首页 > 最新文献

INFORMATION MANAGEMENT AND COMPUTER SCIENCE最新文献

英文 中文
SOCIAL ENGINEERING: AN INTRODUCTION 社会工程:介绍
Pub Date : 1900-01-01 DOI: 10.26480/imcs.02.2022.36.37
Ipseeta Nanda, R. De
The phrase “social engineering” can be used to describe a range of computer exploitation techniques used to trick users. It poses a serious risk to people, businesses, organizations, and governments. This essay discusses the idea of social engineering and its effects on society.
“社会工程”这个短语可以用来描述一系列用来欺骗用户的计算机开发技术。它给个人、企业、组织和政府带来了严重的风险。本文讨论了社会工程的概念及其对社会的影响。
{"title":"SOCIAL ENGINEERING: AN INTRODUCTION","authors":"Ipseeta Nanda, R. De","doi":"10.26480/imcs.02.2022.36.37","DOIUrl":"https://doi.org/10.26480/imcs.02.2022.36.37","url":null,"abstract":"The phrase “social engineering” can be used to describe a range of computer exploitation techniques used to trick users. It poses a serious risk to people, businesses, organizations, and governments. This essay discusses the idea of social engineering and its effects on society.","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124300847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FIRM AUTOMATION: A REINFORCEMENT LEARNING APPROACH 企业自动化:一种强化学习方法
Pub Date : 1900-01-01 DOI: 10.26480/imcs.02.2022.28.30
Ipseeta Nanda, Rajesh De
In most automation, we use ANN or RNN based algorithms. This results well but the prior information is what actions were previously taken by a human, this cannot be the only measure of learning a process we know humans learn everything with experience. And the most appropriate algorithm to learn like a human is Reinforcement Learning
在大多数自动化中,我们使用基于人工神经网络或RNN的算法。结果很好,但先验信息是人类之前采取的行动,这不能是学习的唯一衡量标准,我们知道人类通过经验学习一切。最适合像人类一样学习的算法是强化学习
{"title":"FIRM AUTOMATION: A REINFORCEMENT LEARNING APPROACH","authors":"Ipseeta Nanda, Rajesh De","doi":"10.26480/imcs.02.2022.28.30","DOIUrl":"https://doi.org/10.26480/imcs.02.2022.28.30","url":null,"abstract":"In most automation, we use ANN or RNN based algorithms. This results well but the prior information is what actions were previously taken by a human, this cannot be the only measure of learning a process we know humans learn everything with experience. And the most appropriate algorithm to learn like a human is Reinforcement Learning","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114543130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AUTOMATIC ENGINE LOCK SYSTEM THROUGH ALCOHOL DETECTION IN VIRTUAL ENVIRONMENT 在虚拟环境中通过酒精检测实现发动机自动锁定系统
Pub Date : 1900-01-01 DOI: 10.26480/imcs.01.2022.23.27
Ipseeta Nanda, Rajesh De
Driving under the influence of alcohol has affected and killed countless of people lives. If you are drunk while driving, not only you are putting yourself at risk but also the passengers travelling with you and the others on the road are in danger. So, we have tried to projected an Automatic Engine lock system on behalf of talking responsibility to control driving safely as much as we can. The alcohol detection system works on a simple principle. If a driver has been drinking, the alcohol sensor will sense by playing a Buzzer. With the use of GPS, we will be able to trace the location of the vehicle and a message will be send to the registered number by using GSM module. The main work is done by MQ3 alcohol detecting sensor and the programmable brain Arduino Uno. If the sensor sensed the particular value of alcohol present in the air from a nominal distance then the sensor throw high signal in digitally and the buzzer has been blown. As this way we can identify the driver is alcoholic or not by this project and Thus, the motor driver will be stopped immediately.
