Showing 541 - 560 results of 1,136 for search '"academia"', query time: 0.04s Refine Results
  1. 541

    LoRaWAN technologies for enabling new generation Internet of things by Chaojie GU, Rui TAN

    Published 2021-06-01
    “…LoRaWAN is a representative low power wide area networking technology that has attracted significant attention from both the industry and academia.It can improve the connectivity of massive edge devices greatly in the era of Internet of things (IoT).The basics of LoRaWAN were reviewed briefly and the latest LoRaWAN research results were surveyed in four aspects, i.e., communication performance target localization, wireless network security, and heterogeneous network.The opportunities and challenges were also discussed regarding the wide adoption of LoRaWAN in China’s context in four aspects, i.e., business models, supervision methods, technology innovations, and emerging applications.…”
    Get full text
    Article
  2. 542

    A cultura em questões by Caleb Faria Alves

    Published 2014-01-01
    “…The article also discusses the academia and recent redefinitions of the role of intellectuals.…”
    Get full text
    Article
  3. 543

    Mapping the global clinical landscape of stem cell therapies for neurological diseases from 1998 to 2023: an analysis based on the Trialtrove database by Shenzhong Jiang, Xinjie Bao, Chunlong Zhong, Renzhi Wang

    Published 2025-02-01
    “…Characterizing past and ongoing clinical trials using stem cells for neurological diseases will provide important insights for academia, industry and government. Based on the Trialtrove database, we retrospectively analyzed 530 clinical trials initiated by the end of 2023.…”
    Get full text
    Article
  4. 544

    A survey of mobile edge computing by Zishu LI, Renchao XIE, Li SUN, Tao HUANG

    Published 2018-01-01
    “…Mobile edge computing (MEC) technology integrates IT service environment and cloud computing technology at the edge of the network,improving the capacities of computing and storage of the edge of network,reducing network operation and service delivery delay and further enhancing the quality of experience (QoE) of users.Thus,MEC has attracted extensive attention and has been added in the 5G standard as a key technology.Firstly,the basic concept,reference architecture and technical advantages of MEC were introduced,and the current research state of MEC were summarized from three perspectives:academia,industry and standard setting.Then,the key enablers,application scenarios and specific deployment methods of MEC were introduced in detail.Finally,the existing problems of MEC,such as mobility,security and billing,as well as privacy protection,were discussed.…”
    Get full text
    Article
  5. 545

    Qualitative research is about listening and growing by Warren Bareiss

    Published 2025-01-01
    “…My time spent with QRMH has easily been the most fulfilling of my 25+ years in academia. I have had the support of an editorial board consisting of dedicated scholars who find the service of working on QRMH as rewarding as I do. …”
    Get full text
    Article
  6. 546

    Large-scale OMNeT++-based deterministic networking simulation practice by Chenqiang GAO, Xiangyang ZHU, Jinghai YU

    Published 2023-11-01
    “…TSN and DetNet are major components of the deterministic networking solution, detailed research has been conducted by industry and academia.However, the study seldom considers the joint of these two technologies under large-scale networks.To facilitate the analysis of the joint networks, TSN and DetNet specifific extensions to the popular OMNeT++/INET framework for network simulations was presented, in particular, the time slot scheduling, the TSN node/host/interface and DetNet node/host/interface, the framework for collaboration between the controller and the simulation system.A proof of concept implementation and exemplary evaluation of the joint of these two technologies under large-scale networks was presented.The results show that in large-scale cross-domain scenarios, the time slot scheduling mechanism can provide end-to-end deterministic service guarantee.…”
    Get full text
    Article
  7. 547

    A Football Club's Strategic Performance Management by L.C. Panescu, M. Dragomir

    Published 2024-12-01
    “…This study's context and content greatly advance our knowledge of the football industry and offer a thorough and all-encompassing set of contributions to the field of business academia. The knowledge acquired on a topic that has naturally shown to have a significant impact on people inherently adds something useful and beneficial to society.…”
    Get full text
    Article
  8. 548

