期刊文献+
共找到196,015篇文章
< 1 2 250 >
每页显示 20 50 100
Loneliness and mobile phone addiction:The roles of social anxiety and self-presentation
1
作者 Zhang-Lian Xie Zheng-Xin Hu +2 位作者 Jun Li Long-Wei Qin Kai-Peng Gan 《Journal of Psychology in Africa》 2026年第1期45-52,共8页
This study examined the relationship between loneliness and mobile phone addiction(MPA),and the mediating roles of social anxiety and self presentation in that relationship.The sample comprised 559 students(male=250,f... This study examined the relationship between loneliness and mobile phone addiction(MPA),and the mediating roles of social anxiety and self presentation in that relationship.The sample comprised 559 students(male=250,female=309,mean age=20.78 years,SD=1.13 years).Based on bias-corrected bootstrap method,our indicate loneliness to be associated with MPA of college students.Additionally,social anxiety and self-presentation,respectively,partially mediated the association between loneliness and college students’MPA.Specifically,as loneliness increased,both social anxiety and self-presentation rose,thereby increasing MPA.Social anxiety and self-presentation also sequentially mediated the relationship between loneliness and MPA among college students,such that greater loneliness heightened social anxiety,which subsequently enhanced self-presentation,ultimately resulting in increased MPA.These findings are consistent with Compensatory Internet Use Theory(CIUT).This study findings suggest for college students counselling and development services should alleviate loneliness and social anxiety through group activities,Cognitive-behavioral Therapy(CBT),and social skills training to foster belonging and reduce students’reliance on mobile phones. 展开更多
关键词 LONELINESS mobile phone addiction social anxiety SELF-PRESENTATION college students
在线阅读 下载PDF
Toward Mobile Satellite Internet:The Fundamental Limitation of Wireless Transmission and Enabling Technologies
2
作者 Wenjin Wang Yiming Zhu +2 位作者 Yafei Wang Rui Ding Symeon Chatzinotas 《Engineering》 2025年第11期42-51,共10页
1.Introduction It has been almost 60 years since the launch of Intelsat-I,the world’s first commercial satellite communications system.Over the past few decades,the development of satellite communications has been dr... 1.Introduction It has been almost 60 years since the launch of Intelsat-I,the world’s first commercial satellite communications system.Over the past few decades,the development of satellite communications has been driven by both technological advancements and growing application demands,which have given rise to three primary services:broadcast,fixed satellite,and mobile satellite services[1]. 展开更多
关键词 technological advancements application demands mobile satellite internet broadcast services fixed satellite services satellite communications mobile satellite services wireless transmission
在线阅读 下载PDF
Exploration of Strategies for Ideological and Political Education by Counselors in College and Universities of Xinjiang under the Mobile Internet Environment
3
作者 Junhui WANG Xufeng YU +2 位作者 Lei ZHANG Ling CHU Rehanguli Xiukuer 《Asian Agricultural Research》 2025年第6期51-53,共3页