酒后驾车已经影响和杀死了无数人的生命。如果你在开车时喝醉酒,不仅你自己处于危险之中,而且和你一起旅行的乘客和路上的其他人也处于危险之中。因此,我们试图设计一个自动引擎锁定系统,代表我们尽可能多地控制安全驾驶的责任。酒精检测系统的工作原理很简单。如果司机已经饮酒,酒精传感器将通过播放蜂鸣器感应。使用GPS,我们将能够追踪车辆的位置,并通过GSM模块将信息发送到注册号码。主要工作由MQ3酒精检测传感器和可编程大脑Arduino Uno完成。如果传感器从标称距离检测到空气中存在的特定酒精值,则传感器将数字高信号输入,蜂鸣器已被吹响。这样我们就可以通过这个项目来识别司机是否酗酒,从而立即阻止司机。
{"title":"AUTOMATIC ENGINE LOCK SYSTEM THROUGH ALCOHOL DETECTION IN VIRTUAL ENVIRONMENT","authors":"Ipseeta Nanda, Rajesh De","doi":"10.26480/imcs.01.2022.23.27","DOIUrl":"https://doi.org/10.26480/imcs.01.2022.23.27","url":null,"abstract":"Driving under the influence of alcohol has affected and killed countless of people lives. If you are drunk while driving, not only you are putting yourself at risk but also the passengers travelling with you and the others on the road are in danger. So, we have tried to projected an Automatic Engine lock system on behalf of talking responsibility to control driving safely as much as we can. The alcohol detection system works on a simple principle. If a driver has been drinking, the alcohol sensor will sense by playing a Buzzer. With the use of GPS, we will be able to trace the location of the vehicle and a message will be send to the registered number by using GSM module. The main work is done by MQ3 alcohol detecting sensor and the programmable brain Arduino Uno. If the sensor sensed the particular value of alcohol present in the air from a nominal distance then the sensor throw high signal in digitally and the buzzer has been blown. As this way we can identify the driver is alcoholic or not by this project and Thus, the motor driver will be stopped immediately.","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125304654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COMMUNICATION NETWORK 通信网络
Pub Date : 1900-01-01 DOI: 10.26480/imcs.02.2022.34.35
Ipseeta Nanda, R. De
Communication network is used a communication network are central to the to describe the way in which specific people in a group interact with one another. Academics use varying definitions of “communication network” to refer to the same underlying concept. These three critical dimensions are typically used to characterize the communication network: (1) the network structure, (2) the interactional patterns, (3) the functional characteristics.
通信网络是指以通信网络为中心,用来描述一个群体中特定的人彼此互动的方式。学者们使用不同的“通信网络”定义来指代相同的基本概念。这三个关键维度通常用于描述通信网络的特征:(1)网络结构;(2)交互模式;(3)功能特征。
{"title":"COMMUNICATION NETWORK","authors":"Ipseeta Nanda, R. De","doi":"10.26480/imcs.02.2022.34.35","DOIUrl":"https://doi.org/10.26480/imcs.02.2022.34.35","url":null,"abstract":"Communication network is used a communication network are central to the to describe the way in which specific people in a group interact with one another. Academics use varying definitions of “communication network” to refer to the same underlying concept. These three critical dimensions are typically used to characterize the communication network: (1) the network structure, (2) the interactional patterns, (3) the functional characteristics.","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"889 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116378087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RESEARCH ON EMOTIONAL MUSIC APP DESIGN UNDER THE NEEDS OF OFFICE WORKERS 上班族需求下的情感音乐app设计研究
Pub Date : 1900-01-01 DOI: 10.26480/imcs.01.2022.01.02
Xinyi Wang
To explore the demand and current situation of APP use from the perspective of working people, and to make the future APP design not focus on visual effect by implanting emotional design. It also analyzes how to improve the design to make it more in line with the user needs of office workers, to establish a more comprehensive understanding of the theoretical research and application in related fields. This paper collects, organizes, and visualizes the literature on the main applications of emotional design APP from 2000 to 2021 based on the physiological and psychological characteristics of office workers through Donald A. Norman’s three-level theory of emotional design, and discusses how to make reasonable design for the music APP to improve user experience according to the user characteristics of office workers. Applying interaction design theory and three levels of emotional design theory to the design of the music APP has important research value and scientific perspective. The paper also summarizes the interaction design method based on user experience and builds the design model of the music APP based on emotional design, which is a guide for the subsequent design.
