Search results for " networking"

showing 10 items of 1264 documents

Radio frequency shielding of thin aluminized plastic filters investigated for the ATHENA X-IFU detector

2018

Copyright 2018 Society of Photo-Optical Instrumentation Engineers (SPIE). One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper are prohibited. The X-ray Integral Field Unit (X-IFU) is one of the two detectors of the ATHENA astrophysics space mission approved by ESA in the Cosmic Vision 2015-2025 Science Programme. The X-IFU consists of a large array of transition edge sensors (TES) micro-calorimeters covering a field of view of 5' diameter, sensitive in the energy range 0.2-12 keV, and providing a spectral resolution…

CryostatMaterials sciencePhysics::Instrumentation and DetectorsX-ray detectorRF attenuationField of viewCondensed Matter Physic02 engineering and technologyreverberation chamber7. Clean energyElectromagnetic interferenceSettore FIS/05 - Astronomia E AstrofisicaOpticsX-ray Integral Field Unit (X-IFU)thermal thin-film filter0202 electrical engineering electronic engineering information engineeringElectrical and Electronic Engineeringbusiness.industryElectronic Optical and Magnetic Material020502 materialsDetectorAstrophysics::Instrumentation and Methods for Astrophysicsx-ray detectorComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsresonance modeApplied MathematicATHENA X-ray observatoryEMI shielding0205 materials engineeringElectromagnetic shieldingRadio frequencyAntenna (radio)businessSpace Telescopes and Instrumentation 2018: Ultraviolet to Gamma Ray
researchProduct

‘Tour me onshore’: understanding cruise tourists’ evaluation of shore excursions through text mining

2018

ABSTRACTThe aim of this paper is to shed light on the elements underlying cruise tourists’ evaluation of shore excursions, approaching them as an interaction of expressive and instrumental components.To fulfil the aim of the investigation, a thematic content analysis of 1296 online reviews was conducted using the text-mining software Leximancer. The results of the study revealed that cruise visitors with different overall satisfaction with their guided tour focus the narrative of their opinion on different tour attributes. Thus, the dominant themes of the cruise passengers delighted with their tour included the performance of the tour guide, the arrangement of the tour, as well as the cruis…

Cultural StudiesShoregeographygeography.geographical_feature_categoryHistory05 social sciencesGeography Planning and DevelopmentExcursionCruiseTransportationPort (computer networking)Consumer satisfactionTourism Leisure and Hospitality Management0502 economics and business050211 marketingNarrativeThematic analysisMarketing050212 sport leisure & tourismTourismNature and Landscape ConservationJournal of Tourism and Cultural Change
researchProduct

Social media as a place to see and be seen : Exploring factors affecting job attainment via social media

2023

Job seekers can utilize social media platforms to actively search for job opportunities and also receive unsolicited job offers from recruiters and employers. Using data from a representative sample of Finnish social media users, this article studies both aspects of social media job attainment by analyzing how much individuals successfully apply for jobs and get recruited to positions through social media. Results show that the prevalence of successfully applying to jobs through social media does not differ statistically between socio-economic groups, but the prevalence of getting recruited to jobs through social media is greater within higher socio-economic groups. LinkedIn users are more …

Cultural Studiesimpression managementonline job searchsocial mediasocial networkingLinkedIntyöllistyminensosiaalinen mediatyömarkkinathenkilöstöhankintaManagement Information SystemsrekrytointityönhakijatPolitical Science and International RelationstyönhakuInformation Systems
researchProduct

A Note on Keys and Keystreams of Chacha20 for Multi-key Channels

2018

In this paper we analyze the keystreams generated by the Chacha20 stream cipher. We also compare these to the ones generated by its predecessor, the RC4 stream cipher. Due to the proposed multi-key channels in the upcoming TLS 1.3 standard we analyze the behavior of the keystream in the boundary case where there is a single bit difference between two keys used for the initiation of the stream cipher algorithms. The goal is to check whether a single bit change in the key has any predictable influence on the bits of the keystream output.

Cybersecuritybusiness.industryComputer scienceKeystreamBoundary (topology)Stream cipher020206 networking & telecommunications02 engineering and technologyRC4Symmetric-key algorithmChacha200202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingHardware_ARITHMETICANDLOGICSTRUCTURESbusinessSymmetric encryptionStream cipherAlgorithm
researchProduct

Versatile Direct and Transpose Matrix Multiplication with Chained Operations: An Optimized Architecture Using Circulant Matrices

2016

With growing demands in real-time control, classification or prediction, algorithms become more complex while low power and small size devices are required. Matrix multiplication (direct or transpose) is common for such computation algorithms. In numerous algorithms, it is also required to perform matrix multiplication repeatedly, where the result of a multiplication is further multiplied again. This work describes a versatile computation procedure and architecture: one of the matrices is stored in internal memory in its circulant form, then, a sequence of direct or transpose multiplications can be performed without timing penalty. The architecture proposes a RAM-ALU block for each matrix c…

Cycles per instructionBlock matrix020206 networking & telecommunications02 engineering and technologyParallel computingMatrix chain multiplicationMatrix multiplication020202 computer hardware & architectureTheoretical Computer ScienceMatrix (mathematics)Computational Theory and MathematicsHardware and ArchitectureTranspose0202 electrical engineering electronic engineering information engineeringMultiplicationHardware_ARITHMETICANDLOGICSTRUCTURESArithmeticCirculant matrixSoftwareMathematicsIEEE Transactions on Computers
researchProduct

Cluster-Based Relocation of Stations for Efficient Forest Fire Management in the Province of Valencia (Spain)

2021

Forest fires are undesirable situations with tremendous impacts on wildlife and people&rsquo

DBSCANk-meansFire preventionPoison controlDistribution (economics)02 engineering and technologylcsh:Chemical technologyBiochemistryArticleAnalytical Chemistry0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic EngineeringCluster analysisInstrumentationbusiness.industryEnvironmental resource management020206 networking & telecommunicationsartificial intelligenceDBSCANAtomic and Molecular Physics and OpticsWork (electrical)Software deploymentEnvironmental science020201 artificial intelligence & image processingfire preventionbusinessRelocationFloyd–WarshallSensors
researchProduct

DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign

2017

Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the Internet. The purpose of DNS is to translate domain names into IP addresses and vice versa. However, its simple architecture can easily be misused for malicious activities. One huge security threat concerning DNS is tunneling, which helps attackers bypass the security systems unnoticed. A DNS tunnel can be used for three purposes: as a command and control channel, for data exfiltration or even for tunneling another protocol through it. In this paper, we surveyed different techniques for DNS tunneling detection. We classified those first based on the type of data and then within the categories b…

DNS tunneling detectionSIMPLE (military communications protocol)business.industryComputer scienceDomain Name SystemComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreDomain (software engineering)protokollat0202 electrical engineering electronic engineering information engineeringAPT020201 artificial intelligence & image processingThe Internetcovert channels detectiontietoturvabusinesscomputerProtocol (object-oriented programming)
researchProduct

Criminal networks analysis in missing data scenarios through graph distances.

2021

Data collected in criminal investigations may suffer from: (i) incompleteness, due to the covert nature of criminal organisations; (ii) incorrectness, caused by either unintentional data collection errors and intentional deception by criminals; (iii) inconsistency, when the same information is collected into law enforcement databases multiple times, or in different formats. In this paper we analyse nine real criminal networks of different nature (i.e., Mafia networks, criminal street gangs and terrorist organizations) in order to quantify the impact of incomplete data and to determine which network type is most affected by it. The networks are firstly pruned following two specific methods: …

Data AnalysisFOS: Computer and information sciencesComputer and Information SciencesScienceIntelligenceSocial SciencesTransportationCriminologyCivil EngineeringSocial NetworkingComputer Science - Computers and SocietyLaw EnforcementSociologyComputers and Society (cs.CY)PsychologyHumansComputer NetworksSocial and Information Networks (cs.SI)Algorithms; Humans; Terrorism; Criminals; Data Analysis; Social NetworkingSettore INF/01 - InformaticaQCognitive PsychologyRBiology and Life SciencesEigenvaluesComputer Science - Social and Information NetworksCriminalsTransportation InfrastructurePoliceRoadsProfessionsAlgebraLinear AlgebraPeople and PlacesPhysical SciencesEngineering and TechnologyCognitive ScienceMedicineLaw and Legal SciencesPopulation GroupingsTerrorismCrimeCriminal Justice SystemMathematicsNetwork AnalysisAlgorithmsResearch ArticleNeurosciencePLoS ONE
researchProduct

Context-related data processing in artificial neural networks for higher reliability of telerehabilitation systems

2015

Classification is a data processing technique of a great significance both for native eHealth systems and web telemedicine solutions. In this sense, artificial neural networks have been widely applied in telerehabilitation as powerful tools to process information and acquire a new medical knowledge. But effective analysis of multidimensional heterogeneous medical data, still poses considerable difficulties. It was shown that processing too many data features simultaneously is costly and has some adverse effects on the resulting models classification properties. Therefore, there is a strong need to develop new techniques for selecting features from the very large data sets that include many …

Data processingArtificial neural networkComputer sciencebusiness.industryReliability (computer networking)Feature selectionContext (language use)computer.software_genreMachine learningData acquisitionTelerehabilitationeHealthData miningArtificial intelligencebusinesscomputer2015 17th International Conference on E-health Networking, Application & Services (HealthCom)
researchProduct

A Special Issue on Advances in Machine Learning for Remote Sensing and Geosciences [From the Guest Editors]

2016

Machine learning has become a standard paradigm for the analysis of remote sensing and geoscience data at both local and global scales. In the upcoming years, with the advent of new satellite constellations, machine learning will have a fundamental role in processing large and heterogeneous data sources. Machine learning will move from mere statistical data processing to actual learning, understanding, and knowledge extraction. The ambitious goal is to provide responses to the challenging scientific questions about the earth system. This special issue aims at providing an updated, refreshing view of current developments in the field. For this special issue, we have collected five articles t…

Data processingGeneral Computer Sciencebusiness.industryComputer science020206 networking & telecommunications02 engineering and technologyMachine learningcomputer.software_genreData scienceField (computer science)Earth system scienceKnowledge extractionRemote sensing (archaeology)0202 electrical engineering electronic engineering information engineeringGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingArtificial intelligenceElectrical and Electronic EngineeringbusinessInstrumentationcomputerRemote sensingConstellationIEEE Geoscience and Remote Sensing Magazine
researchProduct