دانلود و نمایش مقالات مرتبط با Telecommunication::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Telecommunication

تعداد مقالات یافته شده: 64
ردیف عنوان نوع
1 Deployment-Ready Quantum Key Distribution Over a Classical Network Infrastructure in Padua
توزیع کلید کوانتومی آماده استقرار بر روی یک زیرساخت شبکه کلاسیک در پادوآ-2022
Current technological progress is driving Quantum Key Distribution towards a commercial and worldwide scale expansion. Its capability to deliver secure communication regardless of the computational power of the attackers will be a fundamental feature in the next generations of telecommunication networks. Nevertheless, demonstrations of QKD implementation in a real operating scenario and their coexistence with the classical telecom infrastructure are of fundamental importance for reliable exploitation. Here we present a Quantum Key Distribution application implemented over a classical fiber-based infrastructure. We exploit a 50 MHz source at 1550 nm, a single 13 km-long fiber cable for both the quantum and the classical channel, and a simplified receiver scheme with just one single-photon detector. In this way, we achieve an error rate of approximately 2% and a secret key rate of about 1.7 kbps, thus demonstrating the feasibility of low-cost and ready-to-use Quantum Key Distribution systems compatible with standard classical infrastructure.
Index Terms: Classical channel | cryptography | fiber, FPGA | padua | POGNAC | quantum communication | quantum key distribution | qubit4sync | telecommunication.
مقاله انگلیسی
2 Managing a Quantum Computing Team—Insights and Challenges at Itaú Unibanco
مدیریت یک تیم محاسبات کوانتومی - بینش و چالش ها در Itau Unibanco-2022
Quantum computing technology is developing rapidly. Technology managers are now faced with pressure to bring the emerging technology inhouse, albeit perhaps stealthy. This article presents the story of a large Brazilian financial services firm that is facing the quantum “opportunity” headon. We provide insights into the challenge of introducing nonproven technology to this one particular organization. In addition to team-level management, other aspects in the realm of organization-level issues are presented including expectation setting, reporting, and budgeting.
keywords: Diffusion of ITT innovations | entrepreneurship | information and telecommunication technologies | quantum computing
مقاله انگلیسی
3 Polarization-Based Quantum Key Distribution Encoder and Decoder on Silicon Photonics
رمزگذار و رمزگشای توزیع کلید کوانتومی مبتنی بر پلاریزاسیون در فوتونیک سیلیکون-2022
Private and secure communication is an indispensable part of the government and individual activities. With the everevolving large-scale of quantum computing, traditional public-key cryptography is severely threatened since its security only relies on the computational complexity of certain mathematical functions. Quantum key distribution (QKD), ascribed to its security based on the inviolability of physics laws, provides an absolutely information-secure solution for the future extensive communication encrypting. Herein this Letter, we proposed a simplified and reconfigurable silicon photonics encoder using a pass-block architecture and experimentally demonstrated its performance with a specialized silicon photonics decoder for high-speed quantum key distribution in polarization-based decoy-state BB84 protocol. We achieved an estimated asymptotic secret key rate of 868 kbps with measured quantum bit error rate (QBER) of 0.90% (Z base) and 1.34% (X base) over 20 km emulated fiber link. This work further advances the process of applying QKD using silicon photonics devices into the future secure telecommunication network.
Index Terms: Quantum key distribution (QKD) | silicon photonics.
مقاله انگلیسی
4 The big picture on the internet of things and the smart city: a review of what we know and what we need to know
تصویر بزرگ در اینترنت اشیا و شهر هوشمند: مروری بر آنچه می‌دانیم و آنچه باید بدانیم-2022
This study examines how the application of the IoT in smart cities is discussed in the current academic literature. Based on bibliometric techniques, 1,802 articles were retrieved from the Scopus database and analyzed to identify the temporal nature of IoT research, the most relevant journals, authors, countries, keywords, and studies. The software tool VOSviewer was used to build the keyword co-occurrence network and to cluster the pertinent literature. Results show the significant growth of IoT research in recent years. The most productive authors, journals, and countries were also identified. The main findings from the keyword co-occurrence clustering and an in-depth qualitative analysis indicate that the IoT is used alongside other technologies including cloud computing, big data analytics, blockchain, artificial intelligence, and wireless telecommunication networks. The major applications of the IoT for smart cities include smart buildings, transportation, healthcare, smart parking, and smart grids. This review is one of the first attempts to map global IoT research in a smart city context and uses a comprehensive set of articles and bibliometric techniques to provide scholars and practitioners with an overview of what has been studied so far and to identify research gaps at the intersection of the IoT and the smart city.
