Results 61 to 70 of about 144,734 (270)
The protection of communications between Internet of Things (IoT) devices is of great concern because the information exchanged contains vital sensitive data.
Aurelien T. Mozipo, John M. Acken
doaj +1 more source
Context-Awareness Enhances 5G Multi-Access Edge Computing Reliability [PDF]
The fifth generation (5G) mobile telecommunication network is expected to support Multi- Access Edge Computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds.
Crippa, Marcos Rate +4 more
core +2 more sources
This study demonstrates a versatile hardware platform using nano‐oscillators based on binary oxides for deterministic and probabilistic computing. By tailoring material physics, NbOx enables energy‐efficient synchronization for pattern recognition, while enhanced stochasticity in engineered SiOx provides robust entropy for p‐bits to solve complex ...
Jihyun Kim +3 more
wiley +1 more source
Aiming at the main features of the information content security incidents and telecommunication network themselves,a design of situation awareness model was presented.The model using distributed character data collection and hierarchical progressive ...
Lin Ge, Xinsheng Ji, Tao Jiang
doaj +2 more sources
Compiled by Susan LaCette.International.pdf: 820 downloads, before Oct.
LaCette, Susan
core +1 more source
The Impact of Acquisition Intensity on ESG Performance
ABSTRACT This study investigates the impact of Acquisition Intensity on ESG performance using a panel of 1,736 US‐listed companies from 2002 to 2023. Employing a robust OLS framework, we assess both Value‐Based and Volume‐Based Acquisition Intensity against overall ESG scores and their environmental, social, and governance pillars, controlling for firm
Ugbede Amedu +2 more
wiley +1 more source
Data security for third generation telecommunication systems [PDF]
This research work started as a humble, and yet ambitious attempt of enhancing the current security level in wireless data communication. Detailed analysis of the existing security protocols and wireless networks, together with their strengths and ...
Delivasilis, Dimitrios L.
core
An evaluation of total quality management practices on business performance of the Nigerian telecommunications sector: a case study of MTN Nigeria Limited [PDF]
This study examines the effects of The Total Quality Management practices on Business Performance of the Nigerian Telecommunications Sector. A review of literatures on TQM shows that no study has been carried out on its application in the Nigerian ...
Alamutu, S. A +3 more
core
ABSTRACT The supply chain consists of interconnected businesses and organisations responsible for the flow of goods and services. As firms increasingly adopt digital technologies, the spillover effects of supply chain digitalisation (SCD) on environmental performance remain underexplored.
Zengdong Cao +4 more
wiley +1 more source
Eavesdropping near-field contactless payments: a quantitative analysis
This paper presents an assessment of how successful an eavesdropping attack on a contactless payment transaction can be in terms of bit and frame error rates, using an easily concealable antenna and low-cost electronics.
Thomas P. Diakos +3 more
doaj +1 more source

