Suggested Topics within your search.
Suggested Topics within your search.
- Telecommunication 7
- Information technology 2
- Mass media 2
- Communication 1
- Communication in rehabilitation 1
- Communication policy 1
- Computers 1
- Electronics 1
- Information theory 1
- Internet 1
- Medical rehabilitation 1
- Rehabilitation 1
- Social aspects 1
- Telecommunication in medicine 1
- Telecommunication policy 1
- Telecommunication systems 1
- Telemedicine 1
- methods 1
- telecommunication 1
-
701
A static MEH handover scheme based on load balancing
Published 2018-07-01“…Based on the MEH (mobile edge host) handover scheme proposed by ETSI (European Telecommunications Standards Institute),an improved and supplementary static handover scheme was put forward.By transferring the former C-MEH (controlling MEH) to a neighbor server with lighter load,the scheme decreased the average waiting time of a signal message at the former C-MEH site.The negative effect of bottle-neck at the former C-MEH could also be lightened.Analysis and simulation results show that the scheme can provide effective and positive supplementary to the ETSI specification in balancing network load and improving user’s satisfaction.…”
Get full text
Article -
702
Discrete Gronwall’s inequality for Ulam stability of delay fractional difference equations
Published 2025-01-01Get full text
Article -
703
-
704
PROBLEMS OF ADAPTATION OF RUSSIAN ACCOUNTING AND CONTROL AND ANALYTICAL PRACTICES TO THE CHALLENGES OF THE DIGITAL ECONOMY
Published 2018-04-01“…The article deals with the cause and effect basis of the problem of digital technologies the spread - one of the characteristic features of the future due to the progress in the microelectronics, information technology and telecommunications. It is concluded that the theoretical basis of the problem of updating the accounting and analytical methodology in the near future and the development of the conceptual apparatus require the solution of the following issues: increasing the degree of information reporting; the need for the formation of new terms, new concepts of information management of financial and economic activities.…”
Get full text
Article -
705
A BDDC Preconditioner for the Rotated Q1 FEM for Elliptic Problems with Discontinuous Coefficients
Published 2014-01-01Get full text
Article -
706
A Hierarchical Procedure for the Synthesis of ANFIS Networks
Published 2012-01-01Get full text
Article -
707
Generating Chaotic Series via Encryption Method in Fractional-Order Chua Systems
Published 2021-01-01Get full text
Article -
708
COMPARATIVE ANALYSIS OF NON-COOPERATIVE SPECTRUM SENSING TECHNIQUES IN COGNITIVE RADIO NETWORK
Published 2024-03-01“… Cognitive radio (CR) is an integral system in telecommunications technology that gives unlicensed users access to licensed spectrums via dynamic spectrum access (DSA), to promote spectral efficiency. …”
Get full text
Article -
709
An Approach for Self-Adaptive Path Loss Modelling for Positioning in Underground Environments
Published 2016-01-01Get full text
Article -
710
-
711
-
712
Da tropodifusão à fibra óptica: os desafios geográficos para a formação do território tecnológico do Amapá, Brasil
Published 2022-12-01“…This text presents the configuration of the technological territory of Amapá (Brazil), based on the historical context of the dispersion of telecommunications networks in the Brazilian space and the verification of the geographical challenges and their implications for the technological development of the territory in the extreme north of Brazil. …”
Get full text
Article -
713
The Invitation to Tender as an Unsuitable Procedure for Awarding Mobile Radio Frequencies
Published 2022-09-01“…Abstract With the amendment to the Telecommunications Act (TKG), which came into force on 1 December 2021, the priority of auctioning as the standard award procedure for frequencies in the event of scarcity has been abolished. …”
Get full text
Article -
714
Analysis of the situation and problem on the legislation of cyberspace in China
Published 2015-12-01“…The internet governance and legislation have experienced the free development,the exploration and the comprehensive stages.There are some problems about the current legislation,such as the law level is low,the high-level law is lack,the legislation is relatively scattered,legislation is lagging far behind the technology,the cur-rent law is principle and lack of the operability,legislation is heavy duty,light-rights,and so on.According to these conditions,accelerating the basic legislation,such as the cyber security law,the personal information protection act,the internet service administration law,the act of e-commerce,the e-government law,the telecommunications act,and so on was suggested,so as to build a relatively complete cyber law system.…”
Get full text
Article -
715
Next Generation of Transport Networks
Published 2014-08-01“…Telecommunications transport networks carry aggregated communications information transparently, reliably and efficiently,supporting a full range of communications service provider(CSP)services and service networking layers (IP,Ethernet,ATM,TDM,etc.). …”
Get full text
Article -
716
Suggestion on establishing curriculum system for information security major
Published 2016-07-01“…The problems of information security demands for professional talents and existing curriculum system setting of information security major were analyzed.A modular and hierarchical curriculum system construction scheme of information security was given under the guidance of information security professional standards promulgated by the Ministry of Education Information Security Teaching Guidance Committee.The construction of curriculum system for information security major at Xi'an University of Posts and Telecommunications was taken as the example.The modular and hierarchical optimization and implementation scheme of information se-curity undergraduate curriculum system were designed.It will be valuable to the information security profes-sional talent training.…”
Get full text
Article -
717
An automatic test platform to verify the security functions for secure WIA-PA wireless sensor networks
Published 2016-11-01Get full text
Article -
718
-
719
-
720