and residual energy into consideration to elect suitable cluster heads.Furthermore,one mobile sink node is employed to access cluster heads in accordance with the data overflow time and moving time from cluster heads to itself.Related experimental results display that the presented method can avoid long distance communicate between sensor nodes.Furthermore,this algorithm reduces energy consumption effectively and improves package delivery rate. 展开更多
关键词 internet of things wireless sensor networks CLUSTERING mobile data collection timer.
在线阅读 下载PDF
An Average Distance Based Self-Relocation and Self-Healing Algorithm for Mobile Sensor Networks 被引量:1
6
作者 Yipeng Qu Stavros V. Georgakopoulos 《Wireless Sensor Network》 2012年第11期257-263,共7页
The sensing coverage of a wireless sensor network is an important measure of the quality of service. It is desirable to develop energy efficient methods for relocating mobile sensors in order to achieve optimum sensin... The sensing coverage of a wireless sensor network is an important measure of the quality of service. It is desirable to develop energy efficient methods for relocating mobile sensors in order to achieve optimum sensing coverage. This paper introduces an average distance based self-relocation and self-healing algorithm for randomly deployed mobile sensor networks. No geo-location or relative location information is needed by this algorithm thereby no hardware such as GPS is required. The tradeoff is that sensors need to move longer distance in order to achieve certain coverage. Simulations are conducted in order to evaluate the proposed relocation and self-healing algorithms. An average of 94% coverage is achieved in the cases that we are examined with or without obstacles. 展开更多
关键词 mobile SENSOR Network coverage Self-Relocation SELF-HEALING
在线阅读 下载PDF
A Systematic Overview of Underwater Wireless Sensor Networks:Applications,Challenge and Research Perspectives 被引量:2
7
作者 Fethi Demim Rekia Bouguessa +1 位作者 Abdenebi Rouigueb Abdelkrim Nemra 《Journal of Computer Science Research》 2023年第2期52-77,共26页
Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and ... Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and memory storage due to the use of acoustic waves for communication,which results in long delays,significant power consumption,limited bandwidth,and packet loss.This paper provides a comprehensive review of the latest advancements in UWSNs,including essential services,common platforms,critical elements,and components such as localization algorithms,communication,synchronization,security,mobility,and applications.Despite significant progress,reliable and flexible solutions are needed to meet the evolving requirements of UWSNs.The purpose of this paper is to provide a framework for future research in the field of UWSNs by examining recent advancements,establishing a standard platform and service criteria,using a taxonomy to determine critical elements,and emphasizing important unresolved issues. 展开更多
关键词 Wireless sensor networks Ad-hoc networks internet of Things Localization algorithms Node mobility Security mechanisms Energy-efficient communication
在线阅读 下载PDF
Technology Trends and Architecture Research for Future Mobile Internet
8
作者 吴建平 李贺武 +3 位作者 孙文琦 吴茜 江卓 赵玮 《China Communications》 SCIE CSCD 2013年第6期14-27,共14页
With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also... With the rapid development of wireless transmission technologies and the proliferation of mobile terminals, the mobile Internet has experienced exponential growth in recent years. However, at the same time, it is also facing more challenges, particularly regarding bandwidth, address space, security, mobility, and energy. In this article, we analyse the five abovementioned challenges and then survey related technology trends. We also describe the progress of architecture research aimed at the future mobile Internet. We reach the conclusion that a single technology cannot solve all the problems of mobile Internet, and future research should focus more on how to make architectures and technologies work together more effectively. 展开更多
关键词 mobile internet network architecture IPV6
在线阅读 下载PDF
Edge Cloud Selection in Mobile Edge Computing(MEC)-Aided Applications for Industrial Internet of Things(IIoT)Services
9
作者 Dae-Young Kim SoYeon Lee +1 位作者 MinSeung Kim Seokhoon Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2049-2060,共12页
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im... In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method. 展开更多
