Academic literature on the topic 'Wide area networks (Computer networks) Electronic data processing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wide area networks (Computer networks) Electronic data processing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Wide area networks (Computer networks) Electronic data processing"

1

Imran, Zeba Ghaffar, Abdullah Alshahrani, Muhammad Fayaz, Ahmed Mohammed Alghamdi, and Jeonghwan Gwak. "A Topical Review on Machine Learning, Software Defined Networking, Internet of Things Applications: Research Limitations and Challenges." Electronics 10, no. 8 (2021): 880. http://dx.doi.org/10.3390/electronics10080880.

Full text
Abstract:
In recent years, rapid development has been made to the Internet of Things communication technologies, infrastructure, and physical resources management. These developments and research trends address challenges such as heterogeneous communication, quality of service requirements, unpredictable network conditions, and a massive influx of data. One major contribution to the research world is in the form of software-defined networking applications, which aim to deploy rule-based management to control and add intelligence to the network using high-level policies to have integral control of the ne
APA, Harvard, Vancouver, ISO, and other styles
2

Amin, B. M. Ruhul, M. J. Hossain, Adnan Anwar, and Shafquat Zaman. "Cyber Attacks and Faults Discrimination in Intelligent Electronic Device-Based Energy Management Systems." Electronics 10, no. 6 (2021): 650. http://dx.doi.org/10.3390/electronics10060650.

Full text
Abstract:
Intelligent electronic devices (IEDs) along with advanced information and communication technology (ICT)-based networks are emerging in the legacy power grid to obtain real-time system states and provide the energy management system (EMS) with wide-area monitoring and advanced control capabilities. Cyber attackers can inject malicious data into the EMS to mislead the state estimation process and disrupt operations or initiate blackouts. A machine learning algorithm (MLA)-based approach is presented in this paper to detect false data injection attacks (FDIAs) in an IED-based EMS. In addition, s
APA, Harvard, Vancouver, ISO, and other styles
3

Raju, V. Vijaya Rama, K. H. Phani Shree, and S. V. Jayarama Kumar. "Voltage instability identification with modified L-index using synchrophasor data." Indonesian Journal of Electrical Engineering and Computer Science 23, no. 3 (2021): 1340. http://dx.doi.org/10.11591/ijeecs.v23.i3.pp1340-1349.

Full text
Abstract:
<p>In the prevailing open-access environment, one of the limitations for power exchanges has been voltage stability. The study of voltage stability necessitates a complete network representation. In this paper, the advantage of the dynamic behavior of generators is considered by incorporating dynamic models for generators. It has been shown dynamic models resulted in more accurate results compared to the conventional PV buses or ideal voltage source models that are used in most of the voltage stability studies. Moreover, the traditional L-index is augmented by incorporating real-time and
APA, Harvard, Vancouver, ISO, and other styles
4

Molina-Cabrera, Alexander, Mario A. Ríos, Yvon Besanger, Nouredine Hadjsaid, and Oscar Danilo Montoya. "Latencies in Power Systems: A Database-Based Time-Delay Compensation for Memory Controllers." Electronics 10, no. 2 (2021): 208. http://dx.doi.org/10.3390/electronics10020208.

Full text
Abstract:
Time-delay is inherent to communications schemes in power systems, and in a closed loop strategy the presence of latencies increases inter-area oscillations and security problems in tie-lines. Recently, Wide Area Measurement Systems (WAMS) have been introduced to improve observability and overcome slow-rate communications from traditional Supervisory Control and Data Acquisition (SCADA). However, there is a need for tackling time-delays in control strategies based in WAMS. For this purpose, this paper proposes an Enhanced Time Delay Compensator (ETDC) approach which manages varying time delays
APA, Harvard, Vancouver, ISO, and other styles
5

Cho, Choongsang, Young Han Lee, Jongyoul Park, and Sangkeun Lee. "A Self-Spatial Adaptive Weighting Based U-Net for Image Segmentation." Electronics 10, no. 3 (2021): 348. http://dx.doi.org/10.3390/electronics10030348.

Full text
Abstract:
Semantic image segmentation has a wide range of applications. When it comes to medical image segmentation, its accuracy is even more important than those of other areas because the performance gives useful information directly applicable to disease diagnosis, surgical planning, and history monitoring. The state-of-the-art models in medical image segmentation are variants of encoder-decoder architecture, which is called U-Net. To effectively reflect the spatial features in feature maps in encoder-decoder architecture, we propose a spatially adaptive weighting scheme for medical image segmentati
APA, Harvard, Vancouver, ISO, and other styles
6

Cai, Chen, Xuqiang Zheng, Yong Chen, et al. "A 1.55-to-32-Gb/s Four-Lane Transmitter with 3-Tap Feed Forward Equalizer and Shared PLL in 28-nm CMOS." Electronics 10, no. 16 (2021): 1873. http://dx.doi.org/10.3390/electronics10161873.

Full text
Abstract:
This paper presents a fully integrated physical layer (PHY) transmitter (TX) suiting for multiple industrial protocols and compatible with different protocol versions. Targeting a wide operating range, the LC-based phase-locked loop (PLL) with a dual voltage-controlled oscillator (VCO) was integrated to provide the low jitter clock. Each lane with a configurable serialization scheme was adapted to adjust the data rate flexibly. To achieve high-speed data transmission, several bandwidth-extended techniques were introduced, and an optimized output driver with a 3-tap feed-forward equalizer (FFE)
APA, Harvard, Vancouver, ISO, and other styles
7

Gaitan, Nicoleta Cristina. "A Long-Distance Communication Architecture for Medical Devices Based on LoRaWAN Protocol." Electronics 10, no. 8 (2021): 940. http://dx.doi.org/10.3390/electronics10080940.

Full text
Abstract:
Recent market studies show that the market for remote monitoring devices of different medical parameters will grow exponentially. Globally, more than 4 million individuals will be monitored remotely from the perspective of different health parameters by 2023. Of particular importance is the way of remote transmission of the information acquired from the medical sensors. At this time, there are several methods such as Bluetooth, WI-FI, or other wireless communication interfaces. Recently, the communication based on LoRa (Long Range) technology has had an explosive development that allows the tr
APA, Harvard, Vancouver, ISO, and other styles
8

Papastefanopoulos, Vasilis, Pantelis Linardatos, and Sotiris Kotsiantis. "Unsupervised Outlier Detection: A Meta-Learning Algorithm Based on Feature Selection." Electronics 10, no. 18 (2021): 2236. http://dx.doi.org/10.3390/electronics10182236.

Full text
Abstract:
Outlier detection refers to the problem of the identification and, where appropriate, the elimination of anomalous observations from data. Such anomalous observations can emerge due to a variety of reasons, including human or mechanical errors, fraudulent behaviour as well as environmental or systematic changes, occurring either naturally or purposefully. The accurate and timely detection of deviant observations allows for the early identification of potentially extensive problems, such as fraud or system failures, before they escalate. Several unsupervised outlier detection methods have been
APA, Harvard, Vancouver, ISO, and other styles
9

Hyeon Kim, Ki, Dongkyun Kim, Yong Hwan Kim, and Joobum Kim. "Performance measurement using dpdk in software-defined local and wide area networks." International Journal of Engineering & Technology 7, no. 2.12 (2018): 119. http://dx.doi.org/10.14419/ijet.v7i2.12.11105.

Full text
Abstract:
Background/Objectives: For data center-based enterprises, the use of data traffic continues to increase. As a result, the increasingly efficient processing of increasing data traffic is becoming a major issue. Effective processing of traffic can be performed through the addition of physical network equipment, but this requires considerable costs.Methods/Statistical analysis: To solve this problem, researches on server virtualization and network virtualization technology are being actively conducted. However, while network virtualization is a cost-effective solution, open-source virtual switche
APA, Harvard, Vancouver, ISO, and other styles
10

Mekruksavanich, Sakorn, and Anuchit Jitpattanakul. "Biometric User Identification Based on Human Activity Recognition Using Wearable Sensors: An Experiment Using Deep Learning Models." Electronics 10, no. 3 (2021): 308. http://dx.doi.org/10.3390/electronics10030308.

Full text
Abstract:
Currently, a significant amount of interest is focused on research in the field of Human Activity Recognition (HAR) as a result of the wide variety of its practical uses in real-world applications, such as biometric user identification, health monitoring of the elderly, and surveillance by authorities. The widespread use of wearable sensor devices and the Internet of Things (IoT) has led the topic of HAR to become a significant subject in areas of mobile and ubiquitous computing. In recent years, the most widely-used inference and problem-solving approach in the HAR system has been deep learni
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Wide area networks (Computer networks) Electronic data processing"

1

Rabinovich, Michael. "Efficient replication management in distributed systems /." Thesis, Connect to this title online; UW restricted, 1994. http://hdl.handle.net/1773/6905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ruan, Jianhua, Han-Shen Yuh, and Koping Wang. "Spider III: A multi-agent-based distributed computing system." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2249.