The present paper explores the ideological and political education work of university counselors in Xinjiang under the mobile Internet environment.It elaborates on the significant value of this work in adapting to con... The present paper explores the ideological and political education work of university counselors in Xinjiang under the mobile Internet environment.It elaborates on the significant value of this work in adapting to contemporary development trends,promoting cultural integration,and safeguarding regional stability.The study analyzes various challenges encountered,including difficulties in information screening,limitations in online communication,and insufficient digital literacy.Corresponding countermeasures are proposed with the aim of enhancing the effectiveness of ideological and political education in Xinjiang s higher education institutions,fostering healthy student development,and facilitating regional progress. 展开更多
关键词 mobile internet Counselors in colleges and universities Ideological and political education
在线阅读 下载PDF
Energy Optimization for Autonomous Mobile Robot Path Planning Based on Deep Reinforcement Learning
4
作者 Longfei Gao Weidong Wang Dieyun Ke 《Computers, Materials & Continua》 2026年第1期984-998,共15页
At present,energy consumption is one of the main bottlenecks in autonomous mobile robot development.To address the challenge of high energy consumption in path planning for autonomous mobile robots navigating unknown ... At present,energy consumption is one of the main bottlenecks in autonomous mobile robot development.To address the challenge of high energy consumption in path planning for autonomous mobile robots navigating unknown and complex environments,this paper proposes an Attention-Enhanced Dueling Deep Q-Network(ADDueling DQN),which integrates a multi-head attention mechanism and a prioritized experience replay strategy into a Dueling-DQN reinforcement learning framework.A multi-objective reward function,centered on energy efficiency,is designed to comprehensively consider path length,terrain slope,motion smoothness,and obstacle avoidance,enabling optimal low-energy trajectory generation in 3D space from the source.The incorporation of a multihead attention mechanism allows the model to dynamically focus on energy-critical state features—such as slope gradients and obstacle density—thereby significantly improving its ability to recognize and avoid energy-intensive paths.Additionally,the prioritized experience replay mechanism accelerates learning from key decision-making experiences,suppressing inefficient exploration and guiding the policy toward low-energy solutions more rapidly.The effectiveness of the proposed path planning algorithm is validated through simulation experiments conducted in multiple off-road scenarios.Results demonstrate that AD-Dueling DQN consistently achieves the lowest average energy consumption across all tested environments.Moreover,the proposed method exhibits faster convergence and greater training stability compared to baseline algorithms,highlighting its global optimization capability under energy-aware objectives in complex terrains.This study offers an efficient and scalable intelligent control strategy for the development of energy-conscious autonomous navigation systems. 展开更多
关键词 Autonomous mobile robot deep reinforcement learning energy optimization multi-attention mechanism prioritized experience replay dueling deep Q-Network
在线阅读 下载PDF
Lightweight Multi-Agent Edge Framework for Cybersecurity and Resource Optimization in Mobile Sensor Networks
5
作者 Fatima Al-Quayed 《Computers, Materials & Continua》 2026年第1期919-934,共16页