关键词 Industrial internet of Things(IIoT)network IIoT service mobile edge computing(MEC) edge cloud selection MEC-aided application
在线阅读 下载PDF
The Application of Artificial Neural Network in Assessing Chinese Mobile Internet Service
10
作者 Zhu Jiachuan 《学术界》 CSSCI 北大核心 2014年第6期282-288,共7页
This paper pays its attention on Chinese mobile Internet service( MIS). Chinese MIS is developing so rapidly that the research on the mechanism of the formation of MIS assessment makes significant sense and therefore ... This paper pays its attention on Chinese mobile Internet service( MIS). Chinese MIS is developing so rapidly that the research on the mechanism of the formation of MIS assessment makes significant sense and therefore the three layers construct of the artificial neural network( ANN) theory is applied to address the problem. The final research model contains MIS features including personalization,localization,reachability,connectivity,convenience and ubiquity as the input layer variables,perceived MIS quality and MIS satisfaction as the hidden layer variables and reuse intention as the output layer variable. MIS risk is identified as the mediating variable. Theoretically,the framework is robust and reveals the mechanism of how customers evaluate a certain mobile Internet service. Practically,the model based on ANN should shed some light on how to understand and improve customer perceived mobile Internet service for both MIS giants and new comers. 展开更多
关键词 人工神经网络 互联网服务 质量管理信息系统 移动 中国 应用 评估 MIS
在线阅读 下载PDF
Mobile Ad Hoc Network与Internet互联的技术研究 被引量:3
11
作者 胡中功 邹莉 沈斌 《武汉科技学院学报》 2005年第6期65-69,共5页
分析了移动IP和AODV协议的工作机理,对MANET与Internet互联的关键技术,包括协议转换、地址分配、网关发现、路由发现与数据传输等问题进行了详细的讨论,并对今后的研究工作进行了展望。
关键词 mobile AD HOC Network internet 移动IP AODV路由协议
在线阅读 下载PDF
Mobile Ad Hoc网络与Internet互联的综合网关发现方法 被引量:3
12
作者 胡中功 沈斌 邹莉 《武汉科技学院学报》 2005年第8期45-49,共5页
大量基于adhoc网络的移动应用得以开展以及被认可的一大挑战就在于其能否提供足够好Internet连接,本文实现了一种MobileAdHoc网络与Internet互联时的综合网关发现方法,由于综合了主动与被动网关发现方法的优点,同时允许中间移动节点解... 大量基于adhoc网络的移动应用得以开展以及被认可的一大挑战就在于其能否提供足够好Internet连接,本文实现了一种MobileAdHoc网络与Internet互联时的综合网关发现方法,由于综合了主动与被动网关发现方法的优点,同时允许中间移动节点解析全局连接信息并在必要的时候以之回复请求节点,因此在合理的开销下改善了移动节点多跳访问Internet的性能,用NS2进行的仿真结果说明了综合方法的有效性。 展开更多
关键词 mobile Ad HOC Network 网络互联 综合网关发现方法 NS2
在线阅读 下载PDF
Mobile Edge Computing Towards 5G: Vision, Recent Progress, and Open Challenges 被引量:33
13
作者 Yifan Yu 《China Communications》 SCIE CSCD 2016年第S2期89-99,共11页
Mobile Edge Computing(MEC) is an emerging technology in 5G era which enables the provision of the cloud and IT services within the close proximity of mobile subscribers.It allows the availability of the cloud servers ... Mobile Edge Computing(MEC) is an emerging technology in 5G era which enables the provision of the cloud and IT services within the close proximity of mobile subscribers.It allows the availability of the cloud servers inside or adjacent to the base station.The endto-end latency perceived by the mobile user is therefore reduced with the MEC platform.The context-aware services are able to be served by the application developers by leveraging the real time radio access network information from MEC.The MEC additionally enables the compute intensive applications execution in the resource constraint devices with the collaborative computing involving the cloud servers.This paper presents the architectural description of the MEC platform as well as the key functionalities enabling the above features.The relevant state-of-the-art research efforts are then surveyed.The paper finally discusses and identifies the open research challenges of MEC. 展开更多
关键词 mobile edge computing 5G mobile internet mobile network mobile application
在线阅读 下载PDF
A Wireless Intrusion Alerts Clustering Method for Mobile Internet 被引量:2
14
作者 CHEN Guanlin WU Ying 《China Communications》 SCIE CSCD 2016年第4期108-118,共11页
With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of... With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of wireless intrusion alerts clustering method for mobile Internet. This paper proposes a Wireless Intrusion Alert Clustering Method(WIACM) based on the information of the mobile terminal. The method includes alert formatting, alert reduction and alert classification. By introducing key information of the mobile terminal device, this method aggregates the original alerts into hyper alerts. The experimental results show that WIACM would be appropriate for real attack scenarios of mobile Internet, and reduce the amount of alerts with more accuracy of alert analysis. 展开更多
关键词 mobile internet wireless intrusion alert clustering network security
在线阅读 下载PDF
The Theory of Internet Finance 被引量:9
15
