Results 61 to 70 of about 114,680 (216)
Performance Analysis of a Novel TCP Protocol Algorithm Adapted to Wireless Networks
As telecommunication systems evolve towards new-generation architectures, likewise, new protocols are created in order to improve efficiency. One of these protocols is Transmission Control Protocol (TCP), which controls the transmission bit rate in ...
Gonzalo Olmedo +3 more
doaj +1 more source
A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America
Vulnerabilities in cyber defense in the countries of the Latin American region have favored the activities of cybercriminals from different parts of the world who have carried out a growing number of cyberattacks that affect public and private services ...
Omar Flor-Unda +5 more
doaj +1 more source
Portal web de gestión de ventas para comercializadoras de servicios de banda ancha de cnt-ep [PDF]
Con el propósito de brindar un mejor servicio a los ecuatorianos, y conectar a todo el país con redes de telecomunicaciones (internet), la Corporación Nacional de Telecomunicaciones CNT-EP, en conjunto con el área de venta de EASYNET S.A –Distribuidora
Andrade Troya, Robert +3 more
core +1 more source
In recent years, there has been a surge in interest in indoor positioning systems that use visible light communication (VLC) technology combined with light‐emitting diodes (LEDs). This paper analyses a database made up of approximately 356 image samples obtained from a CMOS sensor.
David Zabala‐Blanco +6 more
wiley +1 more source
Utilización de Matlab en clusters y grids
Resumen.- Con el fin de disponer de capacidad computacional, equivalente incluso al encontrado en poderosas y costosas supercomputadoras, se pueden utilizar clusters y grids. En el DETRI se han estructurado clusters y se desea ahora conocer si es posible
Marco Bonilla +2 more
doaj
Heuristic Techniques for Assessing Internet Privacy: A Comprehensive Review and Analysis
While Internet privacy is a subjective term that is challenging to define, describe, and quantify, assessing the level of privacy provided by data processors offering services over the Internet is essential for detecting privacy flaws and enabling ...
David Cevallos-Salas +2 more
doaj +1 more source
Simulador para redes ópticas semitransparentes [PDF]
El crecimiento del tráfico de datos en las redes, ha provocado la búsqueda de nuevas tecnologías par poder satisfacer esa demanda. Las redes de fibra óptica tienen la característica de ofrecer un gran ancho de banda y todos los esfuerzos van dirigidos ...
Ferrer Martí, Jordi
core
Resisting and Claiming Digital Sovereignty: The Cases of Civil Society and Indigenous Groups
ABSTRACT In this contribution to “Unthinking digital sovereignty,” we review some discourses and practical proposals that resist or challenge the digital sovereignty of “established states.” Our focus centers on two distinct sociopolitical groups engaged in such practices.
Stéphane Couture +2 more
wiley +1 more source
Comprehensive Evaluation of LoRaWAN Technology in Urban and Rural Environments of Quito
The long-range wide area network (LoRaWAN) protocol is one of the most effective technologies for internet of things (IoT) applications, offering long-distance connectivity with low power consumption.
Ricardo Mena +3 more
doaj +1 more source
Abstract Glioblastoma multiforme (GBM) is the most prevalent and aggressive primary brain tumour that has the worst prognosis in adults. Currently, the automatic segmentation of this kind of tumour is being intensively studied. Here, the automatic three‐dimensional segmentation of the GBM is achieved with its related subzones (active tumour, inner ...
Alexander Mulet de los Reyes +6 more
wiley +1 more source