Due to the growth of smart cities,many real-time systems have been developed to support smart cities using Internet of Things(IoT)and emerging technologies.They are formulated to collect the data for environment monit... Due to the growth of smart cities,many real-time systems have been developed to support smart cities using Internet of Things(IoT)and emerging technologies.They are formulated to collect the data for environment monitoring and automate the communication process.In recent decades,researchers have made many efforts to propose autonomous systems for manipulating network data and providing on-time responses in critical operations.However,the widespread use of IoT devices in resource-constrained applications and mobile sensor networks introduces significant research challenges for cybersecurity.These systems are vulnerable to a variety of cyberattacks,including unauthorized access,denial-of-service attacks,and data leakage,which compromise the network’s security.Additionally,uneven load balancing between mobile IoT devices,which frequently experience link interferences,compromises the trustworthiness of the system.This paper introduces a Multi-Agent secured framework using lightweight edge computing to enhance cybersecurity for sensor networks,aiming to leverage artificial intelligence for adaptive routing and multi-metric trust evaluation to achieve data privacy and mitigate potential threats.Moreover,it enhances the efficiency of distributed sensors for energy consumption through intelligent data analytics techniques,resulting in highly consistent and low-latency network communication.Using simulations,the proposed framework reveals its significant performance compared to state-of-the-art approaches for energy consumption by 43%,latency by 46%,network throughput by 51%,packet loss rate by 40%,and denial of service attacks by 42%. 展开更多
关键词 Artificial intelligence CYBERSECURITY edge computing internet of Things threat detection
在线阅读 下载PDF
Cognitive NFIDC-FRBFNN Control Architecture for Robust Path Tracking of Mobile Service Robots in Hospital Settings
6
作者 Huda Talib Najm Ahmed Sabah Al-Araji Nur Syazreen Ahmad 《Computer Modeling in Engineering & Sciences》 2026年第1期989-1022,共34页
Mobile service robots(MSRs)in hospital environments require precise and robust trajectory tracking to ensure reliable operation under dynamic conditions,including model uncertainties and external disturbances.This stu... Mobile service robots(MSRs)in hospital environments require precise and robust trajectory tracking to ensure reliable operation under dynamic conditions,including model uncertainties and external disturbances.This study presents a cognitive control strategy that integrates a Numerical Feedforward Inverse Dynamic Controller(NFIDC)with a Feedback Radial Basis Function Neural Network(FRBFNN).The robot’s mechanical structure was designed in SolidWorks 2022 SP2.0 and validated under operational loads using finite element analysis in ANSYS 2022 R1.The NFIDC-FRBFNN framework merges proactive inverse dynamic compensation with adaptive neural learning to achieve smooth torque responses and accurate motion control.A two-stage simulation evaluation was conducted.In the first stage,the controller was tested in a simulated hospital environment under both ideal and non-ideal conditions.In the second,it was benchmarked against four established controllers-Neural Network Model Reference Adaptive(NNMRA),Z-number Fuzzy Logic(Z-FL),Adaptive Dynamic Controller(ADC),and Fuzzy Logic-PID(FL-PID)—using circular