Results 51 to 60 of about 144,734 (270)
Research on Telecommunication System Business Security Architecture
The concept of service security was thoroughly analyzed,and the generalized and narrow business security was proposed.The generalized business safety system was divided into five layers,and network security and safety requirements were defined,meanwhile ...
Hong Li, Kai Qu
doaj +2 more sources
The authors devised a protocol that allows two parties, who may malfunction or intentionally convey incorrect information in communication through a quantum channel, to verify each other's measurements and agree on each other's results.
Kazuki Ikeda, Adam Lowe
doaj +1 more source
Impacts of energy taxation in the enlarged European Union, evaluation with GEM-E3 Europe [PDF]
The objective of this study is twofold: first to analyze how the implementation of the EU energy tax policies will affect the EU and its Member States and secondly to analyze how energy tax policies can contribute to climate policy objectives in the ...
Kouvaritakis, Nikos +5 more
core
TCG based approach for secure management of virtualized platforms: state-of-the-art [PDF]
There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios.
Aslam, Mudassar, Gehrmann, Christian
core
Proactive Robotic Grasp Stability via Tactile Safety Margin Feedback
We introduce the tactile safety margin (TSM), defined as the ratio between applied friction force (Ffric) and maximum friction (Fmax) derived from grip force. A bilayer E‐skin with decoupled temperature, strain, and pressure sensing enables real‐time grasp stability monitoring through measured TSM values, allowing robots to proactively adjust grip ...
Yebin Park +10 more
wiley +1 more source
Secure transmission for reconfigurable intelligent surface assisted communication with CV‐DDPG
Reconfigurable intelligent surface (RIS) has great potential in securing wireless transmission, and it can flexibly change the wireless communication environment. However, the employment of RIS increases the difficulty in beamforming of base station (BS),
Ling Gao, Li Xu, Yuexin Zhang, Wei Lin
doaj +1 more source
Business model requirements and challenges in the mobile telecommunication sector [PDF]
The telecommunications business is undergoing a critical revolution, driven by innovative technologies, globalization, and deregulation. Cellular networks and telecommunications bring radical changes to the way telecom businesses are conducted ...
Al-Debei, MM, Avison, D
core
Multi-Level Steganography: Improving Hidden Communication in Networks
The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the ...
Fraczek, Wojciech +2 more
core +2 more sources
Metasurfaces and Metadevices for Topological Electromagnetic Waves
Optical topologies refer to diverse topological localized structures made by diverse parameters of light fields, such as vortices, skyrmions, and hopfions. This article navigates a direction of metasurface‐based integrated devices for generation, manipulation and detection of novel topologies of light, which would be a rapidly growing interdisciplinary
Rensheng Xie +3 more
wiley +1 more source
The evaluation of the activity specifics of Belarus telecommunication companies is made. The realization principles of information protection systems auditing method in these companies is grounded with use of the evaluation results and the requirements ...
V. A. Boiprav, L. L. Utin
doaj

