Results 111 to 120 of about 25,252 (294)
We utilise a metaheuristic optimisation method, inspired by nature, called the Lévy‐flight firefly algorithm (LFA), to tackle the power regulation and user grouping in the NOMA systems. Abstract The non‐orthogonal multiple access strategies have shown promise to boost fifth generation and sixth generation wireless networks' spectral efficiency and ...
Zaid Albataineh +4 more
wiley +1 more source
Simulation-Based Evaluation of V2X System with Variable Computational Infrastructure
The issue of organizing efficient interaction between vehicle-to-everything (V2X) system elements has become increasingly critical in recent years. Utilizing V2X technology enables achieving the necessary balance of safety, reducing system load, and ...
Andrei Vladyko +2 more
doaj +1 more source
The notion of vehicle-to-everything (V2X) has been adopted and developed in a host of application scenarios due to its wide compatibility with intelligent transport, smart city or other relevant concepts since it was set forth.
Shengnan Lv +4 more
semanticscholar +1 more source
ABSTRACT Objectives Mental health service users are responsible and autonomous individuals who can comprehend their own illness and recovery and therefore engage healthcare professionals in their care. Studies have demonstrated how service users feel more dignified, safe, and respected during mental health treatment when they are listened to by their ...
Matthew S. Johnston +3 more
wiley +1 more source
Advances in communications technology have had tremendous influence on network implementation to date, and as communication devices get smaller and technologies more intelligent, a great number of solutions are emerging that converge communications with ...
Jinsu Kim, Eunsun Choi, Namje Park
doaj +1 more source
Acting authentically: Using play to cultivate authentic interrelating in role performance
Summary Research is increasingly demonstrating that authenticity and human connection are fundamental and interrelated human needs. However, organizational roles often constrain authenticity and connection in workplace interactions, especially roles that are highly scripted.
Lyndon E. Garrett
wiley +1 more source
Jamming devices introduce unwanted signals into the network to disrupt primary communications. The effectiveness of these jamming signals mainly depends on the number and distribution of the jammers.
Mohammad Arif +3 more
doaj +1 more source
Semantic Vehicle-to-Everything (V2X) Communications Towards 6G
Semantic Communication (SEM-COM) has emerged as one of the disruptive technologies facilitating the evolution towards sixth-generation (6G) wireless networks. This article presents the potential of SEM-COM to transform Vehicle-to-Everything (V2X) communications, with a particular emphasis on its ability to enhance communication efficiency and ...
Lyu, Tengfei +3 more
openaire +2 more sources
Vehicle-to-Everything Cooperative Perception for Autonomous Driving
This article has been accepted for publication in Proceedings of the IEEE on 11 August ...
Tao Huang +7 more
openaire +2 more sources
Second‐Order Between‐Supplier Learning
ABSTRACT Substantial empirical evidence shows that suppliers in emerging economies can enhance their technological capabilities through direct learning from technologically advanced foreign competitors. However, suppliers in emerging markets may struggle to learn directly from knowledge about competitors’ products that are not widely available on the ...
Lisha Liu, Xianwei Shi, Guangzhi Shang
wiley +1 more source