and lemniscate trajectories.Across ten runs,the proposed controller achieved the lowest tracking errors under all conditions.Under ideal conditions,it achieved average improvements of 55.24%,75.75%,and 55.20%in integral absolute error(IAE),integral squared error(ISE),and mean absolute error(MAE),respectively,with coefficient of variation(CV)reductions above 55%.Under non-ideal conditions,average improvements exceeded 64%in IAE,77%in ISE,and 66%in MAE,while maintaining CV reductions above 57%.These results confirm that the NFIDC-FRBFNN controller offers superior accuracy,robustness,and consistency for real-time path tracking in healthcare robotics. 展开更多
关键词 mobile service robot path planning radial basis function neural network trajectory tracking numerical feed forward inverse dynamic controller
在线阅读 下载PDF
Computational Offloading and Resource Allocation for Internet of Vehicles Based on UAV-Assisted Mobile Edge Computing System
7
作者 Fang Yujie Li Meng +3 位作者 Si Pengbo Yang Ruizhe Sun Enchang Zhang Yanhua 《China Communications》 2025年第9期333-351,共19页
As an essential element of intelligent trans-port systems,Internet of vehicles(IoV)has brought an immersive user experience recently.Meanwhile,the emergence of mobile edge computing(MEC)has enhanced the computational ... As an essential element of intelligent trans-port systems,Internet of vehicles(IoV)has brought an immersive user experience recently.Meanwhile,the emergence of mobile edge computing(MEC)has enhanced the computational capability of the vehicle which reduces task processing latency and power con-sumption effectively and meets the quality of service requirements of vehicle users.However,there are still some problems in the MEC-assisted IoV system such as poor connectivity and high cost.Unmanned aerial vehicles(UAVs)equipped with MEC servers have become a promising approach for providing com-munication and computing services to mobile vehi-cles.Hence,in this article,an optimal framework for the UAV-assisted MEC system for IoV to minimize the average system cost is presented.Through joint consideration of computational offloading decisions and computational resource allocation,the optimiza-tion problem of our proposed architecture is presented to reduce system energy consumption and delay.For purpose of tackling this issue,the original non-convex issue is converted into a convex issue and the alternat-ing direction method of multipliers-based distributed optimal scheme is developed.The simulation results illustrate that the presented scheme can enhance the system performance dramatically with regard to other schemes,and the convergence of the proposed scheme is also significant. 展开更多
关键词 computational offloading internet of Vehicles mobile edge computing resource optimization unmanned aerial vehicle
在线阅读 下载PDF
基于MobileNetV4改进的YOLOv8目标检测算法研究
8
作者 张宁 周云翀 +2 位作者 徐坤财 左超超 彭如镜 《集成技术》 2026年第2期91-103,共13页
为移动设备设计的轻量级卷积神经网络具有较快的推理速度,但受到自身网络局部性约束,即仅能在一个窗口区域内捕获局部信息,导致性能下降。引入自注意力机制虽然可以捕获全局信息,但会降低检测速度。针对上述问题,本文基于YOLOv8提出一... 为移动设备设计的轻量级卷积神经网络具有较快的推理速度,但受到自身网络局部性约束,即仅能在一个窗口区域内捕获局部信息,导致性能下降。引入自注意力机制虽然可以捕获全局信息,但会降低检测速度。针对上述问题,本文基于YOLOv8提出一种对硬件友好的MobileNetV4网络架构。该结构通过引入通用倒置瓶颈搜索块,融合了倒置瓶颈、ConvNext、Feed Forward网络及一种新型的额外深度卷积变体。同时,该结构还引入了动态上采样算子,改进了上采样操作,降低了模型使用GPU的内存和延迟。此外,本文改进了YOLOv8的检测头,通过引入动态检测头,将空间感知、尺度感知和任务感知融合到一个框架中,并在目标检测头中有效地应用注意力机制,提高检测性能和效率。实验结果表明,与次优模型YOLOv8n相比,YOLOv8n_M的平均精度均值mAP50~95提升了1.3%;在模型复杂度方面,YOLOv8n_M成功压缩了36%的模型规模(参数量缩减100万),同时将计算量降低26%(十亿次浮点运算GFLOPs减少2.4单位)。本文提出的YOLOv8n_M有效减少了模型的参数量和推理时间,并在一定程度上提高了模型在不同环境下的目标检测精度。 展开更多
