Suggested Topics within your search.
Suggested Topics within your search.
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Mobile communication systems 2
- ART / Digital 1
- African literature 1
- Anti-Infective Agents 1
- Anti-infective agents 1
- Authors, Nigerian 1
- Certification 1
- Chemotherapy 1
- Communicable diseases in children 1
- Communication in rehabilitation 1
- Computer animation 1
- Criticism and interpretation 1
- Digital cinematography 1
- Digital techniques 1
- Electronic data processing personnel 1
- Examinations 1
- Graphical user interfaces (Computer systems) 1
- Historiography 1
- History 1
- History and criticism 1
-
3441
Research and application practice of knowledge graph technology system for telecom-operators
Published 2022-08-01“…Knowledge graph plays an important role in knowledge search, work order processing, intelligent service, fault analysis and other fields of China Mobile business and maintenance scenario.The knowledge graph technology system of China Mobile was systematically studied.Based on application scenarios and service objects, it can be divided into question & answer retrieval knowledge graph, work-order analysis knowledge graph, system operation and maintenance knowledge graph and business operation knowledge graph.The technical architecture, business architecture and construction methods were introduced, and the planning goal of the evolution and development of knowledge graph was ultimately leaded.…”
Get full text
Article -
3442
Secure access authentication scheme for 4G wireless network based on PCL
Published 2012-04-01“…Considering the access authentication for mobile terminals in the 4G wireless network,a new secure access authentication scheme based on the self-certified public key system was designed.Then the deductive process of the scheme was derived with the protocol derivation system and its security attributes was formally proofed with protocol composition logic.By the security proof and comprehensive analysis,it is showed that the proposed scheme not only has session authentication and key confidentiality,but also can defend pseudo-base station attack and reply attack,provide the undeniable service and identity privacy.Moreover,the scheme can improve the access efficiency of the mobile terminals.…”
Get full text
Article -
3443
Internet of vehicles empowered by edge intelligence
Published 2018-12-01“…By pushing computing,storage and other resources to the proximity of end devices,edge intelligence empowers network edge entities powerful information processing and content delivery capabilities,while providing efficient and low-latency service support for the development and implementation of novel mobile services.Thus,edge intelligence is profoundly changing the functions of mobile applications and the utilization patterns of network resources.The application of edge intelligence technology in vehicular networks was studied firstly,and the core scientific problems that need to be solved in designing an efficient vehicular edge system was presented.Then,the technical challenges faced in solving these problems were analyzed and the corresponding solution strategies were given.…”
Get full text
Article -
3444
Anonymity handover authentication protocol based on group signature for wireless Mesh network
Published 2016-10-01“…In order to ensure that the Mesh network mobile client video,voice and other real-time strong applications without interruption,a secure and efficient handover authentication was very important.To protect the privacy of mobile nodes,an anonymity handover authentication protocol was proposed based on group signature for wireless mesh network.Compared with other handover authentication protocols based on group signature,the proposed scheme did not involve the group signature correlation operation,and the group signature algorithm was only carried out on the router.The pro-posed protocol not only enhances the security but also performs well in authentication efficiency and privacy-preserving.…”
Get full text
Article -
3445
Increased Depth of Cellular Imaging in the Intact Lung Using Far-Red and Near-Infrared Fluorescent Probes
Published 2006-01-01Get full text
Article -
3446
-
3447
mHealth App to Promote Healthy Lifestyles for Diverse Families Living in Rural Areas: Usability Study
Published 2025-02-01“…It includes community programming to promote healthy lifestyles and address social needs and health care visits with an interdisciplinary team. A digital mobile health platform—the Healthy Lifestyle (Nemours Children’s Health) dashboard—was designed as a self-management tool for caregivers to use as part of Mobile Integrated Care for Childhood Obesity. …”
Get full text
Article -
3448
The Self-Perception and Usage of Medical Apps amongst Medical Students in the United States: A Cross-Sectional Survey
Published 2016-01-01“…Background. Mobile medical software applications (apps) are used for clinical decision-making at the point of care. …”
Get full text
Article -
3449
Hippocampal Dendritic Spines Are Segregated Depending on Their Actin Polymerization
Published 2016-01-01“…Our results indicate that, in cultures, the actin mobile fraction is independently regulated at the individual spine level, and mobile fraction values do not correlate with either age or distance from the soma. …”
Get full text
Article -
3450
El imperativo de movilidad y los procesos de precarización en Educación Superior. Docentes e investigadores españoles entre Ecuador y España
Published 2018-05-01“…The new mobilities of the Spanish are inextricably linked to the crisis and the way it impacts on Higher Education. …”
Get full text
Article -
3451
A Smart Electronic Tagging System Based on Context Awareness and Machine-to-Machine Interworking
Published 2013-10-01“…The existing electronic tagging system traces the location of a sex offender using triangulation by communicating with Global Positioning System (GPS) satellites and mobile phone base stations. The acquired location information is used to prevent the offenders from perpetrating repeat crimes. …”
Get full text
Article -
3452
Influence of different type of impermeable phase on the permeability of PLA films: Nanofillers versus crystalline phase
Published 2025-01-01“…For semi-crystalline membranes, the increase in crystallinity led to a decrease of the amorphous chains mobility (MAF) which was found to also influence the permeability. …”
Get full text
Article -
3453
Dépaysement d’une géographe
Published 2015-07-01“…The concept is often discussed, to evoke, for example, fieldwork or geographies of mobility such as tourism. However it is rare that geographers examine this notion from the perspective of job mobility, which is what this paper aims to do, taking the form of a personal narrative. …”
Get full text
Article -
3454
Réseaux d’affaires en justice. La concurrence et les pouvoirs (Couronne d’Aragon, xive siècle)
Published 2023-12-01“…Fluid, versatile, modifiable, and diversely mobilized, mobilized networks prevail for business, without erasing the feudal structure, watermark, and rules of the game. …”
Get full text
Article -
3455
Les plateformes numériques révolutionnent-elles la mobilité urbaine ?
Published 2017-12-01“…Based on mobile ICT, in particular the smartphone, transportation network companies (TNCs) provide applications to link drivers and their personal vehicles to passengers. …”
Get full text
Article -
3456
La cartographie d’une sélection globale de flux, entre ‘significativité’ et ‘densité’
Published 2016-12-01“…If several approaches remain available, one of them is to mobilize a single criterion (α), endogenous to the matrix. …”
Get full text
Article -
3457
Marie de Batarnay (1539-1595), actrice de la fulgurante ascension de sa famille
Published 2024-04-01“…Such documents open a window on the way Marie helped build the Joyeuse family’s fortune, and thus the lineage’s identity, becoming a major player in their upward mobility. In this paper, we will study the history of the Joyeuse family’s fortune and their social mobility in the light of Marie de Batarnay’s action.…”
Get full text
Article -
3458
Associations of arthritis with functional disability and depressive symptoms in general US adults: NHANES 1988–1994 and 1999–2018
Published 2024-12-01“…Conclusions Self‐reported arthritis was associated with ADL disability, IADL disability and mobility disability, and depressive symptoms. Among participants with X‐ray data, radiographic knee osteoarthritis was only associated with mobility disability in general US adults. …”
Get full text
Article -
3459
SHORT REVIEW OF SOME NOSQL DATABASES
Published 2022-05-01“…In most cases, all users interacting with a web service or mobile application are not aware that they are interacting with a distributed database, in fact, the distributed database is implemented in the web service or mobile application offered to customers. …”
Get full text
Article -
3460
Dependence of the Ice Formation Activity of Dioxynaphthalenes, Fluoroglucin and Silver Iodide on the Structure of the Hydrate Shells of Their Crystals
Published 1999-06-01“…The ratio between the thickness of the layer of ‘mobile’ ice and that of the layer of adsorbed water increased as a function of IFA.…”
Get full text
Article