Suggested Topics within your search.
Suggested Topics within your search.
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Mobile communication systems 2
- ART / Digital 1
- African literature 1
- Anti-Infective Agents 1
- Anti-infective agents 1
- Authors, Nigerian 1
- Certification 1
- Chemotherapy 1
- Communicable diseases in children 1
- Communication in rehabilitation 1
- Computer animation 1
- Criticism and interpretation 1
- Digital cinematography 1
- Digital techniques 1
- Electronic data processing personnel 1
- Examinations 1
- Graphical user interfaces (Computer systems) 1
- Historiography 1
- History 1
- History and criticism 1
-
4781
Kitsch landscapes as tourist destinations in South and Southeast Asia (China, Vietnam, Nepal)
Published 2020-10-01“…This article thus looks at this kitschifying of landscapes developed for tourism at the rural/urban interface (scenography, experience provided for tourists, processes mobilized) and the objectives it serves, in order to start to understand and interpret the underlying message(s).…”
Get full text
Article -
4782
Key Technologies and Protocol Architectures in Heterogeneous Network
Published 2013-06-01“…Lastly, other key technologies in HetNet were also analyzed, such as self-organized network (SON), backhaul link design, mobility management, energy saving and cognitive radio, etc. …”
Get full text
Article -
4783
Research of Green Supervision and Service Project System Based on the Cloud Service
Published 2013-05-01“…Therefore,depending on the problems encountered in the project management of the telecommunications industry,a green project super vision thought combined with the cloud computing concept and smart mobile devices was introduced. An in-depth research of the construction of a project supervision services system based on the distributed architecture of cloud service was conducted. …”
Get full text
Article -
4784
Slice scheduling strategy in LTE wireless network virtualization
Published 2017-02-01“…The future mobile communication network slicing mechanism was studied.A slice scheduler of flow level in medium access control (MAC) layer within the base station was used to utilize the shared resources between operators by predetermined proportion in the downlink LTE system.According to the different service level agreement parameters,the wireless resources are allocated for operators,which is the owner of slices in wireless network virtualization.System level simulation experiment and the comparison of the utilization between different slice methods were carried out.Compared to fixed slice method,the NVS method ensures that the users in different slices can achieve better utilization of wireless resources.In addition,the slices for services were established according to the difference of real-time(RT)and non-real-time(NRT)traffic requests,which minimizes the packet loss rate and ensures performance of the whole system.…”
Get full text
Article -
4785
5G network automation: from manual operating to full autonomous
Published 2022-08-01“…To realize automatic management via digitization and intellectualization has become a key technology for thousands of industries to reduce their operation and maintenance costs.As an enabler of digitization and intellectualization, 5G mobile communication system has evolved from manual operating network to human-assisted automation network.Based on the study of automatic technologies of 5G network, the L0~L5 autonomous network levels proposed by 3GPP were analyzed, several key technologies for intent-driven 5G autonomous network including intent life-cycle maintenance and solutions for intent conflict were discussed.Last but not least, a practice of intent-driven 5G autonomous network was proposed: solution of intent-driven application experience assurance.…”
Get full text
Article -
4786
Towards a cultural transition of energy landscapes – Between responsibility and necessity
Published 2024-06-01“…The first reason relates to the impacts of industrial infrastructures, mobility and the management of environmental processes, and is related to the lack of cohesion between the structures and the landscape. …”
Get full text
Article -
4787
Frontières et mobilités en Campanie à l’époque orientalisante : questions de culture matérielle
Published 2022-07-01“…The site provides a privileged observation point on mobility and integration issues, which are to the fore in the anthropological and archaeological international debate. …”
Get full text
Article -
4788
Graph database based security protection mechanism of 5G network data flow
Published 2021-04-01“…As the 5G mobile network is closely integrated with government, medical, financial and other industries related to national economy and people’s livelihood, the security of the data carried by 5G network is crucial.5G data and flow scenarios were firstly analyzed, then 5G data was classified.Combining with the protection requirements of the life cycle of data, an innovative 5G data security labeling model based on graph database was proposed, which could meet the protection requirements of static classification and dynamic flow simultaneously.Based on this model, 5G data security protection mechanism was constructed from three aspects of node security, data flow monitoring and data security risk disposal, realizing life-cycle protection of 5G data.…”
Get full text
Article -
4789
L’outil numérique au service de l’intelligence collective des territoires
Published 2015-12-01“…In this context, digital tools are an indispensable technical means of mobilizing this knowledge, stimulation of collective intelligence at the service of sustainable development of territories. …”
Get full text
Article -
4790
Design of Normal Concrete Mixtures Using Workability-Dispersion-Cohesion Method
Published 2016-01-01“…These coefficients relate workability to mobility and stability of the concrete mix. The coefficients are obtained from special charts depending on mix requirements and aggregate properties. …”
Get full text
Article -
4791
Raconter le territoire sur la scène, dépasser les frontières par la scène
Published 2020-10-01“…This vast project, begun as a reflection upon conditions peculiar to the theatre in Palestine, where mobility restrictions threaten the very survival of theatrical entertainment, whether for writing or performance. …”
Get full text
Article -
4792
« Mr Azn@r, parT »
Published 2004-09-01“…The horizontal communication made possible the expression of different opinions and the NTIC helped to mobilize the citizens on the day before the elections. …”
Get full text
Article -
4793
Challenges for beyond 5G:ultra-densification of radio access network
Published 2020-11-01“…Ultra-densification of radio access network (RAN) is a key to efficiently support the exponentially growing mobile data traffic in 5G era.Furthermore,extremely high frequency band like mmWave band was utilized to solve the bandwidth shortage problem.However,untra-dense reusing the same radio resource produced severe interference.And the mmWave link was very harsh due to frequent blockage by obstacles.Therefore a new RAN architecture needed to be introduced to realize ultra-reliable communications in such a severe radio propagation environment.An architecture of distributed MIMO based RAN was presented.Then,enhanced interference coordination (eIC) was described.Finally,the effectiveness of distributed MIMO based RAN with eIC by computer simulation was showed.…”
Get full text
Article -
4794
La transición desarmada : objetores, política y prensa en la transformación de las Fuerzas Armadas en la España democrática
Published 2004-09-01“…During this process, which generates unprecedented media interest, the conscientious objection movement played a very important role. Its mobilizations will have a significant impact throughout the media, and this will lead to a growing interest in military questions on the part of society, which had been kept at a distance during its recent history. …”
Get full text
Article -
4795
CHANGES TO RETAIL BUSINESS MODELS - OVERVIEW OF THE DETERMINING FACTORS
Published 2016-05-01“…They mainly involve the introduction of new solutions in terms of store formats, cooperation within the distribution channels, changes to the range of products and services offered and the use of mobile technologies.…”
Get full text
Article -
4796
Overview of Key Technologies of Transmission in Massive MIMO System
Published 2015-05-01“…With the rise of the internet of things and rapid development of the mobile internet business,higher data rate of service is demanded. …”
Get full text
Article -
4797
Analysis of the throughput in full-duplex WLAN
Published 2016-06-01“…WLAN is one of the important ways of accessing mobile internet.However,the performance of WLAN declines rapidly as the number of users increases.Improving the performance of WLAN with high density deployment is an important research direction of WLAN technology.Distributed coordination function(DCF)which was the basic media access method of IEEE 802.11 in infrastructure-based networks was modeled and the bottleneck of downlink throughput was pointed out.Taking advantage of full-duplex technology where there was a breakthrough in recent years,a new MAC protocol was designed and analyzed.By providing the AP full-duplex transmitting ability and simple modifications to traditional DCF protocol,the new protocol made the downlink throughput breaking through the bottleneck in infrastructure-based WLAN and increased the total throughput by more than 60%.…”
Get full text
Article -
4798
Dynamic Knowledge Network Modeling Orient to Intelligent Search
Published 2014-10-01“…With the explosive growth of internet data and the increasing user demand, the traditional search methods has been difficult to meet user's needs in the mobile search field. In order to achieve the intelligent search based on semantic understanding, it is urgent to improve the level of search from word-based to semantic-based. …”
Get full text
Article -
4799
Efficient and privacy-preserving profile matching protocols in opportunistic networks
Published 2015-12-01“…In opportunistic networks,users can take the advantage of parallel opportunistic contacts with other mobile users and find the appropriate helpers to forward the messages or share the contents.Most of the existing profile-matching protocols were designed on the basis of homomorphic cryptosystem and were not quite efficient in encryption and decryption.Three efficient and privacy-preserving profile matching protocols were proposed to deal with different privacy requirements in opportunistic networks,which do not use any homomorphic encryption.The proposed protocols were proved to be privacy-preserving and correct.The performances of the protocols are thoroughly analyzed and evaluated via real smartphone experiments,and the results show that the proposed protocols can decrease encryption and decryption time by at least an order of magnitude than the Paillier cryptosystem based protocol.…”
Get full text
Article -
4800
Les terres australes françaises, terrain d’expérimentation de la solidarité écologique
Published 2022-12-01“…Using the longline fishery operating off Crozet and Kerguelen (French subantarctic islands) as a case study, and to propose social-ecological systems models that can be implemented in other similar situations, we examined how players have mobilized and reorganized in response to two severe conflicts: seabird bycatch and depredation by cetaceans (species feeding on fishery catches).…”
Get full text
Article