Suggested Topics within your search.
Suggested Topics within your search.
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Mobile communication systems 2
- ART / Digital 1
- African literature 1
- Anti-Infective Agents 1
- Anti-infective agents 1
- Authors, Nigerian 1
- Certification 1
- Chemotherapy 1
- Communicable diseases in children 1
- Communication in rehabilitation 1
- Computer animation 1
- Criticism and interpretation 1
- Digital cinematography 1
- Digital techniques 1
- Electronic data processing personnel 1
- Examinations 1
- Graphical user interfaces (Computer systems) 1
- Historiography 1
- History 1
- History and criticism 1
-
5421
Oyapock coopération santé : une collaboration transfrontalière pour une meilleure prise en charge du VIH dans le bassin de l’Oyapock
Published 2021-10-01“…PlHIV living in Oiapoque, the Brazilian border city, face constraints of mobility for accessing to a specialized care in their own state. …”
Get full text
Article -
5422
Research on 5G MEC security assessment system and method
Published 2023-08-01“…Multi-access edge computing (MEC) is deployed at the edge of the network, enabling efficient and fast data processing in mobile networks, while also undertaking important security functions, making MEC a prime target for attackers.Therefore, MEC nodes will face huge security risks.How to accurately evaluate and quantify MEC security capabilities is an urgent issue to be solved.For accurately evaluating and quantifying MEC security capabilities, the MEC safety assessment system was proposed in combination with MEC safety risks.The assessment indicators selected in the assessment system comprehensively reflect the basic characteristics of MEC and its complete safety capability.Based on this evaluation system, the MEC security evaluation method was designed by using the analytic hierarchy process (AHP) and fuzzy evaluation, the MEC vulnerability scoring system was creatively proposed, and the evaluation indicators were provided based on the results of MEC vulnerability scoring system, the MEC security capability quantification value was finally calculated.The experimental result proves the effectiveness of the method.…”
Get full text
Article -
5423
Design and implementation of a novel general format multimedia digital rights management system
Published 2013-10-01“…Aiming at the copyright protection of multimedia content,a novel general format multimedia digital rights management model was designed which includes encryption and packaging of content,ke nagement,security engine,license management and distribution,DRM client,DRM management and other functional units.This model uses un-structured encryption method which overcomes the limit ions of encryption method based on the content format to sup-port the general format multimedia.In addition,this model uses the license acquisition number as the only certificate to download license to solve the problem of license reissue and transfer,and supports fine-grained control model.Combined with this model,a multimedia digital rights management system was developed based on fixed and mobile converged services which is used in the field of digital consumer.experimental results and practical application show that this scheme with good practice in the copyright protection multimedia content does not affect the multimedia quality,and have high efficiency and safety.…”
Get full text
Article -
5424
Corrections to “The Recent Technologies to Curb the Second-Wave of COVID-19 Pandemic”
Published 2025-01-01Get full text
Article -
5425
Dynamic service migration strategy based on MDP model with multiple parameter in vehicular edge network
Published 2020-01-01“…To handle with the service interruption caused by vehicles’ mobility and limited service coverage of edge servers,a dynamic service migration algorithm based on multi-parameters Markov decision process (MDP) model was put forward for vehicular edge network,which was called as dynamic service migration algorithm based on multiple parameter (DSMMP).Combining delay,bandwidth,server capacity with vehicle motion information,DSMMP constructed a multi-parameters MDP revenue function to remedy the deficiency of distance-based schemes.By using vehicle motion and delay constraints,a candidate server set with several candidate servers was defined,and migration decision through long-term Bellman revenue values was made.In order to improve the dynamic adaptability of the proposed algorithm,the weight values were calculated and updated by leveraging historical information.Simulation results show that our strategy has a good performance in terms of delay,packet loss ratio and service migration times.…”
Get full text
Article -
5426
Thin Layer Chromatographic Studies of the Adsorption Behaviour of Amino Acids through a Static Soil Phase
Published 2006-12-01“…The effects of particle size, activation temperature, irradiation of the soil by γ-rays and the pH of the soil bed on the mobility sequence of the amino acids were also examined. …”
Get full text
Article -
5427
A Santidade Enfurecida
Published 2020-07-01“…Among the most frequent cases of disputes during the "Gregorian Reformation Era" were clashes between monks and bishops, whose outbreak had repercussions in numerous directions: on aristocratic domination, patrimonial control networks, foundations of ecclesiology, urban mobilizations, legal consensus. The following pages consist of a study of such a case: around 1034 a quarrel opposed the high echelon of the Florentine bishopric to a portion of local monasticism filling in decades with reports of terrifying miracles, popular clamours, open challenges to the papacy and bloody disputes by legal authority. …”
Get full text
Article -
5428
ZnO:Al Grown by Sputtering from Two Different Target Sources: A Comparison Study
Published 2012-01-01“…Further, the sheet resistance, resistivity, carrier concentration, and Hall mobility of these ZnO:Al thin films were measured as a function of film thickness. …”
Get full text
Article -
5429
Teleoperation Robot Control of a Hybrid EEG-Based BCI Arm Manipulator Using ROS
Published 2022-01-01“…Live brain computer interface (BCI) commands from a trained user are successfully harvested and used as an input signal to pick a goal point from 3D point cloud data and calculate the goal position of the robots’ mobile base, placing the goal point in the robot arms workspace. …”
Get full text
Article -
5430
Nouvelle professionnalité des enseignants d’éducation physique et sportive en lycée professionnel. Bonne distance, séquençage et extériorisation des règles du travail scolaire...
Published 2015-01-01“…Our analysis allowed us to highlight revealing elements of a "new job” mobilized by teachers entering the profession, the most significants are presented in this article. …”
Get full text
Article -
5431
Outstanding heritage sites, a resource for the territories
Published 2020-12-01“…To answer this question, the paper mobilizes the notion of territorial resource, in order to apprehend the impact of the site with regard to the territorial context and the coordination of local actors. …”
Get full text
Article -
5432
YOUTH INITIATIVES IN TOURISM IN THE ERA OF DIGITALIZATION AND PANDEMIC
Published 2021-04-01“…The rapid digitalization of the economy since the early 2010s thanks to the rapid development of the mobile Internet and artificial intelligence was accelerated by the COVID-19 coronavirus pandemic, which caused catastrophic losses in international tourism in 2020. …”
Get full text
Article -
5433
Joint Power Allocation at the Base Station and the Relay for Untrusted Relay Cooperation OFDMA Network
Published 2015-01-01“…The secure communication that multiple OFDMA-based cell-edge mobile stations (MS) can only transmit confidential messages to base station (BS) through an untrusted intermediate relay (UR) is discussed. …”
Get full text
Article -
5434
Time-resolved compositional and dynamics analysis of biofilm maturation and dispersal via solid-state NMR spectroscopy
Published 2025-01-01“…Different dynamic regimes respond differently to dispersal: the mobile domain exhibits increased rigidity, while the rigid domain remains stable. …”
Get full text
Article -
5435
Análise espacial dos acidentes de trânsito em rodovias federais no Estado de Goiás – Brasil
Published 2020-12-01“…Despite being under concession and having the best conditions of traffic and inspection by mobile and fixed equipment, these road sections are configured as critical points. …”
Get full text
Article -
5436
Analysis of a modified MIMO multi-bounced channel model for narrow street environment
Published 2017-10-01“…To establish scattering models that match realistic street transmission scenarios for more efficient M2M mobile communication systems,existing models mainly focus on single-scattering and double-scattering,while for narrow urban street environment,single-scattering assumption is rather restrictive.To overcome this problem,a modified multi-bounced channel model based on EBSBM was provided,in which the concept of equivalent scattering point is assumed.The multi-bounced propagation paths are considered as an one-bounced ellipse scattering path and characteristics of the model were further analyzed.General formulations of several important parameters such as the probability density function (PDF) of the angle-of-departure(AOD),angle-of-arrival (AOA) and Doppler shift were derived,which were applied to the performance of multiple-input-multiple-output(MIMO)system employing a circular array antenna.Doppler frequency distribution was also taken into account.The results show good agreement with the previously models,which validates the rationality of proposed model.…”
Get full text
Article -
5437
EAP-Swift: An Efficient Authentication and Key Generation Mechanism for Resource Constrained WSNs
Published 2015-04-01“…As new application areas are emerging, such as infrastructure monitoring and smart cities, the need for sensor mobility handling requires efficient and secure authentication protocols. …”
Get full text
Article -
5438
Small cell discovery based on TOA fingerprint database
Published 2017-09-01“…In the scenario that a large number of small cells are deployed in the mobile communication network,the number of carriers to be detected by the user equipment (UE) in inter-frequency scanning is considerably larger than that in the conventional network deployment scenarios.This procedure may consume tremendous amounts of UEs’ energy.In order to solve this problem,a small cell discovery (SCD) scheme based on TOA fingerprint database to alleviate intensive energy consumption was proposed when the UEs try to find their potential serving small cells.The proposed scheme reduces the energy consumption of the UE by decreasing the number of unnecessary inter-frequency detection.The simulation results verifiy that the proposed scheme,compared with the existing SCD strategy using received signal strength (RSSI) based radio maps,has better anti-noise performance and higher accuracy.In addition,it can effectively help the high-speed UE avoid performing inter-frequency detection,and hence increase the rate of the UE being successfully connected to the appropriate small cell.…”
Get full text
Article -
5439
Empowering MNOs with AI in 5G era
Published 2019-04-01“…As the next generation of telecommunication standard and technology,5G makes it possible for the network to support more advanced technologies like IoT,VR/AR,etc,due to its unique features,high bandwidth and low latency.Those mushrooming new application scenarios and service demand has been bringing MNOs (mobile network operators) huge opportunities as well as challenges.With the development of AI and machine learning technology,MNOs can not only upgrade their own business but also enter more fields with the advantage of “data tunnel” to provide customized solutions for consumers.How AI can empower the MNOs in 5G era from 5 aspects was represented.First of all,the possible challenges brought by 5G were introduced.What entailed was the necessity and feasibility.Then,3 points where MNOs could focus on to carry out AI technologies were discussed,as namely intelligent network,intelligent marketing and service and industrial internet.Finally,the possible difficulties faced by MNOs when applying AI technologies in the future were forecasted.…”
Get full text
Article -
5440
La mémoire du conflit carliste et ses enjeux : entre usage politique et mise en ordre du passé
Published 2019-10-01“…Some officers, just back from the front, tell the Carlist epic in order to mobilize supports to win the war. These authors also make every effort to build and preserve the collective memory of the Legitimist community to whom they belong in order to encourage them to continue the fight everywhere it may emerge. …”
Get full text
Article