4,965 research outputs found

    Polarization properties of specular and dense multipath components in a large industrial hall

    Get PDF
    This paper presents an analysis of the polarization characteristics of specular and dense multipath components (SMC & DMC) in a large industrial hall based on frequency-domain channel sounding experiments at 1.3 GHz with 22 MHz bandwidth. The RiMAX maximum-likelihood estimator is used to extract the full polarimetric SMC and DMC from the measurement data by taking into account the polarimetric radiating patterns of the dual-polarized antennas. Cross-polar discrimination (XPD) values are presented for the measured channels and for the SMC and DMC separately

    Reference catalogue for ICT services in healthcare : model for ICT service management, controlling and benchmarking : version 1.0

    Get PDF
    Translation of the German original

    Decorrelation of the topological charge in tempered Hybrid Monte Carlo simulations of QCD

    Get PDF
    We study the improvement of simulations of QCD with dynamical Wilson fermions by combining the Hybrid Monte Carlo algorithm with parallel tempering. As an indicator for decorrelation we use the topological charge.Comment: LATTICE99 (algorithms and machines

    The RFID PIA – developed by industry, agreed by regulators

    Get PDF
    This chapter discusses the privacy impact assessment (PIA) framework endorsed by the European Commission on February 11th, 2011. This PIA, the first to receive the Commission's endorsement, was developed to deal with privacy challenges associated with the deployment of radio frequency identification (RFID) technology, a key building block of the Internet of Things. The goal of this chapter is to present the methodology and key constructs of the RFID PIA Framework in more detail than was possible in the official text. RFID operators can use this article as a support document when they conduct PIAs and need to interpret the PIA Framework. The chapter begins with a history of why and how the PIA Framework for RFID came about. It then proceeds with a description of the endorsed PIA process for RFID applications and explains in detail how this process is supposed to function. It provides examples discussed during the development of the PIA Framework. These examples reflect the rationale behind and evolution of the text's methods and definitions. The chapter also provides insight into the stakeholder debates and compromises that have important implications for PIAs in general.Series: Working Papers on Information Systems, Information Business and Operation

    Calculation of Finite Size Effects on the Nucleon Mass in Unquenched QCD using Chiral Perturbation Theory

    Full text link
    The finite size effects on nucleon masses are calculated in relativistic chiral perturbation theory. Results are compared with two-flavor lattice results.Comment: talk at Confinement03, 5 pages latex, 3 figures. Assignment of 2 data points to incorrect data sets in plot 1 and of 1 data point in plot 2 corrected. 1 fm lattice result updated. Conclusions unchange

    Systematic Comparison of Methods in Threat and Risk Analysis of ICT Security in Industry 4.0

    Get PDF
    Industry 4.0 is the connection of intelligent objects with information technology and thus with the internet. This leads to new fields of application in information technology. To protect intelligent objects security approaches are necessary. Several security standards already exist for ICT, but not for Industry 4.0. The present paper considers standards to conduct threat analysis and risk analysis of ICT security based on a literature review. A catalogue of criteria relevant to such standards for Industry 4.0 is developed which serves as the basis of their evaluation. Thirteen standards are identified as relevant regarding the criteria, among them IT-Grundschutz

    Real time sobel square edge detector for night vision analysis

    Get PDF
    Vision analysis with low or no illumination is gaining more and more attention recently, especially in the fields of security surveillance and medical diagnosis. In this paper, a real time sobel square edge detector is developed as a vision enhancer in order to render clear shapes of object in targeting scenes, allowing further analysis such as object or human detection, object or human tracking, human behavior recognition, and identification on abnormal scenes or activities. The method is optimized for real time applications and compared with existing edge detectors. Program codes are illustrated in the content and the results show that the proposed algorithm is promising to generate clear vision data with low noise
    • …
    corecore