Suggested Topics within your search.
Suggested Topics within your search.
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Mobile communication systems 2
- ART / Digital 1
- African literature 1
- Anti-Infective Agents 1
- Anti-infective agents 1
- Authors, Nigerian 1
- Certification 1
- Chemotherapy 1
- Communicable diseases in children 1
- Communication in rehabilitation 1
- Computer animation 1
- Criticism and interpretation 1
- Digital cinematography 1
- Digital techniques 1
- Electronic data processing personnel 1
- Examinations 1
- Graphical user interfaces (Computer systems) 1
- Historiography 1
- History 1
- History and criticism 1
-
181
Mobile edge computing and application in traffic offloading
Published 2016-07-01“…Mobile edge computing(MEC)makes it possible to deploy and provide service locally,which is close to the users,by enabling the IT and cloud computation capacity at the radio access network (RAN).Thus,MEC can improve the quality of experience (QoE) by reducing the latency,and decrease the network operation cost through reducing backhaul capacity requirement.Meanwhile,based on the network context information (location,network traffic load,radio information,etc) exposure to applications and services,MEC can further improve the QoE of user and provide the platform to third-party partners for application and service innovation.Besides the introduction of MEC,the detailed MEC platform was presented.Furthermore,the traffic offloading solution based on MEC was proposed and compared with the solution of local IP access and selected IP traffic offload (LIPA/SIPTO).In addition,the problems and challenges of the MEC were also discussed in detail.…”
Get full text
Article -
182
Research on security defense of mobile edge computing
Published 2021-02-01Subjects: “…mobile edge computing…”
Get full text
Article -
183
Mobile Robot Localization Based on Vision and Multisensor
Published 2020-01-01“…To deal with the low accuracy of positioning for mobile robots when only using visual sensors and an IMU, a method based on tight coupling and nonlinear optimization is proposed to obtain a high-precision visual positioning scheme by combining measured value of the preintegrated inertial measurement unit (IMU) and values of the odometer and characteristic observations. …”
Get full text
Article -
184
Prospect of the Fifth-Generation Mobile Communication System
Published 2013-09-01Subjects: “…the 5th generation mobile communication…”
Get full text
Article -
185
Mobility aware edge service migration strategy
Published 2020-04-01Subjects: “…mobile edge computing network…”
Get full text
Article -
186
Scheme of mobile informatization in electric power enterprise
Published 2017-02-01Subjects: “…mobile internet…”
Get full text
Article -
187
Behaviour Analysis of Mobile Malicious Software in Network
Published 2015-08-01Subjects: “…mobile malicious software…”
Get full text
Article -
188
Key technologies of 6G mobile network
Published 2022-07-01“…The development and social needs of mobile communication networks were firstly introduced.Then four key technologies of 6G network were respectively introduced from the perspectives of communication spectrum, coverage dimension, communication empowerment, and new paradigm, namely terahertz (THz) communication, space-air-ground-sea integration network, artificial intelligence (AI), and semantic communication.The related researches of the four key technologies in recent years were analyzed, and some typical application scenarios, coverage scheme, technique principles, etc., were summarized.Finally, based on the summary, main problems of the four technologies were proposed for the future development.Besides, other candidate technologies of 6G network, including integrated sensing and communication, reconfigurable intelligence surface and new materials, blockchain, digital twin, and deterministic network technology, etc., were briefly discussed in the conclusion part.…”
Get full text
Article -
189
Research on security of mobile payment for commercial bank
Published 2014-11-01Subjects: “…mobile payment…”
Get full text
Article -
190
Evaluation criteria and solution of mobile communication network
Published 2020-11-01Subjects: “…mobile communication network…”
Get full text
Article -
191
Location privacy protection for mobile social network
Published 2015-12-01Subjects: Get full text
Article -
192
Technology prospect of 6G mobile communications
Published 2019-01-01Subjects: “…the sixth generation mobile communication system…”
Get full text
Article -
193
MSF: An Efficient Mobile Phone Sensing Framework
Published 2013-03-01“…A new promising research area called mobile sensing promotes completely decentralized sensing based on smartphone capabilities only. …”
Get full text
Article -
194
Hierarchical AAA in mobile IPv6 networks
Published 2006-01-01Subjects: “…mobile IPv6…”
Get full text
Article -
195
Study on the Key Technologies of Mobile Application Development
Published 2013-05-01Subjects: Get full text
Article -
196
Market-Based Approach to Mobile Surveillance Systems
Published 2012-01-01“…It is, therefore, imperative to develop mobile surveillance systems to protect these sites. …”
Get full text
Article -
197
Mobile Internet Trends in 4G Era
Published 2014-05-01Subjects: “…mobile internet…”
Get full text
Article -
198
Accuracy of the SWAY Mobile Cognitive Assessment Application
Published 2021-08-01“…# Background Mobile electronic devices have become integral tools in addressing the need for portable assessment of cognitive function following neurocognitive/motor injury. …”
Get full text
Article -
199
-
200
Modeling Nonusers’ Behavioral Intention towards Mobile Chatbot Adoption: An Extension of the UTAUT2 Model with Mobile Service Quality Determinants
Published 2023-01-01“…The present empirical paper, which is aimed at identifying and discussing the factors motivating nonusers to adopt the specific technology in mobile contexts, proposes a comprehensive conceptual model, which combines the UTAUT 2 behavioral theory with variables of mobile service quality contexts, such as information quality, privacy concerns, interface, and equipment, as well as trust and mobility factors. …”
Get full text
Article