Search results for "RDW"

showing 10 items of 1401 documents

A Telemetry, Tracking, and Command Antennas System for Small-Satellite Applications

2019

Circularly polarized (CP) antennas are used in space applications for telemetry tracking and command (TT&amp

small satellitesComputer Networks and CommunicationsFrequency bandTT&amplcsh:TK7800-836002 engineering and technologyTracking (particle physics)circular patchOpticsCircular patch; Circular polarization; Small satellites; TT&CComputer Science::Systems and ControlCTelemetryTelecommunications link0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringCircular polarizationComputer Science::Information TheoryPatch antennaPhysicsbusiness.industryAxial ratio020208 electrical & electronic engineeringlcsh:ElectronicsAstrophysics::Instrumentation and Methods for Astrophysics020206 networking & telecommunicationsHardware and ArchitectureControl and Systems EngineeringPhysics::Space PhysicsSignal Processingcircular polarizationAntenna (radio)businessSmall satelliteElectronics
researchProduct

Annales des travaux des auditeurs de l'IHEDN 2009 : "Y a-t-il un retour du "soft power" dans les relations internationales ?

2009

CD rom; International audience

soft powerHardware_MEMORYSTRUCTURESIHEDN[ SHS.HIST ] Humanities and Social Sciences/History[SHS.HIST] Humanities and Social Sciences/History[ SHS ] Humanities and Social Sciences[SHS] Humanities and Social SciencesauditeursHardware_CONTROLSTRUCTURESANDMICROPROGRAMMING[SHS.HIST]Humanities and Social Sciences/HistoryComputingMilieux_MISCELLANEOUS[SHS]Humanities and Social Sciencesrelations internationales
researchProduct

Attacking TrustZone on devices lacking memory protection

2021

AbstractARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the system. In this paper, we present a DMA attack tutorial from the insecure world onto the secure world, and the design and implementation of this attack in a real insecure hardware.

sulautettu tietotekniikkaComputational Theory and MathematicsHardware and ArchitectureComputer Science (miscellaneous)esineiden internetTrustZonesecuritytietoturvaverkkohyökkäyksetSoftwarehaavoittuvuus
researchProduct

Towards Automated Classification of Firmware Images and Identification of Embedded Devices

2017

Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…

sulautettu tietotekniikkaComputer scienceVendorvulnerability02 engineering and technologycomputer.software_genreSoftware020204 information systems0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]tietoturvadata securityhaavoittuvuusbusiness.industryFirmwareFingerprint (computing)020206 networking & telecommunicationsubiquitous computingRandom forestIdentification (information)koneoppiminenmachine learningEmbedded systemUser interfaceHardware_CONTROLSTRUCTURESANDMICROPROGRAMMINGbusinesscomputerPrivate network
researchProduct

Software-as-a-Service Revenue Models

2013

This paper give an overview of the three main revenue models, focusing on the advantages and disadvantages for SaaS providers and their customers. Also identify the most effective revenue model for particular situations.

ta113Computer sciencebusiness.industrycomputer.internet_protocolSoftware as a serviceSoftware developmentInformation technologyCloud computingService-oriented architectureComputer securitycomputer.software_genreComputer Science ApplicationsEngineering managementRevenue modelHardware and ArchitectureRevenue assuranceYield managementbusinesscomputerSoftwareIT Professional
researchProduct

A modelling framework for social media monitoring

2013

This paper describes a hierarchical, three-level modelling framework for monitoring social media. Immediate social reality is modelled through the first level of the models. They represent various virtual communities at social media sites and adhere to the social world models of the sites, i.e., the "site ontologies". The second-level model is a temporal multirelational graph that captures the static and dynamic properties of the first-level models from the perspective of the monitoring site. The third-level model consists of a temporal relational database scheme that models the temporal multirelational graph within the database. The models are specified and instantiated at the monitoring s…

ta113Graph databaseComputer Networks and Communicationsbusiness.industryComputer scienceRelational databaseSocial realitySchematiccomputer.software_genreTemporal databaseHardware and ArchitectureGraph (abstract data type)The InternetSocial mediaData miningbusinesscomputerInformation SystemsInternational Journal of Web Engineering and Technology
researchProduct

Consumer value of camera-based mobile interaction with the real world

2013

Camera-based mobile interaction with the real world allows consumers to connect digital information with the real-world environment, and furthermore, to interact with real-world objects and places. To explore and understand the types of consumer value in the context of such consumer-level applications, we applied the critical incident technique to reflect actual use experiences from 107 application users with a recognized consumer value framework by Holbrook. The findings of the study suggest that at the current state value is heavily based on utilitarian efficiency and excellence. Although the applications enable a diverse value, they have yet to fulfill their potential in providing hedoni…

ta113MultimediaComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subjectContext (language use)computer.software_genreComputer Science ApplicationsHardware and ArchitectureHuman–computer interactionExcellenceState (computer science)ta512computerCritical Incident TechniqueValue (mathematics)Mobile interactionSoftwareInformation SystemsValue frameworkActual usemedia_commonPervasive and Mobile Computing
researchProduct

Utilizing online serious games to facilitate distributed requirements elicitation

2015

Online serious games are used to facilitate distributed requirements elicitation.Interactive games enhance collaboration and communication between project members.Serious games raise individuals' confidence to engage in requirements elicitation.Using serious games can improve both quality and quantity of software requirements.Serious games specially enhance the performance of less-experienced stakeholders. Requirements elicitation is one of the most important and challenging activities in software development projects. A variety of challenges related to requirements elicitation are reported in the literature, of which the lack of proper communication and knowledge transfer between software …

ta113Requirements managementBusiness requirementsRequirementEngineeringserious gamesKnowledge managementbusiness.industryrequirements elicitationSoftware developmentRequirements elicitationpelitEmpirical researchhyötypelitHardware and Architecturesoftware developmentohjelmistokehitysbusinessRequirements analysisKnowledge transferSoftwaregamesInformation SystemsJournal of Systems and Software
researchProduct

Visualization in the integrated SimPhoNy multiscale simulation framework

2018

Abstract We describe three distinct approaches to visualization for multiscale materials modelling research. These have been developed with the framework of the SimPhoNy FP7 EU-project, and complement each other in their requirements and possibilities. All have been integrated via wrappers to one or more of the simulation approaches within the SimPhoNy project. In this manuscript we describe and contrast their features. Together they cover visualization needs from electronic to macroscopic scales and are suited to simulations made on personal computers, workstations or advanced High Performance parallel computers. Examples as well as recommendations for future calculations are presented.

ta113Workstation010308 nuclear & particles physicsComputer scienceGeneral Physics and AstronomyElectronic charge density01 natural scienceselectronic charge densityComputational scienceVisualizationComplement (complexity)law.inventionatomisticHardware and Architecturelaw0103 physical sciencesCover (algebra)010306 general physicsvisualizationfluidComputer Physics Communications
researchProduct

Efficient techniques for fault detection and location of multiple controlled Toffoli-based reversible circuit

2021

It is very important to detect and correct faults for ensuring the validity and reliability of these circuits. In this regard, a comparative study with related existing techniques is undertaken. Two techniques to achieve the testability of reversible circuits are introduced that have been improved in terms of quantum cost and fault coverage rate. Considering this aspect, the main focus of these techniques is on the efficient detection and location of faults with 100% accuracy. These techniques for fault detection in reversible circuit design, in addition to being able to produce the correct outputs, can also provide information for fault location that has already been done at a higher cost.…

testcost metricskvanttitietokoneetHardware_PERFORMANCEANDRELIABILITYfault locationkvanttilaskentafault modelsfault detectionreversible circuit
researchProduct