作者 谢平 邹传伟 《China Economist》 2013年第2期18-26,共9页
Internet based technologies, such as mobile payments, social networks, search engines and cloud computation, will lead to a paradigm shift in financial sector. Beside indirect financing via commercial banks and direct... Internet based technologies, such as mobile payments, social networks, search engines and cloud computation, will lead to a paradigm shift in financial sector. Beside indirect financing via commercial banks and direct financing through security markets, a third way to conduct financial activities will emerge, which we call "internet finance'" This paper presents a detailed analysis of payment, information processing and resource allocation under internet finance. 展开更多
关键词 internet finance mobile payments social networks search engines cloudcomputation
在线阅读 下载PDF
A Reliable Routing Algorithm with Network Coding in Internet of Vehicles 被引量:1
16
作者 Zhen Wang Jianqing Li +2 位作者 Manlin Fang Yang Li Botao Feng 《China Communications》 SCIE CSCD 2017年第5期174-184,共11页
The intelligent vehicle network uses advanced information technology to establish an efficient integrated vehicle transport system, which has received great attention in industry and academia, lnternet of Vehicles (... The intelligent vehicle network uses advanced information technology to establish an efficient integrated vehicle transport system, which has received great attention in industry and academia, lnternet of Vehicles (loV) in an urban environment is operated in a wireless environment with high bit error rate and interference. In addition, the wireless link between vehicles is likely to be lost. All of this makes it an important challenge to provide reliable mobile routing in an urban traffic environment. In this paper, a reliable routing algorithm with network coding (RR_ NC) is proposed to solve the above problems. A routing node sequence is discovered in IoV from source to destination by multi-metric ant colony optimization algorithm (MACO), and then clusters are formed around every node in the sequence. By adding linear encoding into the transmission of data between vehicle's clusters, the RR_NC provides much more reliable transmission and can recover the original message in the event of disorder and loss of message. Simulations are taken under different scenarios, and the results prove that this novel algorithm can deliver the information more reliably between vehicles in real-time with lower data loss and communication overhead. 展开更多
关键词 intelligent transportation system (ITS) internet of vehicles (IoV) ROUTING CLUSTER network coding MOBILITY
在线阅读 下载PDF
Distributed nonuniform deployment for target monitoring in mobile sensor networks
17
作者 沈毅 涂志亮 王强 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第3期1-9,共9页
In this paper,three distributed and scalable nonuniform deployment algorithms in order to enhance the quality of monitoring(QoM).Mobile sensors are to be deployed around a target of interest which can be stationary or... In this paper,three distributed and scalable nonuniform deployment algorithms in order to enhance the quality of monitoring(QoM).Mobile sensors are to be deployed around a target of interest which can be stationary or moving,and to approximate a given weight function which is a measure of information or event density.The first two algorithms generate nonuniform deployments by inverse-transformations from a uniform deployment.They handle the situations of global coordinate system which is available and not with appropriate assumptions,respectively.The third algorithm,which relocates sensors to adjust inter-node distances based on the local measurements only,is suitable for general cases.The simulation results demonstrate the proposed algorithms can achieve reliable and satisfactory deployments. 展开更多
关键词 FLOCKING mobile sensor network sensor deployment triangle tessellation nonuniform coverage
在线阅读 下载PDF
Dynamic coverage of mobile multi-target in sensor networks based on virtual force 被引量:1
18
作者 Huang Qingdong Wang Mei +1 位作者 Chen Chen Han Zhuang 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2024年第4期83-94,共12页
