Suggested Topics within your search.
Suggested Topics within your search.
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Mobile communication systems 2
- ART / Digital 1
- African literature 1
- Anti-Infective Agents 1
- Anti-infective agents 1
- Authors, Nigerian 1
- Certification 1
- Chemotherapy 1
- Communicable diseases in children 1
- Communication in rehabilitation 1
- Computer animation 1
- Criticism and interpretation 1
- Digital cinematography 1
- Digital techniques 1
- Electronic data processing personnel 1
- Examinations 1
- Graphical user interfaces (Computer systems) 1
- Historiography 1
- History 1
- History and criticism 1
-
761
Student Mobility or Emigration Flow? The Case of Students Commuting from Serbia to Hungary
Published 2015-04-01Subjects: Get full text
Article -
762
Multi-channel based on power control protocol for mobile ad hoc networks
Published 2006-01-01“…To solve the collision problem brought by power control in mobile ad-hoc network(MANET),multi-channel MAC protocol and on-demand minimum energy routing protocol were employed,to carry out a multi-channel based power control ad hoc network,MCBPC.This architecture controlled the frequent changes of topology,decreased the probability of contact brought by power control,and achieved the goal of energy conservation.Simulation results indicate that compared with AODV@IEEE 802.11 approaches,the proposed MCBPC solution achieves about 90% increase in the throughput and network lifetime,and 30% increase in the packet delivery ratio.…”
Get full text
Article -
763
Reputation detection based on incomplete distribution for mobile agent in wireless sensor networks
Published 2017-06-01“…Mobile agent is a kind of program which can transfer via asynchronous mode independently in the sensor network with outstanding prospects in application. …”
Get full text
Article -
764
Pilot-scale phosphorus recovery from mobile toilet wastewater in Bangkok, Thailand
Published 2025-01-01Subjects: Get full text
Article -
765
2021–2022 Florida Citrus Production Guide: Useful Websites and Mobile Apps
Published 2021-08-01Get full text
Article -
766
MIMO Channel Model with Propagation Mechanism and the Properties of Correlation and Eigenvalue in Mobile Environments
Published 2012-01-01“…Moreover, as the path moves into LOS, the 𝜆1 state with mobile movement becomes more stable than the 𝜆1 of NLOS path.…”
Get full text
Article -
767
The User Participation Incentive Mechanism of Mobile Crowdsensing Network Based on User Threshold
Published 2020-01-01“…Mobile crowdsensing (MCS) network means completing large-scale and complex sensing tasks in virtue of the mobile devices of ordinary users. …”
Get full text
Article -
768
Experimental Study on the Compressive Strength of Big Mobility Concrete with Nondestructive Testing Method
Published 2012-01-01“…An experimental study of C20, C25, C30, C40, and C50 big mobility concrete cubes that came from laboratory and construction site was completed. …”
Get full text
Article -
769
Research prospects of user information detection from encrypted traffic of mobile devices
Published 2021-02-01Subjects: “…mobile device…”
Get full text
Article -
770
Design of A Novel Robot with Omni-directional Mobile and Obstacle-crossing Function
Published 2016-01-01Subjects: Get full text
Article -
771
Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN
Published 2017-06-01“…Barrier coverage in wireless sensor networks plays a key role in intrusion detection system.How to build a robust barrier is a key problem in this research area.In order to fix the weak points caused by nodes’ energy consumption,a reinforcing method was proposed to strengthen the barrier by re-deploying some mobile nodes,in which set-based max-flow algorithm was employed to calculate the number of weak points.The vulnerability degree of each weak point was analyzed so that the mobile nodes can move to these spots to reinforce the whole barrier.Experiment results show that the algorithm can effectively strengthen the barrier,extend the survival time of the barrier and the algorithm complexity is relatively lower.…”
Get full text
Article -
772
Message forwarding based on periodically evolving social characteristics in opportunistic mobile networks
Published 2015-03-01Subjects: “…opportunistic mobile networks…”
Get full text
Article -
773
Mobile Sleep Lab: Comparison of polysomnographic parameters with a conventional sleep laboratory.
Published 2025-01-01“…We, therefore, developed a Mobile Sleep Lab in a bus powered by fuel cells with two sleep measurement chambers. …”
Get full text
Article -
774
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Published 2015-10-01Subjects: “…mobile cloud computing…”
Get full text
Article -
775
Two-level cache based streaming media scheduling algorithm for mobile network
Published 2007-01-01Subjects: “…mobile communication network…”
Get full text
Article -
776
Individual mobility prediction by considering current traveling features and historical activity chain
Published 2025-01-01Subjects: “…Mobility prediction…”
Get full text
Article -
777
Privacy-preserving attribute ticket scheme based on mobile terminal with smart card
Published 2022-10-01“…To solve the problem that the existing electronic ticket systems are challenging to deploy in resource-constrained devices and cannot prevent the sharing of tickets among unauthorized devices, a privacy-preserving attribute ticket scheme based on mobile terminal with a smart card was proposed.The smart card was a secure and constrained-yet-trusted core device that holds secret information and performs lightweight operations.The mobile terminal was a powerful helper device that handles key-independent and time-consuming operations.Firstly, the efficient attribute-based ticket scheme deployed on the mobile terminal with a smart card was constructed by combining a pseudorandom function, anonymous ephemeral identities scheme, aggregatable signatures with randomizable tags, and Pointcheval-Sanders signatures.Secondly, the security model of the electronic tickets system was presented, and the proposed scheme was proved to be unlinkable and unforgeable.Finally, the proposed scheme was implemented on a personal computer, a smart card (Aisinochip ACH512), and a smart phone (Huawei Honor 9i), and the comparison and experimental results show that it is efficient.…”
Get full text
Article -
778
Student Mobility as a Form of Education Internationalization: A Systems Approach to Management
Published 2021-09-01Subjects: Get full text
Article -
779
Exploiting interests and behavior prediction for dynamic resource discovery in mobile social networking
Published 2016-04-01Subjects: “…mobile social networking…”
Get full text
Article -
780
Compliance with reporting standards in Mobile App interventions for ART Adherence among PLHIV
Published 2024-11-01Subjects: Get full text
Article