期刊文献+
共找到8,554篇文章
< 1 2 250 >
每页显示 20 50 100
Enhancing User Experience in AI-Powered Human-Computer Communication with Vocal Emotions Identification Using a Novel Deep Learning Method
1
作者 Ahmed Alhussen Arshiya Sajid Ansari Mohammad Sajid Mohammadi 《Computers, Materials & Continua》 2025年第2期2909-2929,共21页
Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing de... Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing details about the speaker’s goals and desires, as well as their internal condition. Certain vocal characteristics reveal the speaker’s mood, intention, and motivation, while word study assists the speaker’s demand to be understood. Voice emotion recognition has become an essential component of modern HCC networks. Integrating findings from the various disciplines involved in identifying vocal emotions is also challenging. Many sound analysis techniques were developed in the past. Learning about the development of artificial intelligence (AI), and especially Deep Learning (DL) technology, research incorporating real data is becoming increasingly common these days. Thus, this research presents a novel selfish herd optimization-tuned long/short-term memory (SHO-LSTM) strategy to identify vocal emotions in human communication. The RAVDESS public dataset is used to train the suggested SHO-LSTM technique. Mel-frequency cepstral coefficient (MFCC) and wiener filter (WF) techniques are used, respectively, to remove noise and extract features from the data. LSTM and SHO are applied to the extracted data to optimize the LSTM network’s parameters for effective emotion recognition. Python Software was used to execute our proposed framework. In the finding assessment phase, Numerous metrics are used to evaluate the proposed model’s detection capability, Such as F1-score (95%), precision (95%), recall (96%), and accuracy (97%). The suggested approach is tested on a Python platform, and the SHO-LSTM’s outcomes are contrasted with those of other previously conducted research. Based on comparative assessments, our suggested approach outperforms the current approaches in vocal emotion recognition. 展开更多
关键词 Human-computer communication(HCC) vocal emotions live vocal artificial intelligence(AI) deep learning(DL) selfish herd optimization-tuned long/short K term memory(SHO-LSTM)
在线阅读 下载PDF
An Empirical Analysis of the Effect of Text-Based Computer-Mediated Communication on Communicative Competence
2
作者 王剑娜 《海外英语》 2016年第8期225-228,共4页
It has been suggested that text-based computer-mediated communication can help learners to use target language both in classrooms and in social contexts.It’s necessary to investigate the effect of text-based CMC on l... It has been suggested that text-based computer-mediated communication can help learners to use target language both in classrooms and in social contexts.It’s necessary to investigate the effect of text-based CMC on learners’communicative competence by conducting the method of systematic review.The findings implied that text-based CMC settings allowed learners to interact.The interaction provided learners with more opportunities to develop their communicative competence of target language. 展开更多
关键词 text-based computer-mediated communication(CMC) second language acquisition(SLA) COMMUNICATIVE compe
在线阅读 下载PDF
Opening Moves Involved in Text-based Computer-Mediated-Communication (CMC) by Chinese Adults
3
作者 李莉华 《海外英语》 2011年第3X期257-258,260,共3页
The development of science and technology has made it not only possible but very convenient for people living in different parts of the world to communicate with each other, thus bringing forth a new form of communica... The development of science and technology has made it not only possible but very convenient for people living in different parts of the world to communicate with each other, thus bringing forth a new form of communication: computer-mediated communication (CMC). Text-based CMC is one of the most popular forms of CMC in which people send instant messages to others in different settings. Since this mode of interaction combines features of both the written and spoken language (Greenfield & Subrahmanyam, 2003), it's of great interest whether it follows the same sequential rule as the telephone conversation. However, compared to telephone conversations, computer-mediated communication has received much less attention, let alone text-based CMC. The existing body of literature mostly focuses on content analysis and linguistic features but neglects the sequential organization of such interaction (Paolillo, 1999; Greenfield and Subrahmanyam, 2003; Herring, 1999). In light of this, this paper examines the opening moves of instant message exchanges among Chinese adults in an attempt to find out the unique features characterizing the way they open an online chat. The framework that was chosen for data analysis was the sequential model proposed by Schegloff for American telephone openings. 展开更多
