Literatura científica selecionada sobre o tema "Telecommunication – Message processing"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Telecommunication – Message processing".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Telecommunication – Message processing"

1

Ibrahimov, Bayram. "Investigation of Noise Immunity Telecommunication Systems According to the Criterion Energy Efficiency". Transport and Telecommunication Journal 24, n.º 4 (1 de novembro de 2023): 375–84. http://dx.doi.org/10.2478/ttj-2023-0029.

Texto completo da fonte
Resumo:
Abstract Methods for improving the characteristics of the reliability message transmission in multiservice telecommunication networks in the provision of multimedia services are analyzed. The noise immunity reception, effective methods modulation, paths transmission systems, indicators of information, frequency and energy efficiency of the system, methods of processing and receiving messages are considered. The problems of optimizing signal-code constructions according to the criterion of energy efficiency of a telecommunications system are studied. A new approach to the construction of methods for calculating the indicators of noise immunity of receiving messages is proposed, taking into account signal-code structures. The developed calculation method takes into account effective types of modulation, demodulator synthesis algorithms, signal processing methods, bandwidth, signal-to-noise ratio and energy efficiency indicators. On the basis of the calculation method, important analytical expressions were obtained that evaluate the characteristics of the noise immunity reception, taking into account the indicators energy efficiency, throughput per sample, the conditions for the indicators of the signal-to-noise ratio and the probability erroneous reception discrete signals.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Kruglikov, S. V., e A. Yu Zalizka. "Synthesis of wireless telecommunication network with adaptation to refusals of central elements of average and high intensity". Proceedings of the National Academy of Sciences of Belarus, Physical-Technical Series 65, n.º 1 (6 de abril de 2020): 117–28. http://dx.doi.org/10.29235/1561-8358-2020-65-1-117-128.

Texto completo da fonte
Resumo:
A technique of synthesis of a wireless digital communication network with package switching, providing transfer of video messages of real time scale between elements of multipurpose information-operating system in conditions of high failure rate of central elements, is considered. As conceptual model of a telecommunication network – the network of the mixed structure, including multipurpose devices, constructed on the basis of standards of a broadband radio access with switching of packages and two interconnected levels of network interaction of elements (local and main) is accepted. The technique of synthesis of a wireless network is based on the multilevel, combined adaptation of a telecommunication network in the conditions of refusals of central elements, which primary goal is rational change of parameters, functions of network elements in close interrelation with purposeful transformation of structure of telecommunication system subnetworks. The main objective of carrying out the combined adaptation of the network consists in achievement of necessary throughput of communication system depending on degree of failure rate of central elements. Properties of multilevel adaptation were investigated in the course of realization of the combined (structurally-parametrical) synthesis with use of the aggregate approach of modelling of difficult technical systems. Efficiency of the specified technique is proven by the results of the imitating experiment with use of the aggregate model of a wireless network of data transmission with switching of packages, obtained previously. The experimental data, received at natural research of networks of a broadband radio communication on the basis of standards 802.11 b/g/n, have shown, that time of processing of packages of a message essentially depends on use of existing ways of adaptation. In particular, application of effective algorithms of adaptation (both parametrical and structural) will allow to reduce the time of finding of details (packages) in broadband communication devices by several times and, thereby, to provide demanded throughput of the network functioning in the conditions of refusals of central elements.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Sinyavskiy, Ivan, Igor Sorokin e Andrei Sukhov. "Prototype wireless network for internet of things based on DECT standard". Telfor Journal 14, n.º 1 (2022): 8–11. http://dx.doi.org/10.5937/telfor2201008s.

Texto completo da fonte
Resumo:
This paper presents a software prototype of a wireless network for the Internet of Things (IoT) based on the DECT (Digital Enhanced Cordless Telecommunication) standard. It proposes an architecture for encapsulating commands from the most common IoT protocol, MQTT (Message Queuing Telemetry Transport), into SIP (Session Initiation Protocol) packets. A module is created to embed MQTT-SN (MQTT for Sensor Networks) packets into SIP packets. The module is developed in Go language using the built-in "net" library. Delivery of MQTT-SN packets to IoT devices is carried out using the SIP protocol. Source codes and instructions for installing the gateway can be found at https://github.com/iSinyavsky/mqtt-sn-sip-gateway.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Nezamoddini, Nasim, e Amirhosein Gholami. "A Survey of Adaptive Multi-Agent Networks and Their Applications in Smart Cities". Smart Cities 5, n.º 1 (9 de março de 2022): 318–46. http://dx.doi.org/10.3390/smartcities5010019.

