-
121
Design and Analysis of Remote Tourism Teaching and Training System Based on Adaptive Virtual Queue Algorithm
Published 2022-01-01“…During the design of the remote tourism teaching and training system, the adaptive virtual queue algorithm can be used to collect business data information with network technology and sensors and other equipment. …”
Get full text
Article -
122
-
123
-
124
Deep Learning Based Dual Channel Banana Grading System Using Convolution Neural Network
Published 2022-01-01Get full text
Article -
125
Experience in implementing a patient-centered approach in a private medical organization
Published 2022-09-01Get full text
Article -
126
-
127
Identifying the components of the administrative system employee empowerment model based on organizational intelligence and interpersonal relationships
Published 2024-05-01“…Based on the findings of this study, 9 dimensions were identified for the dimensions of administrative system employee empowerment based on organizational intelligence and interpersonal relationships, including personal empowerment, attitudinal empowerment, cognitive empowerment, communication empowerment, managerial empowerment, organizational empowerment, social empowerment, knowledge/informational empowerment, and spiritual empowerment. …”
Get full text
Article -
128
Spatial Intelligence in E-Commerce: Integrating Mobile Agents with GISs for a Dynamic Recommendation System
Published 2025-01-01Get full text
Article -
129
Timely access to specialist outpatient care: can applying systems thinking unblock our waiting lists?
Published 2025-01-01Get full text
Article -
130
-
131
-
132
Digital ecosystem model of the agro-industrial complex
Published 2023-03-01“…The ecosystem architecture has been developed and structured in terms of organizational, infrastructure, innovation, communication and logistics components. The role of the system actor and IT integrator is assigned to the Ministry of Agriculture of the Russian Federation. …”
Get full text
Article -
133
Towards a More Resilient Healthcare Sector in Post-COVID-19 Pandemic in Jordan
Published 2024-12-01Get full text
Article -
134
Perception and Resistance Levels of Management Information Systems on University Administrator and Other Staff: A Practice Selcuk University
Published 2018-02-01“…Production of this information is possible by the existence of the management information systems. However, use of the management information systems actively in business and outside the business accompanies many responsibilities, duties, applications and the new system. …”
Get full text
Article -
135
5G-based smart airport network security scheme design and security analysis
Published 2023-10-01“…To meet the security requirements of smart airports, a 5G-based smart airport network security solution was proposed.The security characteristics and security requirements of the 5G scenario in smart airport were analyzed, and the pain points of security requirements in the current scenario were summarized in five aspects:unified security management and control, network slicing security, security monitoring and early warning, edge computing security, and IoT-aware node security.And then a 5G network security system was designed for smart airports.The functional components of this system included 5G network unified security management and control functions for ubiquitous networks, lightweight 5G network identity authentication and authentication functions, 5G network slice security protection for multi-service requirements, 5G network security monitoring and early warning based on big data analysis, integrated security protection function based on edge computing, and sensory node security protection function based on device behavior analysis.This comprehensive approach built an all-in-one security platform covering business encryption, network security, terminal trustworthiness, identity trustworthiness, and security management and control.Additionally, the potential counterfeit base station attacks in the existing 5G authentication and key agreement (AKA) were analyzed.Due to the lack of authenticity verification of the messages forwarded by the SN, the attacker can pretend to be the real SN to communicate with the UE and the HN, thus carrying out the base station masquerading attack.This kind of attack may lead to the leakage of smart airport network data, and encounter problems such as tampering and deception by opponents.Aiming at the network security requirements of smart airports and the security issues of 5G authentication and key agreement protocol, an improved 5G authentication and key agreement protocol was designed.Formal security models, security goal definitions, and analysis were performed to ensure the robustness and effectiveness of the protocol against attacks.…”
Get full text
Article -
136
Building end to end service guarantee system of IoT covering“terminal pipe and cloud” based on signaling big data
Published 2018-06-01“…With the evolution of wireless communication service types to massive,large connections,small traffic scenarios,mobile Internet has marched into the Internet of things.Carrying on business networking wireless network deployment in communication operators,which provides a wealth of industry applications also enable operators facing huge end-to-end backward challenges to business.An end to end service guarantee system based on the signaling big data and covering the “terminal pipe and cloud” was proposed and constructed,and the six network dimensions in the user,terminal,wireless,transmission,core network and digital network was solved,as well as the four stages of network access,service access,network switching,and service quality of six dimensions and four stages facing the Internet of things.In order to solve the problem of inter professional collaboration and demarcation,the assistant operator completes the transformation from the traditional KPI (key performance indicator) index mode to the service aware KQI (key quality indicator) end to end full process business guarantee mechanism,and provides the end to end full process one key positioning ability guarantee for the Internet of things applications.…”
Get full text
Article -
137
Investigating the Role of Artificial Intelligence Enablers and Companies' Readiness in Adopting an Artificial Intelligence-integrated Customer Relationship Management System
Published 2024-03-01“…ObjectiveEscalating competition and environmental uncertainty drive business owners towards adopting agile and intelligent communication functions with customers. …”
Get full text
Article -
138
Presenting the internal evaluation model on the performance of the banking industry based on the data theory method of the foundation
Published 2024-06-01“…Therefore, the success of all banks, governmental or non-governmental, is influenced by several factors; one of the most important of which is customer satisfaction, in order to achieve excellence in business; and this customer satisfaction is one of the basic requirements of quality management systems (Akbari, 2019). …”
Get full text
Article -
139
Networking model and traffic analysis for integrating ad hoc and LEO satellite terminals
Published 2006-01-01“…The compromise between the utilization rate of valuable satellite channels and the blocking probability of new call was hardly to achieve.Enlightened by the advantages of ad hoc networking,a new scheme was proposed which al-lowed the terminals to work in alternative mode according the instructions from the satellite’s signaling channel,meaned to communicate with other terminals in ad hoc mode when they were in a distance shorter than the maximum ad hoc communication distance and when the system was in busy state or in normal satellite communication mode when the system was idle.So the overflow traffic in nearer distance might get serviced with ad hoc mode and the system’s parame-ters was improved.Simulation results show that the proposed scheme has decreased the realistic call blocking probability and increased the valid channel utility rate of the system.…”
Get full text
Article -
140