Showing 4,801 - 4,820 results of 8,265 for search '"mobilization"', query time: 0.08s Refine Results
  1. 4801

    Topografías variables del poder: las relaciones entre movimientos sociales y el Estado argentino en dos tiempos by Virginia Manzano

    Published 2016-09-01
    “…Over the 1990s, Latin America became a privileged scenario for both the implementation of neoliberal policies and the emergence of intense social protests that challenged those programs of structural adjustment and austerity. Those mobilizations reconfigured forms of government and, in the cases of Ecuador and Bolivia, partially refunded the basis of the modern liberal State through the endorsement of notions such as those of multi-nationality and « good living/to live well ». …”
    Get full text
    Article
  2. 4802

    UAV ad hoc network link prediction based on deep graph embedding by Jian SHU, Qining WANG, Linlan LIU

    Published 2021-07-01
    “…Aiming at the characteristics of the UAV ad hoc network (UAANET), such as topological temporal-varying, node mobility and intermittent connection, a temporal graph embedding model was proposed to present the preprocessed UAANET.To improve the sampling efficiency, the sampling interval was calculated based on linear probability.The network structure features were mapped to the relationship between nodes, and the contextual semantic features of nodes were extracted by adversarial training.With the help of long and short-term memory network, the temporal characteristics of the UAANET were extracted to predict the connection at the next moment.AUC, MAP, and Error Rate were employed as evaluation indexes.The simulation experiments based on NS-3 show that compared with Node2vec, DDNE and E-LSTM-D, the proposed method has a better accuracy.…”
    Get full text
    Article
  3. 4803

    Usages des TIC et rapports a l’incertitude en situation de catastrophes naturelles by Claire Brossaud

    Published 2008-11-01
    “…This article shows how professionnals and disaster victims involved in natural catastrophes in three different areas - Limoges storm in 1999, Abbeville and Bourg-en-Bresse floods in 2001 and 2005 – built a commun risk story with Information and communication technologies (ICT) : Internet, mobiles, data bases, groupware, etc. At first, ICT uses are concretely approached before, during and after the events in a historic context where sciences and technology are growing up to reduce uncertainties of medical and ecological threats. …”
    Get full text
    Article
  4. 4804

    Key technologies of NR multicast and broadcast services by Xiayan XU

    Published 2022-07-01
    “…Internet protocol television (IPTV), group communication and other applications are regarded as multicast/broadcast services.5G cellular mobile communication system should support the transmission of such application data efficiently.Firstly, the basic architecture of 5G multicast/broadcast system based on NR was analyzed according to the different transmission modes of multicast/broadcast application data from 5GC to UE via gNB.Then, the key technologies of 5G multicast/broadcast radio transmission were analyzed in detail from the aspects of air interface protocol stack, physical layer and higher layer protocol enhancements, service process and service continuity, etc.Finally, the evolution trends of 5G multicast/broadcast technology were prospected.…”
    Get full text
    Article
  5. 4805

    Iconografia das fronteiras das Guianas by Gutemberg de Vilhena Silva, Clicia Vieira Di Miceli, Brenda Farias da Silva

    Published 2019-03-01
    “…The central assessment is that all the complexity present at the borders of the Guianas is the result of centuries of occupation, mobilities and conflicts. In general, various institutional arrangements on a variety of topics related to that geographical space are more complex than usual, since the decisions to "open" or "close" in the border interactions consider all the political and economic dynamics that the countries have and whose reflections are felt directly or indirectly in border cities.…”
    Get full text
    Article
  6. 4806

    Development trends of the information technology and cyberspace security by Feng-hua LI

    Published 2015-12-01
    “…The basic characteristics,mutual differences and intrinsic relationships of the internet,mobile internet,internet of things,cloud computing and big data technologies were analyzed,and the evolutions of the information technology and information service mode were deeply studied,the spiraling development trends of information technology and our catching up opportunities were explored,and that the major problem in next generation of in-formation technology was energy consumption was pointed out.Based on the analysis,the security requirements and challenges of the network connections,Industrie 4.0 issues in our cyberspace were analyzed,and that the research on security technology should be synchronized with the development of information technology was presented.Finally,the development opportunities and strategies of our cyberspace security were concluded,and an outlook of the de-velopment trends of the cyberspace security was given.…”
    Get full text
    Article
  7. 4807
  8. 4808

    Rapport au savoir en EPS à l’école primaire by Marie-Paule Poggi, Mathilde Musard

    Published 2014-06-01
    “…The aim is to better understand the sense the students give to the learning settings and to identify which registers of activities they mobilize to succeed and learn in PE. Sixty-five students from 10 different classes (from CE1 to CM2), stemming from two sociologically contrasted schools, were questioned in the form of interviews during the lesson. …”
    Get full text
    Article
  9. 4809

    Collection Tree Extension of Reactive Routing Protocol for Low-Power and Lossy Networks by Jiazi Yi, Thomas Clausen

    Published 2014-03-01
    “…The Lightweight On-Demand Ad hoc Distance Vector Routing Protocol-Next Generation (LOADng) is a reactive distance vector protocol which is intended for use in mobile ad hoc networks and low-power and lossy networks to build paths between source-destination pairs. …”
    Get full text
    Article
  10. 4810

    Renaissance arabe et solidarité musulmane dans La Nation arabe by Anne-Claire de Gayffier-Bonneville

    Published 2002-04-01
    “…The journal had an activist stance which was original for that time : it intended to mobilize Arabs and Muslims not only towards fighting the occupying powers but also towards fighting against the Zionist project which threatened the territorial integrity of Palestine and which symbolised the Arab nation.…”
    Get full text
    Article
  11. 4811

    Does tax competition make tax reform essential? by Maja Klun

    Published 2006-10-01
    “…Tax policy measures that tax mobile or foreign capital at significantly lower rates are known as harmful tax competition. …”
    Get full text
    Article
  12. 4812

    Contribution of geotagged Twitter data in the study of a social group’s activity space by Alexandre Cebeillac, Yves-Marie Rault

    Published 2016-12-01
    “…Using a sample of luxury shoppers, we analyzed the daily activity and mobility patterns of the upper middle class in Delhi, India. …”
    Get full text
    Article
  13. 4813

    L’espace urbain algérois à l’épreuve de ses graffiti by Karim Ouaras

    Published 2015-06-01
    “…The analysis gives meaning to the types of discourses and representations mobilized by graffiti in Algiers urban space…”
    Get full text
    Article
  14. 4814

    Militantisme et identités gaies et lesbiennes : quelle identité pour quels objectifs ? by Guillaume Marche

    Published 2008-05-01
    “…The lesbian, gay, bisexual and transgender (LGBT) movement is split as to whether it should mobilize exclusively around issues narrowly defined in terms of sexual orientation. …”
    Get full text
    Article
  15. 4815

    Vehicular ad hoc network and clustering routing algorithm applied in wilderness scenarios by Mohsen MOHAMED, Kai-kai XU, Wei-wei XIA, Yi WU, Lian-feng SHEN

    Published 2012-10-01
    “…To solve the communication problem among vehicles in wilderness scenarios such as desert and Gobi or between the vehicles and the outside,a special architecture of VANET was proposed and its clustering and routing algorithm was analyzed.Based on different types of communication terminals each vehicle equips and the location,speed and driving direction information of the periodic message,the vehicles are organized into different clusters.The head of each cluster chooses the best route for its members when they ask for inner-clustering communications or inter-clustering communications.It also searches the nearest vehicle which equips satellite communication terminals or land mobile communications terminals to forward messages when a member requests communicating with the outside of the network.Simulation results show that the proposed algorithm has higher network stability,higher data delivery ratio and less routing overhead.…”
    Get full text
    Article
  16. 4816

    Task offloading and resource allocation in NOMA-based ultra-dense MEC networks by Yun SHENG, Chen XU, Guangyuan ZHENG

    Published 2022-02-01
    “…In order to improve spectrum efficiency and meet the service demands of massive users, a non-orthogonal multiple access (NOMA)-based ultra-dense mobile edge computing (MEC) system was considered.In order to solve the serious communication interference caused by simultaneous offloading of multiple users and make efficient use of edge server resources, a joint task offloading and resource allocation scheme was proposed to minimize the system energy consumption while meeting the quality of service (QoS) of all users.Offloading decision, power control, computation resource and subchannel resource allocation were jointly considered in the proposed scheme.Simulations results show that the proposed scheme can efficiently lower system energy consumption compared to the other offloading schemes.…”
    Get full text
    Article
  17. 4817

    Dynamic and electrophoretic light scattering measurements on microtubules at low concentrations. by Annitta George, Ernesto Alva, Lorenzo Brancaleon, Marcelo Marucho

    Published 2024-01-01
    “…This method ensures accurate and reproducible results on essential microtubule filament parameters such as the diffusion coefficient (D) and electrophoretic mobility (μ) from which other structures' hydrodynamics, electrical, and stability properties can be elucidated.…”
    Get full text
    Article
  18. 4818

    Application protection in 5G cloud network using zero trust architecture by Guofeng HE

    Published 2020-12-01
    “…Based on the analysis of security requirements in the era of 5G cloud-network convergence,the basic principles of zero trust were studied,including not rely on location,untrusted traffic,and dynamic access control.The basic architecture of zero-trust was studied,combining with 5G cloud network architecture,the feasible application protection solutions include the customer-built OTT model,the use of the existing VPDN model,and the public zero-trust architecture model was proposed and compared.The application scenarios of customers in 5G cloud network were analyzed,including remote access,secure cloud,mobile office,etc.In these scenarios,the value that zero-trust architecture can bring to customers was proposed,such as application hiding and dynamic control,ensure the application safety.…”
    Get full text
    Article
  19. 4819

    Mainstreaming Urban Interventionist Practices: the Case of the BMW Guggenheim Lab in Berlin by Monika Grubbauer

    Published 2013-06-01
    “…Financed by the German BMW group and realised by the Solomon Guggenheim Foundation, the project addresses issues of contemporary urban life in the form of a ‘mobile laboratory’ with an explicit emphasis on participatory forms of urban intervention. …”
    Get full text
    Article
  20. 4820

    Stepped impedance patch antenna for sub-6GHz 5G range by Hamza Becirspahic, Sehabeddin Taha Imeci

    Published 2023-10-01
    “… This article presents the design of a stepped impedance patch antenna for fifth generation mobile communication networks application. A large tendency towards the new generation is what drives this research. …”
    Get full text
    Article