从劳动人群的角度探索APP的使用需求和现状,通过植入情感设计,让未来的APP设计不再专注于视觉效果。并分析了如何对设计进行改进,使其更符合办公人员的用户需求,对相关领域的理论研究和应用建立更全面的认识。本文通过Donald A. Norman的情感设计三层次理论,根据上班族的生理和心理特征,对2000 - 2021年情感设计类APP的主要应用文献进行收集、整理和可视化,探讨如何根据上班族的用户特征,对音乐类APP进行合理的设计,提升用户体验。将交互设计理论和三个层次的情感设计理论应用到音乐APP的设计中,具有重要的研究价值和科学视角。本文还总结了基于用户体验的交互设计方法,构建了基于情感设计的音乐APP设计模型,为后续的设计提供指导。
{"title":"RESEARCH ON EMOTIONAL MUSIC APP DESIGN UNDER THE NEEDS OF OFFICE WORKERS","authors":"Xinyi Wang","doi":"10.26480/imcs.01.2022.01.02","DOIUrl":"https://doi.org/10.26480/imcs.01.2022.01.02","url":null,"abstract":"To explore the demand and current situation of APP use from the perspective of working people, and to make the future APP design not focus on visual effect by implanting emotional design. It also analyzes how to improve the design to make it more in line with the user needs of office workers, to establish a more comprehensive understanding of the theoretical research and application in related fields. This paper collects, organizes, and visualizes the literature on the main applications of emotional design APP from 2000 to 2021 based on the physiological and psychological characteristics of office workers through Donald A. Norman’s three-level theory of emotional design, and discusses how to make reasonable design for the music APP to improve user experience according to the user characteristics of office workers. Applying interaction design theory and three levels of emotional design theory to the design of the music APP has important research value and scientific perspective. The paper also summarizes the interaction design method based on user experience and builds the design model of the music APP based on emotional design, which is a guide for the subsequent design.","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121093472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMPACT OF SOCIAL NETWORKING SITES ON STUDENTS AND TASK’ PERFORMANCE DURING COVID-19 COVID-19期间社交网站对学生和任务表现的影响
Pub Date : 1900-01-01 DOI: 10.26480/imcs.01.2022.11.17
Amir Khushk, H. Ali, V. Baraboshkin
In today’s world, social networking has emerged as a highly desirable product, but the use of these social networking sites affects the physical and mental health of people. Therefore, this study aims to find the impact of excessive use of social networking sites (ESNS) on students’ task performance (STP) by mediating the role of task distraction (TD). Further, this study explores the moderating role of locus of control (internal and external) on the ESNS-TD relationship. For this purpose, data has been collected from 226 students enrolled in public sector universities in metropolitan cities of Pakistan through the survey. The findings show that excessive use of social networking sites significantly decreases students’ performance. Task distraction partially mediates the ESNS-STP relationship. Further, the results show that only the external locus of control moderates the ESNS-TD relationship. By analyzing the consequences of excessive use of SNSs it raises teachers’ and scholars’ concerns about harmful aspects of Internet use. This study reports that limited use of social networking sites is beneficial for students’ performance.
在当今世界,社交网络已经成为一种非常受欢迎的产品,但是这些社交网站的使用影响了人们的身心健康。因此,本研究旨在通过中介任务分心(TD)的作用,发现过度使用社交网站(ESNS)对学生任务绩效(STP)的影响。此外,本研究还探讨了控制源(内部和外部)对ESNS-TD关系的调节作用。为此目的,通过调查从巴基斯坦大城市公立大学招收的226名学生中收集了数据。研究结果表明,过度使用社交网站会显著降低学生的学习成绩。任务分心在ESNS-STP关系中起部分中介作用。此外,研究结果还表明,只有外部控制点对ESNS-TD关系有调节作用。通过分析过度使用社交网络的后果,提出了教师和学者对网络使用有害方面的关注。本研究报告,有限的使用社交网站是有利于学生的表现。
{"title":"IMPACT OF SOCIAL NETWORKING SITES ON STUDENTS AND TASK’ PERFORMANCE DURING COVID-19","authors":"Amir Khushk, H. Ali, V. Baraboshkin","doi":"10.26480/imcs.01.2022.11.17","DOIUrl":"https://doi.org/10.26480/imcs.01.2022.11.17","url":null,"abstract":"In today’s world, social networking has emerged as a highly desirable product, but the use of these social networking sites affects the physical and mental health of people. Therefore, this study aims to find the impact of excessive use of social networking sites (ESNS) on students’ task performance (STP) by mediating the role of task distraction (TD). Further, this study explores the moderating role of locus of control (internal and external) on the ESNS-TD relationship. For this purpose, data has been collected from 226 students enrolled in public sector universities in metropolitan cities of Pakistan through the survey. The findings show that excessive use of social networking sites significantly decreases students’ performance. Task distraction partially mediates the ESNS-STP relationship. Further, the results show that only the external locus of control moderates the ESNS-TD relationship. By analyzing the consequences of excessive use of SNSs it raises teachers’ and scholars’ concerns about harmful aspects of Internet use. This study reports that limited use of social networking sites is beneficial for students’ performance.","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133826621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE STATE OF THE ART IN ECO-FRIENDLY IOT 最先进的环保物联网技术
Pub Date : 1900-01-01 DOI: 10.26480/imcs.01.2022.18.22
Ipseeta Nanda, R. De
Everything in the “smart world” is connected by the Internet of Things (IoT), making its energy consumption a challenging and alluring research topic. The goal of a green IoT is to create a network that uses very little energy. In this paper, we present an overview of green Internet of Things technologies. It also covers the four stages of the green IoT life cycle (design, production, use, and recycling) in detail. Also covered are green IoT technologies like green tags, green sensing networks, and green internet technologies. Research on the Internet of Things in 5G networks and for smart cities is also presented. Finally, some suggestions for further study and some of the remaining difficulties in the field of green IoT are offered. Green Internet of Things, 5G, wireless sensor networks, cloud computing, smart cities, and energy efficiency are some of the terms that can be found in an IoT index.
“智能世界”中的一切都通过物联网(IoT)连接起来,使其能源消耗成为一个具有挑战性和诱人的研究课题。绿色物联网的目标是创建一个使用很少能源的网络。在本文中,我们介绍了绿色物联网技术的概述。它还详细介绍了绿色物联网生命周期的四个阶段(设计、生产、使用和回收)。还包括绿色物联网技术,如绿色标签、绿色传感网络和绿色互联网技术。对5G网络和智慧城市的物联网进行了研究。最后,提出了绿色物联网领域有待进一步研究的建议和存在的难点。绿色物联网、5G、无线传感器网络、云计算、智慧城市和能源效率是可以在物联网指数中找到的一些术语。
{"title":"THE STATE OF THE ART IN ECO-FRIENDLY IOT","authors":"Ipseeta Nanda, R. De","doi":"10.26480/imcs.01.2022.18.22","DOIUrl":"https://doi.org/10.26480/imcs.01.2022.18.22","url":null,"abstract":"Everything in the “smart world” is connected by the Internet of Things (IoT), making its energy consumption a challenging and alluring research topic. The goal of a green IoT is to create a network that uses very little energy. In this paper, we present an overview of green Internet of Things technologies. It also covers the four stages of the green IoT life cycle (design, production, use, and recycling) in detail. Also covered are green IoT technologies like green tags, green sensing networks, and green internet technologies. Research on the Internet of Things in 5G networks and for smart cities is also presented. Finally, some suggestions for further study and some of the remaining difficulties in the field of green IoT are offered. Green Internet of Things, 5G, wireless sensor networks, cloud computing, smart cities, and energy efficiency are some of the terms that can be found in an IoT index.","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"372 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133207559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BLOCKCHAIN AS A DISRUPTIVE TECHNOLOGY IN NIGERIA’S FINTECH ECOSYSTEM 区块链是尼日利亚金融科技生态系统中的颠覆性技术
Pub Date : 1900-01-01 DOI: 10.26480/imcs.01.2022.03.10
C. Odu
Blockchain technology is a new and innovative technology that has gained interest from all industries, and countries across the globe. More so, a technology that is mostly associated with Bitcoin, a cryptocurrency that has become popular and is seen as the next gold in the financial sector. This paper gives an insight into Blockchain technology in the Nigerian financial industry and its possible disruption to the industry. Further highlights the importance of Blockchain to enable a better understanding for stakeholders in the Nigerian context. The paper looks at the Fintech industry of Nigeria and further goes to explain the types of blockchain existing and their challenges. Starting with the origin of blockchain and its cryptocurrency application. Finally, the author gives recommendations to aid policymakers in making informed decisions about Blockchain technology. These recommendations are significant and will help in also developing the technology rather than truncating its growth.
