Showing 121 - 140 results of 353 for search 'business communications system', query time: 0.15s Refine Results
  1. 121

    Design and Analysis of Remote Tourism Teaching and Training System Based on Adaptive Virtual Queue Algorithm by Jian Wang

    Published 2022-01-01
    “…During the design of the remote tourism teaching and training system, the adaptive virtual queue algorithm can be used to collect business data information with network technology and sensors and other equipment. …”
    Get full text
    Article
  2. 122
  3. 123
  4. 124
  5. 125
  6. 126
  7. 127

    Identifying the components of the administrative system employee empowerment model based on organizational intelligence and interpersonal relationships by fatemeh khoshhal, ali reza sargolzaie, zahra vazife

    Published 2024-05-01
    “…Based on the findings of this study, 9 dimensions were identified for the dimensions of administrative system employee empowerment based on organizational intelligence and interpersonal relationships, including personal empowerment, attitudinal empowerment, cognitive empowerment, communication empowerment, managerial empowerment, organizational empowerment, social empowerment, knowledge/informational empowerment, and spiritual empowerment. …”
    Get full text
    Article
  8. 128
  9. 129
  10. 130
  11. 131
  12. 132

    Digital ecosystem model of the agro-industrial complex by D. A. Korobeinikov

    Published 2023-03-01
    “…The ecosystem architecture has been developed and structured in terms of organizational, infrastructure, innovation, communication and logistics components. The role of the system actor and IT integrator is assigned to the Ministry of Agriculture of the Russian Federation. …”
    Get full text
    Article
  13. 133
  14. 134

    Perception and Resistance Levels of Management Information Systems on University Administrator and Other Staff: A Practice Selcuk University by Sertaç Arı, Esen Şahin

    Published 2018-02-01
    “…Production of this information is possible by the existence of the management information systems. However, use of the management information systems actively in business and outside the business accompanies many responsibilities, duties, applications and the new system. …”
    Get full text
    Article
  15. 135

    5G-based smart airport network security scheme design and security analysis by Xinxin XING, Qingya ZUO, Jianwei LIU

    Published 2023-10-01
    “…To meet the security requirements of smart airports, a 5G-based smart airport network security solution was proposed.The security characteristics and security requirements of the 5G scenario in smart airport were analyzed, and the pain points of security requirements in the current scenario were summarized in five aspects:unified security management and control, network slicing security, security monitoring and early warning, edge computing security, and IoT-aware node security.And then a 5G network security system was designed for smart airports.The functional components of this system included 5G network unified security management and control functions for ubiquitous networks, lightweight 5G network identity authentication and authentication functions, 5G network slice security protection for multi-service requirements, 5G network security monitoring and early warning based on big data analysis, integrated security protection function based on edge computing, and sensory node security protection function based on device behavior analysis.This comprehensive approach built an all-in-one security platform covering business encryption, network security, terminal trustworthiness, identity trustworthiness, and security management and control.Additionally, the potential counterfeit base station attacks in the existing 5G authentication and key agreement (AKA) were analyzed.Due to the lack of authenticity verification of the messages forwarded by the SN, the attacker can pretend to be the real SN to communicate with the UE and the HN, thus carrying out the base station masquerading attack.This kind of attack may lead to the leakage of smart airport network data, and encounter problems such as tampering and deception by opponents.Aiming at the network security requirements of smart airports and the security issues of 5G authentication and key agreement protocol, an improved 5G authentication and key agreement protocol was designed.Formal security models, security goal definitions, and analysis were performed to ensure the robustness and effectiveness of the protocol against attacks.…”
    Get full text
    Article
  16. 136

    Building end to end service guarantee system of IoT covering“terminal pipe and cloud” based on signaling big data by Xuli YE, Qiang ZENG, Liyu LIU, Yu SU, Meng KANG

    Published 2018-06-01
    “…With the evolution of wireless communication service types to massive,large connections,small traffic scenarios,mobile Internet has marched into the Internet of things.Carrying on business networking wireless network deployment in communication operators,which provides a wealth of industry applications also enable operators facing huge end-to-end backward challenges to business.An end to end service guarantee system based on the signaling big data and covering the “terminal pipe and cloud” was proposed and constructed,and the six network dimensions in the user,terminal,wireless,transmission,core network and digital network was solved,as well as the four stages of network access,service access,network switching,and service quality of six dimensions and four stages facing the Internet of things.In order to solve the problem of inter professional collaboration and demarcation,the assistant operator completes the transformation from the traditional KPI (key performance indicator) index mode to the service aware KQI (key quality indicator) end to end full process business guarantee mechanism,and provides the end to end full process one key positioning ability guarantee for the Internet of things applications.…”
    Get full text
    Article
  17. 137

    Investigating the Role of Artificial Intelligence Enablers and Companies' Readiness in Adopting an Artificial Intelligence-integrated Customer Relationship Management System by Soheila Mohammadzadeh Vanestan, Rahim Abedi

    Published 2024-03-01
    “…ObjectiveEscalating competition and environmental uncertainty drive business owners towards adopting agile and intelligent communication functions with customers. …”
    Get full text
    Article
  18. 138

    Presenting the internal evaluation model on the performance of the banking industry based on the data theory method of the foundation by Zahra Ramzanpour Osmavandani, mehdi Rouholamini, Shahrbanoo Gholipour

    Published 2024-06-01
    “…Therefore, the success of all banks, governmental or non-governmental, is influenced by several factors; one of the most important of which is customer satisfaction, in order to achieve excellence in business; and this customer satisfaction is one of the basic requirements of quality management systems (Akbari, 2019). …”
    Get full text
    Article
  19. 139

    Networking model and traffic analysis for integrating ad hoc and LEO satellite terminals by WANG Xiao-yan, WANG Hao, DONG Yan, HUANG Zai-lu

    Published 2006-01-01
    “…The compromise between the utilization rate of valuable satellite channels and the blocking probability of new call was hardly to achieve.Enlightened by the advantages of ad hoc networking,a new scheme was proposed which al-lowed the terminals to work in alternative mode according the instructions from the satellite’s signaling channel,meaned to communicate with other terminals in ad hoc mode when they were in a distance shorter than the maximum ad hoc communication distance and when the system was in busy state or in normal satellite communication mode when the system was idle.So the overflow traffic in nearer distance might get serviced with ad hoc mode and the system’s parame-ters was improved.Simulation results show that the proposed scheme has decreased the realistic call blocking probability and increased the valid channel utility rate of the system.…”
    Get full text
    Article
  20. 140