Search results for "Telecommunication"
showing 10 items of 1769 documents
A framework for evaluating Internet-of-Things platforms: Application provider viewpoint
2014
Widespread adoption of Internet of Things (IoT) applications assumes a sustainable ecosystem of firms creating, distributing, and using these applications. Such an ecosystem often forms around a platform that implements commonly used functionality and offers it to the members of the ecosystem for creating applications and services. In IoT, such a platform may be materialized in a form of a cloud platform that supports the management of connected devices, and the development and use of the applications based on them. A number of cloud platforms targeting IoT applications are available in the market; to prosper, they need to assist the providers of the IoT applications in designing and develo…
Radio frequency shielding of thin aluminized plastic filters investigated for the ATHENA X-IFU detector
2018
Copyright 2018 Society of Photo-Optical Instrumentation Engineers (SPIE). One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper are prohibited. The X-ray Integral Field Unit (X-IFU) is one of the two detectors of the ATHENA astrophysics space mission approved by ESA in the Cosmic Vision 2015-2025 Science Programme. The X-IFU consists of a large array of transition edge sensors (TES) micro-calorimeters covering a field of view of 5' diameter, sensitive in the energy range 0.2-12 keV, and providing a spectral resolution…
Today is already Yesterday: The Glossa XX1 architectural project for the Italian Memorial in Block 21 at Auschwitz
2012
Abstract The architect of the proposed Glossa XX1 Architectural Project for the Italian Memorial in Block 21 at Auschwitz presents and elucidates the restorations it involves and its response to criticisms made by the director of the Auschwitz Museum.
A Note on Keys and Keystreams of Chacha20 for Multi-key Channels
2018
In this paper we analyze the keystreams generated by the Chacha20 stream cipher. We also compare these to the ones generated by its predecessor, the RC4 stream cipher. Due to the proposed multi-key channels in the upcoming TLS 1.3 standard we analyze the behavior of the keystream in the boundary case where there is a single bit difference between two keys used for the initiation of the stream cipher algorithms. The goal is to check whether a single bit change in the key has any predictable influence on the bits of the keystream output.
Versatile Direct and Transpose Matrix Multiplication with Chained Operations: An Optimized Architecture Using Circulant Matrices
2016
With growing demands in real-time control, classification or prediction, algorithms become more complex while low power and small size devices are required. Matrix multiplication (direct or transpose) is common for such computation algorithms. In numerous algorithms, it is also required to perform matrix multiplication repeatedly, where the result of a multiplication is further multiplied again. This work describes a versatile computation procedure and architecture: one of the matrices is stored in internal memory in its circulant form, then, a sequence of direct or transpose multiplications can be performed without timing penalty. The architecture proposes a RAM-ALU block for each matrix c…
Cluster-Based Relocation of Stations for Efficient Forest Fire Management in the Province of Valencia (Spain)
2021
Forest fires are undesirable situations with tremendous impacts on wildlife and people&rsquo
Entrepreneurship Training and Self-Employment among University Graduates
2012
In economies characterized by low labor demand and high rates of youth unemployment, entrepreneurship training has the potential to enable youth to gain skills and create their own jobs. This paper presents experimental evidence on a new entrepreneurship track that provides business training and personalized coaching to university students in Tunisia. Undergraduates in the final year of licence appliquee were given the opportunity to graduate with a business plan instead of following the standard curriculum. This paper relies on randomized assignment of the entrepreneurship track to identify impacts on labor market outcomes one year after graduation. The analysis finds that the entrepreneur…
DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign
2017
Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the Internet. The purpose of DNS is to translate domain names into IP addresses and vice versa. However, its simple architecture can easily be misused for malicious activities. One huge security threat concerning DNS is tunneling, which helps attackers bypass the security systems unnoticed. A DNS tunnel can be used for three purposes: as a command and control channel, for data exfiltration or even for tunneling another protocol through it. In this paper, we surveyed different techniques for DNS tunneling detection. We classified those first based on the type of data and then within the categories b…
Event-based encoding from digital magnetic compass and ultrasonic distance sensor for navigation in mobile systems
2016
Event-based encoding reduces the amount of generated data while keeping relevant information in the measured magnitude. While this encoding is mostly associated with spiking neuromorphic systems, it can be used in a broad spectrum of tasks. The extension of event-based data representation to other sensors would provide advantages related to bandwidth reduction, lower computing requirements, increased processing speed and data processing. This work describes two event-based encoding procedures (magnitude-event and rate-event) for two sensors widely used in industry, especially for navigation in mobile systems: digital magnetic compass and ultrasonic distance sensor. Encoded data meet Address…
A Special Issue on Advances in Machine Learning for Remote Sensing and Geosciences [From the Guest Editors]
2016
Machine learning has become a standard paradigm for the analysis of remote sensing and geoscience data at both local and global scales. In the upcoming years, with the advent of new satellite constellations, machine learning will have a fundamental role in processing large and heterogeneous data sources. Machine learning will move from mere statistical data processing to actual learning, understanding, and knowledge extraction. The ambitious goal is to provide responses to the challenging scientific questions about the earth system. This special issue aims at providing an updated, refreshing view of current developments in the field. For this special issue, we have collected five articles t…