Results 131 to 140 of about 630,589 (380)

Secure Transmission in SWIPT-Powered Two-Way Untrusted Relay Networks

open access: yesIEEE Access, 2018
In this paper, we investigate the secure transmission in two-way untrusted amplify-and-forward relay networks with simultaneous wireless information and power transfer (SWIPT).
Jiazhen Zhang   +3 more
doaj   +1 more source

AdaNET services [PDF]

open access: yes
MountainNet is a small firm which serves as a distribution center for AdaNET Services. These services include providing host systems and telecommunications for AdaNET, developing and supporting AdaNET Information Services, and developing a dynamic ...
Digman, Michael
core   +1 more source

A Robotic Prosthetic Hand for Computer Mouse Operations

open access: yesAdvanced Intelligent Systems, EarlyView.
A soft prosthetic hand for computer mouse operations is introduced to assist users in completing diverse cursor control tasks. The designs of the hardware and software components are presented separately, followed by a user study conducted to assess the feasibility and acceptance of this system.
Ziming Chen   +6 more
wiley   +1 more source

The different role of mandatory access in German regulation of railroads and telecommunications [PDF]

open access: yes
Network services can be provided efficiently in competitive markets, if nondiscriminatory access to the complementary infrastructure capacities is guaranteed.
Knieps, Günter
core  

The Telecommunication Act of 1996 and its Impact [PDF]

open access: yes, 1998
This paper analyzes the effects on the implementation of the Telecommunications Act of 1996 (“Act”) on US telecommunications markets and is based on my forthcoming book with the same title.
Economides, Nicholas
core  

Low-Complexity Architecture for High-Speed 50G-PON LDPC Decoder

open access: yesIEEE Access
We propose a hardware architecture for 50G-PON LDPC decoder achieving high throughput and high error correcting capability while maintaining low level of resource utilization and implementation complexity.
Kon-Woo Kwon   +4 more
doaj   +1 more source

Detecting Interprocedural Infeasible Paths Based on Unsatisfiable Path Constraint Patterns

open access: yesIEEE Access, 2019
The static analysis plays an important role in many software engineering activities. However, the existence of infeasible paths, which causes lower program test coverage and several false positives in the results of the static analysis, has become one of
Honglei Zhu   +4 more
doaj   +1 more source

Satellite provided customer premise services: A forecast of potential domestic demand through the year 2000. Volume 2: Technical report [PDF]

open access: yes
The potential United States domestic telecommunications demand for satellite provided customer premises voice, data and video services through the year 2000 were forecast, so that this information on service demand would be available to aid in NASA ...
Al-Kinani, G.   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy