Search results for "hardware"

showing 10 items of 1372 documents

Expiration of Time Limits and the Ius Appellationis

2022

The rotal decree under comment offers the cue to address the delicate topic of the appeal and the peremptory time limits for its presentation, especially in light of the recent reform of the canonical matrimonial process promulgated by Pope Francis.On the basis of the new structure of the process of matrimonial nullity appears, in fact, evident the legislative disfavor, towards the appeal, seen as a potentially dangerous tool for the salus animarum of the faithful for the risk of procedural lengths connected to it, so as to provide for a prior examination of admissibility in order to avoid that they were made for the purpose of mere dilatory, that is, for the sole purpose of lengthening the…

rotal decreeComputer Networks and CommunicationsHardware and Architectureappealperemptory time limitRota Romanacanonical matrimonial proceSoftware
researchProduct

Testing and implementing a new approach to estimating interregional output multipliers using input-output data for South Korean regions

2020

Flegg's location quotient (FLQ) is a useful tool for estimating intraregional output multipliers. This paper uses it as one component when estimating interregional multipliers. Using statistical information criteria and official data for 16 South Korean regions, it is found that the best approach is to combine the FLQ with a simple trade model. The paper explains how the proposed procedure can be implemented for both multiple and individual regions, and also how a region-specific value for the unknown parameter δ in the FLQ formula can be determined. Finally, an illustrative case study of one of the regions is carried out.

sijaintiMathematical optimizationalueelliset erotComputer scienceGeography Planning and Development0211 other engineering and technologiestalousmaantiedealuetutkimusInformation Criteria02 engineering and technologyEtelä-KoreaFlegg's location quotient (FLQ)Component (UML)0502 economics and businessinterregional multipliersEarth and Planetary Sciences (miscellaneous)Economic base analysisHardware_ARITHMETICANDLOGICSTRUCTURES050207 economicspanos-tuotosanalyysiinformation criteriaInput/outputgravity model05 social sciencestuloksellisuus021107 urban & regional planninganalyysimenetelmätGravity model of tradeStatistics Probability and UncertaintyGeneral Economics Econometrics and Finance
researchProduct

A Telemetry, Tracking, and Command Antennas System for Small-Satellite Applications

2019

Circularly polarized (CP) antennas are used in space applications for telemetry tracking and command (TT&amp

small satellitesComputer Networks and CommunicationsFrequency bandTT&amplcsh:TK7800-836002 engineering and technologyTracking (particle physics)circular patchOpticsCircular patch; Circular polarization; Small satellites; TT&CComputer Science::Systems and ControlCTelemetryTelecommunications link0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringCircular polarizationComputer Science::Information TheoryPatch antennaPhysicsbusiness.industryAxial ratio020208 electrical & electronic engineeringlcsh:ElectronicsAstrophysics::Instrumentation and Methods for Astrophysics020206 networking & telecommunicationsHardware and ArchitectureControl and Systems EngineeringPhysics::Space PhysicsSignal Processingcircular polarizationAntenna (radio)businessSmall satelliteElectronics
researchProduct

Annales des travaux des auditeurs de l'IHEDN 2009 : "Y a-t-il un retour du "soft power" dans les relations internationales ?

2009

CD rom; International audience

soft powerHardware_MEMORYSTRUCTURESIHEDN[ SHS.HIST ] Humanities and Social Sciences/History[SHS.HIST] Humanities and Social Sciences/History[ SHS ] Humanities and Social Sciences[SHS] Humanities and Social SciencesauditeursHardware_CONTROLSTRUCTURESANDMICROPROGRAMMING[SHS.HIST]Humanities and Social Sciences/HistoryComputingMilieux_MISCELLANEOUS[SHS]Humanities and Social Sciencesrelations internationales
researchProduct

Attacking TrustZone on devices lacking memory protection

2021

AbstractARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some vendors offer ARM modules that do not fully comply with TrustZone specifications, which may lead to vulnerabilities in the system. In this paper, we present a DMA attack tutorial from the insecure world onto the secure world, and the design and implementation of this attack in a real insecure hardware.

sulautettu tietotekniikkaComputational Theory and MathematicsHardware and ArchitectureComputer Science (miscellaneous)esineiden internetTrustZonesecuritytietoturvaverkkohyökkäyksetSoftwarehaavoittuvuus
researchProduct

Towards Automated Classification of Firmware Images and Identification of Embedded Devices

2017

Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…

sulautettu tietotekniikkaComputer scienceVendorvulnerability02 engineering and technologycomputer.software_genreSoftware020204 information systems0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]tietoturvadata securityhaavoittuvuusbusiness.industryFirmwareFingerprint (computing)020206 networking & telecommunicationsubiquitous computingRandom forestIdentification (information)koneoppiminenmachine learningEmbedded systemUser interfaceHardware_CONTROLSTRUCTURESANDMICROPROGRAMMINGbusinesscomputerPrivate network
researchProduct

Software-as-a-Service Revenue Models

2013

This paper give an overview of the three main revenue models, focusing on the advantages and disadvantages for SaaS providers and their customers. Also identify the most effective revenue model for particular situations.

ta113Computer sciencebusiness.industrycomputer.internet_protocolSoftware as a serviceSoftware developmentInformation technologyCloud computingService-oriented architectureComputer securitycomputer.software_genreComputer Science ApplicationsEngineering managementRevenue modelHardware and ArchitectureRevenue assuranceYield managementbusinesscomputerSoftwareIT Professional
researchProduct

A modelling framework for social media monitoring

2013

This paper describes a hierarchical, three-level modelling framework for monitoring social media. Immediate social reality is modelled through the first level of the models. They represent various virtual communities at social media sites and adhere to the social world models of the sites, i.e., the "site ontologies". The second-level model is a temporal multirelational graph that captures the static and dynamic properties of the first-level models from the perspective of the monitoring site. The third-level model consists of a temporal relational database scheme that models the temporal multirelational graph within the database. The models are specified and instantiated at the monitoring s…

ta113Graph databaseComputer Networks and Communicationsbusiness.industryComputer scienceRelational databaseSocial realitySchematiccomputer.software_genreTemporal databaseHardware and ArchitectureGraph (abstract data type)The InternetSocial mediaData miningbusinesscomputerInformation SystemsInternational Journal of Web Engineering and Technology
researchProduct

Consumer value of camera-based mobile interaction with the real world

2013

Camera-based mobile interaction with the real world allows consumers to connect digital information with the real-world environment, and furthermore, to interact with real-world objects and places. To explore and understand the types of consumer value in the context of such consumer-level applications, we applied the critical incident technique to reflect actual use experiences from 107 application users with a recognized consumer value framework by Holbrook. The findings of the study suggest that at the current state value is heavily based on utilitarian efficiency and excellence. Although the applications enable a diverse value, they have yet to fulfill their potential in providing hedoni…

ta113MultimediaComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subjectContext (language use)computer.software_genreComputer Science ApplicationsHardware and ArchitectureHuman–computer interactionExcellenceState (computer science)ta512computerCritical Incident TechniqueValue (mathematics)Mobile interactionSoftwareInformation SystemsValue frameworkActual usemedia_commonPervasive and Mobile Computing
researchProduct

Utilizing online serious games to facilitate distributed requirements elicitation

2015

Online serious games are used to facilitate distributed requirements elicitation.Interactive games enhance collaboration and communication between project members.Serious games raise individuals' confidence to engage in requirements elicitation.Using serious games can improve both quality and quantity of software requirements.Serious games specially enhance the performance of less-experienced stakeholders. Requirements elicitation is one of the most important and challenging activities in software development projects. A variety of challenges related to requirements elicitation are reported in the literature, of which the lack of proper communication and knowledge transfer between software …

ta113Requirements managementBusiness requirementsRequirementEngineeringserious gamesKnowledge managementbusiness.industryrequirements elicitationSoftware developmentRequirements elicitationpelitEmpirical researchhyötypelitHardware and Architecturesoftware developmentohjelmistokehitysbusinessRequirements analysisKnowledge transferSoftwaregamesInformation SystemsJournal of Systems and Software
researchProduct