    Justicia transicional, derechos humanos y marco institucional en los nuevos escenarios políticos en México by Laura  Loeza Reyes

    Published 2020-01-01
    “…This article analyzes the importance and relevance of the public policy for transitional justice that was desiged and promoted in Mexico by family groups related to victims of violence and also by national and international human rights organizations and experts from academia. The two primary factors taken into consideration are the humanitarian crisis caused by the «fight against organized crime» policy –which was based on the militarization of police activities, was implemented more than a decade ago, and has left tens of thousands of victims– and the complex and adverse situation the implementation of such a policy faces in light of the current Mexican president’s ignorance on human rights topics. …”
    Get full text
    Article
  9. 549

    Survey on differential privacy and its progress by Zhi-qiang GAO, Yu-tao WANG

    Published 2017-10-01
    “…With the arrival of the era of big data sharing,data privacy protection issues will be highlighted.Since its introduction in 2006,differential privacy technology has been widely researched in data mining and data publishing.In recent years,Google,Apple and other companies have introduced differential privacy technology into the latest products,and differential privacy technology has become the focus of academia and industry again.Firstly,the traditional centralized model of differential privacy was summarized,from the perspective of analysis of data mining and data released in the differential privacy way.Then the latest local differential privacy regarding data collection and data analysis based on the local model was described,involving crowdsourcing with random response technology,BloomFilter,statistical inference techniques.Finally,the main problems and solutions of differential privacy technology were summarized.…”
    Get full text
    Article
  10. 550

    UAV-enabled integrated sensing and communication:architecture, techniques, and future vision by Chenxi LIU, Rui MA, Mugen PENG

    Published 2023-02-01
    “…UAV emergency communication has been regarded as a typical application of the sixth generation mobile communication system (6G), and it can be flexible deployed and provide on-demand services.Meanwhile, integrated sensing and communication (ISAC) is a key feature and enabling technology for 6G.With the aid of the ISAC techniques, the spectral efficiency and the sensing accuracy of UAV emergency communication can be improved, while the system costs can be simultaneously reduced.However, how to efficiently integrate the ISAC techniques into the UAV emergency communication remains a hot and challenging research issue for both the academia and industry.Against these backdrops, a UAV-enabled ISAC architecture was proposed.Then, the fundamental principles that supported the proposed architecture were discussed.Finally, the future directions and challenges in UAV-enabled ISAC were provided.…”
    Get full text
    Article
  11. 551

    Caregiving in the Research Agenda and in Public Policies in Uruguay by Rosario Aguirre, Karina Batthyány, Natalia Genta, Valentina Perrotta

    Published 2014-09-01
    “…It is argued that in Uruguay the work of research undertaken in academia has been able to promote visibility to the work of caregiving and its value for contributing to social welfare and the economic system. …”
    Get full text
    Article
  12. 552

    Adventures With Mommsen by Brian Croke

    Published 2025-01-01
    “…It traces a personal encounter with Mommsen and his work, especially his activities in later Roman history, from undergraduate through postgraduate education, a four-decades long career outside academia, then a return to Mommsen in recent years. …”
    Get full text
    Article
  13. 553

    Low-latency networking:architecture,key scenarios and research prospect by Xutong ZUO, Mowei WANG, Yong CUI

    Published 2019-08-01
    “…With the advent of delay-sensitive applications and ultra-low latency scenarios,research on low-latency networking is attracting attention from academia,industry,and standards organizations.Understanding the causes of latency and designing corresponding techniques to reduce latency enable the development of emerging applications.The sources of latency according to the layered architecture of the network was analyzed,and summarizes the techniques for reducing the latency.After that,three typical low-latency key scenarios and delay optimization techniques for data center network,5G and edge computing was analyzed.Finally,the opportunities and challenges that may be encountered in the development of low latency networks were presented from the perspectives of network architecture innovation,data-driven latency optimization algorithm and the design of new protocols.…”
    Get full text
    Article
  14. 554

    Public Participation in the Social Science: A Systematic Literature Review by Muhammad Ainul Usama, Ulung Pribadi, Al Fauzi Rahmat

    Published 2021-07-01
    “…Public participation has also attracted a lot of attention from academia as a concept of public policy. The authors conducted a systematic literature review of published articles in the social sciences to enhance our understanding of public participation. …”
    Get full text
    Article
  15. 555

    Can the ‘Other’ Frame Back in Tourism Studies? by Sarani Pitor Pakan

    Published 2020-03-01
    “…I found myself, who initially aimed to offer reverse South-to-North tourist/photographic framings, trapped in the question concerning whether non-Western tourism researchers are really able and need to frame back and talk back in academia. While the experiment itself might not be able to seriously challenge the Eurocentric knowledge production in tourism studies, I found it useful as a pedagogy of self-reflection through which non-Western tourism researcher, like me, can resituate her/his postcolonial being, thinking, and sensing and be an initial seed of future decolonial praxis.…”
    Get full text
    Article
  16. 556

    Teaching Open Literacies by Croeser Sky

    Published 2020-12-01
    “…The managerial focus on measuring and quantifying teaching and learning outcomes within academia often works against the evidence on pedagogical best practice. …”
    Get full text
    Article
  17. 557

    Suicidio soberano y suicidio patológico by Hernán Neira

    Published 2017-01-01
    “…Al definir “suicidio”, la Real Academia Española toma una opción filosófica que se aleja de algunos propósitos y puntos de vista de la salubridad pública, y acentúa su carácter de actividad íntima que realiza un sujeto capaz de acción. …”
    Get full text
    Article
  18. 558

    Maintaining the Free Flow of Information. A Manifesto-like Intervention for Practice-Based Research in Academic Training Programs for Multimedia Journalism by Evelyn Echle

    Published 2024-09-01
    “…By interweaving theory, practice and politics, this Manifesto-like paper aims to strengthen the profession of journalism and build a bridge between academia and practical training. …”
    Get full text
    Article
  19. 559

    Survey on the search of Internet of Things by Yun-quan GAO, Xiao-yong LI, Bin-xing FANG

    Published 2015-12-01
    “…With the popularization and development of the Internet of Things,the search of Internet of Things urgently needs to be solved in academia and industry and becomes a hot research topic.With the increasing data generated by sensors,only the search of IoT makes this data valuable.However,different from the traditional Internet search engines (such as Baidu,Google,Bing,Yahoo,etc),the search of IoT has different search objects and search architecture and data in the Internet of Things are massive,real-time,highly dynamic,heterogeneous,highly insecure.The above characteristics make search of IoT face more challenges.Firstly,the concept,characteristics,related technologies of search of IoT were summarized and presented.Secondly,several typical systems and related algorithms were described in detail.Finally,the current problems,the challenges and research prospects of this field for future were presented…”
    Get full text
    Article
  20. 560

    UAV-assisted MEC systems: architecture, key technology, and future challenges by Tiankui ZHANG, Yu XU, Yuanwei LIU, Dingcheng YANG, Yuanhong REN

    Published 2022-08-01
    “…With the fast deployment of 5G and the on-going development of 6G, unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) technology has significant advantages in the terms of overcoming the geographic restrictions, addressing the computational requirements of terminal devices, and enhancing the task offloading rate of the systems, which attracts wide attentions in academia and industry.The concept and the technique advantages of the UAV-assisted MEC systems were firstly clarified, and a general UAV-assisted MEC architecture was proposed, along with the definition of each function module.Then the classic application scenarios were summarized, and the existing key techniques were sorted out, based on which the design methods for the UAV-assisted MEC were achieved.Finally, the research directions and the potential challenges in the future were prospected and clarified.…”
    Get full text
    Article