关键词 YOLOv8 mobileNetV4 注意力机制 移动设备 动态检测头
在线阅读 下载PDF
基于Res-MobileCom并行网络的光伏发电功率等级分类
9
作者 殷林飞 周扬钢 《综合智慧能源》 2026年第1期1-12,共12页
为了提高光伏发电功率等级分类准确性以适应行业要求,提出了一种基于Res-MobileCom并行网络的分类模型。在数据处理中使用去归一化的双线性插值法最大限度保留数据特征,然后通过简化残差网络(ResNet)和用于移动视觉的高效卷积神经网络(M... 为了提高光伏发电功率等级分类准确性以适应行业要求,提出了一种基于Res-MobileCom并行网络的分类模型。在数据处理中使用去归一化的双线性插值法最大限度保留数据特征,然后通过简化残差网络(ResNet)和用于移动视觉的高效卷积神经网络(MobileNet)结构并行训练后将其输出联合输入信道估计-信号检测网络(ComNet)中进一步提取数据特征,最终得到分类结果。试验结果表明:相比于常见的深度学习模型,ResMobileCom模型保持了ResNet和MobileNet的特征提取能力和轻量性,模型具备较好的平衡性和泛化能力;采用去归一化双线性插值法和进一步提取数据特征的ComNet后,模型准确率提高了10百分点以上,为提高光伏发电功率等级分类模型的准确率提供了新的方法和思路。未来工作将围绕稳定性优化、跨任务验证及工程化部署展开。 展开更多
关键词 光伏发电功率等级分类 深度学习 残差网络 残差网络 移动网络 ComNet 轻量化 平行网络
在线阅读 下载PDF
Mobile Ad Hoc Network与Internet互联的技术研究 被引量:3
10
作者 胡中功 邹莉 沈斌 《武汉科技学院学报》 2005年第6期65-69,共5页
分析了移动IP和AODV协议的工作机理,对MANET与Internet互联的关键技术,包括协议转换、地址分配、网关发现、路由发现与数据传输等问题进行了详细的讨论,并对今后的研究工作进行了展望。
关键词 mobile AD HOC Network internet 移动IP AODV路由协议
在线阅读 下载PDF
Mobile Ad Hoc网络与Internet互联的综合网关发现方法 被引量:3
11
作者 胡中功 沈斌 邹莉 《武汉科技学院学报》 2005年第8期45-49,共5页
大量基于adhoc网络的移动应用得以开展以及被认可的一大挑战就在于其能否提供足够好Internet连接,本文实现了一种MobileAdHoc网络与Internet互联时的综合网关发现方法,由于综合了主动与被动网关发现方法的优点,同时允许中间移动节点解... 大量基于adhoc网络的移动应用得以开展以及被认可的一大挑战就在于其能否提供足够好Internet连接,本文实现了一种MobileAdHoc网络与Internet互联时的综合网关发现方法,由于综合了主动与被动网关发现方法的优点,同时允许中间移动节点解析全局连接信息并在必要的时候以之回复请求节点,因此在合理的开销下改善了移动节点多跳访问Internet的性能,用NS2进行的仿真结果说明了综合方法的有效性。 展开更多
关键词 mobile Ad HOC Network 网络互联 综合网关发现方法 NS2
在线阅读 下载PDF
Improved approach to enhanced Internet connectivity for mobile ad hoc networks
12
作者 沈斌 李波 石冰心 《Journal of Southeast University(English Edition)》 EI CAS 2007年第1期16-21,共6页
An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks.... An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks. The hybrid gateway discovery scheme that combined the advantages of a proactive and reactive gateway discovery approach is used to achieve high connectivity while keeping overhead costs low. By exchanging ad hoc on-demand distance vector (AODV) hello packet which includes additional fields named symmetric neighbor list and asymmetric neighbor list, unidirectional links are removed from route computation and broadcast storm can also be relieved simultaneously. Performance results using ns-2 simulations, under varying numbers of unidirectional links and node speeds, show that this improved Internet connectivity approach can provide better performance than others. 展开更多
关键词 mobile ad hoc networks internet connectivity gateway discovery unidirectional link broadcast storm
在线阅读 下载PDF
Mobile Agent技术在Internet中的应用 被引量:6
13
作者 赵春英 《微机发展》 2000年第6期20-22,共3页
本文分析了Internet应用所面临的问题 ,讨论了MobileAgent的概念和技术特点 ,论述了如何把MobileAgent技术应用到Internet中 ,解决其存在的问题。最后 ,简单介绍了目前MobileAgent技术的发展现状和研究趋势。
关键词 internet 人工智能 分布式计算 Mob:leAgent
在线阅读 下载PDF
Mobile Internet系统设计
14
作者 惠韶文 《计算机系统应用》 2000年第9期13-15,共3页
本文对Mobile Internet(车载Internet)系统的通信技术.信息服务实施等关键技术进行研究然后讨论了这类系统用户操作界面的设计特点。
关键词 mobile internet 车辆定位 GPS 系统设计
在线阅读 下载PDF
Mobile Agent和未来的Internet
15
作者 华臻 范辉 +1 位作者 刘敬云 李晋江 《微型机与应用》 2003年第1期4-5,20,共3页
移动代理技术是新型的分布计算技术。随着WWW的出现,Internet的应用呈现了爆炸式增长。本文分析了Internet的发展趋势及使用移动代理所具有的良好应用前景。文章最后给出了当前移动代理系统中存在的问题。
关键词 mobileAGENT internet 移动代理 移动代理系统 移动代码 计算机网络 分布计算
在线阅读 下载PDF
改进MobileNet与融合低阶多通道的模因情感分类 被引量:1
16
作者 高玮军 赵晓萱 《计算机技术与发展》 2025年第9期148-155,共8页
