Results 21 to 30 of about 209,606 (303)
Deploying elastic routing capability in an SDN/NFV-enabled environment [PDF]
SDN and NFV are two paradigms that introduce unseen flexibility in telecom networks. Where previously telecom services were provided by dedicated hardware and associated (vendor-specific) protocols, SDN enables to control telecom networks through ...
Colle, Didier +6 more
core +1 more source
Towards building a firm metaverse security base
The Metaverse is a significant field that is currently receiving considerable attention from both the industry and academia. The transformation of the Metaverse from science fiction to reality is being actively promoted by technology, industry, and ...
Li Anmin +4 more
doaj +1 more source
Narrow linewidth single laser source system for onboard atom interferometry [PDF]
A compact and robust laser system for atom interferometry based on a frequency-doubled telecom laser is presented. Thanks to an original stabilization architecture on a saturated absorption setup, we obtain a frequency-agile laser system allowing fast ...
Bidel, Yannick +6 more
core +2 more sources
The article analyses the telecoms in the European Union countries. The research has two stages: in the first stage the development of telecommunication sectors in various countries has been analyzed.
Manuela Tvaronavičienė, Irina Travkina
doaj +1 more source
Quantum entanglement distribution with 810 nm photons through telecom fibers
We demonstrate the distribution of polarization entangled photons of wavelength 810 nm through standard telecom fibers. This technique allows quantum communication protocols to be performed over established fiber infrastructure, and makes use of the ...
A. Fedrizzi +6 more
core +1 more source
Ultrabright narrow-band telecom two-photon source for long-distance quantum communication [PDF]
We demonstrate an ultrabright narrow-band two-photon source at the 1.5 -\mu m telecom wavelength for long-distance quantum communication. By utilizing a bow-tie cavity, we obtain a cavity enhancement factor of $4.06\times 10^4$.
20361199 +10 more
core +2 more sources
TrustCall: A Trust Computation Model for Web Conversational Services
Web conversational services are exposed to several threats in which the social context between communicating participants is manipulated. Cybercrimes based on identity misrepresentation to obtain sensitive information are on the rise.
Ibrahim Tariq Javed +2 more
doaj +1 more source
Innovation has become an important source of growth and survival for the telecom industry, especially with the highly competitive, dynamic business environment of this sector.
Mohammed A. Hajar +3 more
doaj +1 more source
ENHANCEMENT OF CODE DIVISION MULTIPLE ACCESS (CDMA) WITHIN THE GSM SYSTEM IN IRAQ
Despite the widespread adoption of Global System for Mobile Communications (GSM) in Iraq, the network's capacity and performance limitations have become increasingly apparent, particularly in urban areas with high user density. Currently, LTE (4G) is the
Nabil Abdulwahab Abdulrazaq Baban
doaj +1 more source
Consensus Opinion Model in Online Social Networks Based on Influential Users
A framework to consensus opinion model within a networked social group is put forward. The current research in opinion formation within the groups is largely based on the opinion aggregation of each user of the network.
Amir Mohammadinejad +2 more
doaj +1 more source

