Search results for "Telecommunication"

showing 10 items of 1769 documents

A framework for evaluating Internet-of-Things platforms: Application provider viewpoint

2014

Widespread adoption of Internet of Things (IoT) applications assumes a sustainable ecosystem of firms creating, distributing, and using these applications. Such an ecosystem often forms around a platform that implements commonly used functionality and offers it to the members of the ecosystem for creating applications and services. In IoT, such a platform may be materialized in a form of a cloud platform that supports the management of connected devices, and the development and use of the applications based on them. A number of cloud platforms targeting IoT applications are available in the market; to prosper, they need to assist the providers of the IoT applications in designing and develo…

Cover (telecommunications)Javabusiness.industryComputer scienceCloud computingApplication softwarecomputer.software_genreMaturity (finance)World Wide WebSoftwareThe InternetbusinessInternet of Thingscomputercomputer.programming_language2014 IEEE World Forum on Internet of Things (WF-IoT)
researchProduct

Radio frequency shielding of thin aluminized plastic filters investigated for the ATHENA X-IFU detector

2018

Copyright 2018 Society of Photo-Optical Instrumentation Engineers (SPIE). One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper are prohibited. The X-ray Integral Field Unit (X-IFU) is one of the two detectors of the ATHENA astrophysics space mission approved by ESA in the Cosmic Vision 2015-2025 Science Programme. The X-IFU consists of a large array of transition edge sensors (TES) micro-calorimeters covering a field of view of 5' diameter, sensitive in the energy range 0.2-12 keV, and providing a spectral resolution…

CryostatMaterials sciencePhysics::Instrumentation and DetectorsX-ray detectorRF attenuationField of viewCondensed Matter Physic02 engineering and technologyreverberation chamber7. Clean energyElectromagnetic interferenceSettore FIS/05 - Astronomia E AstrofisicaOpticsX-ray Integral Field Unit (X-IFU)thermal thin-film filter0202 electrical engineering electronic engineering information engineeringElectrical and Electronic Engineeringbusiness.industryElectronic Optical and Magnetic Material020502 materialsDetectorAstrophysics::Instrumentation and Methods for Astrophysicsx-ray detectorComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsresonance modeApplied MathematicATHENA X-ray observatoryEMI shielding0205 materials engineeringElectromagnetic shieldingRadio frequencyAntenna (radio)businessSpace Telescopes and Instrumentation 2018: Ultraviolet to Gamma Ray
researchProduct

Today is already Yesterday: The Glossa XX1 architectural project for the Italian Memorial in Block 21 at Auschwitz

2012

Abstract The architect of the proposed Glossa XX1 Architectural Project for the Italian Memorial in Block 21 at Auschwitz presents and elucidates the restorations it involves and its response to criticisms made by the director of the Auschwitz Museum.

Cultural StudiesHistoryplacVisual Arts and Performing Artsmedia_common.quotation_subjectGlossadesignReligious studiesSettore ICAR/16 - Architettura Degli Interni E AllestimentoSettore M-STO/02 - Storia ModernaArtLineitalianYesterdayVisual artsBlock (telecommunications)Settore SPS/01 - Filosofia PoliticaMemorialSettore ICAR/18 - Storia Dell'Architetturatimetextmedia_common
researchProduct

A Note on Keys and Keystreams of Chacha20 for Multi-key Channels

2018

In this paper we analyze the keystreams generated by the Chacha20 stream cipher. We also compare these to the ones generated by its predecessor, the RC4 stream cipher. Due to the proposed multi-key channels in the upcoming TLS 1.3 standard we analyze the behavior of the keystream in the boundary case where there is a single bit difference between two keys used for the initiation of the stream cipher algorithms. The goal is to check whether a single bit change in the key has any predictable influence on the bits of the keystream output.

Cybersecuritybusiness.industryComputer scienceKeystreamBoundary (topology)Stream cipher020206 networking & telecommunications02 engineering and technologyRC4Symmetric-key algorithmChacha200202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingHardware_ARITHMETICANDLOGICSTRUCTURESbusinessSymmetric encryptionStream cipherAlgorithm
researchProduct

Versatile Direct and Transpose Matrix Multiplication with Chained Operations: An Optimized Architecture Using Circulant Matrices

2016

With growing demands in real-time control, classification or prediction, algorithms become more complex while low power and small size devices are required. Matrix multiplication (direct or transpose) is common for such computation algorithms. In numerous algorithms, it is also required to perform matrix multiplication repeatedly, where the result of a multiplication is further multiplied again. This work describes a versatile computation procedure and architecture: one of the matrices is stored in internal memory in its circulant form, then, a sequence of direct or transpose multiplications can be performed without timing penalty. The architecture proposes a RAM-ALU block for each matrix c…

Cycles per instructionBlock matrix020206 networking & telecommunications02 engineering and technologyParallel computingMatrix chain multiplicationMatrix multiplication020202 computer hardware & architectureTheoretical Computer ScienceMatrix (mathematics)Computational Theory and MathematicsHardware and ArchitectureTranspose0202 electrical engineering electronic engineering information engineeringMultiplicationHardware_ARITHMETICANDLOGICSTRUCTURESArithmeticCirculant matrixSoftwareMathematicsIEEE Transactions on Computers
researchProduct

Cluster-Based Relocation of Stations for Efficient Forest Fire Management in the Province of Valencia (Spain)

2021

Forest fires are undesirable situations with tremendous impacts on wildlife and people&rsquo

DBSCANk-meansFire preventionPoison controlDistribution (economics)02 engineering and technologylcsh:Chemical technologyBiochemistryArticleAnalytical Chemistry0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic EngineeringCluster analysisInstrumentationbusiness.industryEnvironmental resource management020206 networking & telecommunicationsartificial intelligenceDBSCANAtomic and Molecular Physics and OpticsWork (electrical)Software deploymentEnvironmental science020201 artificial intelligence & image processingfire preventionbusinessRelocationFloyd–WarshallSensors
researchProduct

Entrepreneurship Training and Self-Employment among University Graduates

2012

In economies characterized by low labor demand and high rates of youth unemployment, entrepreneurship training has the potential to enable youth to gain skills and create their own jobs. This paper presents experimental evidence on a new entrepreneurship track that provides business training and personalized coaching to university students in Tunisia. Undergraduates in the final year of licence appliquee were given the opportunity to graduate with a business plan instead of following the standard curriculum. This paper relies on randomized assignment of the entrepreneurship track to identify impacts on labor market outcomes one year after graduation. The analysis finds that the entrepreneur…

DISADVANTAGED YOUTHEMPLOYMENT PROGRAMSUNIVERSITY STUDENTSFINANCIAL ANALYSISEXAMSENTREPRENEURSHIP SUPPORTPRIVATE SECTOR JOBSCLASSROOMEMPLOYMENT OPPORTUNITIESEMPLOYMENTACTIVE LABOR MARKETHIGH UNEMPLOYMENTPERSONALITYPRESENT EVIDENCEINFORMATION ABOUT CREDITENTREPRENEURIAL ACTIVITIES[ SHS.EDU ] Humanities and Social Sciences/EducationWORKERSENROLLMENT RATESBUSINESS OWNERSWAGE SUBSIDYEMPLOYMENT OUTCOMESGRADUATION RATEOCCUPATIONSMENTAL HEALTHPUBLIC SECTOR JOBSLABOR MARKET OUTCOMESYOUTH TRAININGCOLLEGE GRADUATEINTERVENTIONSEARNINGSREADINGSKILLED WORKERSBUSINESS TRAININGSALARIED EMPLOYMENT[SHS.EDU]Humanities and Social Sciences/EducationCOMPETENCIESLOCAL EMPLOYMENT OFFICEVENTURE CAPITAL FIRMWORKERUNEMPLOYEDUNIVERSITY PROFESSORSPLAYINGHIGHER EDUCATIONJOB SEARCHLITERACYRECOGNITIONENTREPRENEURSHIP TRAININGSTHINKINGBUSINESS SURVIVALSURVIVAL RATESYOUTH UNEMPLOYMENTEMPLOYABILITYLABOR DEMANDUNEMPLOYMENT SPELLSATTRITIONMINIMUM WAGESKILLS DEVELOPMENTPROFITABILITYFINANCIAL LITERACYPRODUCTIVITY GROWTHENTREPRENEURSPREVIOUS SECTIONGROSS ENROLLMENTSPORTSUNIVERSITY DEGREEEMPLOYMENT STATUSLABOUREXCLUSIONYOUTH UNEMPLOYMENT RATESTART-UPHUMAN DEVELOPMENTNEW BUSINESSESYOUTH EMPLOYMENTPOST-SECONDARY EDUCATIONACADEMIC YEARACCESS TO INFORMATIONUNEMPLOYMENT RATEEMPLOYMENT RATEMINISTRIES OF EDUCATIONBUSINESS PLANLABOR ECONOMICSTELECOMMUNICATIONSJOB SATISFACTIONWAGE SUBSIDY PROGRAMSSOCIAL NETWORKYOUNG WORKERSGROSS ENROLLMENT RATESLOANProgram evaluationPRIVATE SECTOR WAGEMICROFINANCEWAGE SUBSIDIESDEVELOPMENT BANKINDIVIDUAL ENTREPRENEURSHIPComputingMilieux_THECOMPUTINGPROFESSIONGRADUATION REQUIREMENTSPRIVATE SECTOR JOBPUBLIC EMPLOYMENTATTENTIONSALARIED WORKERSKILLS TRAININGSTART-UP CAPITALLEADERSHIPGENDERADMINISTRATIVE RECORDSON-THE-JOB TRAININGFEMALE ENTERPRISEENTREPRENEURSHIP DEVELOPMENTLOCAL EMPLOYMENT OFFICESLABOR FORCE SURVEYPRELIMINARY EVIDENCEEMPLOYERSGRADUATES WITH SKILLSENTREPRENEURFAMILIESTRAINING PROGRAMSEMPLOYMENT OFFICEYOUTH UNEMPLOYMENT RATESCLASSROOM TRAININGJOB OPPORTUNITIESFIRM SIZEUNDERGRADUATESJOBSCURRICULUMUNIVERSITY GRADUATESEMPLOYMENT PROGRAMPUBLIC SECTOR JOBTRAINING PROGRAMMINISTRY OF EDUCATIONTRAINING COURSEUNEMPLOYED YOUTHTRAINING COMPONENTCOMMUNITY COLLEGEENTREPRENEURIAL ACTIVITYEMPLOYMENT IMPACTSSelf-employmentPREVIOUS STUDIESSELF-EMPLOYMENTLACK OF ACCESSLABOR MARKETELIGIBLE STUDENTSSOCIAL COHESIONVOCATIONAL TRAINING PROGRAMSCONTROL GROUPSTECHNICAL KNOWLEDGETERTIARY EDUCATIONGROWTH OPPORTUNITIESSOCIAL SECURITYLITERATURELABOR MARKET EXPERIENCETRAINING PARTICIPANTSECONOMIC CHARACTERISTICSPERSONALITY TRAITSEntrepreneurship trainingDEVELOPMENT CENTERCREDIT CONSTRAINTSEMPLOYMENT POLICIESBUSINESS PLANSOPEN ACCESSTRAINING CONTENTMICRO ENTERPRISESPAPERSWAGE EMPLOYMENTACTIVE LABOR MARKET PROGRAMSJOB OFFERSUBSTITUTION EFFECTPRIVATE SECTORCREDIT ACCESSBehavioral skill[SHS.EDU] Humanities and Social Sciences/EducationHOUSEHOLD INCOMEMICROFINANCE INSTITUTIONSYOUTH TRAINING PROGRAMTEACHINGLEARNINGACCESS TO CREDITPSYCHOLOGYACHIEVEMENTINTERNATIONAL BANKVENTURE CAPITALACCESS TO JOBSUNIVERSITIESPROGRAM BENEFICIARIESSoft skillMOTIVATIONRECALLCREDIT APPLICATIONSLABOR FORCEFINANCIAL SUPPORTBUSINESS NETWORKSMICRO FINANCEVOCATIONAL TRAININGENTREPRENEURIAL SKILLSYouth employmentENTREPRENEURSHIP TRAININGLACK OF INFORMATIONACTIVE LABOR
researchProduct

DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign

2017

Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the Internet. The purpose of DNS is to translate domain names into IP addresses and vice versa. However, its simple architecture can easily be misused for malicious activities. One huge security threat concerning DNS is tunneling, which helps attackers bypass the security systems unnoticed. A DNS tunnel can be used for three purposes: as a command and control channel, for data exfiltration or even for tunneling another protocol through it. In this paper, we surveyed different techniques for DNS tunneling detection. We classified those first based on the type of data and then within the categories b…

DNS tunneling detectionSIMPLE (military communications protocol)business.industryComputer scienceDomain Name SystemComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreDomain (software engineering)protokollat0202 electrical engineering electronic engineering information engineeringAPT020201 artificial intelligence & image processingThe Internetcovert channels detectiontietoturvabusinesscomputerProtocol (object-oriented programming)
researchProduct

Event-based encoding from digital magnetic compass and ultrasonic distance sensor for navigation in mobile systems

2016

Event-based encoding reduces the amount of generated data while keeping relevant information in the measured magnitude. While this encoding is mostly associated with spiking neuromorphic systems, it can be used in a broad spectrum of tasks. The extension of event-based data representation to other sensors would provide advantages related to bandwidth reduction, lower computing requirements, increased processing speed and data processing. This work describes two event-based encoding procedures (magnitude-event and rate-event) for two sensors widely used in industry, especially for navigation in mobile systems: digital magnetic compass and ultrasonic distance sensor. Encoded data meet Address…

Data processingComputer sciencebusiness.industryEvent (computing)020208 electrical & electronic engineeringReal-time computing02 engineering and technologyExternal Data RepresentationData visualizationTransmission (telecommunications)CompassEncoding (memory)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessData transmission2016 IEEE 14th International Conference on Industrial Informatics (INDIN)
researchProduct

A Special Issue on Advances in Machine Learning for Remote Sensing and Geosciences [From the Guest Editors]

2016

Machine learning has become a standard paradigm for the analysis of remote sensing and geoscience data at both local and global scales. In the upcoming years, with the advent of new satellite constellations, machine learning will have a fundamental role in processing large and heterogeneous data sources. Machine learning will move from mere statistical data processing to actual learning, understanding, and knowledge extraction. The ambitious goal is to provide responses to the challenging scientific questions about the earth system. This special issue aims at providing an updated, refreshing view of current developments in the field. For this special issue, we have collected five articles t…

Data processingGeneral Computer Sciencebusiness.industryComputer science020206 networking & telecommunications02 engineering and technologyMachine learningcomputer.software_genreData scienceField (computer science)Earth system scienceKnowledge extractionRemote sensing (archaeology)0202 electrical engineering electronic engineering information engineeringGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingArtificial intelligenceElectrical and Electronic EngineeringbusinessInstrumentationcomputerRemote sensingConstellationIEEE Geoscience and Remote Sensing Magazine
researchProduct