Results 111 to 120 of about 288,912 (293)
Design and implementation of geographic information system with mobile terminal and 5G network
Abstract Remote insurance mainly completes quotation, insurance application and payment through the PC terminal and mobile terminal, and the premium directly enters the insurance account. This article takes remote insurance as an example. First, it analyses the requirements of the remote insurance and insurance system, and then collects data from the ...
Huijun Xiao, Tangsen Huang, Ensong Jiang
wiley +1 more source
Telecom technology and audio quality [PDF]
While successive technology has elevated most aspects of audio quality, this paper shows how it has lowered some aspects, especially bandwidth. We show how technology and network integration reduce our ability to discriminate phonemes and identify ...
Thompson, RA
core
Abstract Objective The latest European Medicines Agency (EMA) guideline on the clinical investigation of medicines to treat epileptic disorders was adopted by the EMA Committee for Medicinal Products for Human Use in 2025. We compared this guideline with the previous version (2010), highlighting areas where significant revisions were introduced ...
Stéphane Auvin +7 more
wiley +1 more source
The topic discussed was the intelligent design of network multimedia using BD and virtual AI technology. First of all, the authors gave a brief overview of its relevant research background, and then comprehensively analysed the advantages and disadvantages of previous scholars' research on network multimedia.
Xin Zhang
wiley +1 more source
Analysis of google entry in unified communications from a resource and competence perspective [PDF]
The business communications market has been deeply transformed by technological and product convergence, due to the progressive substitution of traditional TDM-based voice products and services by ToIP (Telephony over IP) based products and services. The
Vialle, Pierre
core
Deconstructing Web Browsers Using SoonKra [PDF]
Many software engineers would agree that, had it not been for virtual machines, the analysis of public-private key pairs might never have occurred. In fact, few cryptographers would disagree with the understanding of voice-over-IP.
Hensley, A. (Abel)
core
Abstract Objective To assess the feasibility, technical performance, and safety of a novel endovascular electroencephalogram (eEEG) electrode, EP‐01, designed for minimally invasive seizure localization in patients with drug‐resistant epilepsy. Methods This single‐center, prospective, exploratory trial enrolled five patients with drug‐resistant ...
Kota Araki +9 more
wiley +1 more source
In telecommunication technology VoIP protocol has become a very popular technology as it is cheap, efficient. Also it has easy deployment. While it has lots of advantages it brings lots of vulnerabilities.
Selin KAMAS, Muhammed Ali AYDIN
doaj +2 more sources
Widening participation in the International League Against Epilepsy: Looking to the future
Abstract The International League Against Epilepsy (ILAE) is a global organization dedicated to improving the lives of people with epilepsy through education, research, and advocacy. Recognizing the need for broader engagement and multidisciplinary collaboration, the ILAE has established five sections: Young Epilepsy Section (YES), Nursing, Social Work
J. Helen Cross +13 more
wiley +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source