A distributed self-control coverage method for mobile multi-target based on virtual force(MMTVF)is proposed to monitor dynamic targets using a mobile sensor network(MSN).The dynamic coverage method is introduced to ma... A distributed self-control coverage method for mobile multi-target based on virtual force(MMTVF)is proposed to monitor dynamic targets using a mobile sensor network(MSN).The dynamic coverage method is introduced to maintain network connectivity and optimize the coverage of moving targets.The method consists of two parts,one is the virtual force model which is proposed for motion control,and the other is the whale optimization algorithm which is improved to optimize node positions and achieve a steady state quickly.The virtual resultant force stretches the network towards uncovered targets using its multi-target attractive force,maintains network connectivity during network stretching using its attractive force,and prevents node collisions while nodes are moving using its repulsive force.The operating mechanism of the multi-target attractive force and other forces is thoroughly analyzed.Adjustment criteria for the model in different application scenarios are also provided.The comparisons demonstrate MMTVF has significant advantages over other similar approaches. 展开更多
关键词 mobile sensor network(MSN) dynamic coverage virtual force moving targets
原文传递
The Impact of Social Media Usage on Healthcare Delivery among Nurses
19
作者 Kennedy Addo Ernest Opoku Antwi 《E-Health Telecommunication Systems and Networks》 2024年第4期67-86,共20页
Introduction: Social media platforms have become integral to communication and information exchange in various sectors, including healthcare. For nurses, these platforms provide opportunities for professional networki... Introduction: Social media platforms have become integral to communication and information exchange in various sectors, including healthcare. For nurses, these platforms provide opportunities for professional networking, accessing clinical updates, and improving patient care through shared knowledge. Objective: The study aimed to understand the use of social media and its impact on healthcare delivery among nurses at a specific hospital. Methodology: A mixed-method approach was adopted, combining both quantitative and qualitative data. A cross-sectional descriptive survey was conducted with 313 nurses from various clinical departments in a tertiary healthcare institution. Data collection involved structured questionnaires for quantitative analysis and focus group discussions (FGDs) and key informant interviews (KIIs) for qualitative insights. Quantitative data was analyzed using SPSS version 22, and qualitative data was analyzed using thematic analysis with NVivo software. Results: The study found that Facebook, WhatsApp, and Twitter are the most commonly used platforms among nurses for exchanging health information. Key areas of focus included patient experiences, clinical updates, and best practices. Nurses reported that social media allowed them to quickly access up-to-date information and facilitated collaboration with peers. However, challenges such as concerns over patient privacy, the reliability of online information, and the absence of formal guidelines were noted. Conclusion: Social media has significant potential to enhance clinical decision-making and improve patient care among nurses in Ghana. However, barriers such as privacy concerns, unreliable internet access, and the absence of structured guidelines limit its full potential in professional practice. Recommendations: The Ministry of Health, in collaboration with health services, private agencies, and network providers, should also develop clear guidelines for social media use in clinical settings. 展开更多
关键词 Social Media internet Social Networking Site Health Information mobile Devices Healthcare Delivery
在线阅读 下载PDF
A Review of Artificial Intelligence Applications in Contemporary Computer Network Technologies
20
作者 Ackim Lutepo Kai Zhang 《Communications and Network》 2024年第3期90-107,共18页
Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought conveni... Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought convenience to people’s lives. The number of people using the internet around the globe has also increased significantly, exerting a profound influence on artificial intelligence. Further, the constant upgrading and development of artificial intelligence has led to the continuous innovation and improvement of computer technology. Countries around the world have also registered an increase in investment, paying more attention to artificial intelligence. Through an analysis of the current development situation and the existing applications of artificial intelligence, this paper explicates the role of artificial intelligence in the face of the unceasing expansion of computer network technology. 展开更多
关键词 Artificial Intelligence Network Technology internet of Things (IoT) CYBERSECURITY mobile Communication
在线阅读 下载PDF
上一页 1 2 34 下一页 到第
使用帮助 返回顶部