互联网模因已成为网络上最热门的话题之一,并且全球网民都在使用它表达自己的情感。因此,互联网模因分类成为一个活跃的研究方向。然而,现有的多模态方法中,图像特征的提取在计算量和计算时间方面成本过高,融合方法的使用则未考虑模态... 互联网模因已成为网络上最热门的话题之一,并且全球网民都在使用它表达自己的情感。因此,互联网模因分类成为一个活跃的研究方向。然而,现有的多模态方法中,图像特征的提取在计算量和计算时间方面成本过高,融合方法的使用则未考虑模态间的动态平衡以及出现的高维问题。对此,该文提出一种改进MobileNet与融合低阶多通道的互联网模因情感分类模型,用于进行互联网模因的情感分析。模型利用预先训练好的BERT语言模型,以及加入GAM注意力机制的轻量化模型MobileNet,分别学习互联网模因的文本和视觉特征,使用低阶多通道的方法融合模块,有效地融合多模态信息。数据集则使用含有隐喻情感的数据集MET-Meme和Memotion进行实验对比。通过对比实验表明,该模型框架在MET-Meme和Memotion数据集中都有较为优秀的表现,均优于实验所用到的单模态和双模态模型。 展开更多
关键词 互联网模因 情感分类 mobileNet-GAM BERT 低阶多通道融合方法
在线阅读 下载PDF
The transition from traditional banking to mobile internet finance:an organizational innovation perspective-a comparative study of Citibank and ICBC 被引量:24
17
作者 Zhuming Chen Yushan Li +1 位作者 Yawen Wu Junjun Luo 《Financial Innovation》 2017年第1期146-161,共16页
The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected ... The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected to overturn the traditional banking business model,forcing banks to upgrade and transform.This study adopts a comparative case study method to contrast and analyze the Industrial and Commercial Bank of China(ICBC)and Citibank.It analyzes the strategies,organizations,HR systems,and product innovations adopted by these two banks in response to the impact of FinTech.This paper proposes an“electric vehicle”mode for ICBC and an“airplane mode”for Citibank.Further,it describes the difficulties encountered by the Chinese banking industry and proposes some feasible ways to upgrade.“Technology power”will become the core competitive concept for the financial institutions of the future. 展开更多
关键词 mobile internet finance Traditional banks Upgrade and transformation Organizational innovation Technology power
在线阅读 下载PDF
Mobile Agent及其在Internet中的应用 被引量:3
18
作者 刘志华 《计算机仿真》 CSCD 2003年第8期82-84,134,135,共5页
移动Agent技术已成为计算机网络和分布式系统最具活力的发展方向 ,文中对移动Agent的概念、移动Agent的特点、用移动Agent实现Internet信息搜索与传统技术的比较、实现移动Agent面临的技术障碍与社会障碍及移动Agent的应用等方面内容进... 移动Agent技术已成为计算机网络和分布式系统最具活力的发展方向 ,文中对移动Agent的概念、移动Agent的特点、用移动Agent实现Internet信息搜索与传统技术的比较、实现移动Agent面临的技术障碍与社会障碍及移动Agent的应用等方面内容进行了讨论。 展开更多
关键词 mobileAGENT 人工智能 分布式计算 计算机网络 internet 信息搜索
在线阅读 下载PDF
Research on Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing 被引量:5
19
作者 Weijin Jiang Yang Wang +3 位作者 Yirong Jiang Jiahui Chen Yuhui Xu Lina Tan 《China Communications》 SCIE CSCD 2019年第7期174-194,共21页
This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the per... This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large. 展开更多
关键词 mobile internet CLOUD COMPUTING mobile agent system SUBJECTIVE TRUST dynamic TRUST management
在线阅读 下载PDF
A Wireless Intrusion Alerts Clustering Method for Mobile Internet 被引量:2
20
作者 CHEN Guanlin WU Ying 《China Communications》 SCIE CSCD 2016年第4期108-118,共11页
With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of... With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of wireless intrusion alerts clustering method for mobile Internet. This paper proposes a Wireless Intrusion Alert Clustering Method(WIACM) based on the information of the mobile terminal. The method includes alert formatting, alert reduction and alert classification. By introducing key information of the mobile terminal device, this method aggregates the original alerts into hyper alerts. The experimental results show that WIACM would be appropriate for real attack scenarios of mobile Internet, and reduce the amount of alerts with more accuracy of alert analysis. 展开更多
关键词 mobile internet wireless intrusion alert clustering network security
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部