关键词 computer-mediated communication(CMC) Text-based CMC OPENING MOVES instant message exchanges on line chat sequential model
在线阅读 下载PDF
Brain-Computer-Interface Inspired Communications 被引量:1
4
作者 Honglin Hu Xianfu Chen Tao Jiang 《China Communications》 SCIE CSCD 2022年第2期I0002-I0004,共3页
Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detail... Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detailed killer-applications and key technologies of 6G have not been clearly defined yet,it is commonly expected that 6G will provide hypercoverage and hyper-connectivity.Enabled by these capabilities,the 6G communication systems are especially aiming at improving the user’s experi-ence greatly,or more ambitiously,to change the way of human’s everyday life.So far,many new services with more stringent requirements,such as truly immersive extended reali¬ty(XR),high-fidelity mobile hologram,and digital replica,are expected to be satisfied by the 6G communication systems. 展开更多
关键词 communication communicationS EVERYDAY
在线阅读 下载PDF
The 23rd International Conference on Computer Communication and Networks (ICCCN 2014)
5
《计算机应用研究》 CSCD 北大核心 2013年第11期F0002-F0002,共1页
August 4-August 7, 2014 Shanghai, China http:/www.icccn.org/icccn14/ICCCN is one of the leading international conferences for presenting noel ideas and fundamental advances in the fields of computer communications and... August 4-August 7, 2014 Shanghai, China http:/www.icccn.org/icccn14/ICCCN is one of the leading international conferences for presenting noel ideas and fundamental advances in the fields of computer communications and networks. ICCCN serves to foster communication among researchers and practitioners with 展开更多
关键词 WWW ICCCN 2014 The 23rd International Conference on computer communication and Networks
在线阅读 下载PDF
STUDY AND COMPUTER SIMULATION OF AN ADAPTIVE STATISTIC MODEL FOR MOBILE COMMUNICATION CHANNEL 被引量:1
6
作者 Wang Duanyi Hu Zhengming(Beijing University of Posts and Telecommunications, Beijing 100088) 《Journal of Electronics(China)》 1996年第3期228-234,共7页
An adaptive statistic model for mobile communication channel is studied and simulated in this paper. According to the model parameters, an error sequence describing the long burst error characteristics of the mobile c... An adaptive statistic model for mobile communication channel is studied and simulated in this paper. According to the model parameters, an error sequence describing the long burst error characteristics of the mobile communication channel is generated on a computer. A test method using threshold technique is presented to verify the accuracy of the adaptive channel model. 展开更多
关键词 Mobile communication CHANNEL MARKOV MODEL ERROR SEQUENCE computer simulation
在线阅读 下载PDF
Call for Paper--Feature Topic Vol.19, No. 2, 2022 Brain-Computer-Interface Inspired Communications
7
《China Communications》 SCIE CSCD 2021年第6期I0007-I0007,共1页
Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detail... Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detailed killer-applications and key technologies of 6G have not been clearly defined yet,it is commonly expected that 6G will provide hyper-coverage and hyper-connectivity.Enabled by these capabilities,the 6G communication systems are especially aiming at improving the user’s experience greatly,or more ambitiously,to change the way of human’s everyday life.So far,many new services with more stringent requirements,such as truly immersive extended reality(XR),high-fidelity mobile hologram,and digital replica,are expected to be satisfied by the 6G communication systems. 展开更多
关键词 communication communicationS EVERYDAY
在线阅读 下载PDF
On English Communications by Narratives and Computer Games
8
作者 肖红 《海外英语》 2014年第20期280-281,共2页
Computer video games,which are based on personal computers,game consoles,and portable devices,can be played solo or multiplayer,and over networks. Interaction,which is the basic characteristic of games,provides rich c... Computer video games,which are based on personal computers,game consoles,and portable devices,can be played solo or multiplayer,and over networks. Interaction,which is the basic characteristic of games,provides rich communication opportunities for audiences. Meanwhile,narrative is a far more diverse concept to be considered as a distinctly important way of communication. This essay will compare and contrast the communication opportunities provided by narratives and computer games. 展开更多
关键词 communication OPPORTUNITY narratives computer GAME
在线阅读 下载PDF
Anonymity Effects and Implications in the Virtual Environment: From Crowd to Computer-Mediated Communication
9
作者 Zuoming Wang 《Social Networking》 2018年第1期45-62,共18页
Anonymity, an important feature of computer-mediated communication (CMC), is embedded in this new technology. With the penetration of the Internet in society, many daily activities involve online interactions. Anonymi... Anonymity, an important feature of computer-mediated communication (CMC), is embedded in this new technology. With the penetration of the Internet in society, many daily activities involve online interactions. Anonymity affects both the task and social aspects of online communication including information exchange, decision making, and relationship development. This review examines the effects of anonymity on human behavior. It outlines how the prior literature has attempted to address this issue and how the Social Identity Deindividuation (SIDE) model has developed as an attempt to tackle this question. More importantly, it discusses a framework describing the multidimensions of anonymity in CMC [1], and subsequently raised five propositions inspired by this framework. Furthermore, using McLeod’s framework, this review evaluates SIDE studies with regard to their anonymity manipulations. This critique reveals possible future research directions for refining the SIDE model and better studying the effect of anonymity in virtual environment. 展开更多
关键词 ANONYMITY VIRTUAL Environment computer-Mediated communication SIDE
暂未订购
The computer simulation of the communication system that combines data and power down a common twisted wire pair
10
作者 Alexander Paderin Chye En Un 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2000年第S1期81-83,共3页
A peculiarity of control network systems is the automatic implementation mode of monitoring and control, without outside intervention in a control process. This mode imposes rigid restrictions upon transmitted data. A... A peculiarity of control network systems is the automatic implementation mode of monitoring and control, without outside intervention in a control process. This mode imposes rigid restrictions upon transmitted data. All circulating data should comply to the defined time interval in which their reliability is definite. In other word communication has to be predictable and time-constrained in order to produce control output in time. This characteristic corresponds to concept 《determinism》 that characterizes an ability of a protocol to guarantee equivalent and opportune network access with the delay not exceeding definite time interval. For development of a deterministic and noise-resistant protocol is necessary to carry out analysis of an error model obtained by the computer simulation of an electromagnetic process in conditions of variety and intensity of interference. The formalization of the error model gives computer simulation an ability to get the error sequence directly without simulation of the electromagnetic process. The results of the simulation of an error sequence can be used for the expediency analysis of a noise-resistant encoding and the analysis of an error-correcting ability. 展开更多
关键词 110 The computer simulation of the communication system that combines
在线阅读 下载PDF
Emotional Awareness: An Enhanced Computer Mediated Communication Using Facial Expressions
11
作者 Moran David Adi Katz 《Social Networking》 2016年第1期27-38,共12页
This paper describes the design of a prototype for an emotionally enhanced computer mediated communication system which is aimed at compensating for the emotional distance between communicators. The prototype system e... This paper describes the design of a prototype for an emotionally enhanced computer mediated communication system which is aimed at compensating for the emotional distance between communicators. The prototype system encourages the sender to take the emotional perspective of the message receiver by giving the sender a sense of how his message may affect the intended receiver, and by allowing the sender to reconsider sending the message or revise it. The objective of an emotionally enhanced communication system is to raise awareness to the ease in which a written word might be misinterpreted since emotions are too often unseen due to the nature of lean communication media. In order to show the receiver’s assumed emotion, the written text would be parsed before sending the message. An algorithm, for demonstrating the prediction of the emotion a written message might evoke, will choose a facial expression from a pool of 7 expressions, according to the words and phrases inserted in the message. We conducted a user test to evaluate the acceptance and attitudes toward such an emotionally enhanced communication system and received a high level of acceptance and favorable attitudes towards using it. 展开更多
关键词 CMC ICT Social Media Emotional communication Affective Design Interpersonal communication
在线阅读 下载PDF
Recent applications of EEG-based brain-computer-interface in the medical field 被引量:6
12
作者 Xiu-Yun Liu Wen-Long Wang +39 位作者 Miao Liu Ming-Yi Chen Tânia Pereira Desta Yakob Doda Yu-Feng Ke Shou-Yan Wang Dong Wen Xiao-Guang Tong Wei-Guang Li Yi Yang Xiao-Di Han Yu-Lin Sun Xin Song Cong-Ying Hao Zi-Hua Zhang Xin-Yang Liu Chun-Yang Li Rui Peng Xiao-Xin Song Abi Yasi Mei-Jun Pang Kuo Zhang Run-Nan He Le Wu Shu-Geng Chen Wen-Jin Chen Yan-Gong Chao Cheng-Gong Hu Heng Zhang Min Zhou Kun Wang Peng-Fei Liu Chen Chen Xin-Yi Geng Yun Qin Dong-Rui Gao En-Ming Song Long-Long Cheng Xun Chen Dong Ming 《Military Medical Research》 2025年第8期1283-1322,共40页
Brain-computer interfaces(BCIs)represent an emerging technology that facilitates direct communication between the brain and external devices.In recent years,numerous review articles have explored various aspects of BC... Brain-computer interfaces(BCIs)represent an emerging technology that facilitates direct communication between the brain and external devices.In recent years,numerous review articles have explored various aspects of BCIs,including their fundamental principles,technical advancements,and applications in specific domains.However,these reviews often focus on signal processing,hardware development,or limited applications such as motor rehabilitation or communication.This paper aims to offer a comprehensive review of recent electroencephalogram(EEG)-based BCI applications in the medical field across 8 critical areas,encompassing rehabilitation,daily communication,epilepsy,cerebral resuscitation,sleep,neurodegenerative diseases,anesthesiology,and emotion recognition.Moreover,the current challenges and future trends of BCIs were also discussed,including personal privacy and ethical concerns,network security vulnerabilities,safety issues,and biocompatibility. 展开更多
关键词 Brain-computer interfaces(BCIs) Medical applications REHABILITATION communication Brain monitoring DIAGNOSIS
原文传递
A Neuro Metasurface Mode-Router for Fiber Mode Demultiplexing and Communications 被引量:1
13
作者 Yu Zhao Huijiao Wang +10 位作者 Zile Li Tian Huang Chao Yang Ying Qiu Yuhan Gong Zhou Zhou Congling Liang Lei Yu Jin Tao Shaohua Yu Guoxing Zheng 《Engineering》 2025年第2期88-96,共9页
Advancements in mode-division multiplexing(MDM)techniques,aimed at surpassing the Shannon limit and augmenting transmission capacity,have garnered significant attention in optical fiber communica-tion,propelling the d... Advancements in mode-division multiplexing(MDM)techniques,aimed at surpassing the Shannon limit and augmenting transmission capacity,have garnered significant attention in optical fiber communica-tion,propelling the demand for high-quality multiplexers and demultiplexers.However,the criteria for ideal-mode multiplexers/demultiplexers,such as performance,scalability,compatibility,and ultra-compactness,have only partially been achieved using conventional bulky devices(e.g.,waveguides,grat-ings,and free space optics)—an issue that will substantially restrict the application of MDM techniques.Here,we present a neuro-meta-router(NMR)optimized through deep learning that achieves spatial multi-mode division and supports multi-channel communication,potentially offering scalability,com-patibility,and ultra-compactness.An MDM communication system based on an NMR is theoretically designed and experimentally demonstrated to enable simultaneous and independent multi-dataset transmission,showcasing a capacity of up to 100 gigabits per second(Gbps)and a symbol error rate down to the order of 104,all achieved without any compensation technologies or correlation devices.Our work presents a paradigm that merges metasurfaces,fiber communications,and deep learning,with potential applications in intelligent metasurface-aided optical interconnection,as well as all-optical pat-tern recognition and classification. 展开更多
关键词 Metasurfaces Deep learning Mode-division multiplexing Fiber communication
在线阅读 下载PDF
Joint User Association,Resource Allocation and Trajectory Design for Multi-UAV-Aided NOMA Wireless Communication Systems 被引量:1
14
作者 Yin Sixing Qu Zhaowei Yu Peng 《China Communications》 2025年第3期217-233,共17页
In this paper,we investigate a multi-UAV aided NOMA communication system,where multiple UAV-mounted aerial base stations are employed to serve ground users in the downlink NOMA communication,and each UAV serves its as... In this paper,we investigate a multi-UAV aided NOMA communication system,where multiple UAV-mounted aerial base stations are employed to serve ground users in the downlink NOMA communication,and each UAV serves its associated users on its own bandwidth.We aim at maximizing the overall common throughput in a finite time period.Such a problem is a typical mixed integer nonlinear problem,which involves both continuous-variable and combinatorial optimizations.To efficiently solve this problem,we propose a two-layer algorithm,which separately tackles continuous-variable and combinatorial optimization.Specifically,in the inner layer given one user association scheme,subproblems of bandwidth allocation,power allocation and trajectory design are solved based on alternating optimization.In the outer layer,a small number of candidate user association schemes are generated from an initial scheme and the best solution can be determined by comparing all the candidate schemes.In particular,a clustering algorithm based on K-means is applied to produce all candidate user association schemes,the successive convex optimization technique is adopted in the power allocation subproblem and a logistic function approximation approach is employed in the trajectory design subproblem.Simulation results show that the proposed NOMA scheme outperforms three baseline schemes in downlink common throughput,including one solution proposed in an existing literature. 展开更多
关键词 NOMA resource allocation trajectory design UAV communications user association
在线阅读 下载PDF
Joint jammer selection and power optimization in covert communications against a warden with uncertain locations 被引量:1
15
作者 Zhijun Han Yiqing Zhou +3 位作者 Yu Zhang Tong-Xing Zheng Ling Liu Jinglin Shi 《Digital Communications and Networks》 2025年第4期1113-1123,共11页
In covert communications,joint jammer selection and power optimization are important to improve performance.However,existing schemes usually assume a warden with a known location and perfect Channel State Information(... In covert communications,joint jammer selection and power optimization are important to improve performance.However,existing schemes usually assume a warden with a known location and perfect Channel State Information(CSI),which is difficult to achieve in practice.To be more practical,it is important to investigate covert communications against a warden with uncertain locations and imperfect CSI,which makes it difficult for legitimate transceivers to estimate the detection probability of the warden.First,the uncertainty caused by the unknown warden location must be removed,and the Optimal Detection Position(OPTDP)of the warden is derived which can provide the best detection performance(i.e.,the worst case for a covert communication).Then,to further avoid the impractical assumption of perfect CSI,the covert throughput is maximized using only the channel distribution information.Given this OPTDP based worst case for covert communications,the jammer selection,the jamming power,the transmission power,and the transmission rate are jointly optimized to maximize the covert throughput(OPTDP-JP).To solve this coupling problem,a Heuristic algorithm based on Maximum Distance Ratio(H-MAXDR)is proposed to provide a sub-optimal solution.First,according to the analysis of the covert throughput,the node with the maximum distance ratio(i.e.,the ratio of the distances from the jammer to the receiver and that to the warden)is selected as the friendly jammer(MAXDR).Then,the optimal transmission and jamming power can be derived,followed by the optimal transmission rate obtained via the bisection method.In numerical and simulation results,it is shown that although the location of the warden is unknown,by assuming the OPTDP of the warden,the proposed OPTDP-JP can always satisfy the covertness constraint.In addition,with an uncertain warden and imperfect CSI,the covert throughput provided by OPTDP-JP is 80%higher than the existing schemes when the covertness constraint is 0.9,showing the effectiveness of OPTDP-JP. 展开更多
关键词 Covert communications Uncertain warden Jammer selection Power optimization Throughput maximization
在线阅读 下载PDF
Learning Based Interference Coordination for Maritime Communications 被引量:1
16
作者 Liu Chuhuan Xiao Liang +3 位作者 Chen Yifan Li Siyao Yang Helin Lyu Zefang 《China Communications》 2025年第4期356-374,共19页
With the boom in maritime activities,the need for highly reliable maritime communication is becoming urgent,which is an important component of 5G/6G communication networks.However,the bandwidth reuse characteristic of... With the boom in maritime activities,the need for highly reliable maritime communication is becoming urgent,which is an important component of 5G/6G communication networks.However,the bandwidth reuse characteristic of 5G/6G networks will inevitably lead to severe interference,resulting in degradation in the communication performance of maritime users.In this paper,we propose a safe deep reinforcement learning based interference coordination scheme to jointly optimize the power control and bandwidth allocation in maritime communication systems,and exploit the quality-of-service requirements of users as the risk value references to evaluate the communication policies.In particular,this scheme designs a deep neural network to select the communication policies through the evaluation network and update the parameters using the target network,which improves the communication performance and speeds up the convergence rate.Moreover,the Nash equilibrium of the interference coordination game and the computational complexity of the proposed scheme are analyzed.Simulation and experimental results verify the performance gain of the proposed scheme compared with benchmarks. 展开更多
关键词 bandwidth allocation interference coordination maritime communication power control rein-forcement learning
在线阅读 下载PDF
Application of Data Encryption Technology in Computer Network Communication Security
17
作者 LIUBoting JIANGYu 《外文科技期刊数据库(文摘版)自然科学》 2022年第7期010-014,共5页
When integrating data encryption technology into the security management of computer network communication, it is necessary to select the corresponding technical scheme according to the characteristics of the current ... When integrating data encryption technology into the security management of computer network communication, it is necessary to select the corresponding technical scheme according to the characteristics of the current network environment, clarify the types and application characteristics of security protection technology, improve the security management mode, and prevent people from using computers. The current security management scheme is gradually improved, so that the application advantages of data encryption technology can be fully highlighted and peoples information security can be maintained. 展开更多
关键词 data encryption computer network communication security application
原文传递
Cutting-Edge Challenges in Communication Technology and Computer Network Security
18
作者 Haikang Gu 《Journal of Electronic Research and Application》 2024年第5期26-31,共6页
The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev... The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks. 展开更多
关键词 communication technology computer network SECURITY
在线阅读 下载PDF
Constructing Air-Interface Links for Mobile Communications:From{0,1}to[0,1] 被引量:1
19
作者 Tao Jiang 《Engineering》 2025年第3期16-22,共7页
1.Introduction Mobile communications have catalyzed a new era of informa-tion technology revolution,significantly broadening and deepen-ing human-to-human,human-to-machine,and machine-to-machine connections.With their... 1.Introduction Mobile communications have catalyzed a new era of informa-tion technology revolution,significantly broadening and deepen-ing human-to-human,human-to-machine,and machine-to-machine connections.With their incredible speed of development and wide-reaching impact,mobile communications serve as the cornerstone of the Internet of Everything,profoundly reshaping human cognitive abilities and ways of thinking.Furthermore,mobile communications are altering the patterns of production and life,driving leaps in productivity quality,and strongly promot-ing innovation within human civilization. 展开更多
关键词 internet everything air interface links information technology revolution productivity quality mobile communications
在线阅读 下载PDF
AI-Driven Sentiment-Enhanced Secure IoT Communication Model Using Resilience Behavior Analysis 被引量:1
20
作者 Menwa Alshammeri Mamoona Humayun +1 位作者 Khalid Haseeb Ghadah Naif Alwakid 《Computers, Materials & Continua》 2025年第7期433-446,共14页
Wireless technologies and the Internet of Things(IoT)are being extensively utilized for advanced development in traditional communication systems.This evolution lowers the cost of the extensive use of sensors,changing... Wireless technologies and the Internet of Things(IoT)are being extensively utilized for advanced development in traditional communication systems.This evolution lowers the cost of the extensive use of sensors,changing the way devices interact and communicate in dynamic and uncertain situations.Such a constantly evolving environment presents enormous challenges to preserving a secure and lightweight IoT system.Therefore,it leads to the design of effective and trusted routing to support sustainable smart cities.This research study proposed a Genetic Algorithm sentiment-enhanced secured optimization model,which combines big data analytics and analysis rules to evaluate user feedback.The sentiment analysis is utilized to assess the perception of network performance,allowing the classification of device behavior as positive,neutral,or negative.By integrating sentiment-driven insights,the IoT network adjusts the system configurations to enhance the performance using network behaviour in terms of latency,reliability,fault tolerance,and sentiment score.Accordingly to the analysis,the proposed model categorizes the behavior of devices as positive,neutral,or negative,facilitating real-time monitoring for crucial applications.Experimental results revealed a significant improvement in the proposed model for threat prevention and network efficiency,demonstrating its resilience for real-time IoT applications. 展开更多
关键词 Internet of things sentiment analysis smart cities big data resilience communication
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部