Results 41 to 50 of about 144,734 (270)

Seamless image stitching in the gradient domain [PDF]

open access: yesITM Web of Conferences, 2019
The algorithm of seamless image stitching in the gradient domain based on the variational derivative estimation method. The functionality of this algorithm is confirmed by computational experiments with real images of different types.
Devitsyna Svetlana, Balabanova Tatyana
doaj   +1 more source

Модель аудиту безпеки системи технологічного управління телекомунікаційними мережами [PDF]

open access: yes, 2001
Розглядаються алгоритми та часові характеристики моделі аудиту безпеки інформації в системах технологічного управління телекомунікаційними мережами.The algorithm and time characteristics of information security audit model for the Telecommunication ...
Кононович, Володимир   +2 more
core  

Experimental demonstration of long-distance continuous-variable quantum key distribution

open access: yes, 2012
Distributing secret keys with information-theoretic security is arguably one of the most important achievements of the field of quantum information processing and communications. The rapid progress in this field has enabled quantum key distribution (QKD)
Diamanti, Eleni   +4 more
core   +3 more sources

Non‐Uniform Space‐Time‐Coding Modulation for Low‐Complexity Diagnostics of Reconfigurable Intelligent Surfaces

open access: yesAdvanced Electronic Materials, EarlyView.
A diagnostic method for reconfigurable intelligent surfaces (RIS) based on non‐uniform space‐time‐coding modulation is presented. Fault localization is achieved via amplitude‐only spectral measurements, eliminating the need for complex signal processing. A one‐to‐one mapping between harmonic components and RIS elements enables accurate detection.
Xiao Qing Chen   +8 more
wiley   +1 more source

METHOD OF ASSESSMENT OF THE CIBERNETIC PROTECTION OF THE ORGANIZATION COMMUNICATION SYSTEM

open access: yesSučasnì Informacìjnì Tehnologìï u Sferì Bezpeki ta Oboroni, 2018
The article analyzes the open sources of the Internet for the presence of methods of assessment of cybernetic security of information and telecommunication system of the organization.
Igor M. Kozubtsov   +3 more
doaj  

Review on 6G communication and its architecture, technologies included, challenges, security challenges and requirements, applications, with respect to AI domain

open access: yesIET Quantum Communication
The evolution of wireless communication systems has led to the emergence of the sixth generation (6G) communication architecture, characterised by transformative technologies and novel paradigms that transcend the capabilities of its predecessors.
Pranita Bhide   +2 more
doaj   +1 more source

Assessing DER network cybersecurity defences in a power-communication co-simulation environment

open access: yesIET Cyber-Physical Systems, 2020
Increasing penetrations of interoperable distributed energy resources (DER) in the electric power system are expanding the power system attack surface.
Jay Johnson   +6 more
doaj   +1 more source

Towards a business model for cellular network and telecommunication operators: a theoretical framework [PDF]

open access: yes, 2008
Cellular networks and telecommunications bring major change to the way businesses are conducted. Mobility has become one of the main priorities for users and this has impacted on cellular networks and telecommunication operators (CNTOs).
Al-Debei, MM, Avison, D, El-Haddadeh, R
core  

To What Extent Would E-mall Enable SMEs to Adopt E-Commerce? [PDF]

open access: yes, 2012
This paper presents findings from a study of e-commerce adoption by Small and Medium Enterprises (SMEs) in Saudi Arabia. Only tiny number of Saudi commercial organizations, mostly medium and large companies from the manufacturing sector, in involved in e-
AlGhamdi, Rayed   +2 more
core   +2 more sources

Conformal Reconfigurable Intelligent Surfaces: A Cylindrical Geometry Perspective

open access: yesAdvanced Electronic Materials, EarlyView.
Cylindrical reconfigurable intelligent surfaces are explored for low‐complexity beam steering using one‐bit meta‐atoms. A multi‐level modeling approach, including optimization‐based synthesis, demonstrates that even minimal hardware can support directive scattering.
Filippo Pepe   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy