25,074 research outputs found
ACUTA Journal of Telecommunications in Higher Education
In This Issue
lT Market Clock for Enterprise Networking lnfrastructure, 2010
Emerging Technology Trends-Finding the Next Big Thing
Money and Mobile Access Challenge Community Colleges
A Business Perspective on Hosted Communications
FMC: Ready to Fly or Flop?
Challenges Facing Broadband Wireless Providers
Deploying IEEE 802.11n Data and Security Networks Campuswide While Optimizing Energy Efficiency
Interview
President\u27s Message.
From the Executive Director
O&A from the CI
ACUTA Journal of Telecommunications in Higher Education
In This Issue
lT Market Clock for Enterprise Networking lnfrastructure, 2010
Emerging Technology Trends-Finding the Next Big Thing
Money and Mobile Access Challenge Community Colleges
A Business Perspective on Hosted Communications
FMC: Ready to Fly or Flop?
Challenges Facing Broadband Wireless Providers
Deploying IEEE 802.11n Data and Security Networks Campuswide While Optimizing Energy Efficiency
Interview
President\u27s Message.
From the Executive Director
O&A from the CI
Promoting and Empowering the RF and Microwave Community in Costa Rica
This article describes a recent and very fruitful IEEE MTT-S initiative in Latin America focusing on Costa Rica. Envisaged by the Membership and Geographical Activities (MGA) Committee of the MTT-S Administrative Committee (AdCom), this initiative, which was implemented by the end of 2022, aimed at developing MTT-S membership, volunteer base, and increased engagement in MTT-S activities in Region 9 of IEEE, especially focusing on Costa Rica. The delegation consisting of the MTT-S MGA Chair, Goutam Chattopadhyay, and the MTT-S Region 9 Coordinator, José Rayas-Sánchez, visited San Jose, Costa Rica. The 2022 MTT-S President, Rashaunda Henderson, was to accompany the delegation but had to drop out at the last moment due to some unavoidable circumstances. The delegation carried MTT-S President’s message to the microwave community in Costa Rica. This article presents the rationale and goals of the MTT-S delegation, the planning for the initiative, the agenda and activities, and the outcomes achieved. Several months after its implementation, the results obtained indicate that the initiative was very successful, confirming it as an effective strategy to promote RF and microwave-related technical activities and revitalize communities in similar emerging regions of the world.ITESO, A.C
Stacking classifiers for anti-spam filtering of e-mail
We evaluate empirically a scheme for combining classifiers, known as stacked
generalization, in the context of anti-spam filtering, a novel cost-sensitive
application of text categorization. Unsolicited commercial e-mail, or "spam",
floods mailboxes, causing frustration, wasting bandwidth, and exposing minors
to unsuitable content. Using a public corpus, we show that stacking can improve
the efficiency of automatically induced anti-spam filters, and that such
filters can be used in real-life applications
IEEE Standard 1500 Compliance Verification for Embedded Cores
Core-based design and reuse are the two key elements for an efficient system-on-chip (SoC) development. Unfortunately, they also introduce new challenges in SoC testing, such as core test reuse and the need of a common test infrastructure working with cores originating from different vendors. The IEEE 1500 Standard for Embedded Core Testing addresses these issues by proposing a flexible hardware test wrapper architecture for embedded cores, together with a core test language (CTL) used to describe the implemented wrapper functionalities. Several intellectual property providers have already announced IEEE Standard 1500 compliance in both existing and future design blocks. In this paper, we address the problem of guaranteeing the compliance of a wrapper architecture and its CTL description to the IEEE Standard 1500. This step is mandatory to fully trust the wrapper functionalities in applying the test sequences to the core. We present a systematic methodology to build a verification framework for IEEE Standard 1500 compliant cores, allowing core providers and/or integrators to verify the compliance of their products (sold or purchased) to the standar
On Secure Workflow Decentralisation on the Internet
Decentralised workflow management systems are a new research area, where most
work to-date has focused on the system's overall architecture. As little
attention has been given to the security aspects in such systems, we follow a
security driven approach, and consider, from the perspective of available
security building blocks, how security can be implemented and what new
opportunities are presented when empowering the decentralised environment with
modern distributed security protocols. Our research is motivated by a more
general question of how to combine the positive enablers that email exchange
enjoys, with the general benefits of workflow systems, and more specifically
with the benefits that can be introduced in a decentralised environment. This
aims to equip email users with a set of tools to manage the semantics of a
message exchange, contents, participants and their roles in the exchange in an
environment that provides inherent assurances of security and privacy. This
work is based on a survey of contemporary distributed security protocols, and
considers how these protocols could be used in implementing a distributed
workflow management system with decentralised control . We review a set of
these protocols, focusing on the required message sequences in reviewing the
protocols, and discuss how these security protocols provide the foundations for
implementing core control-flow, data, and resource patterns in a distributed
workflow environment
Energy Efficient and Reliable ARQ Scheme (ER-ACK) for Mission Critical M2M/IoT Services
Wireless sensor networks (WSNs) are the main infrastructure for machine to machine (M2M) and Internet of thing (IoT). Since various sophisticated M2M/IoT services have their own quality-of-service (QoS) requirements, reliable data transmission in WSNs is becoming more important. However, WSNs have strict constraints on resources due to the crowded wireless frequency, which results in high collision probability. Therefore a more efficient data delivering scheme that minimizes both the transmission delay and energy consumption is required. This paper proposes energy efficient and reliable data transmission ARQ scheme, called energy efficient and reliable ACK (ER-ACK), to minimize transmission delay and energy consumption at the same time. The proposed scheme has three aspects of advantages compared to the legacy ARQ schemes such as ACK, NACK and implicit-ACK (I-ACK). It consumes smaller energy than ACK, has smaller transmission delay than NACK, and prevents the duplicated retransmission problem of I-ACK. In addition, resource considered reliability (RCR) is suggested to quantify the improvement of the proposed scheme, and mathematical analysis of the transmission delay and energy consumption are also presented. The simulation results show that the ER-ACK scheme achieves high RCR by significantly reducing transmission delay and energy consumption
Circular quantum secret sharing
A circular quantum secret sharing protocol is proposed, which is useful and
efficient when one of the parties of secret sharing is remote to the others who
are in adjacent, especially the parties are more than three. We describe the
process of this protocol and discuss its security when the quantum information
carrying is polarized single photons running circularly. It will be shown that
entanglement is not necessary for quantum secret sharing. Moreover, the
theoretic efficiency is improved to approach 100% as almost all the instances
can be used for generating the private key, and each photon can carry one bit
of information without quantum storage. It is straightforwardly to utilize this
topological structure to complete quantum secret sharing with multi-level
two-particle entanglement in high capacity securely.Comment: 7 pages, 2 figure
- …