Search results for "PROTOCOL"

showing 10 items of 1808 documents

Impact of Structural, Photochemical and Instrumental Effects on Leaf and Canopy Reflectance Variability in the 500–600 nm Range

2021

Current rapid technological improvement in optical radiometric instrumentation provides an opportunity to develop innovative measurements protocols where the remote quantification of the plant physiological status can be determined with higher accuracy. In this study, the leaf and canopy reflectance variability in the PRI spectral region (i.e., 500–600 nm) is quantified using different laboratory protocols that consider both instrumental and experimental set-up aspects, as well as canopy structural effects and vegetation photoprotection dynamics. First, we studied how an incorrect characterization of the at-target incoming radiance translated into an erroneous vegetation reflectance spectru…

spectroscopyreflectanceproximal sensing; spectroscopy; protocols; irradiance; reflectance; vegetation index; sun-/shade-adapted leaves; xanthophyll cycleirradianceScienceQGeneral Earth and Planetary Sciencesprotocolsproximal sensingvegetation indexRemote Sensing
researchProduct

Broncoscopia virtuale in pazienti con lesioni endobronchiali stenosanti. Ottimizzazione della tecnica con TC spirale monostrato

2004

PURPOSE: To describe an original protocol for single slice spiral Computed Tomography (CT) virtual bronchoscopy in the evaluation of patients with central airway stenoses and compare the results with fibreoptic bronchoscopy. MATERIALS AND METHODS: Ten patients (4 female and 6 male; age range 22-60 years; mean age 44 years) with endobronchial disease diagnosed by fibreoptic bronchoscopy (8 malignant tumours, 1 benign tumour and 1 fibroid stenosis) underwent virtual bronchoscopy with single slice spiral CT. A panoramic spiral CT scan of the whole chest was first obtained. Once the area of interest had been identified, a new contrast enhanced scan was performed, from bottom to top, with the fo…

spiral CTvirtual bronchoscopyprotocoloptimization
researchProduct

Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems

2022

In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses. peerReviewed

sulautettu tietotekniikkacybersecurityprotocolsasejärjestelmätilmailucyber-physical systemsfirmwaretakaisinmallinnusvideo surveillanceesineiden internetCCTVkyberturvallisuushaavoittuvuusvulnerabilitieswireless pyrotechnicsremote firing systemsexploitsvalvontajärjestelmätreverse engineeringZigbeeprotokollatcritical infrastructureaviationRFinfrastruktuuritbinareADS-B
researchProduct

A Randomized Controlled Trial Protocol for Using an Accelerometer-Smartphone Application Intervention to Increase Physical Activity and Improve Healt…

2021

Physical activity is beneficial for improving health and reducing sick leave absences. This article describes a protocol for an intervention using an interactive accelerometer smartphone application, telephone counselling, and physical activity recordings to increase the physical activity of workers in the military and improve their health. Under the protocol, employees from six military brigades in Finland will be randomly assigned to intervention and control groups. The intervention group’s participants will use accelerometers to measure their daily physical activities and their quality of sleep for six months. They will receive feedback based on these measurements via a smartphone applic…

suorituskyky318 Medical biotechnologytyöterveysphysical activityhealthinterventiotutkimusphysical performancesairauspoissaolotBiochemistry Genetics and Molecular Biology (miscellaneous)mobile applications3142 Public health care science environmental and occupational healthfyysinen kuntoaccelerometerStructural Biologysotilashenkilöstösick leave absencesProtocolmobiilisovelluksetfyysinen aktiivisuusinterventionBiotechnologyMethods and Protocols
researchProduct

Software-as-a-Service Revenue Models

2013

This paper give an overview of the three main revenue models, focusing on the advantages and disadvantages for SaaS providers and their customers. Also identify the most effective revenue model for particular situations.

ta113Computer sciencebusiness.industrycomputer.internet_protocolSoftware as a serviceSoftware developmentInformation technologyCloud computingService-oriented architectureComputer securitycomputer.software_genreComputer Science ApplicationsEngineering managementRevenue modelHardware and ArchitectureRevenue assuranceYield managementbusinesscomputerSoftwareIT Professional
researchProduct

Two-phase routing in three-dimensional blocked optical tori

2014

The contribution of this paper is an all-optical 3D network architecture. We describe scheduled, two-phase routing for it. The three-dimensional blocked optical torus BOT of block size b consists of b2 × b2 × b2 nodes for the first phase routing. Processors are evenly deployed at the underlying torus so that every bth node consists of a processor. Additionally, a BOT consists of b3 blocks of b × b × b subnetworks for the second phase routing. Routing of each packet is done in two phases. Firstly, packets are routed from source processor to an intermediate target node at the target block. Secondly, packets are routed from the intermediate targets at the target block to the target processor (…

ta113Dynamic Source Routingta213Computer sciencebusiness.industryNetwork packetNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSLink-state routing protocolDestination-Sequenced Distance Vector routingRouting (electronic design automation)businessBlock sizeComputer networkBlock (data storage)Proceedings of the 15th International Conference on Computer Systems and Technologies
researchProduct

Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications

2014

Abstract Constrained Application Protocol (CoAP) has been introduced as a simpler alternative to the Hypertext Transfer Protocol (HTTP) for connecting constrained smart objects to the Web. The adoption of the protocol depends on its relative advantage, and the cost–benefit associated with the use of the protocol is a significant factor affecting a protocol adoption decision. This paper aims at deepening the understanding of the cost–benefits of CoAP and identifies the application scenarios where its use is likely to be economically justifiable. The paper analyzes the costs of using CoAP and HTTP in the Web of Things (WoT) applications, by identifying the components of the total cost of owne…

ta113Information Systems and ManagementHypertext Transfer Protocolta213Cost efficiencyComputer scienceSmart objectsbusiness.industrycomputer.internet_protocolta111Computer securitycomputer.software_genreManagement Information SystemsConstrained Application ProtocolWeb of ThingsArts and Humanities (miscellaneous)Developmental and Educational PsychologyOverhead (computing)businessta512Protocol (object-oriented programming)computerInformation SystemsComputer networkDecision Support Systems
researchProduct

Value Creation and Evolution of a Value Network: A Longitudinal Case Study on a Platform-as-a-Service Provider

2014

Current research on cloud computing emphasizes the important role of Platform-as-a-Service (PaaS) providers. However, little is known about how PaaS providers can offer value to the content providers and firms operating the platform. The findings demonstrate how a small PaaS provider in the cloud gaming market was able to develop a strong position in the value network by offering direct and indirect value to its partners. The findings also reveal how the firm developed its value network over fourteen years, from a complex network with several actors to a very simple value network which included only partners of prime importance. peerReviewed

ta113Knowledge managementSIMPLE (military communications protocol)business.industrySoftware as a serviceCloud computingBusiness valueComplex networkvalue crationPlatform-as-a-Servicevalue networkValue networkValue (economics)Position (finance)BusinessMarketing2014 47th Hawaii International Conference on System Sciences
researchProduct

Sensory modalities and mental content in product experience

2015

Contemporary research in human-technology interaction emphasises the need to focus on what people experience when they interact with technological artefacts. Understanding how people experience products requires detailed investigation of how physical design properties are mentally represented, and the theorisation of how people represent information obtained through different modalities still needs work. The objective of this study is to investigate how people experience modality-related affective aspects of products, using the psychological concept of mental content. For this purpose, we adopt the framework of user psychology, which is the sub-area of psychology involved with investigating…

ta113Modalitiesmedia_common.quotation_subjectCognitionkäyttäjäpsykologiaVariance (accounting)Industrial and Manufacturing Engineeringproduct experienceuser psychologysensory modalityStimulus modalityFeelingmental contentArtificial IntelligenceContent analysisaffective interactionProduct (category theory)PsychologyThink aloud protocolSocial psychologymedia_commonCognitive psychologyInternational Conference on Applied Human Factors and Ergonomics
researchProduct

H.264 QoS and Application Performance with Different Streaming Protocols

2015

Streaming techniques, including the selected streaming protocol, have an effect on the streaming quality. In this study, the performance of three different streaming protocols in a disturbed communication channel is evaluated with a modified version of the FFPlay player. A H.264 encoded video is used as a test sequence. The number of displayed image frames, the frame rate and playout duration are used as objective metrics for QoS. The metrics brings out differences of streaming protocols in our test environment. They are measured at the application level and have a connection to the user experience. peerReviewed

ta113Protocol (science)HLSbusiness.industryComputer sciencecomputer.internet_protocolQuality of serviceReal-time computingstreaming protocolsQoSFrame rateRTSPTest sequenceUser experience designRTMPReal Time Streaming ProtocolQoEH.264businesscomputerComputer networkProceedings of the 8th International Conference on Mobile Multimedia Communications
researchProduct