2022
DOI: 10.1109/mnet.102.2100394
|View full text |Cite
|
Sign up to set email alerts
|

Deep Information Fusion-Driven POI Scheduling for Mobile Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 64 publications
(16 citation statements)
references
References 15 publications
(18 reference statements)
0
16
0
Order By: Relevance
“…When a user registers with the system for the first time, the system determines the user's subordinate status based on the user's predefined attributes, and in this scheme, the user status can be divided into: data owner, data acquirer and third-party organization. When the user enters the system, the system will be based on the user ID and agent license as the identity authentication, and the return result is whether it is a legitimate identity or a legitimate unique identity [28]. Users can be divided into three categories after executing the identity contract IC, for each storage there exists data index, before accessing the data index you must run the access control contract APC.…”
Section: Results and Analysis A Testing Of The Blockchain Structurementioning
confidence: 99%
“…When a user registers with the system for the first time, the system determines the user's subordinate status based on the user's predefined attributes, and in this scheme, the user status can be divided into: data owner, data acquirer and third-party organization. When the user enters the system, the system will be based on the user ID and agent license as the identity authentication, and the return result is whether it is a legitimate identity or a legitimate unique identity [28]. Users can be divided into three categories after executing the identity contract IC, for each storage there exists data index, before accessing the data index you must run the access control contract APC.…”
Section: Results and Analysis A Testing Of The Blockchain Structurementioning
confidence: 99%
“…In recent years, with the rapid development of network and database technology, people have accumulated more and more data [1], and there is a lot of useful information hidden behind these data [2], which has been widely used, and the ability to exploit them becomes increasingly important [3]. The same is true in the field of education.…”
Section: Introductionmentioning
confidence: 99%
“…On this basis, the computer algorithms are used to precisely connect each layer FIGURE 1: A typical example that illustrates scenarios of robust visual SLAM for additive manufacturing to form a layer stack to quickly realize the additive manufacturing of parts [16], [17]. Contemporarily, the application of additive manufacturing technology has bee more and more general in the automotive industry [18], [19],liu2022human. In this context, some brand-name automotive companies currently choose to use additive manufacturing technology in the automotive development stage to achieve the purpose of rapid verification and optimization of components [20], [21].…”
Section: Introductionmentioning
confidence: 99%