Showing 4,821 - 4,840 results of 8,265 for search '"mobilization"', query time: 0.06s Refine Results
  1. 4821

    Social Media Narratives as Political Fan Fiction in the 2016 U.S. Presidential Election by Pekka Kolehmainen

    Published 2017-08-01
    “…Looking at how social media operated as a network of varied public imaginations, the article explores the distinct temporalities around Hillary Clinton, Bernie Sanders, and Donald Trump and explicates how different media logics influenced the ways that the past, the present, and the future were mobilized in narrative formations around each candidate.…”
    Get full text
    Article
  2. 4822

    Intérpretes e notáveis da literatura e da cultura popular do Maranhão by Igor Gastal Grill, Eliana Tavares dos Reis

    Published 2017-01-01
    “…Thereby, the conditioning factors of affirmation, the logics of action and mechanisms of consecration mobilized by agents who constitute as authorized spokespersons are learned, as well as the multiple patterns of notabilization of “interpreters” of the culture and the regional memory in and of Maranhão.…”
    Get full text
    Article
  3. 4823

    Technical solution and application of 5G slicing private network based on cloud-network integration by Kai CHEN

    Published 2022-07-01
    “…Facing the diversified and personalized business needs of vertical industries, 5G network slicing can provide customized, secure, and intelligent services.Combined with OTN, IPRAN/STN resources, cloud resources, cloud-network integration, and fixed-mobile integration system capabilities, 5G network slicing enables customer terminals, wireless base stations, bearers, cores and intranet service platforms communicate through private network isolation channels.The architecture scheme and key technologies of the 5G end-to-end private slicing network were introduced, the difficulties encountered in the automatic opening of private slicing networks under the new-generation operating system was analyzed, and solutions was proposed, which would promote operators from traffic management to resource management era.…”
    Get full text
    Article
  4. 4824

    L’utilisation du concept polysémique de résilience : une analyse empirique en zone côtière by Idrissa Oumar Kane, Jean-Paul Vanderlinden

    Published 2015-11-01
    “…Resilience, as a concept, is now widely used for the analysis of adaptation to climate change in coastal areas. This concept is mobilized by many disciplinary fields and it is thus associated to a high variety of meanings and contexts. …”
    Get full text
    Article
  5. 4825

    Potential and methods of wireless communications for Internet of things based on UAV by Qingheng SONG, Fuchun ZHENG

    Published 2019-03-01
    “…In the absence of terrestrial infrastructure for Internet of things (IoT),an effective low-cost wireless connection can be provided by an unmanned aerial vehicle (UAV) based wireless communication platform.Compared with the terrestrial IoT communication platform,the low-altitude UAV wireless communication system enjoys the advantage of rapid deployment,low cost,on-demand deployment,flexible configuration and better communication channel quality due to short-range line-of-sight links.On the other hand,several new challenges must be overcome due to the high mobility and energy consumption limitations of UAV.An overview of UAV enabled IoT wireless communication was provided,including the air-to-ground channel model,the power consumption model,as well as the applications in UAV based data dissemination/collection and relay,with particular reference to the new opportunities and solutions in these application areas.…”
    Get full text
    Article
  6. 4826

    Science as a Resource for Territorial and Tourism Development of Mountainous Areas of Chilean Patagonia by Fabien Bourlon, Yannick Vialette, Pascal Mao

    Published 2022-05-01
    “…Project leaders are promoting specific scientific research underway in the territory. Science is mobilized as a resource in the creation of products, recreational and educational activities, commercial or non-profit. …”
    Get full text
    Article
  7. 4827

    Electrodynamics of Radiating Charges by Øyvind Grøn

    Published 2012-01-01
    “…It is shown that the resolution of an electromagnetic “perpetuum mobile paradox” associated with a charge moving geodetically along a circular path in the Schwarzschild spacetime requires the so-called tail terms in the equation of motion of a charged particle.…”
    Get full text
    Article
  8. 4828