Texto completo da fonte
Resumo:
The world is moving toward a new connected world in which millions of intelligent processing devices communicate with each other to provide services in transportation, telecommunication, and power grids in the future’s smart cities. Distributed computing is considered one of the efficient platforms for processing and management of massive amounts of data collected by smart devices. This can be implemented by utilizing multi-agent systems (MASs) with multiple autonomous computational entities by memory and computation capabilities and the possibility of message-passing between them. These systems provide a dynamic and self-adaptive platform for managing distributed large-scale systems, such as the Internet-of-Things (IoTs). Despite, the potential applicability of MASs in smart cities, very few practical systems have been deployed using agent-oriented systems. This research surveys the existing techniques presented in the literature that can be utilized for implementing adaptive multi-agent networks in smart cities. The related literature is categorized based on the steps of designing and controlling these adaptive systems. These steps cover the techniques required to define, monitor, plan, and evaluate the performance of an autonomous MAS. At the end, the challenges and barriers for the utilization of these systems in current smart cities, and insights and directions for future research in this domain, are presented.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Adeliyi, Timothy T., e Oludayo O. Olugbara. "Fast Channel Navigation of Internet Protocol Television Using Adaptive Hybrid Delivery Method". Journal of Computer Networks and Communications 2018 (8 de julho de 2018): 1–11. http://dx.doi.org/10.1155/2018/2721950.

Texto completo da fonte
Resumo:
The Internet protocol television brought seamless potential that has revolutionized the media and telecommunication industries by providing a platform for transmitting digitized television services. However, zapping delay is a critical factor that affects the quality of experience in the Internet protocol television. This problem is intrinsically caused by command processing time, network delay, jitter, buffer delay, and video decoding delay. The overarching objective of this paper is to use a hybrid delivery method that agglutinates multicast- and unicast-enabled services over a converged network to minimize zapping delay to the bare minimum. The hybrid method will deliver Internet protocol television channels to subscribers using the unicast stream coupled with differentiated service quality of experience when zapping delay is greater than 0.43 s. This aids a faster transmission by sending a join message to the multicast stream at the service provider zone to acquire the requested channel. The hybrid method reported in this paper is benchmarked with the state-of-the-art multicast stream and unicast stream methods. Results show that the hybrid method has an excellent performance by lowering point-to-point queuing delay, end-to-end packet delay, and packet variation and increasing throughput rate.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Nadeem, Asim, Agha Kashif, Sohail Zafar e Zohaib Zahid. "On 2-partition dimension of the circulant graphs". Journal of Intelligent & Fuzzy Systems 40, n.º 5 (22 de abril de 2021): 9493–503. http://dx.doi.org/10.3233/jifs-201982.

Texto completo da fonte
Resumo:
The partition dimension is a variant of metric dimension in graphs. It has arising applications in the fields of network designing, robot navigation, pattern recognition and image processing. Let G (V (G) , E (G)) be a connected graph and Γ = {P1, P2, …, Pm} be an ordered m-partition of V (G). The partition representation of vertex v with respect to Γ is an m-vector r (v|Γ) = (d (v, P1) , d (v, P2) , …, d (v, Pm)), where d (v, P) = min {d (v, x) |x ∈ P} is the distance between v and P. If the m-vectors r (v|Γ) differ in at least 2 positions for all v ∈ V (G), then the m-partition is called a 2-partition generator of G. A 2-partition generator of G with minimum cardinality is called a 2-partition basis of G and its cardinality is known as the 2-partition dimension of G. Circulant graphs outperform other network topologies due to their low message delay, high connectivity and survivability, therefore are widely used in telecommunication networks, computer networks, parallel processing systems and social networks. In this paper, we computed partition dimension of circulant graphs Cn (1, 2) for n ≡ 2 (mod 4), n ≥ 18 and hence corrected the result given by Salman et al. [Acta Math. Sin. Engl. Ser. 2012, 28, 1851-1864]. We further computed the 2-partition dimension of Cn (1, 2) for n ≥ 6.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Alzahrani, Ali, e Theyazn H. H. Aldhyani. "Artificial Intelligence Algorithms for Detecting and Classifying MQTT Protocol Internet of Things Attacks". Electronics 11, n.º 22 (21 de novembro de 2022): 3837. http://dx.doi.org/10.3390/electronics11223837.

Texto completo da fonte
Resumo:
The Internet of Things (IoT) grew in popularity in recent years, becoming a crucial component of industrial, residential, and telecommunication applications, among others. This innovative idea promotes communication between physical components, such as sensors and actuators, to improve process flexibility and efficiency. Smart gadgets in IoT contexts interact using various message protocols. Message queuing telemetry transfer (MQTT) is a protocol that is used extensively in the IoT context to deliver sensor or event data. The aim of the proposed system is to create an intrusion detection system based on an artificial intelligence algorithm, which is becoming essential in the defense of the IoT networks against cybersecurity threats. This study proposes using a k-nearest neighbors (KNN) algorithm, linear discriminant analysis (LDA), a convolutional neural network (CNN), and a convolutional long short-term memory neural network (CNN-LSTM) to identify MQTT protocol IoT intrusions. A cybersecurity system based on artificial intelligence algorithms was examined and evaluated using a standard dataset retrieved from the Kaggle repository. The dataset was injected by five attacks, namely brute-force, flooding, malformed packet, SlowITe, and normal packets. The deep learning algorithm achieved high performance compared with the developing security system using machine learning algorithms. The performance accuracy of the KNN method was 80.82%, while the accuracy of the LDA algorithm was 76.60%. The CNN-LSTM model attained a high level of precision (98.94%) and is thus very effective at detecting intrusions in IoT settings.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

HERRERO, JUAN CARLOS. "CDMA & TDMA BASED NEURAL NETS". International Journal of Neural Systems 11, n.º 03 (junho de 2001): 237–46. http://dx.doi.org/10.1142/s0129065701000679.

Texto completo da fonte
Resumo:
CDMA and TDMA telecommunication techniques were established long time ago, but they have acquired a renewed presence due to the rapidly increasing mobile phones demand. In this paper, we are going to see they are suitable for neural nets, if we leave the concept "connection" between processing units and we adopt the concept "messages" exchanged between them. This may open the door to neural nets with a higher number of processing units and flexible configuration.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Nesterenko, Mykola, Oleksandr Romanov e Oleksandr Uspenskyi. "Analytical model of assessment of message processing time in the management of telecommunications networks". Collection "Information technology and security" 1, n.º 1 (30 de junho de 2012): 69–75. http://dx.doi.org/10.20535/2411-1031.2012.1.1.53666.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Aryani, Diah, Ade Setiadi e Fifit Alfiah. "APLIKASI WEB PENGIRIMAN DAN PENERIMAAN SMS DENGAN GAMMU SMS ENGINE BERBASIS PHP". CCIT Journal 8, n.º 3 (19 de maio de 2015): 174–90. http://dx.doi.org/10.33050/ccit.v8i3.340.

Texto completo da fonte
Resumo:
The development of the rapidly evolving technology in this era, especially in the telecommunications, media, and information (telecommunications) received positive feedback and negative in society. The technology used by the right target will be very useful in supporting the activities of either the agency or agencies. penyampaikan for information processing and information so that the information presented is fast, precise, and lack of errors, thus making the job more effectively and efficiently. Short Message Service (SMS) is the delivery of messages or information that is already being replaced by chat applications such as fuel and whatsapp. SMS has experienced growth in terms of the use and function as Polling SMS, SMS Banking, and SMS Gateway. Gammu SMS Engine Engine is used for SMS Gateway application. Gammu can be implemented in a variety of programming languages such as PHP and can be used functions as needed. Gammu SMS messaging engine is processing applications that do not perform bulk SMS delivery on most SMS gateway. The method used for Gammu SMS engines do not get hung up on a theory but a configuration setting through some source code and also through the device manager to check the port that is connected to the computer. To use the database files in a manner that is available on the database import gammu folder on the server mysql which we use to connect to the modem and mysql. To run the service engine gammu must use the command prompt by way mengetikm "gammu-smsd smsconf -i -s -c" to the process of running the engine at a command prompt first entry in the directory "bin". Knowing gammu runs aktive with the presence of link to stop and restart the service by running aktivenya gammu we can directly use gammu engine SMS to send and receive SMS..
Estilos ABNT, Harvard, Vancouver, APA, etc.

Teses / dissertações sobre o assunto "Telecommunication – Message processing"

1

Mohror, Kathryn Marie. "Infrastructure For Performance Tuning MPI Applications". PDXScholar, 2004. https://pdxscholar.library.pdx.edu/open_access_etds/2660.

Texto completo da fonte
Resumo:
Clusters of workstations are becoming increasingly popular as a low-budget alternative for supercomputing power. In these systems,message-passing is often used to allow the separate nodes to act as a single computing machine. Programmers of such systems face a daunting challenge in understanding the performance bottlenecks of their applications. This is largely due to the vast amount of performance data that is collected, and the time and expertise necessary to use traditional parallel performance tools to analyze that data. The goal of this project is to increase the level of performance tool support for message-passing application programmers on clusters of workstations. We added support for LAM/MPI into the existing parallel performance tool,P aradyn. LAM/MPI is a commonly used, freely-available implementation of the Message Passing Interface (MPI),and also includes several newer MPI features,such as dynamic process creation. In addition, we added support for non-shared filesystems into Paradyn and enhanced the existing support for the MPICH implementation of MPI. We verified that Paradyn correctly measures the performance of the majority of LAM/MPI programs on Linux clusters and show the results of those tests. In addition,we discuss MPI-2 features that are of interest to parallel performance tool developers and design support for these features for Paradyn.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Ishibashi, Hiroki. "Torus routing in the presence of multicasts". CSUSB ScholarWorks, 1996. https://scholarworks.lib.csusb.edu/etd-project/1251.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Uney, Murat. "Decentralized Estimation Under Communication Constraints". Phd thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12611226/index.pdf.

Texto completo da fonte
Resumo:
In this thesis, we consider the problem of decentralized estimation under communication constraints in the context of Collaborative Signal and Information Processing. Motivated by sensor network applications, a high volume of data collected at distinct locations and possibly in diverse modalities together with the spatially distributed nature and the resource limitations of the underlying system are of concern. Designing processing schemes which match the constraints imposed by the system while providing a reasonable accuracy has been a major challenge in which we are particularly interested in the tradeoff between the estimation performance and the utilization of communications subject to energy and bandwidth constraints. One remarkable approach for decentralized inference in sensor networks is to exploit graphical models together with message passing algorithms. In this framework, after the so-called information graph of the problem is constructed, it is mapped onto the underlying network structure which is responsible for delivering the messages in accordance with the schedule of the inference algorithm. However it is challenging to provide a design perspective that addresses the tradeoff between the estimation accuracy and the cost of communications. Another approach has been performing the estimation at a fusion center based on the quantized information provided by the peripherals in which the fusion and quantization rules are sought while taking a restricted set of the communication constraints into account. We consider two classes of in-network processing strategies which cover a broad range of constraints and yield tractable Bayesian risks that capture the cost of communications as well as the penalty for estimation errors. A rigorous design setting is obtained in the form of a constrained optimization problem utilizing the Bayesian risks. These processing schemes have been previously studied together with the structures that the solutions exhibit in the context of decentralized detection in which a decision out of finitely many choices is made. We adopt this framework for the estimation problem. However, for the case, computationally infeasible solutions arise that involve integral operators that are impossible to evaluate exactly in general. In order not to compromise the fidelity of the model we develop an approximation framework using Monte Carlo methods and obtain particle representations and approximate computational schemes for both the in-network processing strategies and the solution schemes to the design problem. Doing that, we can produce approximating strategies for decentralized estimation networks under communication constraints captured by the framework including the cost. The proposed Monte Carlo optimization procedures operate in a scalable and efficient manner and can produce results for any family of distributions of concern provided that samples can be produced from the marginals. In addition, this approach enables a quantification of the tradeoff between the estimation accuracy and the cost of communications through a parameterized Bayesian risk.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

"Toward intelligent message routing systems". Center for Information Systems Research, Sloan School of Management, Massachusetts Institute of Technology, 1985. http://hdl.handle.net/1721.1/2122.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Fornasier, Patric Computer Science &amp Engineering Faculty of Engineering UNSW. "An empirical investigation of SSDL". 2007. http://handle.unsw.edu.au/1959.4/40514.

Texto completo da fonte
Resumo:
The SOAP Service Description Language (SSDL) is a SOAP-centric language for describing Web Service contracts. SSDL focuses on message abstraction as the building block for creating service-oriented applications and provides an extensible range of protocol frameworks that can be used to describe and formally model Web Service interactions. SSDL's natural alignment with service-oriented design principles intuitively suggests that it encourages the creation of applications that adhere to this architectural paradigm. Given the lack of tools and empirical data for using SSDL as part of Web Services-based SOAs, we identified the need to investigate its practicability and usefulness through empirical work. To that end we have developed Soya, a programming model and runtime environment for creating and executing SSDL-based Web Services. On the one hand, Soya provides straightforward programming abstractions that foster message-oriented thinking. On the other hand, it leverages contemporary tooling (i.e. Windows Communication Foundation) with SSDL-related runtime functionality and semantics. In this thesis, we describe the design and architecture of Soya and show how it makes it possible to use SSDL as an alternative and powerful metadata language without imposing unrealistic burdens on application developers. In addition, we use Soya and SSDL in a case study which provides a set of initial empirical results with respect to SSDL's strengths and drawbacks. In summary, our work serves as a knowledge framework for better understanding message-oriented Web Service development and demonstrates SSDL's practicability in terms of implementation and usability.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Ji, Yiming Alex. "Bias analysis and reduction in localization problems". Phd thesis, 2013. http://hdl.handle.net/1885/112339.

Texto completo da fonte
Resumo:
Localization, also called positioning, is the task of determining the position of a target accurately on the surface of the earth. Localization is an important problem which has a long history. The conception of localization can be tracked back to ancient times when human visual and auditory information were used to localize an object such as prey or an enemy. With the development of science and technology, various technologies have been invented for localization by applying diverse types of sensing and information processing. Before and during the World War II, the Radio Detection And Ranging (RADAR) technology was secretly developed by several nations to track enemy ships and aeroplanes. Later the localization problem was studied using what today would be called a multi-agent system, a system composed of multiple interacting intelligent agents within an environment. In order to implement reconnaissance and surveillance tasks, multiple transmitters and receivers were used. Since World War II, there have been many localization algorithms in order to obtain accurate positions of estimated objects for different applications. However almost all the existing localization algorithms have some limitations. One of the most common limitations arises from errors in the measurements. Once errors are present in the measurements, it is then virtually guaranteed that from the generally nonlinear processing of measurements to achieve localization, bias will appear in the estimated positions which will significantly influence the localization accuracy. In order to ameliorate this problem, in this thesis, we propose a generic bias correction method which mixes Taylor series and Jacobian matrices to determine the bias, where the number of measurements is equal to the number of variables being estimated, leading to an easily calculated analytical (though approximate) bias expression. By using the obtained expression, one can compute the (approximate) bias and then simply subtract it from the original estimated positions to improve the localization accuracy. However, when the number of obtained usable measurements is greater than the number of variables being estimated, the nature of the calculations is more complicated in that a further step is required to obtain the analytical expression of the bias. The proposed novel method is generic which means it can be applied to different types of localization algorithms (range-based, bearing-only, scan-based etc.). In order to demonstrate that the proposed method is also applicable in situations with mobile anchors and targets, we analyze the proposed method in two mobile situations. Monte Carlo simulation results verify that when the underlying geometry is a good geometry, which allows the location of a target to be obtained with acceptable mean square error, the proposed approach can correct the bias effectively with an arbitrary number of independent usable measurements. In addition, the proposed method is applicable irrespective of the type of measurement (range, bearing, time difference of arrival(TDOA), etc). Moreover, a particular geometric problem known as the collinearity problem, which may prevent effective use of localization algorithms and the proposed bias reduction method, is analyzed in detail. In order to deal with the collinearity problem, a novel approach, which takes the level of the measurement noise into consideration, is proposed. Monte Carlo simulation results demonstrate the performance of the proposed method. The simulation results also illustrate the influence of two factors on the effect of the proposed bias correction method: the distance between anchors and the level of noise. Apart from RADAR and multi-agent systems, recently, the localization research has been extended to the wireless sensor networks (WSNs), which have been developed fast in recent years with the innovation and evolution in microelectro-mechanical systems technology. WSNs have gained world-wide attention in many different application areas which are important or even essential to our economy and life. From industrial process control to environment monitoring, to battlefield surveillance, wireless sensor networks can play an important role. In almost every application, the physical locations of sensing nodes are of importance, so that localization is necessary for the sensors themselves. Similar to the situations in other areas, the current localization algorithms for wireless sensor networks also suffer from localization bias. Different from other situations, in wireless sensor networks the geometric layout of the whole network is important since it can significantly influence the localization accuracy. We therefore propose a second bias correction method into which the network geometric information is introduced. The second proposed bias reduction method mixes Taylor series and a maximum likelihood estimate, and leads to an easily calculated analytical (though approximate) bias expression in terms of a known maximum likelihood cost function. In contrast to existing contributions, the work considers a network as a whole when the bias is investigated, by introducing the geometric structure of the network into the proposed bias reduction method via the rigidity matrix, a concept drawn from graph theory. A maximum likelihood cost function is related to the rigidity matrix resulting in a final analytical expression of localization bias in terms of the rigidity matrix. This is a major contribution of our work and appears more suitable for wireless sensor networks than any other bias correction methods. In addition we extend the bias correction method to mobile networks in which the anchors are still static while the sensors at unknown positions are all mobile. The performance of the proposed bias reduction method is demonstrated via Monte Carlo simulation results in networks with different number of nodes. Another important problem which is also a topology related problem is that of consensus. Consensus means to reach an agreement regarding a certain quantity of interest that depends on the state of all objects and it has been investigated in many areas for a long time. In computer science, consensus has been studied as an important challenge of the distributed computing field [1]; in management science and statistics, consensus was considered as long ago as the 1960s [44]. Recently in the wireless sensor networks area consensus has also begun to be studied. Many consensus algorithms have been proposed to deal with consensus. A consensus algorithm (or protocol) is an interaction rule that specifies the information exchange between an object and all of its neighbors achieving consensus. One always hopes that when a consensus algorithm is applied the agreement can be achieved as soon as possible. Therefore the convergence rate, which denotes the speed of a network to achieve the consensus, can be considered to evaluate the performance of a consensus algorithm. We investigate the influence of the network topology on the convergence rate in distributed average consensus problems. Different from existing work, we not only aim to improve the convergence rate but also intend to minimize the communication cost which is important in power limited wireless sensor networks. We analyze the relationship among the number of edges, the convergence rate and the total communication cost. Based on the theoretical analysis and simulation results, we define a kind of Magic Number to help construct a network achieving the minimal communication cost while maintaining a satisfactory convergence rate.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Abraham, Boaz. "Comparative study of healthcare messaging standards for interoperability in ehealth systems". Thesis, 2017. http://hdl.handle.net/1959.7/uws:47389.

Texto completo da fonte
Resumo:
Advances in the information and communication technology have created the field of "health informatics," which amalgamates healthcare, information technology and business. The use of information systems in healthcare organisations dates back to 1960s, however the use of technology for healthcare records, referred to as Electronic Medical Records (EMR), management has surged since 1990’s (Net-Health, 2017) due to advancements the internet and web technologies. Electronic Medical Records (EMR) and sometimes referred to as Personal Health Record (PHR) contains the patient’s medical history, allergy information, immunisation status, medication, radiology images and other medically related billing information that is relevant. There are a number of benefits for healthcare industry when sharing these data recorded in EMR and PHR systems between medical institutions (AbuKhousa et al., 2012). These benefits include convenience for patients and clinicians, cost-effective healthcare solutions, high quality of care, resolving the resource shortage and collecting a large volume of data for research and educational needs. My Health Record (MyHR) is a major project funded by the Australian government, which aims to have all data relating to health of the Australian population stored in digital format, allowing clinicians to have access to patient data at the point of care. Prior to 2015, MyHR was known as Personally Controlled Electronic Health Record (PCEHR). Though the Australian government took consistent initiatives there is a significant delay (Pearce and Haikerwal, 2010) in implementing eHealth projects and related services. While this delay is caused by many factors, interoperability is identified as the main problem (Benson and Grieve, 2016c) which is resisting this project delivery. To discover the current interoperability challenges in the Australian healthcare industry, this comparative study is conducted on Health Level 7 (HL7) messaging models such as HL7 V2, V3 and FHIR (Fast Healthcare Interoperability Resources). In this study, interoperability, security and privacy are main elements compared. In addition, a case study conducted in the NSW Hospitals to understand the popularity in usage of health messaging standards was utilised to understand the extent of use of messaging standards in healthcare sector. Predominantly, the project used the comparative study method on different HL7 (Health Level Seven) messages and derived the right messaging standard which is suitable to cover the interoperability, security and privacy requirements of electronic health record. The issues related to practical implementations, change over and training requirements for healthcare professionals are also discussed.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Livros sobre o assunto "Telecommunication – Message processing"

1

Willmott, R. Practical guide to message handling systems. Manchester: NCC Blackwell, 1993.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

United States. National Aeronautics and Space Administration. Scientific and Technical Information Program., ed. A formal model of asynchronous communication and its use in mechanically verifying a biphase mark protocol. [Washington, DC]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Program, 1992.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

United States. National Aeronautics and Space Administration. Scientific and Technical Information Program., ed. A formal model of asynchronous communication and its use in mechanically verifying a biphase mark protocol. [Washington, DC]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Program, 1992.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Rivera, Rawlinson. MCITP: Microsoft Exchange Server 2007 messaging design and deployment : study guide. Indianapolis, Ind: Wiley Pub., 2008.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Willmott, Robert. Technical guide to message handling systems. Manchester, England: NCC Blackwell, 1993.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Inc, Omnicom, ed. Message handling systems: X.400 architecture and protocols : the Omnicom Institute. Vienna, VA, USA (Suite 304, 501 Church, NE, Vienna 22180): Omnicom, 1986.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Trus, Steve. Guidelines for the evaluation of message handling systems implementations. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1990.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Curtis, Royster, Markovitz Paul e National Institute of Standards and Technology (U.S.), eds. Guidelines for the evaluation of message handling systems implementations. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1990.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Torsten, Rüdebusch, ed. UMTS signaling: UMTS interfaces, protocols, message flows and procedures analyzed and explained. 2a ed. Chichester, West Sussex, England: John Wiley & Sons, 2007.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

IFIP TC 6/WG 6.5 Working Conference on Message Handling Systems (1987 Munich, Germany). Message handling systems: State of the art and future directions : proceedings of the IFIP TC 6/WG 6.5 Working Conference on Message Handling Systems, Munich, F.R.G., 27-29 April 1987. Amsterdam: North-Holland, 1988.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Capítulos de livros sobre o assunto "Telecommunication – Message processing"

1

Vianna, Leonardo Silva, Lizyane Rosa Antunes, Rafael Maia Pinto e Alexandre Leopoldo Gonçalves. "Natural Language Processing of Messages from a Social Network for Inflation Analysis". In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 218–29. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22324-2_17.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Haque, Kazi Nymul, Johirul Islam, Ijaz Ahmad e Erkki Harjula. "Decentralized Pub/Sub Architecture for Real-Time Remote Patient Monitoring: A Feasibility Study". In Communications in Computer and Information Science, 48–65. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-59080-1_4.

Texto completo da fonte
Resumo:
AbstractThe confluence of the Internet of Things (IoT) within the healthcare sector, called Internet of Medical Things (IoMT), has ushered in a transformative approach to real-time patient monitoring. Traditional methods that typically involve the direct transmission of medical sensor data to the cloud, falter under the constraints of medical IoT devices. In response, Multi-access Edge Computing (MEC), as defined by the European Telecommunications Standards Institute (ETSI), brings forth an innovative solution by relocating computing resources closer to the origin of data. However, MEC alone does not fully address the exigencies of constrained medical IoTs in the realm of real-time monitoring. Our architecture advances the computing continuum by seamlessly integrating local edge computing for direct data capture, MEC for nuanced data processing, and cloud computing for the comprehensive synthesis and presentation of data. This synergy is further enhanced by the introduction of a robust message queue mechanism, assuring data resilience and uninterrupted data streaming during network disruptions. With a steadfast commitment to security, our system employs stringent measures to ensure the integrity and confidentiality of sensitive patient data during transmission. This architecture represents a significant leap in healthcare technology, emphasizing the criticality of patient safety, data security, and meticulous data management. The implications of this study are profound, indicating a trajectory for future exploration into the integration of sophisticated data types and AI-driven models to further refine patient monitoring and healthcare outcomes.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Klamberg, Mark. "A Paradigm Shift in Swedish Electronic Surveillance Law". In Digital Democracy and the Impact of Technology on Governance and Politics, 175–201. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-3637-8.ch010.

Texto completo da fonte
Resumo:
Electronic surveillance law is subject to a paradigm shift where traditional principles are reconsidered and the notion of privacy has to be reconstructed. This paradigm shift is the result of four major changes in our society with regard to: technology, perceptions of threats, interpretation of human rights and ownership over telecommunications. The above-mentioned changes have created a need to reform both the tools of electronic surveillance and domestic legislation. Surveillance that was previously kept secret with reference to National Security is now subject to public debate, including Communications Intelligence (COMINT), a sub-category of Signals Intelligence (SIGINT). This chapter covers systems of “mass surveillance,” such as data retention and COMINT, and whether these are consistent with the European Convention on Human Rights. The chapter comes to two conclusions in relation to COMINT. First, the perceived threats have changed, shifting the focus of COMINT from military threats towards non-state actors such as terrorists and criminal networks. Second, COMINT involves relatively narrow interception of the content of messages compared to its large-scale collection and storage of traffic data, which through further processing may reveal who is communicating with whom.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Klamberg, Mark. "A Paradigm Shift in Swedish Electronic Surveillance Law". In Human Rights and Ethics, 2006–32. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6433-3.ch111.

Texto completo da fonte
Resumo:
Electronic surveillance law is subject to a paradigm shift where traditional principles are reconsidered and the notion of privacy has to be reconstructed. This paradigm shift is the result of four major changes in our society with regard to: technology, perceptions of threats, interpretation of human rights and ownership over telecommunications. The above-mentioned changes have created a need to reform both the tools of electronic surveillance and domestic legislation. Surveillance that was previously kept secret with reference to National Security is now subject to public debate, including Communications Intelligence (COMINT), a sub-category of Signals Intelligence (SIGINT). This chapter covers systems of “mass surveillance,” such as data retention and COMINT, and whether these are consistent with the European Convention on Human Rights. The chapter comes to two conclusions in relation to COMINT. First, the perceived threats have changed, shifting the focus of COMINT from military threats towards non-state actors such as terrorists and criminal networks. Second, COMINT involves relatively narrow interception of the content of messages compared to its large-scale collection and storage of traffic data, which through further processing may reveal who is communicating with whom.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Muturi, Nancy. "Access and the Use of ICTs Among Women in Jamaica". In Global Information Technologies, 1199–204. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-939-7.ch089.

Texto completo da fonte
Resumo:
Information and communication technologies (ICTs) have made the global village a reality with the Internet, cell phones and other digital communication technology disseminating messages instantly through the fast information superhighway. The United Nations (U.N.) Development Program (UNDP, 2001) defines ICTs in terms of innovations in microelectronics, computing (hardware and software), telecommunications and opto-electronics—micro-processors, semiconductors and fibre optics. These technologies enable the processing and storage of enormous amounts and rapid distribution of information through communications networks. As new innovations, ICTs are also described as “the building blocks of the networked world,” (UNDP, 2001, p. 30), with ICTs, particularly the Internet, being used by a variety of organizations as a global networking tool. Access to, knowledge of and effective use of ICTs is crucial, particularly where access to the technology is equated to social, political, economic and human development. Internet usage, for example, is regarded as the standard indicator of the use of ICTs and also the most democratic of all mass media, mainly because of their low investment (Internet World Stats, 2006). This technology has been used effectively as a tool for delivery of various services and applications, including distance learning, agriculture, telehealth, e-commerce and e-governance. Individuals, organizations and institutions now use the Internet to strategically reach a large audience of markets through e-mails and other advertising strategies, since it is fast and economical, irrespective of size or location of business. There are many gender issues, however, related to connectivity and access to available ICTs, some of which are visibly documented and most often examined as the digital divide based on gender. Rakow (1986), in her classic studies on gender and ICTs, however, points out that technology should not be examined based on the differences in the behavior of men or women towards a technology, but instead to look for the ways in which the technology is used to construct us as women and men through the social practices that put it to use. Rakow further argues that more attention needs to be paid to how communication technologies alter, aid, or construct women’s opportunities for interacting with each other and with the wider public domain. This article is based on data gathered through a detailed open-ended questionnaire, with a sample of 121 Jamaican women, ages 21 and older, and explores their access and nature of use of ICTs as well as challenges they face in their attempts to use them effectively. Like other Caribbean islands, Jamaica has embraced ICTs as a tool for national development, adopting the most recent technologies to ensure global connectivity. The study examines how these technologies could be used effectively to address some of the developmental, economical, health and human developmental challenges that face the Small Island Developing States (SIDS). These findings are used to complement existing studies, including national surveys and literature on the gender and ICT issues in the Caribbean.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Telecommunication – Message processing"

1

Konoura, Hiroaki, Masafumi Kinoshita, Takafumi Koike, Kenji Leibnitz e Masayuki Murata. "Efficient dequeuing technique for distributed messaging systems processing massive message volumes". In 2016 26th International Telecommunication Networks and Applications Conference (ITNAC). IEEE, 2016. http://dx.doi.org/10.1109/atnac.2016.7878821.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Ibrahimov, B. G., Z. A. Ismaylov, M. Y. Orujova e I. M. Mammadov. "About One Problem of Control Network and Channel Resources in Communication Networks During Processing Useful and Service Message Signals". In 2022 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF). IEEE, 2022. http://dx.doi.org/10.1109/weconf55058.2022.9803316.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Sawchuk, Alexander A. "Optical Interconnection architectures for digital systems and processors". In OSA Annual Meeting. Washington, D.C.: Optica Publishing Group, 1986. http://dx.doi.org/10.1364/oam.1986.wq2.

Texto completo da fonte
Resumo:
We describe the use of bulk (3-D) optical systems in interconnection networks for electronic digital parallel processing and for telecommunications. More powerful computing architectures can be achieved through the use of parallel processors and the sharing of resources such as memory. Ideally, these elements must communicate through a dynamic, flexible interconnection network with a minimum of contention (message conflicts). A crossbar interconnection allows general communication without contention, but is has been difficult to implement large crossbars electronically due to VLSI technology limitations. For this reason, simpler interconnection networks having contention or suitable only for specialized applications have been developed. We describe some potential advantages of optical interconnection networks, including high signal bandwidth, low mutual interference, and parallelism. We present several implementations of electrically controlled generalized optical crossbar interconnection networks (having no contention and broadcasting capability) based on optical vector-matrix and matrix-matrix multiplier designs. These systems utilize acousto-, electro- or magnetooptic spatial light modulators (SLMs) as the active controlling element. We define important general parameters for electronic and optical interconnection networks and give a comparison of capabilities for many architectures. We also describe a separate all-optical digital sequential processor architecture which implements optically controlled interconnection networks.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

"Message from the SIGTELCOM 2017 general chairs". In 2017 International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom). IEEE, 2017. http://dx.doi.org/10.1109/sigtelcom.2017.7849779.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Dandanov, Nikolay, Krasimir Tonchev, Vladimir Poulkov e Pavlina Koleva. "Approximate Message Passing for Downlink Sparse Channel Estimation in FDD Massive MIMO". In 2019 42nd International Conference on Telecommunications and Signal Processing (TSP). IEEE, 2019. http://dx.doi.org/10.1109/tsp.2019.8768850.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Kustov, Vladimir, e Alexei Krasnov. "Masking Hidden Messages under Noise in Steganography Problems". In 2021 44th International Conference on Telecommunications and Signal Processing (TSP). IEEE, 2021. http://dx.doi.org/10.1109/tsp52935.2021.9522678.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

"Message from the SIGTELCOM’20 General & TPC Chairs". In 2020 4th International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom). IEEE, 2020. http://dx.doi.org/10.1109/sigtelcom49868.2020.9199051.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

"Message from the SIGTELCOM’19 General & TPC Chairs". In 2019 3rd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom). IEEE, 2019. http://dx.doi.org/10.1109/sigtelcom.2019.8696097.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Adzhemov, A. S., S. A. Adzhemov e A. Y. Kudryashova. "Methods of Comparison of Code Combinations with Message Elements from the Source". In 2023 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO). IEEE, 2023. http://dx.doi.org/10.1109/synchroinfo57872.2023.10178629.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

"Message from the SIGTELCOM 2018 general and technical program chairs". In 2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom). IEEE, 2018. http://dx.doi.org/10.1109/sigtelcom.2018.8325819.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia