Academic literature on the topic 'Sim application toolkit'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Sim application toolkit.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Sim application toolkit"

1

Gherari, Manel, Abdelkrim Amirat, Mohamed Ridda Laouar, and Mourad Oussalah. "MC-Sim: a mobile cloud simulation toolkit based on CloudSim." International Journal of Computer Applications in Technology 57, no. 1 (2018): 72. http://dx.doi.org/10.1504/ijcat.2018.090033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rashid, Muhammad Haroon, Ants Koel, and Toomas Rang. "Nano and Micro-Scale Simulations of Si/4H-SiC and Si/3C-SiC NN-Heterojunction Diodes." Materials Science Forum 963 (July 2019): 357–61. http://dx.doi.org/10.4028/www.scientific.net/msf.963.357.

Full text
Abstract:
In the last decades, silicon carbide (SiC) based heterostructures have gained a remarkable place in research field due to their exceptional properties. These properties make SiC highly suitable for high temperature, high frequency, and high power electronics applications. The most prominent polytypes (among 200 types) of SiC like 3C-SiC, 4H-SiC and 6H-SiC, have distinctive electrical and physical attributes that make them promising candidates for high performance optoelectronic applications. Silicon (Si) also has been accepted as a promising material for wide range of electronic, optical and optoelectronic applications. Heterostructures fabricated by the direct bonding of SiC polytype and Si may have interesting physical and electrical attributes. In this paper, micro and nano-scale simulations of the nn-heterostructures of Si/4H-SiC and Si/3C-SiC have been done with Silvaco TCAD and QuantumWise Atomistix Toolkit (ATK) softwares respectively. Voltage-current density characteristics of the nanoscale and microscale simulated devices are computed and discussed. In nanoscale devices, the effects of defects due to lattice misplacements (axial displacement of bonded wafers) are also studied. These simulations are the preparation for our future experiments, which are targeted to produce either a high electron mobility diode or a light emitting diode, by direct bonding (diffusion welding) of SiC polytypes.
APA, Harvard, Vancouver, ISO, and other styles
3

Rashid, Muhammad Haroon, Ants Koel, and Toomas Rang. "Simulations of Heterostructures Based on 3C-4H and 6H-4H Silicon Carbide Polytypes." Materials Science Forum 924 (June 2018): 302–5. http://dx.doi.org/10.4028/www.scientific.net/msf.924.302.

Full text
Abstract:
In the last decade, silicon carbide (SiC) has gained a remarkable position among wide bandgap semiconductors due to its high temperature, high frequency, and high power electronics applications. SiC heterostructures, based on the most prominent polytypes like 3C-SiC, 4H-SiC and 6H-SiC, exhibit distinctive electrical and physical properties that make them promising candidates for high performance optoelectronic applications. The results of simulations of nn-junction 3C-4H/SiC and 6H-4H/SiC heterostructures, at the nanoscale and microscale, are presented in this paper. Nanoscale devices are simulated with QuantumWise Atomistix Toolkit (ATK) software, and microscale devices are simulated with Silvaco TCAD software. Current-voltage (IV) characteristics of nanoscale and microscale simulated devices are compared and discussed. The effects of non-ideal bonding at the heterojunction interface due to lattice misplacements (axial displacement of bonded wafers) are studied using the ATK simulator. These simulations lay the groundwork for the experiments, which are targeted to produce either a photovoltaic device or a light-emitting diode (working in the ultraviolet or terahertz spectra), by direct bonding of SiC polytypes.
APA, Harvard, Vancouver, ISO, and other styles
4

Rashid, Muhammad Haroon, Ants Koel, and Toomas Rang. "Nano- and Micro-Scale Simulations of Ge/3C-SiC and Ge/4H-SiC NN-Heterojunction Diodes." Materials Science Forum 1004 (July 2020): 490–96. http://dx.doi.org/10.4028/www.scientific.net/msf.1004.490.

Full text
Abstract:
During the last decade, silicon carbide (SiC) and its heterostructures with other semiconductors have gained a significant importance for wide range of electronics applications. These structures are highly suitable for high frequency and high power applications in extremely high temperature environments. SiC exists in more than 200 different polycrystalline forms, called polytypes. Among these 200 types, the most prominent polytypes with exceptional physical and electrical attributes are 3C-SiC, 4H-SiC and 6H-SiC. Heterostructures of these SiC polytypes with other conventional semiconductors (like Si, Ge) can give rise to interesting electronic characteristics. In this article, Germanium (Ge) has been used to make heterostructures with 3C-SiC and 4H-SiC using a novel technique called diffusion welding. Microscale and nanoscale simulations of nn-heterojunction of Ge/3C-SiC and Ge/4H-SiC have been done. Microscale devices have been simulated with a commercially available semiconductor device simulator tool called Silvaco TCAD. Whereas nanoscale devices have been simulated with QuantumWise Atomistix Toolkit (ATK) software package. Current-voltage (IV) curves of all simulated devices have been calculated and compared. In nanoscale device, the effects of defects on IV-characteristics due to non-ideal bonding (lattice misplacement) at heterojunction interface have been analyzed. Our simulation results reveal that the proposed heterostructure devices with diffusion welding of wafers are theoretically possible. These simulations are the preparations of our near future physical experiments targeted to fabricate SiC based heterostructure devices using diffusion bonding technique.
APA, Harvard, Vancouver, ISO, and other styles
5

Pradani, Winangsari, Ade Jamal, Arie Wahyu Triansyah, and Annisa Utami. "Pengembangan Sistem Informasi Perpustakaan Menggunakan Teknologi Google Web Toolkit (GWT)." JURNAL Al-AZHAR INDONESIA SERI SAINS DAN TEKNOLOGI 2, no. 2 (September 1, 2013): 96. http://dx.doi.org/10.36722/sst.v2i2.130.

Full text
Abstract:
<p><em>Abstrak</em> - <strong><em>Stock opname </em>merupakan salah satu kegiatan penting pada perpustakaan dalam pemeliharaan koleksi pustaka. Kegiatan <em>stock opname </em>adalah melakukan pencocokan data antara koleksi pustaka yang ada di rak-rak buku dengan pangkalan data yang dimiliki perpustakaan. Pada saat ini kegiatan <em>stock opname</em> pada Perpustakaan SMP/SMA Al-Azhar Kebayoran Baru belum dilaksanakan secara rutin karena keterbatasan tenaga SDM. Perpustakaan SMP/SMA Al Azhar telah menggunakan aplikasi <em>Senayan Library Management System</em> (SLiMs) yang bersifat open source. Di lain pihak, Teknik Informatika UAI juga memiliki satu sistem aplikasi perpustakaan yaitu Sistem Informasi Perpustakaan berbasis desktop (SIAP). Modul <em>mobile stock opname</em> telah ada di aplikasi SIAP. Dalam kegiatan penelitian ini modul <em>stock opname </em>SIAP akan ditempelkan kepada sistem SLiMS. Dengan modul aplikasi <em>mobile stock opname</em> yang ada pada handset atau komputer tablet, pustakawan dapat langsung memasukkan data hasil pemeriksaan pada saat kegiatan berlangsung. Langkah mencetak daftar koleksi dan pencatatan manual tidak diperlukan lagi. Jika sebelumnya kegiatan <em>stock opname</em> dilakukan 3 langkah, dengan sistem baru menjadi 1 langkah. Waktu yang dibutuhkan untuk pencatatan berkurang hingga tinggal 50% dari waktu semula.</strong></p><p><strong> </strong></p><p><em>Abstract</em> - <strong>Stock opname is one of the important activities of the library in the maintenance of library collections. Stock opname is doing data matching between the existing library collections in bookshelves with a database owned by the library. At this time, stock opname actifity in the library SMP / SMA Al-Azhar Kebayoran Baru has not been implemented on a regular basis due to limited human resources personnel. Library SMP / SMA Al Azhar have used the application Senayan Library Management System (SLiMs), which is open source. On the other hand, Information Engineering UAI also has a library application system is Sistem Informasi Perpustakaan berbasis desktop (SIAP). Mobile module inventory check has existed in the SIAP. In this research activity, stock opname module in SIAP will be attached to the SLiMs. With the mobile application modules existing inventory check on the handset or tablet computer, librarians can directly enter data at the time of examination activities take place. Step print a list of collection and manual recording is not required anymore. If previous activities carried out stock taking three steps, with the new system into one step. The time required for recording reduced to 50% of the original time.</strong></p>
APA, Harvard, Vancouver, ISO, and other styles
6

Rashid, Muhammad Haroon, Ants Koel, and Toomas Rang. "Effects of the Inclusion of Armchair Graphene Nanoribbons on the Electrical Conduction Properties of NN-Heterojunction 4H-6H/SiC Diodes." Materials Science Forum 962 (July 2019): 29–35. http://dx.doi.org/10.4028/www.scientific.net/msf.962.29.

Full text
Abstract:
In recent years, graphene has sparked the interest of researchers due to its promising electrical and physical attributes. These attributes make it highly suitable to develop electronic devices with ultra-high mobility of charge carriers. Meanwhile silicon carbide (SiC), a wide bandgap semiconductor material, is being used for high temperature optoelectronic applications. SiC has more than 250 different crystalline forms, these are called polytypes. Some of these polytypes (such as 4H-SiC, 6H-SiC and 3C-SiC) have exceptional physical and electrical properties. Electronic devices which have SiC and graphene as their constituent materials may combine the outstanding attributes of both materials. This article attempts to simulate electronic devices having SiC and graphene as their constituent materials. For this purpose, simulations of a novel nn-heterojunction 4H-6H/SiC diodes with the inclusion of an armchair nanoribbon layer have been carried out. All of the simulations have been run using QuantumWise Atomistix Toolkit (ATK) software, which is an atomic scale electronic device simulator. The density of the states, charge carrier densities and current-voltage curves of the simulated devices have been computed. The simulation results showed a significant improvement in the electrical conduction properties of nn-heterojunction 4H-6H/SiC diodes after the inclusion of the armchair graphene nanoribbons. These simulations provide the groundwork for our future experiments, which will be targeted on fabricating high mobility diodes and/or field effect transistors.
APA, Harvard, Vancouver, ISO, and other styles
7

Alshathri, Samah, Bogdan Ghita, and Nathan Clarke. "Sharing with Live Migration Energy Optimization Scheduler for Cloud Computing Data Centers." Future Internet 10, no. 9 (September 6, 2018): 86. http://dx.doi.org/10.3390/fi10090086.

Full text
Abstract:
The cloud-computing concept has emerged as a powerful mechanism for data storage by providing a suitable platform for data centers. Recent studies show that the energy consumption of cloud computing systems is a key issue. Therefore, we should reduce the energy consumption to satisfy performance requirements, minimize power consumption, and maximize resource utilization. This paper introduces a novel algorithm that could allocate resources in a cloud-computing environment based on an energy optimization method called Sharing with Live Migration (SLM). In this scheduler, we used the Cloud-Sim toolkit to manage the usage of virtual machines (VMs) based on a novel algorithm that learns and predicts the similarity between the tasks, and then allocates each of them to a suitable VM. On the other hand, SLM satisfies the Quality of Services (QoS) constraints of the hosted applications by adopting a migration process. The experimental results show that the algorithm exhibits better performance, while saving power and minimizing the processing time. Therefore, the SLM algorithm demonstrates improved virtual machine efficiency and resource utilization compared to an adapted state-of-the-art algorithm for a similar problem.
APA, Harvard, Vancouver, ISO, and other styles
8

Guba, O., M. A. Taylor, P. A. Ullrich, J. R. Overfelt, and M. N. Levy. "The spectral element method (SEM) on variable-resolution grids: evaluating grid sensitivity and resolution-aware numerical viscosity." Geoscientific Model Development 7, no. 6 (November 27, 2014): 2803–16. http://dx.doi.org/10.5194/gmd-7-2803-2014.

Full text
Abstract:
Abstract. We evaluate the performance of the Community Atmosphere Model's (CAM) spectral element method on variable-resolution grids using the shallow-water equations in spherical geometry. We configure the method as it is used in CAM, with dissipation of grid scale variance, implemented using hyperviscosity. Hyperviscosity is highly scale selective and grid independent, but does require a resolution-dependent coefficient. For the spectral element method with variable-resolution grids and highly distorted elements, we obtain the best results if we introduce a tensor-based hyperviscosity with tensor coefficients tied to the eigenvalues of the local element metric tensor. The tensor hyperviscosity is constructed so that, for regions of uniform resolution, it matches the traditional constant-coefficient hyperviscosity. With the tensor hyperviscosity, the large-scale solution is almost completely unaffected by the presence of grid refinement. This later point is important for climate applications in which long term climatological averages can be imprinted by stationary inhomogeneities in the truncation error. We also evaluate the robustness of the approach with respect to grid quality by considering unstructured conforming quadrilateral grids generated with a well-known grid-generating toolkit and grids generated by SQuadGen, a new open source alternative which produces lower valence nodes.
APA, Harvard, Vancouver, ISO, and other styles
9

Davison, Kelly, Roz Queen, Francis Lau, and Marcy Antonio. "Culturally Competent Gender, Sex, and Sexual Orientation Information Practices and Electronic Health Records: Rapid Review." JMIR Medical Informatics 9, no. 2 (February 11, 2021): e25467. http://dx.doi.org/10.2196/25467.

Full text
Abstract:
Background Outdated gender, sex, and sexual orientation (GSSO) information practices in health care contribute to health inequities for sexual and gender minorities (SGMs). Governments, statistics agencies, and health care organizations are developing and implementing modernized practices that support health equity for SGMs. Extending our work, we conducted a rapid review of grey literature to explore information practices that support quality health care for SGMs. Objective The aim of this rapid review of grey literature was to elucidate modern GSSO information practices from leading agencies for adaptation, adoption, and application by health care providers and organizations seeking to modernize outdated GSSO information practices that contribute to health inequities among SGMs. Methods We searched MEDLINE and Google from 2015 to 2020 with terms related to gender, sex, sexual orientation, and electronic health/medical records for English-language grey literature resources including government and nongovernment organization publications, whitepapers, data standards, toolkits, health care organization and health quality practice and policy guides, conference proceedings, unpublished academic work, and statistical papers. Peer-reviewed journal articles were excluded, as were resources irrelevant to information practices. We also screened the reference sections of included articles for additional resources, and canvassed a working group of international topic experts for additional relevant resources. Duplicates were eliminated. ATLAS.ti was used to support analysis. Themes and codes were developed through an iterative process of writing and discussion with the research team. Results Twenty-six grey literature resources met the inclusion criteria. The overarching themes that emerged from the literature were the interrelated behaviors, attitudes, and policies that constitute SGM cultural competence as follows: shared language with unambiguous definitions of GSSO concepts; welcoming and inclusive care environments and affirming practices to reduce barriers to access; health care policy that supports competent health care; and adoption of modernized GSSO information practices and electronic health record design requirements that address invisibility in health data. Conclusions Health equity for SGMs requires systemic change. Binary representation of sex and gender in electronic health records (EHRs) obfuscates natural and cultural diversity and, in the context of health care, places SGM patients at risk of clinical harm because it leads to clinical assumptions. Agencies and agents in health care need to be equipped with the knowledge and tools needed to cultivate modern attitudes, policies, and practices that enable health equity for SGMs. Adopting small but important changes in the language and terminology used in technical and social health care systems is essential for institutionalizing SGM competency. Modern GSSO information practices depend on and reinforce SGM competency in health care.
APA, Harvard, Vancouver, ISO, and other styles
10

"Implementation of Digital Signature Algorithm using Big Data Sensing Environment." International Journal of Engineering and Advanced Technology 9, no. 2 (December 30, 2019): 4128–31. http://dx.doi.org/10.35940/ijeat.b4959.129219.

Full text
Abstract:
WBAN is a self-governing and perceptive used to informant the activities of a person and to improve the individuality of people, which satisfies the requirements of the user's needs. In this paper, we propose a Big data retrieval unit in WBAN using Elliptical Curve Cryptography. Big data transmit the data through Map reduce and retrieve the data safely using ECCDS algorithm. Map-reduce is a programming method for accessing multiple data sets on multi-node hardware efficiently using a distributed storage process and it incorporate the entire in-between requirements connected via the identical in-among key in . Cloud Sim extensible toolkit is used to enable the modeling and to enhance the application provision.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Sim application toolkit"

1

Edsbäcker, Peter. "SIM cards for cellular networks : An introduction to SIM card application development." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-13989.

Full text
Abstract:
A SIM, Subscriber Identity Module, is the removable circuit board found in a modern cellular phone. It carries the network identity information and is a type of smart card which can also be found on payment cards (EMV), ID cards and so on. A smart card is basically a small computer, providing a safe and controlled execution environment. Historically smart card software was very hardware dependent and mostly developed by the manufacturers themselves. With the introduction of the open Java Card standard created by Sun Microsystems (Oracle) this was meant to change. However, information still remains scattered and is hard to obtain. This paper is meant to serve both as an introduction to the field and also as a good foundation for future studies. It begins with a theoretical discussion about smart card hardware and software architectures, network standards in the context of SIM cards, typical applications, coming trends and technologies and ends off with an overview of the Java Card standard. The following section discusses the supplied example SIM card application coupled with an introduction how to use the Gemalto Developer Suite for application development and testing. The paper ends with an extensive appendix section going in depth about some of the more important subjects.
APA, Harvard, Vancouver, ISO, and other styles
2

Van, der Merwe Pieter Ben. "Mobile commerce over GSM: A banking perspective on security." Diss., 2004. http://hdl.handle.net/2263/26431.

Full text
Abstract:
GSM has changed the face of communication and information exchange, much as the Internet did. With the advances made in the mobile technology arena, new opportunities are created. Mobile Commerce (m-Commerce) is one such opportunity. Each new advance in technology brings with it associated risks. This dissertation focuses on the risks involved with m-Commerce for the banking industry. This dissertation provides a detailed overview of basic services that any m-Commerce application should provide to the banking industry. These principles provide the foundation for securing any financial transaction over untrusted networks. Several mechanisms to provide these services are also discussed. Examples of such mechanisms include hash functions, Message Authentication Codes and Digital Signatures. The security of GSM networks has come under attack in the past. This is largely due to the fact that the GSM consortium opted to develop their security technologies in secret, rather than in the public domain. This dissertation aims to evaluate the security offered by GSM and assess potential attacks in order to further understand risks associated with m-Commerce applications over GSM. In recent years there have been significant additions to the GSM enabling technology family. The arrival of the SIM Application Toolkit and the Wireless Application Protocol promised to again change the face of commerce. Although market acceptance of these technologies proved to be initially slow, usage is set to increase exponentially within the next couple of years. A detailed analysis of these enabling technologies is presented in the dissertation. Possible attacks on these technologies are discussed in the latter part or this document. Based on the findings of the research, some changes to either the application architectures or the processing of the data have been suggested in order to enhance the security offered by these services. It is not the intent of this dissertation to redesign these applications, but to rather leverage off the current technologies in order to enable secure m-Commerce over these channels. This dissertation provides a detailed overview of basic services that any m-Commerce application should provide to the banking industry. These principles provide the foundation for securing any financial transaction over untrusted networks. Several mechanisms to provide these services are also discussed. Examples of such mechanisms include hash functions, Message Authentication Codes and Digital Signatures. The security of GSM networks has come under attack in the past. This is largely due to the fact that the GSM consortium opted to develop their security technologies in secret, rather than in the public domain. This dissertation aims to evaluate the security offered by GSM and assess potential attacks in order to further understand risks associated with m Commerce applications over GSM. In recent years there have been significant additions to the GSM enabling technology family. The arrival of the SIM Application Toolkit and the Wireless Application Protocol promised to again change the face of commerce. Although market acceptance of these technologies proved to be initially slow, usage is set to increase exponentially within the next couple of years. A detailed analysis of these enabling technologies is presented in the dissertation. Possible attacks on these technologies are discussed in the latter part or this document. Based on the findings of the research, some changes to either the application architectures or the processing of the data have been suggested in order to enhance the security offered by these services. It is not the intent of this dissertation to redesign these applications, but to rather leverage off the current technologies in order to enable secure m-Commerce over these channels.
Dissertation (M.Sc (Electronics))--University of Pretoria, 2005.
Electrical, Electronic and Computer Engineering
unrestricted
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Sim application toolkit"

1

Guthery, Scott, and Mary Cronin. Mobile Application Development with SMS and the SIM Toolkit. McGraw-Hill Professional, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mobile Application Development with SMS and the SIM Toolkit. McGraw-Hill Professional, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mobile Application Development Using SMS and the SIM Toolkit. New York: McGraw-Hill, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Sim application toolkit"

1

Waite, Gary, and Keith Mayes. "Application Development Environments for Java and SIM Toolkit." In Smart Cards, Tokens, Security and Applications, 229–55. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-72198-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Waite, Gary, Keith Mayes, and Raja Naeem Akram. "Application Development Environments for Java and SIM Toolkit." In Smart Cards, Tokens, Security and Applications, 253–81. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50500-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Charalabidis, Yannis. "Governmental Service Transformation through Cost Scenarios Simulation." In Handbook of Research on E-Business Standards and Protocols, 791–805. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0146-8.ch036.

Full text
Abstract:
Formal methods for measuring the impact of interoperability on digital public services is emerging as an important research challenge in electronic government. The eGOVSIM model that is described in this chapter aims to provide administrations with a tool to calculate the gains from digitising and making interoperable services for citizens and businesses. The chapter presents existing methods for calculating the cost of services for the administration and the service consumers, such as the Standard Cost Model (SCM) and the Activity Based Costing (ABC). Then it goes on presenting a toolset for analytical cost calculations based on the various process steps and the information needs of each governmental service. The eGOVSIM toolset supports the definition of several service provision scenarios, such as front/back office system interoperability, cross-system or cross-organisational interoperability allowing the calculation of time, effort and cost elements, and relevant gains from the application of each scenario. Application results for two cases / scenarios are also presented, so that the reader can see the applicability and overall value of the approach. Lessons learned and future research directions for service cost estimation are also described.
APA, Harvard, Vancouver, ISO, and other styles
4

Khashchanskiy, Victor I., and Andrei L. Kustov. "Acoustic Data Communication with Mobile Devices." In Mobile Computing, 1135–42. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-054-7.ch094.

Full text
Abstract:
One of the applications of m-commerce is mobile authorization, that is, rights distribution to mobile users by sending authorization data (a token) to the mobile devices. For example, a supermarket can distribute personalized discount coupon tokens to its customers via SMS. The token can be a symbol string that the customers will present while paying for the goods at the cash desk. The example can be elaborated further—using location information from the mobile operator, the coupons can only be sent to, for example, those customers who are in close vicinity of the mall on Saturday (this will of course require customers to allow disclosing their location). In the example above, the token is used through its manual presentation. However, most interesting is the case when the service is released automatically, without a need for a human operator validating the token and releasing a service to the customer; for example, a vending machine at the automatic gas station must work automatically to be commercially viable. To succeed, this approach requires a convenient and uniform way of delivering authorization information to the point of service—it is obvious that an average user will only have enough patience for very simple operations. And this presents a problem. There are basically only three available local (i.e., short-range) wireless interfaces (LWI): WLAN, IR, and Bluetooth, which do not cover the whole range of mobile devices. WLAN has not gained popularity yet, while IR is gradually disappearing. Bluetooth is the most frequently used of them, but still it is not available in all phones. For every particular device it is possible to send a token out using some combination of LWI and presentation technology, but there is no common and easy-to-use combination. This is a threshold for the development of services. Taking a deeper look at the mobile devices, we can find one more non-standard simplex LWI, which is present in all devices—acoustical, where the transmitter is a phone ringer. Token presentation through acoustic interface along with general solution of token delivery via SIM Toolkit technology (see 3GPP TS, 1999) was presented by Khashchanskiy and Kustov (2001). However, mobile operators have not taken SIM Toolkit into any serious use, and the only alternative way of delivering sound tokens into the phone-ringing tone customization technology was not available for a broad range of devices at the time the aforementioned paper was published. Quite unexpectedly, recent development of mobile phone technologies gives a chance for sound tokens to become a better solution for the aforementioned problem, compared with other LWI. Namely, it can be stated that every contemporary mobile device supports either remote customization of ringing tones, or MMS, and in the majority of cases, even both, thus facilitating sound token receiving over the air. Most phone models can playback a received token with only a few button-clicks. Thus, a sound token-based solution meets the set criteria better than any other LWI. Token delivery works the same way for virtually all phones, and token presentation is simple. In this article we study the sound token solution practical implementation in detail. First, we select optimal modulation, encoding, and recognition algorithm, and we estimate data rate. Then we present results of experimental verification.
APA, Harvard, Vancouver, ISO, and other styles
5

