4,965 research outputs found
Polarization properties of specular and dense multipath components in a large industrial hall
This paper presents an analysis of the polarization characteristics of specular and dense multipath components (SMC & DMC) in a large industrial hall based on frequency-domain channel sounding experiments at 1.3 GHz with 22 MHz bandwidth. The RiMAX maximum-likelihood estimator is used to extract the full polarimetric SMC and DMC from the measurement data by taking into account the polarimetric radiating patterns of the dual-polarized antennas. Cross-polar discrimination (XPD) values are presented for the measured channels and for the SMC and DMC separately
Reference catalogue for ICT services in healthcare : model for ICT service management, controlling and benchmarking : version 1.0
Translation of the German original
Decorrelation of the topological charge in tempered Hybrid Monte Carlo simulations of QCD
We study the improvement of simulations of QCD with dynamical Wilson fermions
by combining the Hybrid Monte Carlo algorithm with parallel tempering. As an
indicator for decorrelation we use the topological charge.Comment: LATTICE99 (algorithms and machines
The RFID PIA – developed by industry, agreed by regulators
This chapter discusses the privacy impact assessment (PIA) framework endorsed
by the European Commission on February 11th, 2011. This PIA, the first to receive the
Commission's endorsement, was developed to deal with privacy challenges associated with
the deployment of radio frequency identification (RFID) technology, a key building block of
the Internet of Things. The goal of this chapter is to present the methodology and key
constructs of the RFID PIA Framework in more detail than was possible in the official text.
RFID operators can use this article as a support document when they conduct PIAs and need
to interpret the PIA Framework. The chapter begins with a history of why and how the PIA
Framework for RFID came about. It then proceeds with a description of the endorsed PIA
process for RFID applications and explains in detail how this process is supposed to function.
It provides examples discussed during the development of the PIA Framework. These
examples reflect the rationale behind and evolution of the text's methods and definitions. The
chapter also provides insight into the stakeholder debates and compromises that have
important implications for PIAs in general.Series: Working Papers on Information Systems, Information Business and Operation
Calculation of Finite Size Effects on the Nucleon Mass in Unquenched QCD using Chiral Perturbation Theory
The finite size effects on nucleon masses are calculated in relativistic
chiral perturbation theory. Results are compared with two-flavor lattice
results.Comment: talk at Confinement03, 5 pages latex, 3 figures. Assignment of 2 data
points to incorrect data sets in plot 1 and of 1 data point in plot 2
corrected. 1 fm lattice result updated. Conclusions unchange
Systematic Comparison of Methods in Threat and Risk Analysis of ICT Security in Industry 4.0
Industry 4.0 is the connection of intelligent objects with information technology and thus with the internet. This leads to new fields of application in information technology. To protect intelligent objects security approaches are necessary. Several security standards already exist for ICT, but not for Industry 4.0. The present paper considers standards to conduct threat analysis and risk analysis of ICT security based on a literature review. A catalogue of criteria relevant to such standards for Industry 4.0 is developed which serves as the basis of their evaluation. Thirteen standards are identified as relevant regarding the criteria, among them IT-Grundschutz
Real time sobel square edge detector for night vision analysis
Vision analysis with low or no illumination is gaining more and more attention recently, especially in the fields of security surveillance and medical diagnosis. In this paper, a real time sobel square edge detector is developed as a vision enhancer in order to render clear shapes of object in targeting scenes, allowing further analysis such as object or human detection, object or human tracking, human behavior recognition, and identification on abnormal scenes or activities. The method is optimized for real time applications and compared with existing edge detectors. Program codes are illustrated in the content and the results show that the proposed algorithm is promising to generate clear vision data with low noise
- …