区块链技术是一项新的创新技术,已经引起了全球所有行业和国家的兴趣。更重要的是,这项技术主要与比特币有关,比特币是一种越来越受欢迎的加密货币,被视为金融领域的下一个黄金。本文深入分析了尼日利亚金融业的区块链技术及其可能对该行业造成的破坏。进一步强调了区块链的重要性,使尼日利亚的利益相关者能够更好地理解。本文着眼于尼日利亚的金融科技行业,并进一步解释了现有区块链的类型及其面临的挑战。从区块链的起源及其加密货币应用开始。最后,作者给出了建议,以帮助决策者做出有关区块链技术的明智决策。这些建议意义重大,将有助于发展这项技术,而不是阻碍它的发展。
{"title":"BLOCKCHAIN AS A DISRUPTIVE TECHNOLOGY IN NIGERIA’S FINTECH ECOSYSTEM","authors":"C. Odu","doi":"10.26480/imcs.01.2022.03.10","DOIUrl":"https://doi.org/10.26480/imcs.01.2022.03.10","url":null,"abstract":"Blockchain technology is a new and innovative technology that has gained interest from all industries, and countries across the globe. More so, a technology that is mostly associated with Bitcoin, a cryptocurrency that has become popular and is seen as the next gold in the financial sector. This paper gives an insight into Blockchain technology in the Nigerian financial industry and its possible disruption to the industry. Further highlights the importance of Blockchain to enable a better understanding for stakeholders in the Nigerian context. The paper looks at the Fintech industry of Nigeria and further goes to explain the types of blockchain existing and their challenges. Starting with the origin of blockchain and its cryptocurrency application. Finally, the author gives recommendations to aid policymakers in making informed decisions about Blockchain technology. These recommendations are significant and will help in also developing the technology rather than truncating its growth.","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122591812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AN ANALYSIS OF 5G WIRELESS NETWORKS 5g无线网络分析
Pub Date : 1900-01-01 DOI: 10.26480/imcs.02.2022.38.40
Ipseeta Nanda, R. De
Every major telecom in the world is working to make it even faster because everyone loves speed and, more specifically, fast internet. Stable internet connections are becoming more and more important for smartphones, watches, homes, and automobiles. The fifth generation of technology, or 5G, is here to help us survive in a world where speed is changing every second and where we demand more and more technology. Some of the most important goals that must be achieved in the future, or in a world beyond 4G, are increased capacity, improved data rate, decreased latency, and quality service. Large-scale improvements in the 5G cellular architecture are necessary to meet these demands. The 5G cellular network architecture and some of the key emerging technologies that can help the architecture become more human and better meet user demands are primarily the focus of this paper. The primary focus of this paper’s coverage of 5G details is device-to-device communication and massive multiple input multiple output technology (D2D). A general, credible 5G cellular network architecture is put forth using guidelines from online books and thorough research on the subject.
