Results 31 to 40 of about 168,691 (324)
Integrasi Wireless Fidelity (WiFi) pada jaringan Universal Mobile Telecommunication System (UMTS)
Universal Mobile Telecommunication System (UMTS) merupakan sistem telekomunikasi generasi ketiga (3G) hasil pengembangan jaringan Global System for Mobile Communication (GSM) yang memiliki laju data paket 2 Mbps untuk perangkat yang diam di tempat, 384 ...
Endah Budi Purnomowati
doaj +1 more source
Alternative and emergency cellular system based on OpenBTS and SDR
The Global System for Mobile Communications (GSM) has been widely accepted around the world. The implementation of this system for a comunity are expensive because to use high-cost equipment, but thanks to the development of software-defined radio ...
Alian Ernesto Matos Rodríguez +1 more
doaj +1 more source
Lattice QCD Calculations of Hadron Structure: Constituent Quarks and Chiral Symmetry [PDF]
New data from parity-violating experiments on the deuteron now allow isolation of the strange-quark contribution to the nucleon magnetic moment, G_M^s(0), without the uncertainty surrounding the anapole moment of the nucleon.
Leinweber, D. B., Thomas, A. W.
core +2 more sources
Generalized Spatial Modulation in Large-Scale Multiuser MIMO Systems
Generalized spatial modulation (GSM) uses $n_t$ transmit antenna elements but fewer transmit radio frequency (RF) chains, $n_{rf}$. Spatial modulation (SM) and spatial multiplexing are special cases of GSM with $n_{rf}=1$ and $n_{rf}=n_t$, respectively ...
Chockalingam, A. +2 more
core +1 more source
Strange Magnetic Moment of The Nucleon from Lattice QCD [PDF]
We calculate the strange magnetic moment of the nucleon on a quenched $16^3 \times 24$ lattice at $\beta = 6.0$, and with Wilson fermions at $\kappa$ = 0.148, 0.152, and 0.154.
Beck +13 more
core +4 more sources
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed +8 more
wiley +1 more source
Isolation Defines Identity: Functional Consequences of Extracellular Vesicle Purification Strategies
Four extracellular vesicle purification strategies are compared using ovarian‐cancer ascites and ES‐2 cell supernatants. A novel workflow links purification to function by combining particle‐normalized proteomics with matched cell‐free and cell‐based assays.
Christian Preußer +10 more
wiley +1 more source
Abstract The Internet of Things is emerging as a crucial technology in aiding humans and making their lives easier. Among the human population, a large percentage of people suffer from disabilities resulting in challenges in everyday life particularly people with visual disabilities.
Hania Tarik +8 more
wiley +1 more source
GSM Interaction Based Real Time Climate Change Monitoring Technique [PDF]
The trend nowadays is towards communication and the way to communicate between the source and destination remotely. This work presents a new technique to communicate among different locations, either automatically or based on notification request.
Sarmad Nozad Mahmood
doaj +1 more source
Generalized Spatial Modulation in Indoor Wireless Visible Light Communication
In this paper, we investigate the performance of generalized spatial modulation (GSM) in indoor wireless visible light communication (VLC) systems. GSM uses $N_t$ light emitting diodes (LED), but activates only $N_a$ of them at a given time.
Alaka, S. P. +2 more
core +1 more source

