Academic literature on the topic 'Telecommunication – Message processing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Telecommunication – Message processing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Telecommunication – Message processing"

1

Kruglikov, S. V., and A. Yu Zalizka. "Synthesis of wireless telecommunication network with adaptation to refusals of central elements of average and high intensity." Proceedings of the National Academy of Sciences of Belarus, Physical-Technical Series 65, no. 1 (April 6, 2020): 117–28. http://dx.doi.org/10.29235/1561-8358-2020-65-1-117-128.

Full text
Abstract:
A technique of synthesis of a wireless digital communication network with package switching, providing transfer of video messages of real time scale between elements of multipurpose information-operating system in conditions of high failure rate of central elements, is considered. As conceptual model of a telecommunication network – the network of the mixed structure, including multipurpose devices, constructed on the basis of standards of a broadband radio access with switching of packages and two interconnected levels of network interaction of elements (local and main) is accepted. The technique of synthesis of a wireless network is based on the multilevel, combined adaptation of a telecommunication network in the conditions of refusals of central elements, which primary goal is rational change of parameters, functions of network elements in close interrelation with purposeful transformation of structure of telecommunication system subnetworks. The main objective of carrying out the combined adaptation of the network consists in achievement of necessary throughput of communication system depending on degree of failure rate of central elements. Properties of multilevel adaptation were investigated in the course of realization of the combined (structurally-parametrical) synthesis with use of the aggregate approach of modelling of difficult technical systems. Efficiency of the specified technique is proven by the results of the imitating experiment with use of the aggregate model of a wireless network of data transmission with switching of packages, obtained previously. The experimental data, received at natural research of networks of a broadband radio communication on the basis of standards 802.11 b/g/n, have shown, that time of processing of packages of a message essentially depends on use of existing ways of adaptation. In particular, application of effective algorithms of adaptation (both parametrical and structural) will allow to reduce the time of finding of details (packages) in broadband communication devices by several times and, thereby, to provide demanded throughput of the network functioning in the conditions of refusals of central elements.
APA, Harvard, Vancouver, ISO, and other styles
2

Sinyavskiy, Ivan, Igor Sorokin, and Andrei Sukhov. "Prototype wireless network for internet of things based on DECT standard." Telfor Journal 14, no. 1 (2022): 8–11. http://dx.doi.org/10.5937/telfor2201008s.

Full text
Abstract:
This paper presents a software prototype of a wireless network for the Internet of Things (IoT) based on the DECT (Digital Enhanced Cordless Telecommunication) standard. It proposes an architecture for encapsulating commands from the most common IoT protocol, MQTT (Message Queuing Telemetry Transport), into SIP (Session Initiation Protocol) packets. A module is created to embed MQTT-SN (MQTT for Sensor Networks) packets into SIP packets. The module is developed in Go language using the built-in "net" library. Delivery of MQTT-SN packets to IoT devices is carried out using the SIP protocol. Source codes and instructions for installing the gateway can be found at https://github.com/iSinyavsky/mqtt-sn-sip-gateway.
APA, Harvard, Vancouver, ISO, and other styles
3

Nezamoddini, Nasim, and Amirhosein Gholami. "A Survey of Adaptive Multi-Agent Networks and Their Applications in Smart Cities." Smart Cities 5, no. 1 (March 9, 2022): 318–46. http://dx.doi.org/10.3390/smartcities5010019.

Full text
Abstract:
The world is moving toward a new connected world in which millions of intelligent processing devices communicate with each other to provide services in transportation, telecommunication, and power grids in the future’s smart cities. Distributed computing is considered one of the efficient platforms for processing and management of massive amounts of data collected by smart devices. This can be implemented by utilizing multi-agent systems (MASs) with multiple autonomous computational entities by memory and computation capabilities and the possibility of message-passing between them. These systems provide a dynamic and self-adaptive platform for managing distributed large-scale systems, such as the Internet-of-Things (IoTs). Despite, the potential applicability of MASs in smart cities, very few practical systems have been deployed using agent-oriented systems. This research surveys the existing techniques presented in the literature that can be utilized for implementing adaptive multi-agent networks in smart cities. The related literature is categorized based on the steps of designing and controlling these adaptive systems. These steps cover the techniques required to define, monitor, plan, and evaluate the performance of an autonomous MAS. At the end, the challenges and barriers for the utilization of these systems in current smart cities, and insights and directions for future research in this domain, are presented.
APA, Harvard, Vancouver, ISO, and other styles
4

Adeliyi, Timothy T., and Oludayo O. Olugbara. "Fast Channel Navigation of Internet Protocol Television Using Adaptive Hybrid Delivery Method." Journal of Computer Networks and Communications 2018 (July 8, 2018): 1–11. http://dx.doi.org/10.1155/2018/2721950.

