نتایج جستجو برای: telecommunication terminal
تعداد نتایج: 158861 فیلتر نتایج به سال:
User requirements for telecommunication systems are difficult to understand because they are obscured by a long history of ad hoc feature development and technological limitations. The presence of a viable modular architecture for telecommunication features gives us a fresh start. Working within this framework, we can discover desirable properties that ought to be requirements for all telecommu...
As long as there have been databases there has been a large interest in measuring their performance. Therefore, several different benchmarks have been proposed. However, previous proposals do not consider timely response and other telecommunication application requirements. This paper shortly reviews telecommunication requirements and previous work on real-time databases. These requirements are...
Deregulation and Enterprization in Central and Eastern Telecommunication - a Benchmark for the West?
The restructuring of telecommunication in Central and Eastern Europe occurs at a time when the classical structures of telecommunication are falling apart worldwide. Coming from the socialist system in which telecommunication did not exist as an independent economic activity, the Eastern European countries have created specific “post-socialist“ modes of reform, often outdoing Western countries ...
We have performed a study on telecommunication systems for a hypothetical mission to Mars. The objective of the study was to evaluate and compare the benefits that microwave—X-band (8.4 GHz) and Ka-band (32 GHz)—and optical communications technologies afford to future missions. The telecommunication systems were required to return data after launch and in orbit at 2.7 AU with daily data volumes...
Network is the bearer of services and services are the soul of network. The convergent network extends the original communications service type and gradually forms new convergent services which integrate the traditional telecommunication services and a large number of value-added services or contents on Internet (Kolberg et al., 2010). The integrated service is essentially to handle the data an...
In this paper, a new configuration method of multimode software radio system by parameter controlled and telecommunication component block embedded digital signal processing hardware (DSPH) is proposed for the future flexible multimedia communications. In this method, in advance, basic telecommunication component blocks are implemented in the DSPH like DSP and FPGA. And, external parameters, wh...
Telecommunication companies generate a tremendous amount of data. These data include call detail data, which describes the calls that traverse the telecommunication networks, network data, which describes the state of the hardware and software components in the network, and customer data, which describes the telecommunication customers. This chapter describes how data mining can be used to unco...
Fixed–mobile convergence (FMC) is a radical innovation for telecommunication companies because it requires them to move into unknown territories that are beyond traditional business lines and underlying technologies. In the meantime, understanding what types of telecommunication companies are better at doing business through the early adoption of FMC has become increasingly important in the con...
We present an overview of our approach to managing security as a dimension of Quality of Service. Relative to traditional QoS attributes (e.g., jitter, deadline, latency) security has been handled rather statically and indirectly. We have developed a theory of Quality of Security Service and a related security-costing framework that supports extension of QoSS functionality to embrace existing a...
The canonical IT security properties are geared towards infrastructure security. The task of an infrastructure security service is completed once data has been delivered to the application. When false data is submitted to the infrastructure, false data will be delivered securely. To secure an application, one thus may have to go beyond securing the infrastructure and in addition provide mechani...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید