Suggested Topics within your search.
Suggested Topics within your search.
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Mobile communication systems 2
- ART / Digital 1
- African literature 1
- Anti-Infective Agents 1
- Anti-infective agents 1
- Authors, Nigerian 1
- Certification 1
- Chemotherapy 1
- Communicable diseases in children 1
- Communication in rehabilitation 1
- Computer animation 1
- Criticism and interpretation 1
- Digital cinematography 1
- Digital techniques 1
- Electronic data processing personnel 1
- Examinations 1
- Graphical user interfaces (Computer systems) 1
- Historiography 1
- History 1
- History and criticism 1
-
5081
Joint optimization of transmission and edge offloading for energy-aware point cloud video streaming
Published 2024-05-01“…To solve this problem, a point cloud video streaming transmission scheme assisted by mobile edge computing (MEC) was proposed, which offloaded part of computing tasks to the MEC server based on the access bandwidth and point cloud video content. …”
Get full text
Article -
5082
Two-hop cover-based access control scheme for wireless sensor networks
Published 2010-01-01“…In order to support randomly moving users,a THC(two-hop cover) algorithm and a two-hop cover-based ac-cess control scheme were proposed.The proposed algorithm made two-hop nodes be able to retrieve access control in-formation of user’s in time through diffusing the information periodically.The scheme based on THC algorithm,the se-curity mechanisms of Merkle hash tree and one way chain,as well as distributed access control mode,its main contribu-tion was it supports randomly moving users for the first time.The analyses and experiments have shown that the pro-posed scheme can be applied to both mobile and stationary user and have several advantages over the current access con-trol methods of low cost in computation,communication and storage,and resistance to node capture,query replay and DoS attacks.…”
Get full text
Article -
5083
App Fiction and ‘Postdigital Culture’
Published 2024-10-01“…The turn of 2015 and 2016 saw the release of three novels in the form of mobile device applications that might be recognized with the benefit of hindsight as paving the way for a new distinct genre of digital fiction. …”
Get full text
Article -
5084
Se « protéger » derrière son nez rouge ? Le travail émotionnel des artistes-clowns à l’hôpital
Published 2023-12-01“…Based on an interactionist perspective, this analysis: 1) examines the emotional labour that clowns conduct in their daily work in hospitals; and 2) shows how their work organization can be mobilized to regulate emotions. By taking a close look at the specificities of the clowns’ practices, this paper opens up new paths to analyze the multiple ways emotions can serve each performance.…”
Get full text
Article -
5085
Treasury Pattern Analysis and Application Based on Security Control Platform
Published 2013-06-01“…Through the investigation and analysis of various application scenarios for Guangxi mobile network operation center treasury management, trigger mode, authorization model and working efficiency optimization of treasury management were analyzed, designed and implemented. …”
Get full text
Article -
5086
A Novel 3D Indoor Localization Scheme Using Virtual Access Point
Published 2014-04-01“…Therefore, merely by scanning the WLAN signals, mobile users can detect their location indoors.…”
Get full text
Article -
5087
Robot Trajectories Comparison: A Statistical Approach
Published 2014-01-01“…The task of planning a collision-free trajectory from a start to a goal position is fundamental for an autonomous mobile robot. Although path planning has been extensively investigated since the beginning of robotics, there is no agreement on how to measure the performance of a motion algorithm. …”
Get full text
Article -
5088
A Case of Hydrocele Stone with Its Composition Analysis
Published 2010-01-01“…Hydrocele stones are freely mobile calcified bodies lying between the tunica vaginalis layers, and they are relatively rare. …”
Get full text
Article -
5089
Research on agricultural IoT pest and disease image recognition algorithm based on STM32
Published 2023-12-01“…In modern agriculture IoT systems, edge computing is an indispensable component.In this context, it is feasible to deploy lightweight pest and disease image recognition tasks on edge devices.However, due to the constraints of device computation and storage capabilities, this task faces significant challenges.To address these challenges, an economically practical method was proposed for pest and disease image recognition on STM32 edge devices.Specifically, the MobileNetv2 structure was improved to better suit the characteristics of STM32, quantization-aware training technique was used to compresses the network, model portability was enhanced.Meanwhile, the X-CUBE-AI was used to arrange the model and evaluate the performance.Experimental results demonstrate that the proposed model not only ensures image classification accuracy but also reduces the Flash and RAM resource consumption on STM32 compared to other lightweight networks.…”
Get full text
Article -
5090
Pre-authentication and group management based secure handover for space-earth integration network
Published 2016-07-01“…In space-earth integration network,high-speed movement of space nodes brings in the problem of fre-quent satellite access router (SAR) handover.A group-based secure handover scheme for multiple mobility nodes (MN) utilizing satellite trajectory prediction was proposed.By using the movement features of the corresponding entities,an efficient aggregation mechanism for the interaction message occurred during the multi-MN handover was put forward.By using predictable satellite trajectory,authentication and session key agreement between new SAR and MN was accomplished beforehand with the secure context.Compared with existing schemes,the proposed scheme can provide necessary security features,lower the handover delay,and reduce the computation and commu-nication overhead of mutual authentication and key agreement.The proposed scheme well suits the space-earth inte-gration network,where the satellite node is energy constraint.…”
Get full text
Article -
5091
Development and Validation of High Performance Liquid Chromatographic Method for Determination of Lamivudine from Pharmaceutical Preparation
Published 2010-01-01“…A Thermo BDS C18 column in isocratic mode, with a mobile phase consisting of 0.01 M ammonium dihydrogen orthophosphate buffer adjusted to pH 2.48 by using formic acid and methanol in the ratio of 50:50 was used. …”
Get full text
Article -
5092
Pensare la sovranità alimentare nell’Europa d’Oltremare: Aruba, Saint-Pierre e Miquelon, Belep (Nuova Caledonia)
Published 2024-06-01“…We will explore the ways in which three different and distant societies of the European archipelago navigate the interwining of colonialism and autonomy, rights of access to land and sea, insularity and isolation, mobility and regional relations, to trace their own forms of food sovereignty: Aruba (NL), Saint-Pierre and Miquelon (FR) and the Belep Islands (Kanaky New Caledonia - FR).…”
Get full text
Article -
5093
Results of the GreenCleanS Project funded by the Science Fund of the Republic of Serbia
Published 2024-01-01“…The technology development includes experimental work at the laboratory scale and pilot scale level (technology readiness level, TRL 4), as well as the demonstration of the technology in an operational environment, involving the treatment of 3 tons of oil in a mobile desulfurization unit to achieve TRL 7. The implementation of this innovative technology will contribute to reducing the number of transformer failures caused by mineral oils containing S₈, a highly corrosive compound.…”
Get full text
Article -
5094
Insights into multiscale chemical characterisation for the understanding of berry maturation
Published 2025-01-01“…Known methods in wine analysis, such as phloroglucinolysis, were complemented with methods usually applied to other food products and rarely or never on grapes or wines, such as solid-state NMR and NMR water mobility by 1H MRI. The feasibility of merging these methods was validated on this first trial. …”
Get full text
Article -
5095
Calculation-experimental method for determining the initial geometric parameters of rubber-cord shell of rotation
Published 2019-06-01“…The results of the study are of interest in the design of systems for shock and vibration protection of technical objects, such as underground and mobile complexes of strategic missile launchers, aircraft electronic equipment and general-purpose vehicles…”
Get full text
Article -
5096
Dynamic power control scheme based on fractional frequency reuse for D2D communication
Published 2016-09-01“…By reusing the resource of existing cellular users,D2D (device-to-device)communication underlaying cellular network can improve the spectrum utilization rate and reduce the power consumption of mobile terminals.However,it will bring interference to the existing cellular networks.In order to ensure the quality of service of D2D users and cellular users,the power control and resource allocation scheme for D2D communication underlaying cellular communications was studied.Specifically,fractional frequency reuse was introduced to achieve the resource partitioning and resource reuse between cellular users and D2D users.Based on the principle of maximizing the throughput of the whole system,the optimization objective was established.Combined with the fractional power control and introduction of interference limits,a dynamic power control strategy was proposed.Simulation results show that the proposed scheme improves the performance of the overall system.…”
Get full text
Article -
5097
The Coral Reefs Optimization Algorithm: A Novel Metaheuristic for Efficiently Solving Optimization Problems
Published 2014-01-01“…In this research the CRO algorithm is tested in several continuous and discrete benchmark problems, as well as in practical application scenarios (i.e., optimum mobile network deployment and off-shore wind farm design). …”
Get full text
Article -
5098
Development and experiment research of 25 Gbit/s passive optical network
Published 2017-02-01“…With the new service development of high-definition video and virtual reality and the requirement of transporting the fifth generation mobile fronthaul/backhaul signals,passive optical network (PON)is required to transmit signals above 10 Gbit/s.When the line rate is above 10 Gbit/s,chromatic dispersion and power budget are the main constraint factor of system performance.Development and difficulty of 25 Gbit/s PON were introduced.25 Gbit/s PON was studied in experiment using 25 Gbit/s EML laser with zero dispersion wavelength,25 Gbit/s APD and 10 Gbit/s APD.Experiment results show that 32 dBm optical power budget(N2 level in 10 Gbit/s symmetric EPON)was achieved when EML transmit optical power is+5 dBm and 25 Gbit/s APD is used without optical amplifier.…”
Get full text
Article -
5099
Design and Analysis of a Novel Micromanipulation Robot Mechanism
Published 2018-01-01“…Therefore,a hybrid robot mechanism for micromanipulation with three translation and two rotation of five degrees of freedom (DOF) is presented. Firstly,the mobility and motion feature of this 5-DOF mechanism is analyzed with the constraint screw method.Then the inverse and forward displacement problems of the proposed hybrid mechanism are solved according to the geometrical relationship,and the Jacobian matrix of the mechanism is obtained based on the forward and inverse solution,the decoupled feature of the proposed parallel mechanism is validated. …”
Get full text
Article -
5100
Plant and Pest Diagnosis and Identification through DDIS
Published 2018-03-01“…This 4-page document discusses typical DDIS hardware and camera, the DDIS process, sample types, user roles, DDIS for Extension clientele, and DDIS Mobile. Written by J. Xin, L. Buss, C. Harmon, P. …”
Get full text
Article