Suggested Topics within your search.
Suggested Topics within your search.
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Mobile communication systems 2
- ART / Digital 1
- African literature 1
- Anti-Infective Agents 1
- Anti-infective agents 1
- Authors, Nigerian 1
- Certification 1
- Chemotherapy 1
- Communicable diseases in children 1
- Communication in rehabilitation 1
- Computer animation 1
- Criticism and interpretation 1
- Digital cinematography 1
- Digital techniques 1
- Electronic data processing personnel 1
- Examinations 1
- Graphical user interfaces (Computer systems) 1
- Historiography 1
- History 1
- History and criticism 1
-
5001
ANALYSIS OF CHANGES IN TRANSPORT PROCESSES IN WARSAW PUBLIC TRANSPORT IN THE FACE OF DISRUPTIONS IN 2019-2022
Published 2024-09-01“…Passenger transport is a key element of sustainable development and improving the quality of life in agglomerations because it provides mobility for residents and tourists. In recent years, residents have become increasingly willing to use public transport. …”
Get full text
Article -
5002
Coupling linear virtual element and non-linear finite volume methods for poroelasticity
Published 2023-11-01“…As a continuation, we here propose an extension of this study to more general polyhedral meshes and to heterogeneous anisotropic mobility tensors for the flow equations. At this occasion, a general finite-volume framework, which includes non-linear or sushi finite volume methods for instance, is introduced to extend this analysis.…”
Get full text
Article -
5003
On-demand key management based on social attribute for opportunistic networks
Published 2012-12-01“…An on-demand key management scheme was proposed based on social attributes,which could conform to the characteristics of intermittent connectivity,high mobility and self-organized management in opportunistic networks.By utilizing the identity-based threshold signature scheme,the authentication of nodes’social attributes was realized.Due to the specialty of the opportunistic routing protocols,nodes selectiv ly issued the identity certificates for each other to establish the Web of trust based on the matching of social attributes.Consequently,the performance of certificate graph was efficiently optimized comparing to the traditional met .Meanwhile,thanks to checking the social attribute evidences,the invalid certificate chains caused by malicious nodes were avoid to be built.Simulation result shows that,the scheme can provide high success ratio for reconstruction of certificate chains and high user reachability through low network costs in opportunistic networks.…”
Get full text
Article -
5004
A Rare T2-T3 Synovial Facet Cyst Causing Progressive Myelopathy
Published 2021-01-01“…Synovial cysts usually present in the more mobile lumbar and cervical parts of the spine; however, they may also arise in the thoracic spine. …”
Get full text
Article -
5005
Spatio-temporal aware privacy-preserving scheme in LBS
Published 2018-05-01“…Location-based service (LBS) brings a lot of conveniences in people’s daily life,but the conveniences are accompanied with the leaking of privacy.A dummy-based location-preserving scheme was proposed,which took the correlation between spatial issues and temporal issues into account.Two algorithms were included in this scheme,map dividing algorithm and dummy contents determining algorithm.The map dividing algorithm divided the map into discrete location cells by Voronoi Diagram to ensure these discrete location cells were not adjacent to each other.The dummy contents determining algorithm replaced the query content in previous moment by the intending location in next moment,which efficiently avoided the adversary inferring mobile users’ sensitive information according to the correlation between spatial issues and temporal issues.The simulation experiments show that the proposed scheme is effective and efficient.…”
Get full text
Article -
5006
Design and Analysis of a Kind of Low Coupling 2T2R Parallel Mechanism
Published 2018-01-01“…The results show that the mechanism is four degrees of freedom,the mobile platform can achieve two translation and two rotation. …”
Get full text
Article -
5007
Resource Allocation with MAC Layer Node Cooperation in Cognitive Radio Networks
Published 2010-01-01“…A fuzzy logic reasoner is utilized in order to take into account the effect of the coexistence of a large number of users in the interference as well as to cope for uncertainties in the message exchange, caused by the nodes' mobility and the large delays in the updating of the necessary information. …”
Get full text
Article -
5008
Review on unmanned aerial vehicle covert communication network
Published 2023-08-01“…Unmanned aerial vehicle (UAV) communication network is an important part of the future integrated space-aerial-ground network, and an effective support to achieve the global three-dimensional coverage of the communication network.The open characteristics of wireless channels make UAV communication vulnerable to malicious attacks by illegal users.Covert communication provides a promising solution for improving the security defense and privacy protection capabilities of UAV communication.However, the overlapping characteristics of the mobility of UAV systems and the requirements of covert communication scenarios bring severe challenges to the collaborative optimization of network resources.The UAV covert communication network was investigated from requirements, challenges, framework and main technologies perspectives.The architecture and model, performance characteristic, as well as potential candidate technologies were analyzed and discussed, in an attempt to outline the overall framework of UAV covert communication, and provide guidance for the subsequent research on UAV covert communication.…”
Get full text
Article -
5009
Technological Addictions: Disease or Adaptive Behavior?
