Results 31 to 40 of about 3,580,654 (226)
Green resource allocation for mobile edge computing
We investigate the green resource allocation to minimize the energy consumption of the users in mobile edge computing systems, where task offloading decisions, transmit power, and computation resource allocation are jointly optimized.
Anqi Meng+4 more
doaj
Source Camera Identification and Detection in Digital Videos through Blind Forensics [PDF]
Source camera identification in digital videos is the problem of associating an unknown digital video with its source device, within a closed set of possible devices. The existing techniques in source detection of digital videos try to find a fingerprint of the actual source in the video in form of PRNU (Photo Response Non--Uniformity), and match it ...
arxiv
Connectedness, Continuity, and Proximities in Temporal Digital Topology [PDF]
This paper introduces the structure and axioms for a temporal digital topology (TDT) with the focus on digital connectedness, continuity and proximities in TDT spaces. Results are given for temporal digital adjacencies, connectedness and proximities that occur in time-constrained digital topological spaces.
arxiv
Students within this study followed the ICSDR (Identify, Conceptualize/Connect, Storyboard, Develop, Review/Reflect /Revise) development model to create digital video, as a personalized and active learning assignment.
Laurie O. Campbell, T. Cox
semanticscholar +1 more source
The use of technology in language learning has extensively expanded in line with the advancement of technology itself. However, the investigation into the implementation of video conferences, learning management systems, and mobile applications ...
Fakhrurrazi M. Amin, Hanna Sundari
semanticscholar +1 more source
Background Federal and state public health agencies in the United States are increasingly using digital advertising and social media to promote messages from broader multimedia campaigns.
K. Davis+7 more
semanticscholar +1 more source
Method for Estimating the Bandwidth Capacity of a Steganographic Communication Channel [PDF]
Ensuring information security in critical infrastructure, particularly in the energy sector, is highly relevant today. Steganographic methods are among the most effective for information protec-tion, but they can also be misused for unauthorized ...
Bobok I.I.+5 more
doaj +1 more source
Readers, Players, and Watchers: EFL Students' Vocabulary Acquisition through Digital Video Games.
The present study investigated vocabulary acquisition through a commercial digital video game compared to a traditional pencil-and-paper treatment. Chosen through cluster sampling, 241 male high school students (age 12–18) participated in the study. They
Mohsen Ebrahimzadeh
semanticscholar +1 more source
Beamforming Design for STAR-RIS-Assisted NOMA with Binary and Coupled Phase-Shifts
This paper investigates the joint optimization of active and passive beamforming in simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS)-assisted non-orthogonal multiple access (NOMA) systems, with the aim of ...
Yongfei Liu, Yuhuan Wang, Weizhang Xu
doaj +1 more source
Robust estimates of the density or abundance of cetaceans are required to support a wide range of ecological studies and inform management decisions. Considerable effort has been put into the development of line‐transect sampling techniques to obtain ...
Laura D. Williamson+6 more
semanticscholar +1 more source