Suggested Topics within your search.
Suggested Topics within your search.
- Communication policy 1
- Computer networks 1
- Computer security 1
- Cyberterrorism 1
- Economic conditions 1
- Economic development 1
- Economies 1
- Foreign economic relations 1
- Heritage in Africa 1
- Interior landscaping 1
- Internet 1
- Politics 1
- Prevention 1
- Rural development 1
- Rural roads 1
- Security measures 1
- Telecommunication policy 1
-
1701
Le rôle du numérique dans la redéfinition des communs urbains
Published 2017-04-01“…Then we look how the commons and commoners can use the digital infrastructure around three subjects: how the digital helps coordinating actions and ideas of the commons; how it gives commonners the ability to show the urban commons, mostly through participative maps; and the importance of open data. …”
Get full text
Article -
1702
Research on hierarchical service guarantee scheme for 5G network
Published 2022-05-01“…The digital transformation process of economic society is accelerating.As the first of "new infrastructure", 5G will effectively enable the industry digital transformation.Facing the diverse needs of the industry in terms of network performance, operators need to provide the industry with hierarchical wireless service levels.Based on the analysis of 5G network performance requirements of industry services, the RAN-based service guarantee capability of 5G network was introduced from three aspects: data rate, delay and reliability.At the same time, based on the demands, various service guarantee technical technologies were combined and associated with network slice ID and 5QI to form a hierarchical service guarantee scheme.By matching industry service demands and network capacities, the integration and development of communication and vertical industry will be better promoted.…”
Get full text
Article -
1703
THE ROLE OF ENGINEERING PEDAGOGY IN THE SOLUTION OF SECURITY PROBLEMS ON AUTOMOBILE TRANSPORT AND IN THE SPHERE OF ROAD MAINTENANCE
Published 2022-05-01“…An important factor in providing security in technosphere is the level of professional competency of the engineers - Bachelor’s, Master’s and Specialist’s degree holders, - who design, create and operate objects of the infrastructure. In the paper we analyze the role of engineering pedagogy in the processes of preparation of competent engineers at technical university MADI to solve the tasks of providing security in technosphere and of subsequent improvement of their qualifications.…”
Get full text
Article -
1704
DEVELOPMENT OF THE CULTURAL AND LEISURE SPHERE IN THE MOSCOW
Published 2021-05-01“…The author presents the results of the analysis of the main directions of the development of the cultural and leisure policy of the city of Moscow in three components: content, infrastructure and territorial. The issues of providing the services of cultural and leisure facilities to the residents of the peripheral territories of the city of Moscow are of paramount importance at the present time. …”
Get full text
Article -
1705
L’économie politique de l’accès technique au marché : le cas du TAFTA
Published 2021-07-01“…It proceeds through the convergence of technical infrastructures (technical standards and regulations, conformity assessment). …”
Get full text
Article -
1706
Research and practice of software-defined security technology architecture in the 5G+ era
Published 2021-12-01“…Cloud network security has become a strong need under the background of the new infrastructure and digital economy, while cloud network integration security has been defined as an ongoing trends.Initially, three major types of problems facing 5G private network users were presented in providing overall security services, and an overall software-defined security architecture in the 5G+ era was proposed.Furthermore, the corresponding prototype system design and implementation was discussed based on this architecture.At the end, the verification shows that the software-defined security orchestration and scheduling system based on the cloud-based architecture helps to accurately solve the overall business security threats and hidden dangers of 5G private network enterprise customers in the 5G+ era, providing systematic reference value for subsequent research.…”
Get full text
Article -
1707
La mise en visibilité des eaux souterraines au Maroc : un processus historiquement lié aux politiques de développement de l’irrigation
Published 2022-03-01“…The current situation of groundwater overexploitation is currently redefined as a problem of a lack of water resources, justifying the implementation of new infrastructure aimed at increasing the global supply of water resources.…”
Get full text
Article -
1708
L’orpaillage au Burkina Faso : une aubaine économique pour les populations, aux conséquences sociales et environnementales mal maîtrisées
Published 2017-12-01“…Far from the cities, the miners and their families are deprived of social and sanitary infrastructure and live in great precariousness. Finally, the environment around the mines is durably polluted by the techniques of extraction of gold (use of mercury or cyanide). …”
Get full text
Article -
1709
Program-target approach in support of tourism development: Experience of foreign countries
Published 2023-12-01“…Experience of individual countries allows us to highlight systemic measures aimed at developing tourism infrastructure facilities and creating new jobs both in the industry itself and in related areas. …”
Get full text
Article -
1710
A Multihoming Clustering Algorithm for Vehicular Ad Hoc Networks
Published 2014-03-01“…To make vehicle clustering applicable everywhere regardless of the provided infrastructure, vehicles must rely only on themselves and must not take any supporting services, such as location or external communication services, for granted. …”
Get full text
Article -
1711
Research on IPv6+ intelligent backbone network technology
Published 2023-05-01“…The China Media Group backbone network is a key infrastructure that connects the headquarters, data centers, hubs/journalists at home and abroad, and “hundreds cities and thousands of screens” across the country, and IPv6+ is the main technical route of the next-generation IP network.The present situation and challenges of the backbone network of the headquarters were mainly analyzed, the principle, advantages and technical characteristics of the core of IPv6+ were introduced, and how IPv6+ technology adapts to the development of broadcast and television services was discussed.Finally, the conception and suggestion of constructing and deploying the next generation broadcast TV backbone network based on IPv6+ were put forward.It provided a new idea to simplify the protocol and speed up the service opening for the future construction of backbone network of radio and television stations.…”
Get full text
Article -
1712
The race for AI hegemony
Published 2025-02-01“…AI can transform industries, automate tasks, and create jobs, but it also brings concerns about infrastructure, resource redistribution, inequality, regulation, and ethics. …”
Get full text
Article -
1713
Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security
Published 2019-06-01“…,quantum communication,public key infrastructure,physical layer security,blockchain,trusted computing and privacy protection.Apart from teaching the related technologies,the remarkable achievements and efforts of Chinese scientists were shown and the future work was indicated.Students are grouped to do literature research,expand their knowledge,exchange the learning experience and explore the law of scientific research in these new aspects.Students can not only absorb the knowledge of cutting-edge technology,but also learn the method and spirit to address scientific problems.A useful reference for education and teaching method of course ideological for graduate students was provided.…”
Get full text
Article -
1714
Trusted virtual machine management model for cloud computing
Published 2014-11-01“…For virtual machine in cloud computing,the authorization of manager domain is too centralized to be secure,and the strategies of tenants can be easily falsified.In view of the two problems,a trusted virtual machine management Model for cloud computing infrastructure is proposed.The model provides fine grained manager domain of virtual machine in which both managers and tenants are strictly constrained when they operate on other tenant domains.The sensitive code and data in tenant virtual machine cannot be accessed or falsified without permission.The model creates a trustable tunnel between tenant and system domain,and distributes tenant strategies using the tunnel in a secure way.Security analysis and experimental results show the model ensures the security of tenant data and tenant strategies effectively.…”
Get full text
Article -
1715
Análise da qualidade de vida na cidade de Araçatuba (São Paulo): uma proposta metodológica com a utilização de sistemas de informação geográfica (sig)
Published 2017-09-01“…The aim of this paper is to present a methodology to analyze the quality of urban life through the spatial distribution of indicators related to infrastructure, public services and environmental quality using Geographic Information Systems (GIS). …”
Get full text
Article -
1716
Concertation numérique et aménagement du territoire : coconstruction d’un outil expérimental d’e-débat
Published 2022-03-01“…While there is a growing demand with participation and consultation from the public, relating to infrastructure projects or land planning, critics point out the inadequacy of these mechanisms. …”
Get full text
Article -
1717
Industrial Agglomeration and Location Choice in Services and Retail Sector: The Case of India
Published 2018-12-01“…Our findings suggested that infrastructure, corruption and law, labour law and workforce had a significant effect on location choice. …”
Get full text
Article -
1718
De la production paysagère à la formation des paysages vécus à Conakry (Guinée)
Published 2019-12-01“…Although such a shaping of landscapes was replaced by urban planning through "management and infrastructure", there remained here and there landscapes shaped by the know-how of the inhabitants and by forms of socio-ecological mutual aid enabling them to live in such a hot climate. …”
Get full text
Article -
1719
Design of double layer satellite constellation based on distributed satellite clusters
Published 2018-07-01“…Nowadays,the land communication system is unable to support the complex information needs,and realizing global seamless coverage and high capacity through space information network is anticipated.The existing satellite network is mainly composed of single satellite constellation,which absents the cooperation between the low earth orbit (LEO) satellites and geostationary orbit (GEO) satellites.A double-layer satellite constellation based on distributed satellite clusters was proposed,in which the infrastructure layer was composed of LEO satellites,the communication between LEO satellites was accomplished over inter-satellite links (ISL),and GEO satellites enhance the performance of coverage in low and middle latitudes.As simulation results show,the proposed approach can realize excellent global multiple coverage only relying on the deployment of satellite earth stations in China.…”
Get full text
Article -
1720
Hyperpath Searching Algorithm considering Delay at Intersection and Its Application in CVIS for Vehicle Navigation
Published 2022-01-01“…A “recommendation priority passable phase” guidance strategy is proposed for the cooperative vehicle-infrastructure system (CVIS) based on the optimal hyperpath. …”
Get full text
Article