Published 2017-04-01“…It has emerge the idea of addiction to video games, to mobile, to the internet and in recent years, to social networks, among others; however, to what extent they are true addictions, is a subject of deep debate, since they are not recognized as diseases in the current official classifications. …”
Get full text
Article -
5010
TLC-densitometric analysis of allantoin in Symphytum officinale L. roots
Published 2020-03-01“…The results of TLC quantification were compared with HPLC analysis carried out on a HILIC Luna NH2 100A column, with mobile phase consisting of acetonitrile/water 80:20 (V/V) and UV detection at 190 and 210 nm. …”
Get full text
Article -
5011
Determination of Self-Development in the Vocational Educational Environment
Published 2015-02-01“…The authors make the conclusion that the self-development prospects are determined by the internal and external motivation, professional mobility and striving for success. The determination specificity of professional self- development, identified by the authors, can provide the psychological basis for future specialists training.…”
Get full text
Article -
5012
Professional know-how and MSD prevention: conceptual and methodological reflection leading to their identification and the start of their construction
Published 2008-11-01“…The ergonomic approach developed in this study and a theoretical framework resulting from practice have helped to uncover the wealth of knowledge that is mobilized in manual labor.…”
Get full text
Article -
5013
An incentive mechanism with bandwidth allocation for federated learning
Published 2022-12-01“…Federated learning (FL) is an emerging machine learning paradigm that can make full use of crowd sourced mobile resources for training on decentralized data.However, it is challenging to deploy FL over a wireless network because of the limited bandwidth and clients’ selfishness.To address these challenges, an incentive mechanism with bandwidth allocation (IMBA) was proposed.Considering the difference between clients' data quality and computing power, IMBA designs a payment scheme to incentivize high-quality clients to contribute their computing resources, thus improving the training accuracy of the model.By minimizing the weight sum of training time and payment cost, the optimal payment and bandwidth allocation scheme was determined, and the training delay was reduced by optimizing bandwidth allocation.Experiments show that IMBA effectively improves training accuracy, reduces the training delay and helps the server flexibly balance training delay and hiring payment.…”
Get full text
Article -
5014
Interdisciplinarité, sciences impliquées et participation citoyenne, un nouveau mode de production de connaissances au service de la transition sociale et écologique
Published 2023-09-01“…This approach consists in mobilizing knowledge of different natures and scopes, both from the academic world and from the vernacular experiences. …”
Get full text
Article -
5015
Design and Simulated Characteristics of Nanosized InSb Based Heterostructure Devices
Published 2014-01-01“…In addition, InSb has the property of high saturation velocity and mobility which results in higher performance of the device than any other materials in III-V compounds.…”
Get full text
Article -
5016
Deciphering the safeguarding role of cysteine residues in p53 against H2O2-induced oxidation using high-resolution native mass spectrometry
Published 2025-01-01“…Here, we employed native mass spectrometry (MS) and ion mobility (IM)-MS coupled to chemical labelling and H2O2-induced oxidation to examine the mechanism of redox regulation of the p53-p21 complex. …”
Get full text
Article -
5017
Liquid Chromatographic Method for Determination of Nisoldipine from Pharmaceutical Samples
Published 2010-01-01“…The method uses aluminum plates pre-coated with silica gel 60F-254 as stationary phase and cyclohexane-ethyl acetate-toluene (3:3:4, v/v/v) as mobile phase. Linearity was established over a range of 400-2400 ng per zone. …”
Get full text
Article -
5018
Backhaul carrying scheme of TD-LTE microcell base station
Published 2016-04-01“…How to build an efficient,safe and intelligent backhaul network solution for MiBS was investigated. Based on China Mobile’s current network,PON+CMNet,PTN+CMNet,PON+PTN,PTN end-to-end four kinds of small cell backhaul network solutions were proposed and furtherly tested and verified. …”
Get full text
Article -
5019
Scene Construction and Application of Panoramic Virtual Simulation in Interactive Dance Teaching Based on Artificial Intelligence Technology
Published 2022-01-01“…Due to the research capabilities and practical value of mobile video technology, it is widely used in advanced fields, such as video animation production, rehabilitation medicine, sports training, and game software, effectively realizing the connection between the three-dimensional world and the simulation world. …”
Get full text
Article -
5020
Structure Design and Static Analysis of the Underactuated Three-knuckle Manipulator with a Reverse Rope-pulley Mechanism
Published 2023-12-01“…Secondly, simplified modeling, kinematic envelope grasping simulation and static grasping contact force simulation are carried out for the three-knuckle manipulator. The mobile envelope grasping ability of the three-knuckle manipulator is shown by the simulation results. …”
Get full text
Article