世界上每一家主要的电信公司都在努力使它更快,因为每个人都喜欢速度,更具体地说,是快速的互联网。对于智能手机、手表、家庭和汽车来说,稳定的互联网连接变得越来越重要。第五代技术,即5G,是为了帮助我们在这个速度每秒都在变化、对技术要求越来越高的世界中生存下来。在未来,或者在4G以后的世界里,必须实现的一些最重要的目标是增加容量、提高数据速率、减少延迟和提高服务质量。为了满足这些需求,5G蜂窝架构的大规模改进是必要的。5G蜂窝网络架构和一些关键的新兴技术,可以帮助架构变得更人性化,更好地满足用户需求,是本文的主要重点。本文对5G细节覆盖的主要重点是设备对设备通信和大规模多输入多输出技术(D2D)。根据在线书籍的指导方针和对该主题的深入研究,提出了一个通用的、可信的5G蜂窝网络架构。
{"title":"AN ANALYSIS OF 5G WIRELESS NETWORKS","authors":"Ipseeta Nanda, R. De","doi":"10.26480/imcs.02.2022.38.40","DOIUrl":"https://doi.org/10.26480/imcs.02.2022.38.40","url":null,"abstract":"Every major telecom in the world is working to make it even faster because everyone loves speed and, more specifically, fast internet. Stable internet connections are becoming more and more important for smartphones, watches, homes, and automobiles. The fifth generation of technology, or 5G, is here to help us survive in a world where speed is changing every second and where we demand more and more technology. Some of the most important goals that must be achieved in the future, or in a world beyond 4G, are increased capacity, improved data rate, decreased latency, and quality service. Large-scale improvements in the 5G cellular architecture are necessary to meet these demands. The 5G cellular network architecture and some of the key emerging technologies that can help the architecture become more human and better meet user demands are primarily the focus of this paper. The primary focus of this paper’s coverage of 5G details is device-to-device communication and massive multiple input multiple output technology (D2D). A general, credible 5G cellular network architecture is put forth using guidelines from online books and thorough research on the subject.","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130217331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
REVIEW OF CLOUD COMPUTING CRYPTOGRAPHY 云计算密码学综述
Pub Date : 1900-01-01 DOI: 10.26480/imcs.02.2022.31.33
Ipseeta Nanda, R. De
The delivery of computing services over the internet, as opposed to storing data on a local memory device or a proprietary disc drive, is known as cloud computing. Servers, storage, databases, networking, and software are some examples of computing services. The primary justification and major benefit of using the cloud are the user’s ability to store data there and access it from any location at any time, as well as the low cost of all its services. Despite this, because the data stored in the cloud is not directly maintained by the customer, security has always been a major concern with cloud computing. The data owners are unlikely to be aware of the route their data is taking when they upload or store data using a cloud computing service. The user is unaware of whether or not a third party is gathering, processing, and accessing their information. Numerous cryptography algorithms have been proposed to address security concerns. This paper discussed different cryptography algorithms that are present in the previous work with a focus on the fundamentals of cloud computing.
通过互联网提供计算服务,而不是将数据存储在本地存储设备或专有磁盘驱动器上,被称为云计算。服务器、存储、数据库、网络和软件是计算服务的一些例子。使用云的主要理由和主要好处是用户能够将数据存储在云上,并随时从任何位置访问数据,以及其所有服务的低成本。尽管如此,由于存储在云中的数据不是由客户直接维护的,因此安全性一直是云计算的主要关注点。数据所有者在使用云计算服务上传或存储数据时,不太可能意识到他们的数据所经过的路径。用户不知道第三方是否正在收集、处理和访问他们的信息。为了解决安全问题,已经提出了许多加密算法。本文讨论了前面工作中出现的不同加密算法,重点是云计算的基础。
{"title":"REVIEW OF CLOUD COMPUTING CRYPTOGRAPHY","authors":"Ipseeta Nanda, R. De","doi":"10.26480/imcs.02.2022.31.33","DOIUrl":"https://doi.org/10.26480/imcs.02.2022.31.33","url":null,"abstract":"The delivery of computing services over the internet, as opposed to storing data on a local memory device or a proprietary disc drive, is known as cloud computing. Servers, storage, databases, networking, and software are some examples of computing services. The primary justification and major benefit of using the cloud are the user’s ability to store data there and access it from any location at any time, as well as the low cost of all its services. Despite this, because the data stored in the cloud is not directly maintained by the customer, security has always been a major concern with cloud computing. The data owners are unlikely to be aware of the route their data is taking when they upload or store data using a cloud computing service. The user is unaware of whether or not a third party is gathering, processing, and accessing their information. Numerous cryptography algorithms have been proposed to address security concerns. This paper discussed different cryptography algorithms that are present in the previous work with a focus on the fundamentals of cloud computing.","PeriodicalId":292564,"journal":{"name":"INFORMATION MANAGEMENT AND COMPUTER SCIENCE","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121398484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
INFORMATION MANAGEMENT AND COMPUTER SCIENCE
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1