Full text
Abstract:
The Internet protocol television brought seamless potential that has revolutionized the media and telecommunication industries by providing a platform for transmitting digitized television services. However, zapping delay is a critical factor that affects the quality of experience in the Internet protocol television. This problem is intrinsically caused by command processing time, network delay, jitter, buffer delay, and video decoding delay. The overarching objective of this paper is to use a hybrid delivery method that agglutinates multicast- and unicast-enabled services over a converged network to minimize zapping delay to the bare minimum. The hybrid method will deliver Internet protocol television channels to subscribers using the unicast stream coupled with differentiated service quality of experience when zapping delay is greater than 0.43 s. This aids a faster transmission by sending a join message to the multicast stream at the service provider zone to acquire the requested channel. The hybrid method reported in this paper is benchmarked with the state-of-the-art multicast stream and unicast stream methods. Results show that the hybrid method has an excellent performance by lowering point-to-point queuing delay, end-to-end packet delay, and packet variation and increasing throughput rate.
APA, Harvard, Vancouver, ISO, and other styles
5

Nadeem, Asim, Agha Kashif, Sohail Zafar, and Zohaib Zahid. "On 2-partition dimension of the circulant graphs." Journal of Intelligent & Fuzzy Systems 40, no. 5 (April 22, 2021): 9493–503. http://dx.doi.org/10.3233/jifs-201982.

Full text
Abstract:
The partition dimension is a variant of metric dimension in graphs. It has arising applications in the fields of network designing, robot navigation, pattern recognition and image processing. Let G (V (G) , E (G)) be a connected graph and Γ = {P1, P2, …, Pm} be an ordered m-partition of V (G). The partition representation of vertex v with respect to Γ is an m-vector r (v|Γ) = (d (v, P1) , d (v, P2) , …, d (v, Pm)), where d (v, P) = min {d (v, x) |x ∈ P} is the distance between v and P. If the m-vectors r (v|Γ) differ in at least 2 positions for all v ∈ V (G), then the m-partition is called a 2-partition generator of G. A 2-partition generator of G with minimum cardinality is called a 2-partition basis of G and its cardinality is known as the 2-partition dimension of G. Circulant graphs outperform other network topologies due to their low message delay, high connectivity and survivability, therefore are widely used in telecommunication networks, computer networks, parallel processing systems and social networks. In this paper, we computed partition dimension of circulant graphs Cn (1, 2) for n ≡ 2 (mod 4), n ≥ 18 and hence corrected the result given by Salman et al. [Acta Math. Sin. Engl. Ser. 2012, 28, 1851-1864]. We further computed the 2-partition dimension of Cn (1, 2) for n ≥ 6.
APA, Harvard, Vancouver, ISO, and other styles
6

Alzahrani, Ali, and Theyazn H. H. Aldhyani. "Artificial Intelligence Algorithms for Detecting and Classifying MQTT Protocol Internet of Things Attacks." Electronics 11, no. 22 (November 21, 2022): 3837. http://dx.doi.org/10.3390/electronics11223837.

Full text
Abstract:
The Internet of Things (IoT) grew in popularity in recent years, becoming a crucial component of industrial, residential, and telecommunication applications, among others. This innovative idea promotes communication between physical components, such as sensors and actuators, to improve process flexibility and efficiency. Smart gadgets in IoT contexts interact using various message protocols. Message queuing telemetry transfer (MQTT) is a protocol that is used extensively in the IoT context to deliver sensor or event data. The aim of the proposed system is to create an intrusion detection system based on an artificial intelligence algorithm, which is becoming essential in the defense of the IoT networks against cybersecurity threats. This study proposes using a k-nearest neighbors (KNN) algorithm, linear discriminant analysis (LDA), a convolutional neural network (CNN), and a convolutional long short-term memory neural network (CNN-LSTM) to identify MQTT protocol IoT intrusions. A cybersecurity system based on artificial intelligence algorithms was examined and evaluated using a standard dataset retrieved from the Kaggle repository. The dataset was injected by five attacks, namely brute-force, flooding, malformed packet, SlowITe, and normal packets. The deep learning algorithm achieved high performance compared with the developing security system using machine learning algorithms. The performance accuracy of the KNN method was 80.82%, while the accuracy of the LDA algorithm was 76.60%. The CNN-LSTM model attained a high level of precision (98.94%) and is thus very effective at detecting intrusions in IoT settings.
APA, Harvard, Vancouver, ISO, and other styles
7

HERRERO, JUAN CARLOS. "CDMA & TDMA BASED NEURAL NETS." International Journal of Neural Systems 11, no. 03 (June 2001): 237–46. http://dx.doi.org/10.1142/s0129065701000679.

Full text
Abstract:
CDMA and TDMA telecommunication techniques were established long time ago, but they have acquired a renewed presence due to the rapidly increasing mobile phones demand. In this paper, we are going to see they are suitable for neural nets, if we leave the concept "connection" between processing units and we adopt the concept "messages" exchanged between them. This may open the door to neural nets with a higher number of processing units and flexible configuration.
APA, Harvard, Vancouver, ISO, and other styles
8

Nesterenko, Mykola, Oleksandr Romanov, and Oleksandr Uspenskyi. "Analytical model of assessment of message processing time in the management of telecommunications networks." Collection "Information technology and security" 1, no. 1 (June 30, 2012): 69–75. http://dx.doi.org/10.20535/2411-1031.2012.1.1.53666.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Aryani, Diah, Ade Setiadi, and Fifit Alfiah. "APLIKASI WEB PENGIRIMAN DAN PENERIMAAN SMS DENGAN GAMMU SMS ENGINE BERBASIS PHP." CCIT Journal 8, no. 3 (May 19, 2015): 174–90. http://dx.doi.org/10.33050/ccit.v8i3.340.

Full text
Abstract:
The development of the rapidly evolving technology in this era, especially in the telecommunications, media, and information (telecommunications) received positive feedback and negative in society. The technology used by the right target will be very useful in supporting the activities of either the agency or agencies. penyampaikan for information processing and information so that the information presented is fast, precise, and lack of errors, thus making the job more effectively and efficiently. Short Message Service (SMS) is the delivery of messages or information that is already being replaced by chat applications such as fuel and whatsapp. SMS has experienced growth in terms of the use and function as Polling SMS, SMS Banking, and SMS Gateway. Gammu SMS Engine Engine is used for SMS Gateway application. Gammu can be implemented in a variety of programming languages such as PHP and can be used functions as needed. Gammu SMS messaging engine is processing applications that do not perform bulk SMS delivery on most SMS gateway. The method used for Gammu SMS engines do not get hung up on a theory but a configuration setting through some source code and also through the device manager to check the port that is connected to the computer. To use the database files in a manner that is available on the database import gammu folder on the server mysql which we use to connect to the modem and mysql. To run the service engine gammu must use the command prompt by way mengetikm "gammu-smsd smsconf -i -s -c" to the process of running the engine at a command prompt first entry in the directory "bin". Knowing gammu runs aktive with the presence of link to stop and restart the service by running aktivenya gammu we can directly use gammu engine SMS to send and receive SMS..
APA, Harvard, Vancouver, ISO, and other styles
10

Buzhin, I. G., V. M. Antonova, E. A. Gaifutdinov, and Yu B. Mironov. "METHODOLOGY FOR A COMPREHENSIVE ASSESSMENT OF THE TELECOMMUNICATION SERVICES QUALITY OF TRANSPORT NETWORKS USING SDN/NFV TECHNOLOGIES." T-Comm 16, no. 12 (2022): 40–45. http://dx.doi.org/10.36724/2072-8735-2022-16-12-40-45.

Full text
Abstract:
Methodology for a comprehensive assessment of the quality of telecommunication services of transport networks using SDN/NFV technology has been developed. The current state and development trends of communication networks have shown that the potential for growth in productivity and bandwidth of networks based on traditional technologies is practically exhausted. These problems can be solved by the technology of software-defined networks and virtualization of network functions (here-inafter SDN/NFV). This methodology can be the basis for selecting the structure and number of SDN controllers and their optimal location in the communication network based on SDN/NFV, calculating reliability indicators, obtaining loss probabilities of streams and control messages as well as time delays for processing streams in SDN telecommunication equipment. Proposals on balancing the traffic load on SDN controllers of the communication network were also given.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Telecommunication – Message processing"

1

Mohror, Kathryn Marie. "Infrastructure For Performance Tuning MPI Applications." PDXScholar, 2004. https://pdxscholar.library.pdx.edu/open_access_etds/2660.

Full text
Abstract:
Clusters of workstations are becoming increasingly popular as a low-budget alternative for supercomputing power. In these systems,message-passing is often used to allow the separate nodes to act as a single computing machine. Programmers of such systems face a daunting challenge in understanding the performance bottlenecks of their applications. This is largely due to the vast amount of performance data that is collected, and the time and expertise necessary to use traditional parallel performance tools to analyze that data. The goal of this project is to increase the level of performance tool support for message-passing application programmers on clusters of workstations. We added support for LAM/MPI into the existing parallel performance tool,P aradyn. LAM/MPI is a commonly used, freely-available implementation of the Message Passing Interface (MPI),and also includes several newer MPI features,such as dynamic process creation. In addition, we added support for non-shared filesystems into Paradyn and enhanced the existing support for the MPICH implementation of MPI. We verified that Paradyn correctly measures the performance of the majority of LAM/MPI programs on Linux clusters and show the results of those tests. In addition,we discuss MPI-2 features that are of interest to parallel performance tool developers and design support for these features for Paradyn.
APA, Harvard, Vancouver, ISO, and other styles
2

Ishibashi, Hiroki. "Torus routing in the presence of multicasts." CSUSB ScholarWorks, 1996. https://scholarworks.lib.csusb.edu/etd-project/1251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Uney, Murat. "Decentralized Estimation Under Communication Constraints." Phd thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12611226/index.pdf.

Full text
Abstract:
In this thesis, we consider the problem of decentralized estimation under communication constraints in the context of Collaborative Signal and Information Processing. Motivated by sensor network applications, a high volume of data collected at distinct locations and possibly in diverse modalities together with the spatially distributed nature and the resource limitations of the underlying system are of concern. Designing processing schemes which match the constraints imposed by the system while providing a reasonable accuracy has been a major challenge in which we are particularly interested in the tradeoff between the estimation performance and the utilization of communications subject to energy and bandwidth constraints. One remarkable approach for decentralized inference in sensor networks is to exploit graphical models together with message passing algorithms. In this framework, after the so-called information graph of the problem is constructed, it is mapped onto the underlying network structure which is responsible for delivering the messages in accordance with the schedule of the inference algorithm. However it is challenging to provide a design perspective that addresses the tradeoff between the estimation accuracy and the cost of communications. Another approach has been performing the estimation at a fusion center based on the quantized information provided by the peripherals in which the fusion and quantization rules are sought while taking a restricted set of the communication constraints into account. We consider two classes of in-network processing strategies which cover a broad range of constraints and yield tractable Bayesian risks that capture the cost of communications as well as the penalty for estimation errors. A rigorous design setting is obtained in the form of a constrained optimization problem utilizing the Bayesian risks. These processing schemes have been previously studied together with the structures that the solutions exhibit in the context of decentralized detection in which a decision out of finitely many choices is made. We adopt this framework for the estimation problem. However, for the case, computationally infeasible solutions arise that involve integral operators that are impossible to evaluate exactly in general. In order not to compromise the fidelity of the model we develop an approximation framework using Monte Carlo methods and obtain particle representations and approximate computational schemes for both the in-network processing strategies and the solution schemes to the design problem. Doing that, we can produce approximating strategies for decentralized estimation networks under communication constraints captured by the framework including the cost. The proposed Monte Carlo optimization procedures operate in a scalable and efficient manner and can produce results for any family of distributions of concern provided that samples can be produced from the marginals. In addition, this approach enables a quantification of the tradeoff between the estimation accuracy and the cost of communications through a parameterized Bayesian risk.
APA, Harvard, Vancouver, ISO, and other styles
4

"Toward intelligent message routing systems." Center for Information Systems Research, Sloan School of Management, Massachusetts Institute of Technology, 1985. http://hdl.handle.net/1721.1/2122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fornasier, Patric Computer Science &amp Engineering Faculty of Engineering UNSW. "An empirical investigation of SSDL." 2007. http://handle.unsw.edu.au/1959.4/40514.

Full text
Abstract:
The SOAP Service Description Language (SSDL) is a SOAP-centric language for describing Web Service contracts. SSDL focuses on message abstraction as the building block for creating service-oriented applications and provides an extensible range of protocol frameworks that can be used to describe and formally model Web Service interactions. SSDL's natural alignment with service-oriented design principles intuitively suggests that it encourages the creation of applications that adhere to this architectural paradigm. Given the lack of tools and empirical data for using SSDL as part of Web Services-based SOAs, we identified the need to investigate its practicability and usefulness through empirical work. To that end we have developed Soya, a programming model and runtime environment for creating and executing SSDL-based Web Services. On the one hand, Soya provides straightforward programming abstractions that foster message-oriented thinking. On the other hand, it leverages contemporary tooling (i.e. Windows Communication Foundation) with SSDL-related runtime functionality and semantics. In this thesis, we describe the design and architecture of Soya and show how it makes it possible to use SSDL as an alternative and powerful metadata language without imposing unrealistic burdens on application developers. In addition, we use Soya and SSDL in a case study which provides a set of initial empirical results with respect to SSDL's strengths and drawbacks. In summary, our work serves as a knowledge framework for better understanding message-oriented Web Service development and demonstrates SSDL's practicability in terms of implementation and usability.
APA, Harvard, Vancouver, ISO, and other styles
6

Ji, Yiming Alex. "Bias analysis and reduction in localization problems." Phd thesis, 2013. http://hdl.handle.net/1885/112339.

Full text
Abstract:
Localization, also called positioning, is the task of determining the position of a target accurately on the surface of the earth. Localization is an important problem which has a long history. The conception of localization can be tracked back to ancient times when human visual and auditory information were used to localize an object such as prey or an enemy. With the development of science and technology, various technologies have been invented for localization by applying diverse types of sensing and information processing. Before and during the World War II, the Radio Detection And Ranging (RADAR) technology was secretly developed by several nations to track enemy ships and aeroplanes. Later the localization problem was studied using what today would be called a multi-agent system, a system composed of multiple interacting intelligent agents within an environment. In order to implement reconnaissance and surveillance tasks, multiple transmitters and receivers were used. Since World War II, there have been many localization algorithms in order to obtain accurate positions of estimated objects for different applications. However almost all the existing localization algorithms have some limitations. One of the most common limitations arises from errors in the measurements. Once errors are present in the measurements, it is then virtually guaranteed that from the generally nonlinear processing of measurements to achieve localization, bias will appear in the estimated positions which will significantly influence the localization accuracy. In order to ameliorate this problem, in this thesis, we propose a generic bias correction method which mixes Taylor series and Jacobian matrices to determine the bias, where the number of measurements is equal to the number of variables being estimated, leading to an easily calculated analytical (though approximate) bias expression. By using the obtained expression, one can compute the (approximate) bias and then simply subtract it from the original estimated positions to improve the localization accuracy. However, when the number of obtained usable measurements is greater than the number of variables being estimated, the nature of the calculations is more complicated in that a further step is required to obtain the analytical expression of the bias. The proposed novel method is generic which means it can be applied to different types of localization algorithms (range-based, bearing-only, scan-based etc.). In order to demonstrate that the proposed method is also applicable in situations with mobile anchors and targets, we analyze the proposed method in two mobile situations. Monte Carlo simulation results verify that when the underlying geometry is a good geometry, which allows the location of a target to be obtained with acceptable mean square error, the proposed approach can correct the bias effectively with an arbitrary number of independent usable measurements. In addition, the proposed method is applicable irrespective of the type of measurement (range, bearing, time difference of arrival(TDOA), etc). Moreover, a particular geometric problem known as the collinearity problem, which may prevent effective use of localization algorithms and the proposed bias reduction method, is analyzed in detail. In order to deal with the collinearity problem, a novel approach, which takes the level of the measurement noise into consideration, is proposed. Monte Carlo simulation results demonstrate the performance of the proposed method. The simulation results also illustrate the influence of two factors on the effect of the proposed bias correction method: the distance between anchors and the level of noise. Apart from RADAR and multi-agent systems, recently, the localization research has been extended to the wireless sensor networks (WSNs), which have been developed fast in recent years with the innovation and evolution in microelectro-mechanical systems technology. WSNs have gained world-wide attention in many different application areas which are important or even essential to our economy and life. From industrial process control to environment monitoring, to battlefield surveillance, wireless sensor networks can play an important role. In almost every application, the physical locations of sensing nodes are of importance, so that localization is necessary for the sensors themselves. Similar to the situations in other areas, the current localization algorithms for wireless sensor networks also suffer from localization bias. Different from other situations, in wireless sensor networks the geometric layout of the whole network is important since it can significantly influence the localization accuracy. We therefore propose a second bias correction method into which the network geometric information is introduced. The second proposed bias reduction method mixes Taylor series and a maximum likelihood estimate, and leads to an easily calculated analytical (though approximate) bias expression in terms of a known maximum likelihood cost function. In contrast to existing contributions, the work considers a network as a whole when the bias is investigated, by introducing the geometric structure of the network into the proposed bias reduction method via the rigidity matrix, a concept drawn from graph theory. A maximum likelihood cost function is related to the rigidity matrix resulting in a final analytical expression of localization bias in terms of the rigidity matrix. This is a major contribution of our work and appears more suitable for wireless sensor networks than any other bias correction methods. In addition we extend the bias correction method to mobile networks in which the anchors are still static while the sensors at unknown positions are all mobile. The performance of the proposed bias reduction method is demonstrated via Monte Carlo simulation results in networks with different number of nodes. Another important problem which is also a topology related problem is that of consensus. Consensus means to reach an agreement regarding a certain quantity of interest that depends on the state of all objects and it has been investigated in many areas for a long time. In computer science, consensus has been studied as an important challenge of the distributed computing field [1]; in management science and statistics, consensus was considered as long ago as the 1960s [44]. Recently in the wireless sensor networks area consensus has also begun to be studied. Many consensus algorithms have been proposed to deal with consensus. A consensus algorithm (or protocol) is an interaction rule that specifies the information exchange between an object and all of its neighbors achieving consensus. One always hopes that when a consensus algorithm is applied the agreement can be achieved as soon as possible. Therefore the convergence rate, which denotes the speed of a network to achieve the consensus, can be considered to evaluate the performance of a consensus algorithm. We investigate the influence of the network topology on the convergence rate in distributed average consensus problems. Different from existing work, we not only aim to improve the convergence rate but also intend to minimize the communication cost which is important in power limited wireless sensor networks. We analyze the relationship among the number of edges, the convergence rate and the total communication cost. Based on the theoretical analysis and simulation results, we define a kind of Magic Number to help construct a network achieving the minimal communication cost while maintaining a satisfactory convergence rate.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Telecommunication – Message processing"

1

Willmott, R. Practical guide to message handling systems. Manchester: NCC Blackwell, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rivera, Rawlinson. MCITP: Microsoft Exchange Server 2007 messaging design and deployment : study guide. Indianapolis, Ind: Wiley Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Willmott, Robert. Technical guide to message handling systems. Manchester, England: NCC Blackwell, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Trus, Steve. Guidelines for the evaluation of message handling systems implementations. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Torsten, Rüdebusch, ed. UMTS signaling: UMTS interfaces, protocols, message flows and procedures analyzed and explained. 2nd ed. Chichester, West Sussex, England: John Wiley & Sons, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Richard, Monson-Haefel, Chappell David A, and Monson-Haefel Richard, eds. Java message service. 2nd ed. Sebastopol, CA: O'Reilly, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

IFIP TC 6/WG 6.5 Working Conference on Message Handling Systems (1987 Munich, Germany). Message handling systems: State of the art and future directions : proceedings of the IFIP TC 6/WG 6.5 Working Conference on Message Handling Systems, Munich, F.R.G., 27-29 April 1987. Amsterdam: North-Holland, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Java message service (JMS) for J2EE. Indianapolis, IN: New Riders, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

J, Cronin Mary, ed. Developing MMS applications: Multimedia messaging services for wireless networks. New York: McGraw-Hill, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bateman, David. Configuring Cisco Unified communications manager and Unity connection: A step-by-step guide. 2nd ed. Indianapolis, IN: Crisco Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Telecommunication – Message processing"

1

Vianna, Leonardo Silva, Lizyane Rosa Antunes, Rafael Maia Pinto, and Alexandre Leopoldo Gonçalves. "Natural Language Processing of Messages from a Social Network for Inflation Analysis." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 218–29. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22324-2_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Klamberg, Mark. "A Paradigm Shift in Swedish Electronic Surveillance Law." In Digital Democracy and the Impact of Technology on Governance and Politics, 175–201. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-3637-8.ch010.

Full text
Abstract:
Electronic surveillance law is subject to a paradigm shift where traditional principles are reconsidered and the notion of privacy has to be reconstructed. This paradigm shift is the result of four major changes in our society with regard to: technology, perceptions of threats, interpretation of human rights and ownership over telecommunications. The above-mentioned changes have created a need to reform both the tools of electronic surveillance and domestic legislation. Surveillance that was previously kept secret with reference to National Security is now subject to public debate, including Communications Intelligence (COMINT), a sub-category of Signals Intelligence (SIGINT). This chapter covers systems of “mass surveillance,” such as data retention and COMINT, and whether these are consistent with the European Convention on Human Rights. The chapter comes to two conclusions in relation to COMINT. First, the perceived threats have changed, shifting the focus of COMINT from military threats towards non-state actors such as terrorists and criminal networks. Second, COMINT involves relatively narrow interception of the content of messages compared to its large-scale collection and storage of traffic data, which through further processing may reveal who is communicating with whom.
APA, Harvard, Vancouver, ISO, and other styles
3

Klamberg, Mark. "A Paradigm Shift in Swedish Electronic Surveillance Law." In Human Rights and Ethics, 2006–32. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6433-3.ch111.

Full text
Abstract:
Electronic surveillance law is subject to a paradigm shift where traditional principles are reconsidered and the notion of privacy has to be reconstructed. This paradigm shift is the result of four major changes in our society with regard to: technology, perceptions of threats, interpretation of human rights and ownership over telecommunications. The above-mentioned changes have created a need to reform both the tools of electronic surveillance and domestic legislation. Surveillance that was previously kept secret with reference to National Security is now subject to public debate, including Communications Intelligence (COMINT), a sub-category of Signals Intelligence (SIGINT). This chapter covers systems of “mass surveillance,” such as data retention and COMINT, and whether these are consistent with the European Convention on Human Rights. The chapter comes to two conclusions in relation to COMINT. First, the perceived threats have changed, shifting the focus of COMINT from military threats towards non-state actors such as terrorists and criminal networks. Second, COMINT involves relatively narrow interception of the content of messages compared to its large-scale collection and storage of traffic data, which through further processing may reveal who is communicating with whom.
APA, Harvard, Vancouver, ISO, and other styles
4

Muturi, Nancy. "Access and the Use of ICTs Among Women in Jamaica." In Global Information Technologies, 1199–204. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-939-7.ch089.

Full text
Abstract:
Information and communication technologies (ICTs) have made the global village a reality with the Internet, cell phones and other digital communication technology disseminating messages instantly through the fast information superhighway. The United Nations (U.N.) Development Program (UNDP, 2001) defines ICTs in terms of innovations in microelectronics, computing (hardware and software), telecommunications and opto-electronics—micro-processors, semiconductors and fibre optics. These technologies enable the processing and storage of enormous amounts and rapid distribution of information through communications networks. As new innovations, ICTs are also described as “the building blocks of the networked world,” (UNDP, 2001, p. 30), with ICTs, particularly the Internet, being used by a variety of organizations as a global networking tool. Access to, knowledge of and effective use of ICTs is crucial, particularly where access to the technology is equated to social, political, economic and human development. Internet usage, for example, is regarded as the standard indicator of the use of ICTs and also the most democratic of all mass media, mainly because of their low investment (Internet World Stats, 2006). This technology has been used effectively as a tool for delivery of various services and applications, including distance learning, agriculture, telehealth, e-commerce and e-governance. Individuals, organizations and institutions now use the Internet to strategically reach a large audience of markets through e-mails and other advertising strategies, since it is fast and economical, irrespective of size or location of business. There are many gender issues, however, related to connectivity and access to available ICTs, some of which are visibly documented and most often examined as the digital divide based on gender. Rakow (1986), in her classic studies on gender and ICTs, however, points out that technology should not be examined based on the differences in the behavior of men or women towards a technology, but instead to look for the ways in which the technology is used to construct us as women and men through the social practices that put it to use. Rakow further argues that more attention needs to be paid to how communication technologies alter, aid, or construct women’s opportunities for interacting with each other and with the wider public domain. This article is based on data gathered through a detailed open-ended questionnaire, with a sample of 121 Jamaican women, ages 21 and older, and explores their access and nature of use of ICTs as well as challenges they face in their attempts to use them effectively. Like other Caribbean islands, Jamaica has embraced ICTs as a tool for national development, adopting the most recent technologies to ensure global connectivity. The study examines how these technologies could be used effectively to address some of the developmental, economical, health and human developmental challenges that face the Small Island Developing States (SIDS). These findings are used to complement existing studies, including national surveys and literature on the gender and ICT issues in the Caribbean.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Telecommunication – Message processing"

1

Konoura, Hiroaki, Masafumi Kinoshita, Takafumi Koike, Kenji Leibnitz, and Masayuki Murata. "Efficient dequeuing technique for distributed messaging systems processing massive message volumes." In 2016 26th International Telecommunication Networks and Applications Conference (ITNAC). IEEE, 2016. http://dx.doi.org/10.1109/atnac.2016.7878821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ibrahimov, B. G., Z. A. Ismaylov, M. Y. Orujova, and I. M. Mammadov. "About One Problem of Control Network and Channel Resources in Communication Networks During Processing Useful and Service Message Signals." In 2022 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF). IEEE, 2022. http://dx.doi.org/10.1109/weconf55058.2022.9803316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Message from the SIGTELCOM 2017 general chairs." In 2017 International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom). IEEE, 2017. http://dx.doi.org/10.1109/sigtelcom.2017.7849779.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dandanov, Nikolay, Krasimir Tonchev, Vladimir Poulkov, and Pavlina Koleva. "Approximate Message Passing for Downlink Sparse Channel Estimation in FDD Massive MIMO." In 2019 42nd International Conference on Telecommunications and Signal Processing (TSP). IEEE, 2019. http://dx.doi.org/10.1109/tsp.2019.8768850.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kustov, Vladimir, and Alexei Krasnov. "Masking Hidden Messages under Noise in Steganography Problems." In 2021 44th International Conference on Telecommunications and Signal Processing (TSP). IEEE, 2021. http://dx.doi.org/10.1109/tsp52935.2021.9522678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

"Message from the SIGTELCOM’20 General & TPC Chairs." In 2020 4th International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom). IEEE, 2020. http://dx.doi.org/10.1109/sigtelcom49868.2020.9199051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

"Message from the SIGTELCOM’19 General & TPC Chairs." In 2019 3rd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom). IEEE, 2019. http://dx.doi.org/10.1109/sigtelcom.2019.8696097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Message from the SIGTELCOM 2018 general and technical program chairs." In 2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom). IEEE, 2018. http://dx.doi.org/10.1109/sigtelcom.2018.8325819.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Adzhemov, A. S., and A. Y. Kudryashova. "Features of Bijection of Spaces when Transmitting Messages from Source to Recipient." In 2021 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO). IEEE, 2021. http://dx.doi.org/10.1109/synchroinfo51390.2021.9488380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography