Filters








40,969 Hits in 8.0 sec

Development of a novel recommendation algorithm for collaborative health: Care system model

Igor Kulev, Elena Vlahu-Gjorgievska, Vladimir Trajkovik, Saso Koceski
2013 Computer Science and Information Systems  
This paper presents the mathematical model of a novel algorithm that generates recommendations and suggestions for preventive intervention instead of emergency care and hospital admissions.  ...  In this way, the proposed algorithm generates recommendations that will help the user to adapt his physical activities in order to improve his own health.  ...  The system consists of three components: medical server, mobile device and reading device for health parameters.  ... 
doi:10.2298/csis120921057k fatcat:ffvh4ag64bckdfddaeflnqew7e

An intelligent detection approach to multi-intrusions based on hybrid-model searching algorithm

Bo-Cha Chang, Wen-Shyong Hsieh, Yu-Cheng Lin, Mong-Fong Horng
2009 2009 IEEE International Conference on Systems, Man and Cybernetics  
The second is a hybrid-model searching algorithm to improve the accuracy and computation cost in searching intruding subjects.  ...  The third is the Universal-Plug-and-Play (UPnP-based) instant messaging (UIM).  ...  ACKNOWLEDGMENT The authors would like to sincerely thank National Science Council, Taiwan, ROC for the partial finance support under the grant 97-2228-E-151-006-  ... 
doi:10.1109/icsmc.2009.5346092 dblp:conf/smc/HorngHCL09 fatcat:7ab2spkklnbdtnhaffyl6u4mq4

Cache Optimization Models and Algorithms [article]

Georgios Paschos and George Iosifidis and Giuseppe Caire
2019 arXiv   pre-print
and improving the services offered to users.  ...  In the near future, caching is set to play an important role in storage-assisted Internet architectures, information-centric networks, and wireless systems, reducing operating and capital expenditures  ...  This problem is a generalization of the connected facility location problem (CoFL), see [107] , [217] .  ... 
arXiv:1912.12339v1 fatcat:tofgtzkzx5cudpepyhodwbvnnm

Design of Authentication Model Preserving Intimacy and Trust in Intelligent Environments

Benchaa Djellali, Abdallah Chouarfia, Kheira Belarbi, Pascal Lorenz
2015 Network Protocols and Algorithms  
In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users handling smart devices and smart services in PCEs.  ...  With the recent advances in communication technologies for low-power devices, pervasive computing environments (PCE) spread as new domains beyond legacy enterprise and personal computing.  ...  Security in Ubiquitous Networks Problem With the evolution of communication systems, mobile devices require access to an increasing number of services.  ... 
doi:10.5296/npa.v7i1.7208 fatcat:e6e7cgyrafd6bpieam4syubimq

A Modern Agricultural Model Based on IoT and Fog-Cloud Computing Algorithm

Md. Zahurul Haque, Rafiqul Islam
2020 Zenodo  
In this paper, we propose an IoT and fog computing based modern agricultural system model, which reduces the transmission cost, latency, delay etc.  ...  Fog computing basically extends cloud computing and services to the edge of the network and reduce the amount of data transported to the cloud for processing, analysis and storage.  ...  Cloud computing cannot solve all problems due to its own draw backs such as unacceptable latency, delay, lack of mobility support and location-awareness [2] .  ... 
doi:10.5281/zenodo.4159290 fatcat:2wvkanatsndbbcsxmn6gbaqogu

Access Point Placement Model for Indoor Environment using Hybrid Empirical Propagation and Simulated Annealing Algorithm

Fransiska Sisilia Mukti
2021 International Journal of Computing and Digital Systems  
This research aims to give a novel method in placing the AP (transmitter antenna) for indoor environments using a combination of empirical propagation (ITU-R model) and optimization algorithm (Simulated  ...  Determining of an Access Point (AP) placement is one of the most challenging problems in building a wireless network, especially for indoor environments.  ...  ACKNOWLEDGMENT We want to thank Institut Asia Malang, especially for the Network Operating Centre team who has given a lot of data to complete our research needs.  ... 
doi:10.12785/ijcds/100183 fatcat:ehgkec6ydnhhngcpd3dtbihsgy

Research Huawei's Human Resource Management Model by Wireless Network Communication and Association Rule Algorithms

Ming Li, Min Zheng, Zhihan Lv
2021 Wireless Communications and Mobile Computing  
This article is based on the wireless network communication method and association rule algorithm applied to the research of Huawei's human resource management model.  ...  In the current era of increasingly fierce competition among enterprises, it is becoming more and more important to study the latest types of human resource management models and apply them to themselves  ...  The first-generation mobile communication system is an analog mobile communication system that uses analog transmission to provide voice services, including AMPS in the United States, TACS in the United  ... 
doi:10.1155/2021/2031232 fatcat:pfcue33slbaztlupnjla75jpuq

Adaptive load control algorithms for 3rd generation mobile networks

Simin Nadjm-Tehrani, Kayvan Najarian, Calin Curescu, Tomas Lingvall, Teresa A. Dahlberg
2002 Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems - MSWiM '02  
In this paper we present strategies to deal with inherent load uncertainties in future generation mobile networks.  ...  We address the interplay between user differentiation and resource allocation, and specifically the problem of CPU load control in a radio network controller (RNC).  ...  ACKNOWLEDGEMENTS The authors wish to thank Pär Gustavsson and Sören Holmström at Ericsson for discussions and feedback during this work.  ... 
doi:10.1145/570758.570777 dblp:conf/mswim/Nadjm-TehraniNCLD02 fatcat:zyjlocdb7faajpierbvznkmmly

Mobile systems location privacy: "MobiPriv" a robust k anonymous system

Leon Stenneth, Phillip S. Yu, Ouri Wolfson
2010 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications  
Wi th the rapid advancement of positioning and tracking capabilities (mobile phones, on-board navigation systems) location based services are rapidly increasing.  ...  Privacy in location based systems is addressed in many papers. Our work is focused on the trusted third party privacy framework that utilizes the concept of k-anonymity with or without I-diversity.  ...  ACKNOWLEDGEMENTS This work is supported in part by NS F through grants II S-09149 34, II S-0905215, and DB I -096044 3. Also DG E-0549489, II S-095 7 394, and II S-084 7680. 9 .  ... 
doi:10.1109/wimob.2010.5645011 dblp:conf/wimob/StennethYW10 fatcat:kedput3pbrbbvo3c52lh3gaemy

Mathematical model and algorithm of selecting software promotion options differentiated by functionality and business models

Yuriy Yekhlakov, Dmitriy Baraksanov
2015 Business Informatics  
As a result of the problem solution, software product should be distributed as SaaS in 14 segments, and as ASP -in 3 segments.  ...  Citation: Yekhlakov Yu.P., Baraksanov D.N. (2015) Mathematical model and algorithm of selecting software promotion options differentiated by functionality and business models.  ...  makes it possible to conclude about the suitability of the proposed model and algorithm for solving practical problems.  ... 
doi:10.17323/1998-0663.2015.4.55.62 fatcat:lvsuiju47jbmbick6xig2ncjeq

Adaptive load control algorithms for 3rd generation mobile networks

Simin Nadjm-Tehrani, Kayvan Najarian, Calin Curescu, Tomas Lingvall, Teresa A. Dahlberg
2002 Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems - MSWiM '02  
In this paper we present strategies to deal with inherent load uncertainties in future generation mobile networks.  ...  We address the interplay between user differentiation and resource allocation, and specifically the problem of CPU load control in a radio network controller (RNC).  ...  ACKNOWLEDGEMENTS The authors wish to thank Pär Gustavsson and Sören Holmström at Ericsson for discussions and feedback during this work.  ... 
doi:10.1145/570774.570777 fatcat:qmiv62hbirhtxplqxkqvvdexcm

Algorithmic Foundations of Economic and Mathematical Modeling of Network Logistics Processes

Sergey Yevgenievich Barykin, Irina Vasilievna Kapustina, Sergey Mikhailovich Sergeev, Vladimir Konstantinovich Yadykin
2020 Journal of Open Innovation: Technology, Market and Complexity  
The purpose of this study is to further develop the algorithmic foundations of economic and mathematical modeling of logistics networks based on advanced technologies that the digitalization process provides  ...  The results obtained will find application not only in transport problems.  ...  Acknowledgments: The authors would like to thank the four anonymous referees for their very useful suggestions.  ... 
doi:10.3390/joitmc6040189 fatcat:jwq2o6mxhfhgthyrjhjhgbnxry

Simulation and Performance Evaluation of the Intel Rate Adaptation Algorithm

Rémy Grünblatt, Isabelle Guérin-Lassous, Olivier Simonin
2019 Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems - MSWIM '19  
Thanks to this implementation, we can evaluate the performance of Iwl-Mvm-Rs in different scenarios (static and with mobility, with and without fast fading).  ...  Most of the WiFi controllers rely on proprietary code and the used rate adaptation algorithms in these controllers are unknown.  ...  ACKNOWLEDGMENTS The authors would like to thanks the Direction Générale de l'Armement (DGA) and the Fédération Informatique de Lyon (FIL) for their financial support.  ... 
doi:10.1145/3345768.3355921 dblp:conf/mswim/GrunblattLS19 fatcat:uwbzu4yx5rfk5ji45pg2ywqqxq

Analysis of e-Commerce Characteristics Based on Edge Algorithm and COX Model

Jinzhong Zuo, Chi-Hua Chen
2021 Wireless Communications and Mobile Computing  
Aiming at the problems of imperfect legal system in China's e-commerce supervision, lack of cross-departmental coordination mechanism, and difficulty in investigation and evidence collection of e-commerce  ...  With the rapid development of C2C (consumer to consumer) e-commerce transactions in China, the problem of information asymmetry in C2C e-commerce transactions is becoming more and more obvious.  ...  research progress and outcomes and the Humanities and Social Science Research Project of Anhui University in 2016 (SK2016A0636).  ... 
doi:10.1155/2021/6628068 fatcat:wjtpmrvgvfgj5hzpikw5piz6qm

Indoor radio location algorithm using empirical propagation models and probability distribution heuristics

Gábor Varga, Róbert Schulcz
2011 Periodica Polytechnica Electrical Engineering  
The propagation model described in this paper can be used to generate estimated signal strength patterns for locations that were left out of the survey; and the values coming from the two different sources  ...  The results from this location algorithm are combined with other probability distributions, generated by heuristics such as the distribution of walls, previous walking directions and typical indoor movement  ...  We let the mobile device to take 100 measurements and observed the outcome of the algorithm on the server.  ... 
doi:10.3311/pp.ee.2011-1-2.10 fatcat:q75hnrp645h5tnsdeulky24qqu
« Previous Showing results 1 — 15 out of 40,969 results