Results 111 to 120 of about 25,252 (294)

Joint power control and user grouping mechanism for efficient uplink non‐orthogonal multiple access‐based 5G communication: Utilising the Lèvy‐flight firefly algorithm

open access: yesIET Networks, EarlyView., 2023
We utilise a metaheuristic optimisation method, inspired by nature, called the Lévy‐flight firefly algorithm (LFA), to tackle the power regulation and user grouping in the NOMA systems. Abstract The non‐orthogonal multiple access strategies have shown promise to boost fifth generation and sixth generation wireless networks' spectral efficiency and ...
Zaid Albataineh   +4 more
wiley   +1 more source

Simulation-Based Evaluation of V2X System with Variable Computational Infrastructure

open access: yesNetwork
The issue of organizing efficient interaction between vehicle-to-everything (V2X) system elements has become increasingly critical in recent years. Utilizing V2X technology enables achieving the necessary balance of safety, reducing system load, and ...
Andrei Vladyko   +2 more
doaj   +1 more source

A systematic literature review of vehicle-to-everything in communication, computation and service scenarios

open access: yesInternational Journal of General Systems
The notion of vehicle-to-everything (V2X) has been adopted and developed in a host of application scenarios due to its wide compatibility with intelligent transport, smart city or other relevant concepts since it was set forth.
Shengnan Lv   +4 more
semanticscholar   +1 more source

“It Was a Very Pleasant Surprise”: Exploring Public Safety Service Users' Experiences With Inpatient Mental Health Treatment and Recovery

open access: yesJournal of Clinical Psychology, EarlyView.
ABSTRACT Objectives Mental health service users are responsible and autonomous individuals who can comprehend their own illness and recovery and therefore engage healthcare professionals in their care. Studies have demonstrated how service users feel more dignified, safe, and respected during mental health treatment when they are listened to by their ...
Matthew S. Johnston   +3 more
wiley   +1 more source

A Proposal for a Mobility-Control Data Transfer Mechanism Based on a Block Network Utilizing End-to-End Authentication Data

open access: yesMathematics
Advances in communications technology have had tremendous influence on network implementation to date, and as communication devices get smaller and technologies more intelligent, a great number of solutions are emerging that converge communications with ...
Jinsu Kim, Eunsun Choi, Namje Park
doaj   +1 more source

Acting authentically: Using play to cultivate authentic interrelating in role performance

open access: yesJournal of Organizational Behavior, EarlyView.
Summary Research is increasingly demonstrating that authenticity and human connection are fundamental and interrelated human needs. However, organizational roles often constrain authenticity and connection in workplace interactions, especially roles that are highly scripted.
Lyndon E. Garrett
wiley   +1 more source

Analysis of MCP-Distributed Jammers and 3D Beam-Width Variations for UAV-Assisted C-V2X Millimeter-Wave Communications

open access: yesMathematics
Jamming devices introduce unwanted signals into the network to disrupt primary communications. The effectiveness of these jamming signals mainly depends on the number and distribution of the jammers.
Mohammad Arif   +3 more
doaj   +1 more source

Semantic Vehicle-to-Everything (V2X) Communications Towards 6G

open access: yes
Semantic Communication (SEM-COM) has emerged as one of the disruptive technologies facilitating the evolution towards sixth-generation (6G) wireless networks. This article presents the potential of SEM-COM to transform Vehicle-to-Everything (V2X) communications, with a particular emphasis on its ability to enhance communication efficiency and ...
Lyu, Tengfei   +3 more
openaire   +2 more sources

Vehicle-to-Everything Cooperative Perception for Autonomous Driving

open access: yesProceedings of the IEEE
This article has been accepted for publication in Proceedings of the IEEE on 11 August ...
Tao Huang   +7 more
openaire   +2 more sources

Second‐Order Between‐Supplier Learning

open access: yesJournal of Operations Management, EarlyView.
ABSTRACT Substantial empirical evidence shows that suppliers in emerging economies can enhance their technological capabilities through direct learning from technologically advanced foreign competitors. However, suppliers in emerging markets may struggle to learn directly from knowledge about competitors’ products that are not widely available on the ...
Lisha Liu, Xianwei Shi, Guangzhi Shang
wiley   +1 more source

Home - About - Disclaimer - Privacy