Results 41 to 50 of about 144,734 (270)
Seamless image stitching in the gradient domain [PDF]
The algorithm of seamless image stitching in the gradient domain based on the variational derivative estimation method. The functionality of this algorithm is confirmed by computational experiments with real images of different types.
Devitsyna Svetlana, Balabanova Tatyana
doaj +1 more source
Модель аудиту безпеки системи технологічного управління телекомунікаційними мережами [PDF]
Розглядаються алгоритми та часові характеристики моделі аудиту безпеки інформації в системах технологічного управління телекомунікаційними мережами.The algorithm and time characteristics of information security audit model for the Telecommunication ...
Кононович, Володимир +2 more
core
Experimental demonstration of long-distance continuous-variable quantum key distribution
Distributing secret keys with information-theoretic security is arguably one of the most important achievements of the field of quantum information processing and communications. The rapid progress in this field has enabled quantum key distribution (QKD)
Diamanti, Eleni +4 more
core +3 more sources
A diagnostic method for reconfigurable intelligent surfaces (RIS) based on non‐uniform space‐time‐coding modulation is presented. Fault localization is achieved via amplitude‐only spectral measurements, eliminating the need for complex signal processing. A one‐to‐one mapping between harmonic components and RIS elements enables accurate detection.
Xiao Qing Chen +8 more
wiley +1 more source
METHOD OF ASSESSMENT OF THE CIBERNETIC PROTECTION OF THE ORGANIZATION COMMUNICATION SYSTEM
The article analyzes the open sources of the Internet for the presence of methods of assessment of cybernetic security of information and telecommunication system of the organization.
Igor M. Kozubtsov +3 more
doaj
The evolution of wireless communication systems has led to the emergence of the sixth generation (6G) communication architecture, characterised by transformative technologies and novel paradigms that transcend the capabilities of its predecessors.
Pranita Bhide +2 more
doaj +1 more source
Assessing DER network cybersecurity defences in a power-communication co-simulation environment
Increasing penetrations of interoperable distributed energy resources (DER) in the electric power system are expanding the power system attack surface.
Jay Johnson +6 more
doaj +1 more source
Towards a business model for cellular network and telecommunication operators: a theoretical framework [PDF]
Cellular networks and telecommunications bring major change to the way businesses are conducted. Mobility has become one of the main priorities for users and this has impacted on cellular networks and telecommunication operators (CNTOs).
Al-Debei, MM, Avison, D, El-Haddadeh, R
core
To What Extent Would E-mall Enable SMEs to Adopt E-Commerce? [PDF]
This paper presents findings from a study of e-commerce adoption by Small and Medium Enterprises (SMEs) in Saudi Arabia. Only tiny number of Saudi commercial organizations, mostly medium and large companies from the manufacturing sector, in involved in e-
AlGhamdi, Rayed +2 more
core +2 more sources
Conformal Reconfigurable Intelligent Surfaces: A Cylindrical Geometry Perspective
Cylindrical reconfigurable intelligent surfaces are explored for low‐complexity beam steering using one‐bit meta‐atoms. A multi‐level modeling approach, including optimization‐based synthesis, demonstrates that even minimal hardware can support directive scattering.
Filippo Pepe +4 more
wiley +1 more source

