Suggested Topics within your search.
Suggested Topics within your search.
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Mobile communication systems 2
- ART / Digital 1
- African literature 1
- Anti-Infective Agents 1
- Anti-infective agents 1
- Authors, Nigerian 1
- Certification 1
- Chemotherapy 1
- Communicable diseases in children 1
- Communication in rehabilitation 1
- Computer animation 1
- Criticism and interpretation 1
- Digital cinematography 1
- Digital techniques 1
- Electronic data processing personnel 1
- Examinations 1
- Graphical user interfaces (Computer systems) 1
- Historiography 1
- History 1
- History and criticism 1
-
4801
Topografías variables del poder: las relaciones entre movimientos sociales y el Estado argentino en dos tiempos
Published 2016-09-01“…Over the 1990s, Latin America became a privileged scenario for both the implementation of neoliberal policies and the emergence of intense social protests that challenged those programs of structural adjustment and austerity. Those mobilizations reconfigured forms of government and, in the cases of Ecuador and Bolivia, partially refunded the basis of the modern liberal State through the endorsement of notions such as those of multi-nationality and « good living/to live well ». …”
Get full text
Article -
4802
UAV ad hoc network link prediction based on deep graph embedding
Published 2021-07-01“…Aiming at the characteristics of the UAV ad hoc network (UAANET), such as topological temporal-varying, node mobility and intermittent connection, a temporal graph embedding model was proposed to present the preprocessed UAANET.To improve the sampling efficiency, the sampling interval was calculated based on linear probability.The network structure features were mapped to the relationship between nodes, and the contextual semantic features of nodes were extracted by adversarial training.With the help of long and short-term memory network, the temporal characteristics of the UAANET were extracted to predict the connection at the next moment.AUC, MAP, and Error Rate were employed as evaluation indexes.The simulation experiments based on NS-3 show that compared with Node2vec, DDNE and E-LSTM-D, the proposed method has a better accuracy.…”
Get full text
Article -
4803
Usages des TIC et rapports a l’incertitude en situation de catastrophes naturelles
Published 2008-11-01“…This article shows how professionnals and disaster victims involved in natural catastrophes in three different areas - Limoges storm in 1999, Abbeville and Bourg-en-Bresse floods in 2001 and 2005 – built a commun risk story with Information and communication technologies (ICT) : Internet, mobiles, data bases, groupware, etc. At first, ICT uses are concretely approached before, during and after the events in a historic context where sciences and technology are growing up to reduce uncertainties of medical and ecological threats. …”
Get full text
Article -
4804
Key technologies of NR multicast and broadcast services
Published 2022-07-01“…Internet protocol television (IPTV), group communication and other applications are regarded as multicast/broadcast services.5G cellular mobile communication system should support the transmission of such application data efficiently.Firstly, the basic architecture of 5G multicast/broadcast system based on NR was analyzed according to the different transmission modes of multicast/broadcast application data from 5GC to UE via gNB.Then, the key technologies of 5G multicast/broadcast radio transmission were analyzed in detail from the aspects of air interface protocol stack, physical layer and higher layer protocol enhancements, service process and service continuity, etc.Finally, the evolution trends of 5G multicast/broadcast technology were prospected.…”
Get full text
Article -
4805
Iconografia das fronteiras das Guianas
Published 2019-03-01“…The central assessment is that all the complexity present at the borders of the Guianas is the result of centuries of occupation, mobilities and conflicts. In general, various institutional arrangements on a variety of topics related to that geographical space are more complex than usual, since the decisions to "open" or "close" in the border interactions consider all the political and economic dynamics that the countries have and whose reflections are felt directly or indirectly in border cities.…”
Get full text
Article -
4806
Development trends of the information technology and cyberspace security
Published 2015-12-01“…The basic characteristics,mutual differences and intrinsic relationships of the internet,mobile internet,internet of things,cloud computing and big data technologies were analyzed,and the evolutions of the information technology and information service mode were deeply studied,the spiraling development trends of information technology and our catching up opportunities were explored,and that the major problem in next generation of in-formation technology was energy consumption was pointed out.Based on the analysis,the security requirements and challenges of the network connections,Industrie 4.0 issues in our cyberspace were analyzed,and that the research on security technology should be synchronized with the development of information technology was presented.Finally,the development opportunities and strategies of our cyberspace security were concluded,and an outlook of the de-velopment trends of the cyberspace security was given.…”
Get full text
Article -
4807
Twin Deficits: Evidence From Portugal, Italy, Spain and Greece
Published 2020-10-01Get full text
Article -
4808
Rapport au savoir en EPS à l’école primaire
Published 2014-06-01“…The aim is to better understand the sense the students give to the learning settings and to identify which registers of activities they mobilize to succeed and learn in PE. Sixty-five students from 10 different classes (from CE1 to CM2), stemming from two sociologically contrasted schools, were questioned in the form of interviews during the lesson. …”
Get full text
Article -
4809
Collection Tree Extension of Reactive Routing Protocol for Low-Power and Lossy Networks
Published 2014-03-01“…The Lightweight On-Demand Ad hoc Distance Vector Routing Protocol-Next Generation (LOADng) is a reactive distance vector protocol which is intended for use in mobile ad hoc networks and low-power and lossy networks to build paths between source-destination pairs. …”
Get full text
Article -
4810
Renaissance arabe et solidarité musulmane dans La Nation arabe
Published 2002-04-01“…The journal had an activist stance which was original for that time : it intended to mobilize Arabs and Muslims not only towards fighting the occupying powers but also towards fighting against the Zionist project which threatened the territorial integrity of Palestine and which symbolised the Arab nation.…”
Get full text
Article -
4811
Does tax competition make tax reform essential?
Published 2006-10-01“…Tax policy measures that tax mobile or foreign capital at significantly lower rates are known as harmful tax competition. …”
Get full text
Article -
4812
Contribution of geotagged Twitter data in the study of a social group’s activity space
Published 2016-12-01“…Using a sample of luxury shoppers, we analyzed the daily activity and mobility patterns of the upper middle class in Delhi, India. …”
Get full text
Article -
4813
L’espace urbain algérois à l’épreuve de ses graffiti
Published 2015-06-01“…The analysis gives meaning to the types of discourses and representations mobilized by graffiti in Algiers urban space…”
Get full text
Article -
4814
Militantisme et identités gaies et lesbiennes : quelle identité pour quels objectifs ?
Published 2008-05-01“…The lesbian, gay, bisexual and transgender (LGBT) movement is split as to whether it should mobilize exclusively around issues narrowly defined in terms of sexual orientation. …”
Get full text
Article -
4815
Vehicular ad hoc network and clustering routing algorithm applied in wilderness scenarios
Published 2012-10-01“…To solve the communication problem among vehicles in wilderness scenarios such as desert and Gobi or between the vehicles and the outside,a special architecture of VANET was proposed and its clustering and routing algorithm was analyzed.Based on different types of communication terminals each vehicle equips and the location,speed and driving direction information of the periodic message,the vehicles are organized into different clusters.The head of each cluster chooses the best route for its members when they ask for inner-clustering communications or inter-clustering communications.It also searches the nearest vehicle which equips satellite communication terminals or land mobile communications terminals to forward messages when a member requests communicating with the outside of the network.Simulation results show that the proposed algorithm has higher network stability,higher data delivery ratio and less routing overhead.…”
Get full text
Article -
4816
Task offloading and resource allocation in NOMA-based ultra-dense MEC networks
Published 2022-02-01“…In order to improve spectrum efficiency and meet the service demands of massive users, a non-orthogonal multiple access (NOMA)-based ultra-dense mobile edge computing (MEC) system was considered.In order to solve the serious communication interference caused by simultaneous offloading of multiple users and make efficient use of edge server resources, a joint task offloading and resource allocation scheme was proposed to minimize the system energy consumption while meeting the quality of service (QoS) of all users.Offloading decision, power control, computation resource and subchannel resource allocation were jointly considered in the proposed scheme.Simulations results show that the proposed scheme can efficiently lower system energy consumption compared to the other offloading schemes.…”
Get full text
Article -
4817
Dynamic and electrophoretic light scattering measurements on microtubules at low concentrations.
Published 2024-01-01“…This method ensures accurate and reproducible results on essential microtubule filament parameters such as the diffusion coefficient (D) and electrophoretic mobility (μ) from which other structures' hydrodynamics, electrical, and stability properties can be elucidated.…”
Get full text
Article -
4818
Application protection in 5G cloud network using zero trust architecture
Published 2020-12-01“…Based on the analysis of security requirements in the era of 5G cloud-network convergence,the basic principles of zero trust were studied,including not rely on location,untrusted traffic,and dynamic access control.The basic architecture of zero-trust was studied,combining with 5G cloud network architecture,the feasible application protection solutions include the customer-built OTT model,the use of the existing VPDN model,and the public zero-trust architecture model was proposed and compared.The application scenarios of customers in 5G cloud network were analyzed,including remote access,secure cloud,mobile office,etc.In these scenarios,the value that zero-trust architecture can bring to customers was proposed,such as application hiding and dynamic control,ensure the application safety.…”
Get full text
Article -
4819
Mainstreaming Urban Interventionist Practices: the Case of the BMW Guggenheim Lab in Berlin
Published 2013-06-01“…Financed by the German BMW group and realised by the Solomon Guggenheim Foundation, the project addresses issues of contemporary urban life in the form of a ‘mobile laboratory’ with an explicit emphasis on participatory forms of urban intervention. …”
Get full text
Article -
4820
Stepped impedance patch antenna for sub-6GHz 5G range
Published 2023-10-01“… This article presents the design of a stepped impedance patch antenna for fifth generation mobile communication networks application. A large tendency towards the new generation is what drives this research. …”
Get full text
Article