Search results for "Communications"
showing 10 items of 3827 documents
An AmI-Based Software Architecture Enabling Evolutionary Computation in Blended Commerce: The Shopping Plan Application
2015
This work describes an approach to synergistically exploit ambient intelligence technologies, mobile devices, and evolutionary computation in order to support blended commerce or ubiquitous commerce scenarios. The work proposes a software architecture consisting of three main components: linked data for e-commerce, cloud-based services, and mobile apps. The three components implement a scenario where a shopping mall is presented as an intelligent environment in which customers use NFC capabilities of their smartphones in order to handle e-coupons produced, suggested, and consumed by the abovesaid environment. The main function of the intelligent environment is to help customers define shopp…
LTE-based passive radars and applications: a review
2021
This paper provides an overview of the most recent passive radars based on long-term evolution (LTE). To begin, this paper investigates the various characteristics and requirements of 4 G LTE signals for radar, taking performance aspects such as range, velocity, range resolution, and velocity resolution into account. An ambiguity function analysis is performed on a measured LTE signal using the synchronization and reference signal components to evaluate key performance parameters such as Doppler and range characteristics. We also discuss how LTE passive radar can be used in a variety of applications. The detailed analysis of the LTE downlink signal, its structural overview, and the effect o…
The popularization of plate tectonics: presenting the concepts of dynamics and time
1996
There have been many attempts to describe and represent the theory of plate tectonics to laypeople. In the context of a study conducted at the request of a museum, we have tried to determine how the concepts of both geological time and the movements of the plates have been reformulated. After having systematically studied in detail publications aimed at more or less educated readers, we have selected a corpus of twelve articles from nine different magazines or journals. Among the different means of expression used by the popularizers, rhetorical figures constitute a significant resource. Procedures based on analogy (metaphor, comparison, analogical reasoning) were brought together in a sing…
Complicaciones tras técnicas de anestesia regional
2008
In recent years, there has been a considerable increase in the number of procedures carried out under regional anesthesia. The techniques used can be associated with a number of complications, which should be understood so that they can be recognized and managed appropriately. The overall incidence of reported complications associated with these techniques is low and therefore, with currently available data, we can only have an approximate idea of their incidence. The objective of this study is to systematically describe the complications that may arise from the use of neuraxial and peripheral regional anesthesia techniques.
Water Structure Recovery in Chaotropic Anion Recognition: High-Affinity Binding of Dodecaborate Clusters to γ-Cyclodextrin
2015
Dodecaborate anions of the type B12X12(2-) and B12X11Y(2-) (X=H, Cl, Br, I and Y=OH, SH, NH3(+), NR3(+)) form strong (K(a) up to 10(6) L mol(-1), for B12Br12(2-)) inclusion complexes with γ-cyclodextrin (γ-CD). The micromolar affinities reached are the highest known for this native CD. The complexation exhibits highly negative enthalpies (up to -25 kcal mol(-1)) and entropies (TΔS up to -18.4 kcal mol(-1), both for B12I12(2-)), which position these guests at the bottom end of the well-known enthalpy-entropy correlation for CDs. The high driving force can be traced back to a chaotropic effect, according to which chaotropic anions have an intrinsic affinity to hydrophobic cavities in aqueous …
Mitigating DDoS using weight‐based geographical clustering
2020
Distributed denial of service (DDoS) attacks have for the last two decades been among the greatest threats facing the internet infrastructure. Mitigating DDoS attacks is a particularly challenging task as an attacker tries to conceal a huge amount of traffic inside a legitimate traffic flow. This article proposes to use data mining approaches to find unique hidden data structures which are able to characterize the normal traffic flow. This will serve as a mean for filtering illegitimate traffic under DDoS attacks. In this endeavor, we devise three algorithms built on previously uncharted areas within mitigation techniques where clustering techniques are used to create geographical clusters …
From the prehistoric to the posthuman selfie
2019
Abstract LeRoy McDermott’s hypothesis proposes a perceptual interpretation of the Venus statues from to the Upper Paleolithic period these being in fact the first examples of human self-representations. The arguments he brings are of an artistic nature par excellence and they refer to the visual distortions arising from the subject’s point of view. The fantasy of being admired by others through the means of the nude selfie has generated a whole trend in today’s pop culture and Kim Kardashian is a prime example in this sense. The “shareware body” has gone through an entire history of significance, from Albrecht Dürer’s mystical meaning of the body, to Érika Ordosgoitti’s activist take on the…
A Hardware and Secure Pseudorandom Generator for Constrained Devices
2018
Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…
A future of journalism beyond the objectivity-dialogue divide? : Hybridity in the news of entrepreneurial journalists
2019
As pioneers of new ideas and practices, many entrepreneurial journalists spearhead the change of journalism towards hybridity. By applying appraisal theory, this article examines a hybrid of objectivity and dialogue in daily news articles by five entrepreneurial journalism outlets – Axios, MustRead, National Observer, The Skimm and the Voice of San Diego. For comparative purposes, a dataset from three legacy media outlets was also analysed. The results show that the entrepreneurial journalism outlets employ journalistic dialogue in otherwise stylistically objective news texts notably more often than do legacy media outlets. Dialogic registers provide subtle, non-partisan assessments of eve…
Digital Home: Life Transitions and Digital Domestic Practices in Later Life
2019
As older adults become active users of digital technologies, digital activity among this age group is increasingly associated with life stage factors. This paper discusses the understanding of life stage as explanatory factors in older adults’ digital engagement by exploring the association between life transitions and digital domestic practices in Finland. The study is based on an analysis of qualitative, in-person interview data from 20 participants between the ages of 50 and 78 who recently bought their own apartment in Western or Central Finland. The aims are to identify variances of life transitions in relation to domestic practices, investigate the association between life transitions…