نتایج جستجو برای: telecommunication

تعداد نتایج: 9649  

Journal: :برنامه ریزی و بودجه 0
علیرضا امینی alireza amini دانشگاه آزاد اسلامی

this paper tries to measure and analyze the trend of indicators of labor and capital productivity as well as total factor productivity (tfp) in the economic sectors introduced in the 4th five-year-development plan for the period within 1971-2003. according to the results, the productivity indicator throughout iran has increased 0/9% on average annually and the highest growth has been in the tel...

1997
Aurel A. Lazar

The recent move towards market deregulation and open competition has sparked a wave of serious introspection in the telecommunications service industry. Telecom providers and operators are now required to open up their primary revenue channels to competing industries. In this paper, we examine the service structure of two major global communication networks the Telephone Network and the Interne...

2007
Bill N. Schilit David M. Hilbert

This chapter describes how the changing information about an individual’s location, environment, and social situation can be used to initiate and facilitate people’s interactions with one another, individually and in groups. Context-aware communication is contrasted with other forms of context-aware computing and we characterize applications in terms of design decisions along two dimensions: th...

2012
Antonis M. Hadjiantonis

The telecommunications sector has become a dynamic key area for the economic development of the European Union (EU) and remains in constant evolution. Because of intense competition, telecommunications companies are forced to diversify their offers and thus to propose an increasing number of services. However, economic analysis often ignores important technical aspects of telecommunications and...

2004
Stan van Hoesel

Network design and network synthesis have been the classical optimization problems in telecommunication for a long time. In the recent past, there have been many technological developments such as digitization of information, optical networks, internet, and wireless networks. These developments have led to a series of new optimization problems. This manuscript gives an overview of the developme...

1999
Frantz Rowe Detlef Struck

This paper deals with adapting the telecommunication services of an organization to the diversity of individual value orientations related to culture. After a discussion of the processes linking telecommunication use to cultural values, we show on empirical grounds the relationship between the preference of the individual for organizational cultures and his or her telecommunication use (fax, em...

2013
G. Ghodrati Amiri M. A. Barkhordari S. R. Massah M. R. Vafaei

Telecommunication towers are among the few steel structures that little attention has been paid to their seismic behavior in existing design codes. Due to lack of design provisions, the designers apply the existing building design codes to telecommunication towers. However, the seismic behavior and response of telecommunication towers is very different from that of building structures. For exam...

2002
Babak A. Farshchian Sune Jakobsson Erik Berg

MDA (Model-Driven Architecture) has been coined by OMG (Object Management Group) as the next step in application integration. Being based on standards already embraced by a large segment of the software engineering industry, MDA promises fully automatic model transformation. MDA enables application developers to use formalisms such as UML to specify their applications in a totally platform-inde...

2003
Audun Jøsang Mary Anne Patton

Authentication is a security service that consists of verifying that someone’s identity is as claimed. There are a number of challenges to presenting information from the authentication process to the user in a way that is meaningful and ensures security. We show examples where authentication requirements are not met, due to user behaviour and properties of existing user interfaces, and suggest...

2012
Rainer Schick Christoph Ruland

Current security systems dealing with sensitive private data do not provide sufficient options to find data leaks. An approach to find the last authorized receiver of a protected copy is proposed in this paper. Existing security concepts are extended by a new security service based on reliable tracking data embedding. Additionally, a new mechanism to protect the new tracking data is shown. Digi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید