Secure Transmission in SWIPT-Powered Two-Way Untrusted Relay Networks
In this paper, we investigate the secure transmission in two-way untrusted amplify-and-forward relay networks with simultaneous wireless information and power transfer (SWIPT).
Jiazhen Zhang+3 more
doaj +1 more source
A Decomposition Algorithm for Local Access Telecommunications Network Expansion Planning [PDF]
Anantaram Balakrishnan+2 more
openalex +1 more source
MountainNet is a small firm which serves as a distribution center for AdaNET Services. These services include providing host systems and telecommunications for AdaNET, developing and supporting AdaNET Information Services, and developing a dynamic ...
Digman, Michael
core +1 more source
A Robotic Prosthetic Hand for Computer Mouse Operations
A soft prosthetic hand for computer mouse operations is introduced to assist users in completing diverse cursor control tasks. The designs of the hardware and software components are presented separately, followed by a user study conducted to assess the feasibility and acceptance of this system.
Ziming Chen+6 more
wiley +1 more source
A Telecommunications Network For Distance Education Learning: If It's Built, Will Agriculture Teachers Use It? [PDF]
Greg Miller, Wade Miller
openalex +1 more source
The different role of mandatory access in German regulation of railroads and telecommunications [PDF]
Network services can be provided efficiently in competitive markets, if nondiscriminatory access to the complementary infrastructure capacities is guaranteed.
Knieps, Günter
core
The Telecommunication Act of 1996 and its Impact [PDF]
This paper analyzes the effects on the implementation of the Telecommunications Act of 1996 (“Act”) on US telecommunications markets and is based on my forthcoming book with the same title.
Economides, Nicholas
core
Low-Complexity Architecture for High-Speed 50G-PON LDPC Decoder
We propose a hardware architecture for 50G-PON LDPC decoder achieving high throughput and high error correcting capability while maintaining low level of resource utilization and implementation complexity.
Kon-Woo Kwon+4 more
doaj +1 more source
Detecting Interprocedural Infeasible Paths Based on Unsatisfiable Path Constraint Patterns
The static analysis plays an important role in many software engineering activities. However, the existence of infeasible paths, which causes lower program test coverage and several false positives in the results of the static analysis, has become one of
Honglei Zhu+4 more
doaj +1 more source
Satellite provided customer premise services: A forecast of potential domestic demand through the year 2000. Volume 2: Technical report [PDF]
The potential United States domestic telecommunications demand for satellite provided customer premises voice, data and video services through the year 2000 were forecast, so that this information on service demand would be available to aid in NASA ...
Al-Kinani, G.+4 more
core +1 more source