Suggested Topics within your search.
Suggested Topics within your search.
- Telecommunication 7
- Information technology 2
- Mass media 2
- Communication 1
- Communication in rehabilitation 1
- Communication policy 1
- Computers 1
- Electronics 1
- Information theory 1
- Internet 1
- Medical rehabilitation 1
- Rehabilitation 1
- Social aspects 1
- Telecommunication in medicine 1
- Telecommunication policy 1
- Telecommunication systems 1
- Telemedicine 1
- methods 1
- telecommunication 1
-
721
-
722
-
723
-
724
IoT based intelligent pest management system for precision agriculture
Published 2024-12-01Get full text
Article -
725
-
726
Image Encryption Using a Lightweight Stream Encryption Algorithm
Published 2012-01-01“…Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm. …”
Get full text
Article -
727
Research of WLAN authentication in roaming environment with the trend of network integration
Published 2012-09-01“…In the tendency of network convergence,the method of WLAN network client authentication based on telecommunications network will be the main way of WLAN authentication in the future.In order to make WLAN authentication efficiency and security under roaming condition,WLAN authentication requirements were analyzed,the authentication mode,the process and the existing problems were discussed.An application model and design scheme of WLAN network client authentication based on EAP SIM/AKA protocol with the trend of network integration were proposed and verified.Experimental results show that this application model can complete the EAP SIM/AKA protocol identification of a WLAN client in roaming process,reduce the investment of networks,keep the safety grades of the nodes in the visited WLAN with the initial safety grades,and realize the real-time charging.…”
Get full text
Article -
728
-
729
The Dynamical Analysis of Computer Viruses Model with Age Structure and Delay
Published 2021-01-01Get full text
Article -
730
-
731
Twin Deficits: Evidence From Portugal, Italy, Spain and Greece
Published 2020-10-01Get full text
Article -
732
Practice analysis of domestic and foreign industry benchmarking enterprises in the field of network and information security
Published 2020-11-01“…In order to better promote the construction of China Telecom’s network and information security governance system,optimize the network and information security product service system,and promote the cultivation and development of network and information security core competence,domestic and foreign industry benchmark enterprises were selected to carry out practical case analysis.The advanced successful experience of benchmarking enterprises in the field of network and information security were summarized,and the current development status and future development trend in the field of network and information security were further combined,and targeted development suggestions and measures were put forward to improve the governance system of China’s telecommunications network and information security,improve the governance ability,as well as related business,and the development of products and services provides useful help.…”
Get full text
Article -
733
-
734
A comparative analysis of the development modes of the IoT for telecom operators
Published 2019-09-01“…In recent years,the development of IoT is in full swing.It is of great significance for the current transformation and development of domestic telecom operators.In this context,the business model is very important for operators to achieve “overtaking” in the IoT industry.Based on the analysis of the operation status of the IoT of operators,the development strategies of the IoT industry at home and abroad were compared,and three different development strategies was summarized.Telecom operators had advantages in customers,channels and other aspects,but limited by many factors.It was suggested that in constructing the development model,they should follow the principle of gradual progress,fully according to their own enterprise positioning,combined with national policies,pay attention to their own positioning in the industry chain of the IoT,pay attention to risks,and ultimately realize it.Better development model improve the current situation of increasing revenue in the telecommunications industry.…”
Get full text
Article -
735
A New Model of Ultracapacitors Based on Fractal Fundamentals
Published 2014-01-01Get full text
Article -
736
Measurement of Coherence Bandwidth in UHF Radio Channels for Narrowband Networks
Published 2015-01-01Get full text
Article -
737
Strict Efficiency in Vector Optimization with Nearly Convexlike Set-Valued Maps
Published 2013-01-01Get full text
Article -
738
A New Fractional-Order Hyperchaotic System and Its Adaptive Tracking Control
Published 2021-01-01Get full text
Article -
739
Bayesian Nonparametric Modeling for Rapid Design of Metamaterial Microstructures
Published 2014-01-01Get full text
Article -
740