keywords: اینترنت اشیا | شهر هوشمند | مرور | کتاب سنجی | Internet of things | Smart city | Review | Bibliometrics
مقاله انگلیسی
5 Auditors as intermediaries in the endogenization of an accounting standard: The case of IFRS 15 within the telecom industry
حسابرسان به عنوان واسطه ها در اندوژنیزاسیون استاندارد حسابداری: مورد IFRS 15 در صنعت مخابراتی-2021
This study is about auditors’ role as regulatory intermediaries in the international accounting standardsetting process. Drawing from the socio-legal literature, we use a theoretical framework combining the Regulator-Intermediary-Target (RIT) model and the legal endogeneity theory that sheds light on auditors’ role in fostering the emergence of an agreed-upon meaning of a standard. While standards are open to different possible interpretations at implementation stage, we argue that standard-setting is a critical step at which a significant part of standard’s meaning is locked in. Hence the importance of discussions over the substance and wording of standards for parties involved in the due process. We investigate auditors’ support to their clients engaging in such discussions leading to the co-construction of the standard’s meaning and thus to the potential endogenization of the standard. For this purpose, the IASB due process is conceptualized as a regulatory conversation (Black, 2002). We use a single case study carried out in the office of one large accounting firm. Our examination focuses on discussions between the IASB and telecommunications industry representatives around the draft IFRS 15 on revenue recognition, as depicted by the latter’s auditors. We find that auditors from the firm’s in-house consulting network play a pivotal role in assisting field auditors and their clients engaging with the IASB while preserving the firm’s reputation. Taken as a whole, our findings suggest that auditors played a pivotal role as intermediaries between the IASB (the regulator) and the targets (Telco firms) and as such contributed to the partial endogenization of the draft IFRS 15. We discuss the implications of our findings for conceptualizing auditor’s role in accounting standard-setting.
keywords: حسابرسان | مکالمه نظارتی | IASB فرآیند | واسطه های نظارتی | اندوژن سازی | مدیریت | Auditors | Regulatory conversation | IASB due process | Regulatory intermediaries | Endogenization | Managerialization
مقاله انگلیسی
6 Demographic variation in active consumer behaviour: On-line search for retail broadband services
تنوع جمعیتی در رفتار فعال مصرف کننده: جستجوی آنلاین خدمات پهن باند خرده فروشی-2020
Consumers who actively search for better broadband deals may benefit from lower prices or improved service quality compared to those who do not. If, however, consumers differ in their propensity to engage with the market and actively search, these potential benefits may not accrue equally. This paper investigates differences in consumer search activity for telecommunications services across small geographic areas. We exploit rich and novel data from a commercial price comparison site to explore the dispersion of consumer search in the Irish retail broadband market, while controlling for supply-side variations. By linking geo-coded searches to census data on small area socio-economic characteristics, we identify the areas where most search originates and can thus characterise the socio-economic groups to whom the benefits of search are most likely to accrue. We find evidence that areas populated by many highly educated, married people, commuters, mortgage holders, and retirees are among the most active in search. In contrast, those areas in which many older people, farmers, low-skilled workers and students reside give rise to significantly fewer consumer searches.
Keywords: Broadband services | Consumer search behaviour | Socio-economic effects | Ireland | behavioural economics | Microeconomics | Technology management | Consumer attitude | Consumer psychology | psychology | business | economics
مقاله انگلیسی
7 Enterprise architecture breakthrough for telecommunications transformation: A reconciliation model to solve bankruptcy
موفقیت معماری سازمانی برای تحول ارتباطات از راه دور: یک مدل سازش برای حل ورشکستگی-2020
Observations of communication service providers (CSPs) over the past five years have revealed that text services have reduced radically by around 75%, followed by voice services and the average revenue per user (ARPU). This condition signifies that telecommunications companies are being affected by digital disruption. A fundamental analysis of current business processes is thus necessary for future telecommunications success. In the area of corporate strategic management, studies on conversion of the Internet of Things (IoT)-based industry as a new customer are gaining popularity. This research analyzes the breakthrough operational activities through a customer-centric approach as well as end-to-end CSP business activities towards a new customer reconciliation model. The customer-centric activities address problem to solution and complaint to solution. In the future, CSPs are expected to have large numbers of newly registered customers from IoT-based industries. The strategic mechanism for transforming leaps from old business processes into new ones is a novel research subject using the business process management (BPM) method. Business process analysis has been facilitated by the Internationa Telecommunication Union (ITU) telecommunications standards body developed by TMForum as the global telecommunications industry association. This transformation involves development of organizational structure, business activities, technical specifications, information and communication flow, and operational schemes, modeled under the enterprise architecture strategic notation, whose result is a breakthrough enterprise archi- tecture design for future telecommunications companies. The design contributes to strategic management knowledge on how collaboration between the telecommunications industry and other IoT-based industries is determined for real operations. This research presents a transformation scheme that can solve the potential problem of bankruptcy in the telecommunications industry through a case study of a smart city in the IoT-based industry.
Keywords: Electrical engineering | Industry | Industrial engineering | Internet of things | Process modeling | Operations management | Industry management | Strategic management | Telecommunication companies | Business process management (BPM) | Enterprise architecture | Internet-of-things (IoT)
مقاله انگلیسی
8 Security assessment of suppliers of telecommunications infrastructure for the provision of services in 5G technology
ارزیابی امنیتی تامین کنندگان زیرساخت های مخابراتی برای ارائه خدمات در فناوری 5G-2020
The process of commencing services based on 5G technology has begun. One condition for starting up 5G technology is the distribution of the frequencies required for the provision of those services. For the first time in the process of making frequencies available, require- ments have arisen pertaining to the security of the infrastructure necessary for the provision of those services. In the EU, recommendations have been drawn up, based in particular on an NISCG report entitled Cybersecurity of 5G networks EU Toolbox of risk mitigating measures. In this article, an analysis is made of the implementation of those recommendations concern- ing suppliers of infrastructure, based on examples from selected EU countries, in order to ensure that such assessments are objective and transparent. In some cases, the provisions implementing the recommendations do not fully protect the fundamental rights of the en- tities assessed as foreseen in EU and domestic law, particularly the right to a fair trial before an independent court. I propose certain changes in the regulations pertaining to suppliers of telecommunications equipment.
Keywords: 5G | Security | Telecommunications infrastructure | Supplier infrastructure | 5G toolbox
مقاله انگلیسی
9 The uncertain future of data retention laws in the EU: Is a legislative reset possible?
آینده نامشخص قوانین حفظ داده ها در اتحادیه اروپا: آیا بازنشانی قانونی امکان پذیر است؟-2020
The article discusses the CJEU’s most important case law, including interpretations presented in recent cases relating to data retention for both national security purposes (Privacy International, La Quadrature du Net) and the fight against serious crime (H.K). The analysis is a starting point for discussing the draft e-Privacy Regulation, in particular a controversial proposal introduced by the EU Council that may limit the Court’s jurisdiction in cases involving data retention rules that cover state security. Negotiated over the past five years, the draft e-Privacy Regulation fleshes out EU data protection rules governing electronic communication services. As a result, the way in which obligations under the Regulation are defined is critical in setting a standard for retention rules consistent with CJEU case law for decades to come. At the same time, succumbing to pressure from Member States may have the opposite result – the emergence of new ambiguities concerning not only the admissibility of data retention but also the competence of EU institutions to regulate this area of the telecommunications sector.© 2021 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)
Keywords: General obligation to retain data | e-privacy regulation | Data protection | National security
مقاله انگلیسی
10 A novel plithogenic TOPSIS- CRITIC model for sustainable supply chain risk management
یک مدل TOPISIS- انتقادی plithogenic جدید برای مدیریت ریسک پایدار زنجیره تأمین-2020
The trend of considering supply chain sustainability with an absence of attention to sustainability risks may disturb the business future. The role of risk management is concentrated in identifying and analyse the influence of loss to business, social and environment, get ready by coverage budget, and derive strategies to protect supply chain sustainability against these risks. Risk management assists the com- pany’s performance to be more confident in supply chain sustainability decisions. The extent of the risk is based on the organization’s magnitude, so the sustainable supply chain risk management strategies of large firms require to be more advanced. The purpose of this research is the estimation of sustainable supply chain risk management (SSCRM). The proposed methodology in this paper is a combination of plithogenic multi-criteria decision-making approach based on the Technique in Order of Preference by Similarity to Ideal Solution (TOPSIS) and Criteria Importance Through Inter-criteria Correlation (CRITIC) methods. In order to evaluate the proposed model, we present a real-world case study of the Tele- communications Equipment Company. The results show the importance of each criterion to evaluate SSCRM and the ranking of the three telecommunications equipment categories.© 2019 Elsevier Ltd. All rights reserved.
Keywords: Risk management | Supply chain sustainability | Plithogeny | TOPSIS | CRITIC
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 4190 :::::::: بازدید دیروز: 3097 :::::::: بازدید کل: 38457 :::::::: افراد آنلاین: 52