Hasil untuk "Cellular telephone services industry. Wireless telephone industry"

Menampilkan 20 dari ~2579576 hasil · dari DOAJ, arXiv, Semantic Scholar, CrossRef

JSON API
arXiv Open Access 2026
Industry Influence in High-Profile Social Media Research

Joseph Bak-Coleman, Jevin West, Cailin O'Connor et al.

To what extent is social media research independent from industry influence? Leveraging openly available data, we show that half of the research published in top journals has disclosable ties to industry in the form of prior funding, collaboration, or employment. However, the majority of these ties go undisclosed in the published research. These trends do not arise from broad scientific engagement with industry, but rather from a select group of scientists who maintain long-lasting relationships with industry. Undisclosed ties to industry are common not just among authors, but among reviewers and academic editors during manuscript evaluation. Further, industry-tied research garners more attention within the academy, among policymakers, on social media, and in the news. Finally, we find evidence that industry ties are associated with a topical focus away from impacts of platform-scale features. Together, these findings suggest industry influence in social media research is extensive, impactful, and often opaque. Going forward there is a need to strengthen disclosure norms and implement policies to ensure the visibility of independent research, and the integrity of industry supported research.

en cs.SI
arXiv Open Access 2026
Dependable Connectivity for Industrial Wireless Communication Networks

Nurul Huda Mahmood, Onel L. A. Lopez, David Ruiz-Guirola et al.

Dependability - a system's ability to consistently provide reliable services by ensuring safety and maintainability in the face of internal or external disruptions - is a fundamental requirement for industrial wireless communication networks (IWCNs). While 5G ultra-reliable low-latency communication (URLLC) addresses some aspects of this challenge, its evolution toward holistic dependability in 6G must encompass reliability, availability, safety, and security. This paper provides a comprehensive framework for dependable IWCNs, bridging theory and practice. We first establish the theoretical foundations of dependability, including outlining its key attributes and presenting analytical tools to study it. Next, we explore practical enablers, such as adaptive multiple access schemes leveraging real-time monitoring and time-sensitive networking to ensure end-to-end determinism. A case study demonstrates how intelligent wake-up protocols improve event detection probability by orders of magnitude compared to conventional duty cycling. Finally, we outline open challenges and future directions for a 6G-driven dependable IWCN.

en cs.NI, cs.ET
DOAJ Open Access 2025
Comparative Evaluation of Printed Rectenna Topologies on Unconventional Substrates for Enhanced RF Energy Harvesting

Ursula do C. Resende, Yan S. Gonçalves, Icaro V. Soares

This study investigates four rectenna system configurations using microstrip patch antennas with different geometries fabricated on various substrates, including glass, paper, fiberglass (FR4), and polyester fabric. A voltage doubler rectifier circuit was designed for each antenna type to enhance performance. Metamaterial cells were incorporated into the glass, FR4, and paper-based systems to improve electromagnetic wave capture. Simulations and optimizations were conducted using computer simulation technology (CST) and advanced design system (ADS) for operation at 2.45 GHz. Both the simulated and measured results that were obtained validate the potential of the proposed systems as efficient energy-harvesting solutions.

Electrical engineering. Electronics. Nuclear engineering, Cellular telephone services industry. Wireless telephone industry
arXiv Open Access 2025
Solving the initial value problem for cellular automata by pattern decomposition

Henryk Fukś

For many cellular automata, it is possible to express the state of a given cell after $n$ iterations as an explicit function of the initial configuration. We say that for such rules the solution of the initial value problem can be obtained. In some cases, one can construct the solution formula for the initial value problem by analyzing the spatiotemporal pattern generated by the rule and decomposing it into simpler segments which one can then describe algebraically. We show an example of a rule when such approach is successful, namely elementary rule 156. Solution of the initial value problem for this rule is constructed and then used to compute the density of ones after $n$ iterations, starting from a random initial condition. We also show how to obtain probabilities of occurrence of longer blocks of symbols.

en nlin.CG, math.DS
arXiv Open Access 2024
Efficient Simulation of Non-uniform Cellular Automata with a Convolutional Neural Network

Michiel Rollier, Aisling J. Daly, Odemir M. Bruno et al.

Cellular automata (CAs) and convolutional neural networks (CNNs) are closely related due to the local nature of information processing. The connection between these topics is beneficial to both related fields, for conceptual as well as practical reasons. Our contribution solidifies this connection in the case of non-uniform CAs (nuCAs), simulating a global update in the architecture of the Python package TensorFlow. Additionally, we demonstrate how the highly optimised out-of-the-box multiprocessing in TensorFlow offers interesting computational benefits, especially when simulating large numbers of nuCAs with many cells.

arXiv Open Access 2024
Effects of a Vanishing Noise on Elementary Cellular Automata Phase-Space Structure

Franco Bagnoli, Michele Baia, Tommaso Matteuzzi

We investigate elementary cellular automata (ECA) from the point of view of (discrete) dynamical systems. By studying small lattice sizes, we obtain the complete phase space of all minimal ECA, and, starting from a maximal entropy distribution (all configurations equiprobable), we show how the dynamics affects this distribution. We then investigate how a vanishing noise alters this phase space, connecting attractors and modifying the asymptotic probability distribution. What is interesting is that this modification not always goes in the sense of decreasing the entropy.

arXiv Open Access 2024
Cybersecurity in Industry 5.0: Open Challenges and Future Directions

Bruno Santos, Rogério Luís C. Costa, Leonel Santos

Unlocking the potential of Industry 5.0 hinges on robust cybersecurity measures. This new Industrial Revolution prioritises human-centric values while addressing pressing societal issues such as resource conservation, climate change, and social stability. Recognising the heightened risk of cyberattacks due to the new enabling technologies in Industry 5.0, this paper analyses potential threats and corresponding countermeasures. Furthermore, it evaluates the existing industrial implementation frameworks, which reveals their inadequacy in ensuring a secure transition from Industry 4.0 to Industry 5.0. Consequently, the paper underscores the necessity of developing a new framework centred on cybersecurity to facilitate organisations' secure adoption of Industry 5.0 principles. The creation of such a framework is emphasised as a necessity for organisations.

S2 Open Access 2023
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems

Shen Wang, M. Delavar, M. A. Azad et al.

Caller ID spoofing is a global industry problem and often acts as a critical enabler for telephone fraud. To address this problem, the Federal Communications Commission has mandated telecom providers in the U.S. to implement STIR/SHAKEN, an industry-driven solution based on digital signatures. STIR/SHAKEN relies on a public key infrastructure (PKI) to manage digital certificates, but scaling up this PKI for the global telecom industry is extremely difficult, if not impossible. Furthermore, it only works with IP-based systems (e.g., SIP), leaving the traditional non-IP systems (e.g., SS7) unprotected. So far the alternatives to the STIR/SHAKEN have not been sufficiently studied. In this article, we propose a PKI-free solution, called Caller ID Verification (CIV). CIV authenticates the caller ID based on a challenge-response process instead of digital signatures, hence requiring no PKI. It supports both IP and non-IP systems. Perhaps counter-intuitively, we show that number spoofing can be leveraged, in conjunction with Dual-tone Multi-frequency, to efficiently implement the challenge-response process, i.e., using spoofing to fight against spoofing. We implement CIV for Voice over Internet Protocol, cellular, and landline phones across heterogeneous networks (SS7/SIP) by only updating the software on the user’s phone. This is the first caller ID authentication solution with working prototypes for all three types of telephone systems in the current telecom architecture. Finally, we show how the implementation of CIV can be optimized by integrating it into telecom clouds as a service, which users may subscribe to.

9 sitasi en Computer Science
arXiv Open Access 2023
Multi-Industry Simplex : A Probabilistic Extension of GICS

Maksim Papenkov, Chris Meredith, Claire Noel et al.

Accurate industry classification is a critical tool for many asset management applications. While the current industry gold-standard GICS (Global Industry Classification Standard) has proven to be reliable and robust in many settings, it has limitations that cannot be ignored. Fundamentally, GICS is a single-industry model, in which every firm is assigned to exactly one group - regardless of how diversified that firm may be. This approach breaks down for large conglomerates like Amazon, which have risk exposure spread out across multiple sectors. We attempt to overcome these limitations by developing MIS (Multi-Industry Simplex), a probabilistic model that can flexibly assign a firm to as many industries as can be supported by the data. In particular, we utilize topic modeling, an natural language processing approach that utilizes business descriptions to extract and identify corresponding industries. Each identified industry comes with a relevance probability, allowing for high interpretability and easy auditing, circumventing the black-box nature of alternative machine learning approaches. We describe this model in detail and provide two use-cases that are relevant to asset management - thematic portfolios and nearest neighbor identification. While our approach has limitations of its own, we demonstrate the viability of probabilistic industry classification and hope to inspire future research in this field.

en q-fin.PM
arXiv Open Access 2023
Four state deterministic cellular automaton rule emulating random diffusion

Henryk Fukś

We show how to construct a deterministic nearest-neighbour cellular automaton (CA) with four states which emulates diffusion on a one-dimensional lattice. The pseudo-random numbers needed for directing random walkers in the diffusion process are generated with the help of rule 30. This CA produces density profiles which agree very well with solutions of the diffusion equation, and we discuss this agreement for two different boundary and initial conditions. We also show how our construction can be generalized to higher dimensions.

arXiv Open Access 2023
Energy Loss Prediction in IoT Energy Services

Pengwei Yang, Amani Abusafia, Abdallah Lakhdari et al.

We propose a novel Energy Loss Prediction(ELP) framework that estimates the energy loss in sharing crowdsourced energy services. Crowdsourcing wireless energy services is a novel and convenient solution to enable the ubiquitous charging of nearby IoT devices. Therefore, capturing the wireless energy sharing loss is essential for the successful deployment of efficient energy service composition techniques. We propose Easeformer, a novel attention-based algorithm to predict the battery levels of IoT devices in a crowdsourced energy sharing environment. The predicted battery levels are used to estimate the energy loss. A set of experiments were conducted to demonstrate the feasibility and effectiveness of the proposed framework. We conducted extensive experiments on real wireless energy datasets to demonstrate that our framework significantly outperforms existing methods.

en cs.DC, cs.LG
DOAJ Open Access 2022
Simultaneous Estimation of Wall and Object Parameters in TWR Using Deep Neural Network

Fardin Ghorbani, Hossein Soleimani

The purpose of this paper is to present a deep learning model that simultaneously estimates targets and wall parameters in through-the-wall radar (TWR). As a result of the complexity of the environments in which through-the-wall radars operate, TWR faces many challenges. The propagation of radar signals through walls is further delayed and attenuated than in free space. Therefore, the targets are less able to be detected and the images of the targets are distorted and defocused as a consequence. To address the above challenges, two modes are considered in this work: single targets and two targets. In both cases, permittivity and wall thickness are considered, along with the target’s center in two dimensions and the permittivity of targets. Therefore, in the case of a single target, we estimate five values, whereas in the case of two targets, we estimate eight values simultaneously, each representing the mentioned parameters. As a result of using deep neural networks to solve the task of target locating problem in TWR, the model has a better chance of learning and increased accuracy if it involves more parameters (such as wall parameters and permittivity of the wall) in the target location problem. In this way, the accuracy of target locating improved when two wall parameters were considered in problem. A deep neural network model was used to estimate wall permittivity and thickness, as well as two-dimensional coordinates and permittivity of targets with 99% accuracy in single-target and two-target modes.

Electrical engineering. Electronics. Nuclear engineering, Cellular telephone services industry. Wireless telephone industry
arXiv Open Access 2022
The World of Graph Databases from An Industry Perspective

Yuanyuan Tian

Rapidly growing social networks and other graph data have created a high demand for graph technologies in the market. A plethora of graph databases, systems, and solutions have emerged, as a result. On the other hand, graph has long been a well studied area in the database research community. Despite the numerous surveys on various graph research topics, there is a lack of survey on graph technologies from an industry perspective. The purpose of this paper is to provide the research community with an industrial perspective on the graph database landscape, so that graph researcher can better understand the industry trend and the challenges that the industry is facing, and work on solutions to help address these problems.

en cs.DB
DOAJ Open Access 2021
Bandwidth Enhancement of a Microstrip-Line-Fed Printed Rotated Wide-Slot Antenna Based on Self-Shape Blending Algorithm

Aiting Wu, Furan Zhu, Pengquan Zhang et al.

This paper proposes a self-shape blending algorithm to improve antenna bandwidth. A printed antenna is designed for bandwidth enhancement based on the proposed algorithm; this approach can also be used to enhance bandwidth in other applications. The antenna completely covers WLAN bands and WiMAX bands after the proposed algorithm is applied. The shape of the rotating slot and the parasitic patch also changes, which excites additional resonance and improves the impedance matching at high frequencies. Test results show that the proposed antenna can work from 2.07 GHz to 5.94 GHz with S11≤−10dB. Compared to a slot antenna without the self-shape blending algorithm, the bandwidth increases by more than 0.7 GHz.

Electrical engineering. Electronics. Nuclear engineering, Cellular telephone services industry. Wireless telephone industry
DOAJ Open Access 2021
Design of RCS Reduction Applied to W-Band Circularly Polarized Antenna Array

Chun-Hong Chen, Pei-Yang Wang, Jun Chen et al.

A single-layer capsule-shaped polarization conversion metasurface (PCM) is proposed in this paper. In the W-band, its polarization conversion rate (PCR) exceeds 97%, effectively changing the polarization direction of the incident wave. PCM is arranged in a chessboard array to achieve broadband RCS reduction. Placing the PCM array on a circularly polarized sequentially rotated slot antenna array, simulated results show that the radiation characteristics of the antenna array are hardly affected by the PCM array. The results of measurement demonstrate that the RCS of the antenna array with PCM array proposed is reduced by more than 10 dB from 40 to 119 GHz; the relative bandwidth (−10 dB) reaches 96.3%.

Electrical engineering. Electronics. Nuclear engineering, Cellular telephone services industry. Wireless telephone industry
arXiv Open Access 2021
CyberSecurity Challenges: Serious Games for Awareness Training in Industrial Environments

Tiago Espinha Gasiba, Ulrike Lechner, Maria Pinto-Albuquerque

Awareness of cybersecurity topics, e.g., related to secure coding guidelines, enables software developers to write secure code. This awareness is vital in industrial environments for the products and services in critical infrastructures. In this work, we introduce and discuss a new serious game designed for software developers in the industry. This game addresses software developers' needs and is shown to be well suited for raising secure coding awareness of software developers in the industry. Our work results from the experience of the authors gained in conducting more than ten CyberSecurity Challenges in the industry. The presented game design, which is shown to be well accepted by software developers, is a novel alternative to traditional classroom training. We hope to make a positive impact in the industry by improving the cybersecurity of products at their early production stages.

en cs.SE

Halaman 14 dari 128979