Search results for "Communications"

showing 10 items of 3827 documents

An AmI-Based Software Architecture Enabling Evolutionary Computation in Blended Commerce: The Shopping Plan Application

2015

This work describes an approach to synergistically exploit ambient intelligence technologies, mobile devices, and evolutionary computation in order to support blended commerce or ubiquitous commerce scenarios. The work proposes a software architecture consisting of three main components: linked data for e-commerce, cloud-based services, and mobile apps. The three components implement a scenario where a shopping mall is presented as an intelligent environment in which customers use NFC capabilities of their smartphones in order to handle e-coupons produced, suggested, and consumed by the abovesaid environment. The main function of the intelligent environment is to help customers define shopp…

Ambient intelligenceArticle SubjectExploitDatabaseComputer Networks and CommunicationsComputer sciencebusiness.industryShopping mallCloud computingTK5101-6720computer.software_genreComputer Science ApplicationsTelecommunicationIntelligent environmentUbiquitous commerceSoftware architecturebusinessMobile devicecomputerMobile Information Systems
researchProduct

LTE-based passive radars and applications: a review

2021

This paper provides an overview of the most recent passive radars based on long-term evolution (LTE). To begin, this paper investigates the various characteristics and requirements of 4 G LTE signals for radar, taking performance aspects such as range, velocity, range resolution, and velocity resolution into account. An ambiguity function analysis is performed on a measured LTE signal using the synchronization and reference signal components to evaluate key performance parameters such as Doppler and range characteristics. We also discuss how LTE passive radar can be used in a variety of applications. The detailed analysis of the LTE downlink signal, its structural overview, and the effect o…

Ambiguity functionbusiness.industryComputer scienceSignalSynchronizationPassive radarlaw.inventionsymbols.namesakelawTelecommunications linksymbolsElectronic engineeringGeneral Earth and Planetary SciencesWirelessRadarbusinessDoppler effectVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

The popularization of plate tectonics: presenting the concepts of dynamics and time

1996

There have been many attempts to describe and represent the theory of plate tectonics to laypeople. In the context of a study conducted at the request of a museum, we have tried to determine how the concepts of both geological time and the movements of the plates have been reformulated. After having systematically studied in detail publications aimed at more or less educated readers, we have selected a corpus of twelve articles from nine different magazines or journals. Among the different means of expression used by the popularizers, rhetorical figures constitute a significant resource. Procedures based on analogy (metaphor, comparison, analogical reasoning) were brought together in a sing…

Analogical reasoningMetaphorCommunicationmedia_common.quotation_subject05 social sciencesAnalogy050801 communication & media studiesContext (language use)050905 science studies[SHS.LANGUE] Humanities and Social Sciences/Linguistics[SHS.INFO] Humanities and Social Sciences/Library and information sciencesLinguistics0508 media and communicationsResource (project management)Arts and Humanities (miscellaneous)Expression (architecture)Dynamics (music)Developmental and Educational PsychologyRhetorical questionSociology0509 other social sciencesSocial sciencemedia_commonPublic Understanding of Science
researchProduct

Complicaciones tras técnicas de anestesia regional

2008

In recent years, there has been a considerable increase in the number of procedures carried out under regional anesthesia. The techniques used can be associated with a number of complications, which should be understood so that they can be recognized and managed appropriately. The overall incidence of reported complications associated with these techniques is low and therefore, with currently available data, we can only have an approximate idea of their incidence. The objective of this study is to systematically describe the complications that may arise from the use of neuraxial and peripheral regional anesthesia techniques.

Anesthesiology and Pain Medicinebusiness.industryRegional anesthesiaAnesthesiaBlock (telecommunications)Incidence (epidemiology)fungiMEDLINEfood and beveragesMedicineCritical Care and Intensive Care MedicinebusinessRevista Española de Anestesiología y Reanimación
researchProduct

Water Structure Recovery in Chaotropic Anion Recognition: High-Affinity Binding of Dodecaborate Clusters to γ-Cyclodextrin

2015

Dodecaborate anions of the type B12X12(2-) and B12X11Y(2-) (X=H, Cl, Br, I and Y=OH, SH, NH3(+), NR3(+)) form strong (K(a) up to 10(6) L mol(-1), for B12Br12(2-)) inclusion complexes with γ-cyclodextrin (γ-CD). The micromolar affinities reached are the highest known for this native CD. The complexation exhibits highly negative enthalpies (up to -25 kcal mol(-1)) and entropies (TΔS up to -18.4 kcal mol(-1), both for B12I12(2-)), which position these guests at the bottom end of the well-known enthalpy-entropy correlation for CDs. The high driving force can be traced back to a chaotropic effect, according to which chaotropic anions have an intrinsic affinity to hydrophobic cavities in aqueous …

AnionsBoron CompoundsModels MolecularHofmeister seriesInorganic chemistrySupramolecular chemistrysyklodekstriinithost–guest complexes010402 general chemistry01 natural sciencessupramolecular chemistryCatalysissupramolekulaarinen kemiaMoleculeBinding siteta116Binding SitescyclodextrinsAqueous solutionMolecular Structure010405 organic chemistryChemistryDodecaborateWaterBorclusterGeneral MedicineGeneral ChemistryAffinitiesCommunicationsboron clusters0104 chemical sciencesCrystallographyChaotropic agentThermodynamicsgamma-CyclodextrinsHofmeister seriesAngewandte Chemie International Edition
researchProduct

Mitigating DDoS using weight‐based geographical clustering

2020

Distributed denial of service (DDoS) attacks have for the last two decades been among the greatest threats facing the internet infrastructure. Mitigating DDoS attacks is a particularly challenging task as an attacker tries to conceal a huge amount of traffic inside a legitimate traffic flow. This article proposes to use data mining approaches to find unique hidden data structures which are able to characterize the normal traffic flow. This will serve as a mean for filtering illegitimate traffic under DDoS attacks. In this endeavor, we devise three algorithms built on previously uncharted areas within mitigation techniques where clustering techniques are used to create geographical clusters …

Anomaly intrusion detectionsComputer Networks and CommunicationsComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDenial-of-service attackFault tolerancecomputer.software_genreClustering techniquesData segmentComputer Science ApplicationsTheoretical Computer ScienceComputational Theory and MathematicsMitigating DDoS attacksCloud burstingData miningCluster analysisWeight based dosingcomputerSoftwareAddress clusteringMitigation techniquesConcurrency and Computation: Practice and Experience
researchProduct

From the prehistoric to the posthuman selfie

2019

Abstract LeRoy McDermott’s hypothesis proposes a perceptual interpretation of the Venus statues from to the Upper Paleolithic period these being in fact the first examples of human self-representations. The arguments he brings are of an artistic nature par excellence and they refer to the visual distortions arising from the subject’s point of view. The fantasy of being admired by others through the means of the nude selfie has generated a whole trend in today’s pop culture and Kim Kardashian is a prime example in this sense. The “shareware body” has gone through an entire history of significance, from Albrecht Dürer’s mystical meaning of the body, to Érika Ordosgoitti’s activist take on the…

Anthropology05 social sciencesPosthuman050801 communication & media studiesPrehistoryMedia theory0508 media and communicationsCulture theory0502 economics and businessCultural studiesLiterary criticism050211 marketingSociologySelfieHealth communicationSæculum
researchProduct

A Hardware and Secure Pseudorandom Generator for Constrained Devices

2018

Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…

Applied cryptography; Chaotic circuits; Constrained devices; Discrete dynamical systems; FPGA; Lightweight Cryptography; Random number generators; Statistical tests; Control and Systems Engineering; Information Systems; Computer Science Applications1707 Computer Vision and Pattern Recognition; Electrical and Electronic EngineeringHardware security moduleComputer scienceRandom number generationCryptography[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyPseudorandom generatorConstrained devicesLightweight CryptographyChaotic circuits[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]PermutationRandom number generatorsStatistical tests0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringField-programmable gate arrayThroughput (business)FPGAPseudorandom number generatorGenerator (category theory)business.industry020208 electrical & electronic engineeringComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsDiscrete dynamical systems[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science ApplicationsApplied cryptography[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Control and Systems EngineeringKey (cryptography)[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessComputer hardwareInformation SystemsIEEE Transactions on Industrial Informatics
researchProduct

A future of journalism beyond the objectivity-dialogue divide? : Hybridity in the news of entrepreneurial journalists

2019

As pioneers of new ideas and practices, many entrepreneurial journalists spearhead the change of journalism towards hybridity. By applying appraisal theory, this article examines a hybrid of objectivity and dialogue in daily news articles by five entrepreneurial journalism outlets – Axios, MustRead, National Observer, The Skimm and the Voice of San Diego. For comparative purposes, a dataset from three legacy media outlets was also analysed. The results show that the entrepreneurial journalism outlets employ journalistic dialogue in otherwise stylistically objective news texts notably more often than do legacy media outlets. Dialogic registers provide subtle, non-partisan assessments of eve…

Appraisal theory050402 sociologymedia_common.quotation_subject518 Media and communicationshybrid journalism050801 communication & media studies0508 media and communicationsHybridity0504 sociologyArts and Humanities (miscellaneous)dialogisuusobjektiivisuusSociologyFIELDentrepreneurial journalismmedia_commondialoguefuture of journalismCommunicationField (Bourdieu)05 social sciencesAppraisal theory16. Peace & justiceappraisal theoryObject (philosophy)EpistemologyhybridimediajournalismiJournalismobjectivitytulevaisuusarviointiObjectivity (philosophy)HYBRIDIZATION
researchProduct

Digital Home: Life Transitions and Digital Domestic Practices in Later Life

2019

As older adults become active users of digital technologies, digital activity among this age group is increasingly associated with life stage factors. This paper discusses the understanding of life stage as explanatory factors in older adults’ digital engagement by exploring the association between life transitions and digital domestic practices in Finland. The study is based on an analysis of qualitative, in-person interview data from 20 participants between the ages of 50 and 78 who recently bought their own apartment in Western or Central Finland. The aims are to identify variances of life transitions in relation to domestic practices, investigate the association between life transitions…

Appropriation0508 media and communications05 social sciences050801 communication & media studies050109 social psychology0501 psychology and cognitive sciencesSociologyMarketingOlder peopleLife stageInterview data
researchProduct