    2018–2019 Florida Citrus Production Guide: Best Management Practices for Soil-Applied Agricultural Chemicals by Joseph W. Noling, Lawrence R. Parsons

    Published 2019-01-01
    “…These BMPs must consider the soil properties of the application site and the mobility and toxicity of agrichemicals in soil, particularly with regard to rainfall and irrigation practices. …”
    Get full text
    Article
  9. 4829

    VM migration across subnets in future internet architecture—XIA by Hong-wei MENG, Zhong CHEN, Zi-qian MENG, Chuck SONG

    Published 2016-03-01
    “…When a VM migrates among hosts residing in two IP subnets,the network attachment point of VM changed,which causes the IP mobility problem.It was meaningful to design and evaluate VM migration performance under the future internet architecture.XIA (expressive Internet architecture)was focused,a novel future internet architecture,sup-port for VM live migration.Motivated by the natural f res of ID/location decoupling,versatile routing with DAG (di-rected acyclic graphs) in XIA,The design and implementation of rendezvous agent based migration (RABM) approach was given.In demonstrate that XIA supported VM migration can achieve fast network re-connection between VM and correspondent node,while keeping the network control plane simplicity and data plane efficiency.…”
    Get full text
    Article
  10. 4830

    A Wild Bunch: Older “Funny Girls” and the Small Screen by Franziska Röber

    Published 2024-09-01
    “…Particular attention is paid to the question of humor and the domestic spaces (older) women inhabit and how these spaces may be mobilized by older women in order to be “funny” and behave “badly” without being punished.…”
    Get full text
    Article
  11. 4831

    UAV-enabled integrated sensing and communication:architecture, techniques, and future vision by Chenxi LIU, Rui MA, Mugen PENG

    Published 2023-02-01
    “…UAV emergency communication has been regarded as a typical application of the sixth generation mobile communication system (6G), and it can be flexible deployed and provide on-demand services.Meanwhile, integrated sensing and communication (ISAC) is a key feature and enabling technology for 6G.With the aid of the ISAC techniques, the spectral efficiency and the sensing accuracy of UAV emergency communication can be improved, while the system costs can be simultaneously reduced.However, how to efficiently integrate the ISAC techniques into the UAV emergency communication remains a hot and challenging research issue for both the academia and industry.Against these backdrops, a UAV-enabled ISAC architecture was proposed.Then, the fundamental principles that supported the proposed architecture were discussed.Finally, the future directions and challenges in UAV-enabled ISAC were provided.…”
    Get full text
    Article
  12. 4832

    6G: typical applications, key technologies and challenges by Ning LUAN, Ke XIONG, Yu ZHANG, Ruisi HE, Gang QU, Bo AI

    Published 2022-03-01
    “…2020 marked the first year of the era of 5G commercialization in China and the inception of worldwide research in 6G.Compared with 5G networks, 6G networks will have larger information capacity, higher transmission rate, lower transmission delay, larger number of connected devices, higher spectrum efficiency, higher energy efficiency, and can support applications with higher mobile speed.Therefore, 6G networks will involve many new key technologies and also face many challenges.The background, development, typical applications, performance indicators, network architecture, key technologies and future challenges of 6G were systematically reviewed, which are expected to provide some reference for future 6G networks related research.…”
    Get full text
    Article
  13. 4833

    Reconversion de friches militaires : le refuge culturel comme dispositif unique en son genre by Fabien Jakob

    Published 2019-02-01
    “…Thanks to a pragmatic approach inspired by the sociology of emancipation (Boltanski & Thévenot, 1991) under which the commitment to action is coordinated around a shared conception of common good (civic, industrial, inspired, fame, domestic and market), it aims at analyzing the heterogeneous representations and actions registers which are mobilized during this reassignment attempting a compromise between technical, cultural dimensions, market concerns, political issues and diplomatic aspirations.…”
    Get full text
    Article
  14. 4834

    Enjeux communicationnels des recherches partenariales dans le contexte des open labs by Valérie Lépine, Fabienne Martin-Juchat

    Published 2020-12-01
    “…These conditions question the teacher-researcher’s identity in partnership research, such as: the quality of inter-comprehension, the level of construction of a shared language, the emergence of a community of exchanges and practices––foundation of cooperation, the degree of reflexivity, and the emotional and relational skills mobilized. These conditions are necessary but not sufficient for the co-production of knowledge and methods.…”
    Get full text
    Article
  15. 4835

    Du carbon lock-in au nuclear lock-in : les verrous spatiaux aux changements de politique nucléaire en Suède by Teva Meyer

    Published 2017-11-01
    “…These path dependencies are constituted by the material features of the energy system – elements upon which the involved political actors project their own values and norms, and, either unconsciously of strategically, mobilize spatial representations.…”
    Get full text
    Article
  16. 4836

    A long-time & short-time prediction based 5G base station energy-saving policy by Miaomiao ZHANG, Hao ZHAO, Yan ZHOU, Yang ZHANG, Li YU, Yanping LIANG, Chunjie FENG

    Published 2022-11-01
    “…With the development of the mobile communication technology and the acceleration of 5G commercial network deployment, energy consumption of 5G, which will continue to raise the operating expense significantly.How to maximize the energy efficiency while ensuring service experience and equipment safety has always been one of the research focus in the industry.With the challenges including complexity of network architecture and variety of base station types, an AI-based energy-saving technology including policy generation and closed-loop security assurance of “perception, prediction, analysis, and decision” was introduced.After calibration and validation based on the offline dataset, the false-switch-off rate is less than 2%, and the recall rate is not fewer than 84%.Further study shows that the technology has greater potential on energy-saving.…”
    Get full text
    Article
  17. 4837

    Key technologies and solutions of 5G high-speed railway wireless network by Yanhong JIAO, Tao WANG, Fuqiang LI, Xiangchen MA, Wenbin YAO

    Published 2020-08-01
    “…High-speed railway has become a part of daily life.It is very important to provide high-quality mobile communication network for high-speed railway users in 5G era.The technical challenges faced by high-speed railway construction after entering the 5G era were analyzed,and on this basis,the key technologies of 5G high-speed railway network,equipment selection,transmission resource demand analysis were analyzed and solutions were put forward.Based on the above technical analysis,combined with the actual network construction demand,construction scenarios,current network conditions and investment,5G high-speed railway wireless network construction scheme could be formulated accurately and efficiently according to local conditions.…”
    Get full text
    Article
  18. 4838

    Construction of Information Security System of Power Generation Enterprise by Ying Yu

    Published 2014-01-01
    “…Based on this analysis, a five-level business system, as the network management, border security protection, mobile access security, host security, application security, was designed for power generation enterprise security reinforcement. …”
    Get full text
    Article
  19. 4839

    Variabilité hydrologique et vulnérabilité des populations du Lago Janauaca (Amazonas, Brésil) by Guillaume Drapeau, Catherine Mering, Josyane Ronchail, Naziano Filizola

    Published 2011-03-01
    “…Droughts appear to be the major disturbances, not only because of their impact on crops, but mostly because of the difficulties they imply for local and regional mobilities.…”
    Get full text
    Article
  20. 4840

    Empirical research on the diffusion effect of ICT innovation diffusion and prediction in China by Wenyu HU, Wenju WANG

    Published 2020-01-01
    “…Based on the characteristics of information and communication technology (ICT) in China,an empirical study was made on the diffusion effect of ICT innovation using Bass extension model.The results show that the curve fitting estimation effect of genetic algorithm was remarkable.In addition,non-cumulative adopter model was used to empirically analyze the diffusion effect of ICT innovation from the aspects of technology evolution,business,region and provinces.It was concluded that innovation diffusion was significantly driven by innovation effect along with the evolution of ICT,especially 3G/4G,broadband Internet,digital TV and their convergent business.Finally,the non-cumulative Bass model using genetic algorithm were used to predict the user size of fixed-line,mobile,broad-band,radio and television in the next five years.…”
    Get full text
    Article