Khashchanskiy, V. "Acoustic Data Communication with Mobile Devices." In Encyclopedia of Mobile Computing and Commerce, 15–19. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-002-8.ch003.

Full text
Abstract:
One of the applications of m-commerce is mobile authorization, that is, rights distribution to mobile users by sending authorization data (a token) to the mobile devices. For example, a supermarket can distribute personalized discount coupon tokens to its customers via SMS. The token can be a symbol string that the customers will present while paying for the goods at the cash desk. The example can be elaborated further—using location information from the mobile operator, the coupons can only be sent to, for example, those customers who are in close vicinity of the mall on Saturday (this will of course require customers to allow disclosing their location).In the example above, the token is used through its manual presentation. However, most interesting is the case when the service is released automatically, without a need for a human operator validating the token and releasing a service to the customer; for example, a vending machine at the automatic gas station must work automatically to be commercially viable. To succeed, this approach requires a convenient and uniform way of delivering authorization information to the point of service—it is obvious that an average user will only have enough patience for very simple operations. And this presents a problem. There are basically only three available local (i.e., short-range) wireless interfaces (LWI): WLAN, IR, and Bluetooth, which do not cover the whole range of mobile devices. WLAN has not gained popularity yet, while IR is gradually disappearing. Bluetooth is the most frequently used of them, but still it is not available in all phones. For every particular device it is possible to send a token out using some combination of LWI and presentation technology, but there is no common and easy-to-use combination. This is a threshold for the development of services. Taking a deeper look at the mobile devices, we can find one more non-standard simplex LWI, which is present in all devices—acoustical, where the transmitter is a phone ringer. Token presentation through acoustic interface along with general solution of token delivery via SIM Toolkit technology (see 3GPP TS, 1999) was presented by Khashchanskiy and Kustov (2001). However, mobile operators have not taken SIM Toolkit into any serious use, and the only alternative way of delivering sound tokens into the phone-ringing tone customization technology was not available for a broad range of devices at the time the aforementioned paper was published. Quite unexpectedly, recent development of mobile phone technologies gives a chance for sound tokens to become a better solution for the aforementioned problem, compared with other LWI. Namely, it can be stated that every contemporary mobile device supports either remote customization of ringing tones, or MMS, and in the majority of cases, even both, thus facilitating sound token receiving over the air. Most phone models can playback a received token with only a few button-clicks. Thus, a sound token-based solution meets the set criteria better than any other LWI. Token delivery works the same way for virtually all phones, and token presentation is simple. In this article we study the sound token solution practical implementation in detail. First, we select optimal modulation, encoding, and recognition algorithm, and we estimate data rate. Then we present results of experimental verification.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Sim application toolkit"

1

Jain, Shikha, and Anurag Jain. "SIM Application Toolkit - Protocol Conformance and Implementation Challenges." In 2006 International Conference on Wireless and Mobile Communications (ICWMC'06). IEEE, 2006. http://dx.doi.org/10.1109/icwmc.2006.84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shikha Jain. "SIM Application Toolkit - Protocol Conformance and Implementation Challenges." In 2006 International Conference on Wireless and Mobile Communications. IEEE, 2006. http://dx.doi.org/10.1109/iccgi.2006.84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Madlmayr, Gerald, Oliver Dillinger, Josef Langer, and Christoph Schaffer. "The benefit of using SIM application toolkit in the context of near field communication applications." In International Conference on the Management of Mobile Business (ICMB 2007). IEEE, 2007. http://dx.doi.org/10.1109/icmb.2007.62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ng, Sok Mooi, Biramarta Isnadi, Luong Ann Lee, Syahnaz Omar, Siti Nurshamshinazzatulbalqish Saminal, Wan Hariz Fadli Wan Shafie, and Riaz Khan. "Structural Integrity Management (SIM) via a Digitalized Structural Integrity Compliance System." In ASME 2020 39th International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/omae2020-19064.

Full text
Abstract:
Abstract The objective of this paper is to present the digitalization of Structural Integrity Management for PETRONAS, via a web-based Structural Integrity Compliance System (SICS). Developed initially as a software application to manage the vast database for integrity management of offshore fleet, the system covers the substructure, topside structures, onshore civil and structural assets and ship-shaped floating structure modules. The system is developed in line with API RP 2SIM, taking the SIM process of Data-Evaluation-Strategy-Program. The Data captured in the system inclusive of the design, construction, characteristics, inspection, foundation and metocean data required for evaluation of the likelihood of failure. While the life safety, environmental pollution & business loss data is assigned to evaluate the consequence of failure. After successful implementation of substructure module, the system has been expanded to capture data and evaluate risk of other types of assets, namely the topside structures, onshore civil and structural assets and at last, a module developed for a ship shaped floating structure. A centralized database to manage the integrity a large aging fleet provides good visibility to the management in order to prioritize resources (budget, manpower and logistic) for inspection and maintenance, at the same time reducing the risk of operation disruption due to non-compliance. The system has created much cost saving through Risk-Based Underwater Inspection (RBUI) and risk-based anomalies repair. SICS consists of the risk ranking sub-module and also other decision making tools including Strengthening-Modification and Repair (SMR) Toolkit, and Technical Limits Weight Control (TLWC) Tool. These toolkits are codified to provide quick decision making to management to evaluate the feasibility of SMR scheme or modification involving additional topside weights.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Fan. "WS-SIM: A Toolkit for Modeling and Simulation of Service Composition." In 2nd International Conference on Computer and Information Applications (ICCIA 2012). Paris, France: Atlantis Press, 2012. http://dx.doi.org/10.2991/iccia.2012.69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

She, Wei, I.-Ling Yen, and Bhavani Thuraisingham. "WS-Sim: A Web Service Simulation Toolset with Realistic Data Support." In 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops (COMPSACW). IEEE, 2010. http://dx.doi.org/10.1109/compsacw.2010.29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shi, Yu, Jian Li, and Zhize Li. "Gradient Boosting with Piece-Wise Linear Regression Trees." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/476.

Full text
Abstract:
Gradient Boosted Decision Trees (GBDT) is a very successful ensemble learning algorithm widely used across a variety of applications. Recently, several variants of GBDT training algorithms and implementations have been designed and heavily optimized in some very popular open sourced toolkits including XGBoost, LightGBM and CatBoost. In this paper, we show that both the accuracy and efficiency of GBDT can be further enhanced by using more complex base learners. Specifically, we extend gradient boosting to use piecewise linear regression trees (PL Trees), instead of piecewise constant regression trees, as base learners. We show that PL Trees can accelerate convergence of GBDT and improve the accuracy. We also propose some optimization tricks to substantially reduce the training time of PL Trees, with little sacrifice of accuracy. Moreover, we propose several implementation techniques to speedup our algorithm on modern computer architectures with powerful Single Instruction Multiple Data (SIMD) parallelism. The experimental results show that GBDT with PL Trees can provide very competitive testing accuracy with comparable or less training time.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography