Search results for "telecommunications"

showing 10 items of 1639 documents

An over-the-distance wireless battery charger based on RF energy harvesting

2017

An RF powered receiver silicon IC (integrated circuit) for RF energy harvesting is presented as wireless battery charger. This includes an RF-to-DC energy converter specifically designed with a sensitivity of -18.8 dBm and an energy conversion efficiency of ∼45% at 900 MHz with a transmitting power of 0.5 W in free space. Experimental results concerned with remotely battery charging using a complete prototype working in realistic scenarios will be shown.

Battery (electricity)EngineeringInternet of Things02 engineering and technologyIntegrated circuitInternet of Things; Litium Ion Battery; Radio Frequency Harvesting; Wireless Battery Charger; Wireless Sensor Networks; Hardware and Architecture; Electrical and Electronic Engineering; Modeling and SimulationSettore ING-INF/01 - ElettronicaRadio Frequency Harvestinglaw.inventionBattery chargerlawWireless Battery ChargerHardware_INTEGRATEDCIRCUITS0202 electrical engineering electronic engineering information engineeringElectronic engineeringElectrical and Electronic Engineeringbusiness.industry020208 electrical & electronic engineeringEnergy conversion efficiencyElectrical engineering020206 networking & telecommunicationsHardware and ArchitectureModeling and SimulationLitium Ion BatteryRadio frequencyInternet of ThingWireless Sensor NetworksbusinessEnergy harvestingSensitivity (electronics)Wireless sensor networkWireless Sensor Network2017 14th International Conference on Synthesis, Modeling, Analysis and Simulation Methods and Applications to Circuit Design (SMACD)
researchProduct

Episodes of second-degree ventriculo-atrial block during ventricular tachycardia

2017

Male0301 basic medicinemedicine.medical_specialtySettore MED/09 - Medicina Internabusiness.industrysecond degree ventriculo-atrial block ventricular tachycardiaGeneral MedicineVentricular tachycardiamedicine.diseaseDegree (temperature)Electrocardiography03 medical and health sciencesHeart Block030104 developmental biologyInternal medicineBlock (telecommunications)Tachycardia VentricularmedicineCardiologyHumansCardiology and Cardiovascular MedicinebusinessAgedJournal of Cardiovascular Medicine
researchProduct

A limited feedback scheme based on spatially correlated channels for coordinated multipoint systems

2012

High spectral efficiency can be achieved in the downlink of multi-antenna coordinated multi-point systems provided that the multiuser interference is appropriately managed at the transmitter side. For this sake, downlink channel information needs to be sent back by the users, thus reducing the rate available at the uplink channel. The amount and type of feedback information required has been extensively studied and many limited feedback schemes have been proposed lately. A common pattern to all of them is that achieving low rates of feedback information is possible at the cost of increasing complexity at the user side and, sometimes, assuming that some statistics of the channel are known. I…

Spatial correlationWireless communicationsComputer Networks and CommunicationsComputer scienceMIMOData_CODINGANDINFORMATIONTHEORYPrecodingTelecomunicacióControl theoryTEORIA DE LA SEÑAL Y COMUNICACIONESTelecommunications linkZero-forcing precodingWirelessComunicació i tecnologiaComputer Science::Information Theorybusiness.industryQuantization (signal processing)TransmitterLimited feedbackPrecodingComputer Science ApplicationsMIMOSignal ProcessingBit error ratebusinessAlgorithmCommunication channelEURASIP Journal on Wireless Communications and Networking
researchProduct

Is IS Online Chatter Just Noise?: An Analysis of the Islamic State Strategic Communications

2020

The objective of this research is to analyze the potential use of strategic communication, and specifically, strategic brand management and online communications directed to a foreign target by the...

Sociology and Political ScienceComputer sciencecomputer.internet_protocolbusiness.industryCommunication05 social sciences050801 communication & media studiesIslamBrand managementNoise0508 media and communications0502 economics and businessIS-ISStrategic communicationState (computer science)Telecommunicationsbusinesscomputer050203 business & managementInternational Journal of Strategic Communication
researchProduct

A privacy enhanced device access protocol for an IoT context

2013

In this paper, we present the case for a device authentication protocol that authenticates a device/service class rather than an individual device. The devices in question are providing services available to the public. The proposed protocol is an online protocol, and it uses a pseudo-random temporary identity scheme to provide user privacy. This allows the Internet-of-Things device to have full assurance of the user, with respect to the request service, while permitting the user to remain anonymous with respect to the device. The user can then enjoy identity and location privacy in addition to untraceability with respect to device access. Copyright © 2013 John Wiley & Sons, Ltd.

Service (business)Challenge-Handshake Authentication ProtocolAuthenticationComputer Networks and CommunicationsComputer science020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer securitycomputer.software_genreAuthentication protocol0202 electrical engineering electronic engineering information engineeringIdentity (object-oriented programming)020201 artificial intelligence & image processingKey derivation functionProtocol (object-oriented programming)computerInformation SystemsSecurity and Communication Networks
researchProduct

Unlocking behaviors of long-term service consumers : the role of action inertia

2017

Purpose The purpose of this paper is to examine the antecedents of word-of-mouth (WOM) in long-term service settings. Specifically, the authors examine the moderating role of action inertia in the relationships between satisfaction and repatronage intention, satisfaction and WOM, and repatronage intention and WOM. Design/methodology/approach The proposed model was empirically tested using survey data from 1,385 telecommunications service subscribers. The data were analyzed using partial least squares path modeling. Findings Results suggest that a positive link between repatronage intention and WOM, hereto a neglected relationship in the marketing literature, in contrast to previous literat…

Service (business)Service qualityStrategy and Management05 social sciencessatisfactionWord of mouthTelecommunications servicerepatronage intentionsAdvertisingservice qualityLoyalty business modelAction (philosophy)word-of-mouth0502 economics and businessPartial least squares path modelingSurvey data collection050211 marketingaction inertiaMarketingPsychology050203 business & managementperceived value
researchProduct

Learning from Errors: Detecting ZigBee Interference in WiFi Networks

2014

In this work we show how to detect ZigBee interference on commodity WiFi cards by monitoring the reception errors, such as synchronization errors, invalid header formats, too long frames, etc., caused by ZigBee transmissions. Indeed, in presence of non-WiFi modulated signals, the occurrence of these types of errors follows statistics that can be easily recognized. Moreover, the duration of the error bursts depends on the transmission interval of the interference source, while the error spacing depends on the receiver implementation. On the basis of these considerations, we propose the adoption of hidden Markov chains for characterizing the behavior of WiFi receivers in presence of controlle…

business.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingwlan 802.11 802.15.4 frame error detection wireless coexistenceInterval (mathematics)Interference (wave propagation)SynchronizationLearning from errorsTransmission (telecommunications)HeaderbusinessHidden Markov modelComputer networkNeuRFon
researchProduct

Time-domain-induced polarization: Full-decay forward modeling and 1D laterally constrained inversion of Cole-Cole parameters

2012

Time-domain-induced polarization has significantly broadenedits field of reference during the last decade, from mineralexploration to environmental geophysics, e.g., for clay and peatidentification and landfill characterization. Though, insufficientmodeling tools have hitherto limited the use of time-domaininducedpolarization for wider purposes. For these reasons, anew forward code and inversion algorithm have been developedusing the full-time decay of the induced polarization response,together with an accurate description of the transmitter waveformand of the receiver transfer function, to reconstruct thedistribution of the Cole-Cole parameters of the earth. The accuratemodeling of the tra…

Physicsbusiness.industryTransmitterPolarization (waves)Transfer functionInduced polarizationSettore FIS/07 - Fisica Applicata(Beni Culturali Ambientali Biol.e Medicin)Computational physicsmodellinginversionStep responseGeophysicsGeochemistry and PetrologySettore GEO/11 - Geofisica ApplicataWaveformTime domainTime domain induced polarization inversionTelecommunicationsbusinessCole–Cole equationGEOPHYSICS
researchProduct

Digital information receiver based on stochastic resonance

2003

International audience; An electronic receiver based on stochastic resonance is presented to rescue subthreshold modulated digital data. In real experiment, it is shown that a complete data restoration is achieved for both uniform and Gaussian white noise.

Complete data[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image ProcessingComputer scienceStochastic resonance[ PHYS.COND.CM-DS-NN ] Physics [physics]/Condensed Matter [cond-mat]/Disordered Systems and Neural Networks [cond-mat.dis-nn]Digital dataNonlinear signal processing[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processing01 natural sciences010305 fluids & plasmas[NLIN.NLIN-PS]Nonlinear Sciences [physics]/Pattern Formation and Solitons [nlin.PS][INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing0103 physical sciencesElectronic engineering[ NLIN.NLIN-PS ] Nonlinear Sciences [physics]/Pattern Formation and Solitons [nlin.PS][PHYS.COND.CM-DS-NN]Physics [physics]/Condensed Matter [cond-mat]/Disordered Systems and Neural Networks [cond-mat.dis-nn]stochastic resonance010306 general physicsEngineering (miscellaneous)Subthreshold conductionbusiness.industryApplied MathematicsWhite noise[SPI.TRON]Engineering Sciences [physics]/Electronics[ SPI.TRON ] Engineering Sciences [physics]/ElectronicsNonlinear systemModeling and SimulationNonlinear dynamicsTelecommunicationsbusiness[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing
researchProduct

Graph recursive least squares filter for topology inference in causal data processes

2017

In this paper, we introduce the concept of recursive least squares graph filters for online topology inference in data networks that are modelled as Causal Graph Processes (CGP). A Causal Graph Process (CGP) is an auto regressive process in the time series associated to different variables, and whose coefficients are the so-called graph filters, which are matrix polynomials with different orders of the graph adjacency matrix. Given the time series of data at different variables, the goal is to estimate these graph filters, hence the associated underlying adjacency matrix. Previously proposed algorithms have focused on a batch approach, assuming implicitly stationarity of the CGP. We propose…

Recursive least squares filterSignal processingMean squared errorComputer science020206 networking & telecommunications02 engineering and technologyCall graphNetwork topology0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)020201 artificial intelligence & image processingAdjacency matrixTime seriesAlgorithm2017 IEEE 7th International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP)
researchProduct