Suggested Topics within your search.
Suggested Topics within your search.
- Telecommunication 7
- Information technology 2
- Mass media 2
- Communication 1
- Communication in rehabilitation 1
- Communication policy 1
- Computers 1
- Electronics 1
- Information theory 1
- Internet 1
- Medical rehabilitation 1
- Rehabilitation 1
- Social aspects 1
- Telecommunication in medicine 1
- Telecommunication policy 1
- Telecommunication systems 1
- Telemedicine 1
- methods 1
- telecommunication 1
-
681
Supply Fee for In-house Fiber Networks — A Critical Review of a New Tool for Accelerating the Roll-out of Gigabit Connections
Published 2021-11-01“…Abstract From 1 December 2021, a supply fee for in-house fiber networks is temporarily introduced into the Telecommunications Act. This article reviews the provisions of the new Paragraph 72 of this Act. …”
Get full text
Article -
682
-
683
Asynchronous Gossip-Based Gradient-Free Method for Multiagent Optimization
Published 2014-01-01Get full text
Article -
684
-
685
Performance Analysis of Microwave Photonic Spectral Filters based on Optical Microcombs
Published 2025-01-01Get full text
Article -
686
-
687
-
688
A QoE and Availability-Aware Framework for Network Slice Placement and Resource Allocation
Published 2025-01-01Get full text
Article -
689
-
690
AlGaAs Tunnel Junction (TJ)-VCSELs: A NEGF–Drift-Diffusion Approach
Published 2024-01-01Get full text
Article -
691
-
692
-
693
-
694
-
695
Developing the digital economy in French rural regions?
Published 2011-12-01“…These facilities offer IT gear and services that individuals and small enterprises could not afford such as DSL symmetrical telecommunications, a videoconferencing system, secretarial and concierge services. …”
Get full text
Article -
696
Core network service model and networking scheme oriented NB-IoT
Published 2017-04-01“…It is a huge market space for narrowband-ineternet of things (NB-IoT),and NB-IoT is the focus of future development direction.The global telecommunications operators have begun to distributed actively.In order to better determine the network deployment of the construction program and resource allocation,from the business scene of NB-IoT,the NB-IoT service characteristics were analyzed,and the NB-IoT core network business model parameters and networking solutions were given,which was of great significance to the follow-up NB-IoT core network resource allocation and planning scheme.…”
Get full text
Article -
697
Research on NFV fault association and fault self-healing
Published 2017-11-01“…NFV implements the hardware and software decoupling of telecommunications network equipment,gets rid of the dependence on dedicated hardware equipment.NFV brings benefits such as resource sharing,automatic deployment,flexibility and other features,but it also brings some problems such as more fault points,difficult fault analysis and so on.It results in NFV network operation and maintenance more difficult.The NFV fault process and fault association were analyzed,and guidance for fault location processing in NFV was provided.At the same time,the VNF fault self-healing implementation scheme was given to realize the network element and service fault self-healing,and improve capability of automatic operation and maintenance.…”
Get full text
Article -
698
Globalização e integração territorial – o caso da região de Tefé no Amazonas
Published 2018-04-01“…It was concluded that this relativized integration occurs due to the existence of a telecommunications network and services with limited infrastructures that damage the fluidity of relations and flows. …”
Get full text
Article -
699
ELECTROMAGNETIC WAVES SHIELDING BY THE PLANE ONE-LAYER SCREEN MADE FROM MATERIALS WITH SPACE DISPERSION
Published 2017-12-01Get full text
Article -
700
NFV security requirements and strategies
Published 2016-03-01“…Rapid development of cloud computing technology not only brings the convenience of high-speed computing,but also buries a lot of unsafe factors.European Telecommunications Standards Institute(ETSI)pointed out that the problem of virtualization security would become a major problem for telecom operators and enterprises in the next year.The NFV architecture security technology was researched,the importance of the safety was pointed out,the facilities of availability management and startup related safety problems were analyzed,and the NFV software security risks was summarized too.Through continuous improvement of NFV security technology makes cloud computing environment can be more secure and orderly development.…”
Get full text
Article