Full text
Abstract:
The project, Spider III, presents architecture and protocol of a multi-agent-based internet distributed computing system, which provides a convenient development and execution environment for transparent task distribution, load balancing, and fault tolerance. Spider is an on going distribution computing project in the Department of Computer Science, California State University San Bernardino. It was first proposed as an object-oriented distributed system by Han-Sheng Yuh in his master's thesis in 1997. It has been further developed by Koping Wang in his master's project, of where he made large
APA, Harvard, Vancouver, ISO, and other styles
3

Deeds, John J. "A model for end-to-end delay in distributed computer systems." Thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-09052009-040608/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Munishwar, Vikram P. "Storage and indexing issues in sensor networks." Diss., Online access via UMI:, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Gong. "Data and application migration in cloud based data centers --architectures and techniques." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41078.

Full text
Abstract:
Computing and communication have continued to impact on the way we run business, the way we learn, and the way we live. The rapid technology evolution of computing has also expedited the growth of digital data, the workload of services, and the complexity of applications. Today, the cost of managing storage hardware ranges from two to ten times the acquisition cost of the storage hardware. We see an increasing demand on technologies for transferring management burden from humans to software. Data migration and application migration are one of popular technologies that enable computing and data
APA, Harvard, Vancouver, ISO, and other styles
6

Teesri, Sumuscha. "Implementation business-to-business electronic commerce website using active server pages." CSUSB ScholarWorks, 2000. https://scholarworks.lib.csusb.edu/etd-project/3023.

Full text
Abstract:
E-commerce is the current approach for doing any type of business online, which uses the superior power of digital information to understand the requirements and preferences of each client and each partner, to adapt products and services for them, and then to distribute the products and services as swiftly as possible.
APA, Harvard, Vancouver, ISO, and other styles
7

Chung, Edward Chi-Fai. "Quality of service analysis for distributed multimedia systems in a local area networking environment." Ohio : Ohio University, 1996. http://www.ohiolink.edu/etd/view.cgi?ohiou1174610545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciar
APA, Harvard, Vancouver, ISO, and other styles
9

Gao, Lei. "SAR: semantic-aware replication." Thesis, 2005. http://hdl.handle.net/2152/2426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"The use of the optimal wide-area network redundancy in decision making." Thesis, 2014. http://hdl.handle.net/10210/9016.

Full text
Abstract:
M.B.A.<br>Electronic Data Systems (EDS) Africa is part of EDS International, one of the largest outsourcing companies in the world. EDS's clients expect EDS to have the required knowledge and decision-making skills to ensure that their Wide area NETWORK (WAN) redundancy is in line with the business requirement. This is a careful balance between spending money on redundancy compared with the cost of WAN downtime to the business. This implies that EDS's management must realise when the WAN design is not optimal. A decision must then be made to change the design to incorporate the correct redunda
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Wide area networks (Computer networks) Electronic data processing"

1

Songru, Lin, ed. Dian nao wang lu gai lun yu shi wu. 4th ed. Qi feng zi xun gu fen you xian gong si, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vachon, Bob. Accessing the WAN: CCNA exploration companion guide. Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vachon, Bob. Accessing the WAN: CCNA exploration companion guide. Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vachon, Bob. Accessing the WAN: CCNA exploration companion guide. Cisco Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Coe, Jeffrey. CCNA routing and switching exam cram. Coriolis Group Books, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Enterprise-wide networking. Sams, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jepsen, Thomas C. Distributed Storage Networks. John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Eric, Quinn, ed. CCNP BCRAN exam cram. Coriolis Group Books, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Madron, Thomas William. Enterprise-wide computing: How to implement and manage LANs. Wiley, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

James, Martin. Enterprise networking: Data link subnetworks. Prentice Hall PTR, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Wide area networks (Computer networks) Electronic data processing"

1

M, Santhiya, Siva Rathnam M, Radha Krishnan T, and Nishanth S. "Smart Forest Fire Identification and Notification System Using Iot Based Wireless Sensor Networks." In Intelligent Systems and Computer Technology. IOS Press, 2020. http://dx.doi.org/10.3233/apc200203.

Full text
Abstract:
Wildlife and wildlife authorities face the problem of animal migration from woodland to residential areas in the present environment. Natural calamities triggered by nature, wind and dry undergrowth will destroy acres of land and consume everything in their way that causes significant harm to both natural and human capital. The proposed system to design an IoT-based system that will be able to detect the fire as soon as possible before the fire spreads over the wide area and prevent poaching. Raspberry interfacing with a temperature sensor, a smoke sensor, webcam and a buzzer. GSM gateway is used to conduct this project to provide the user with the final SMS via given number in simulation program. The temperature sensor used to indicate high and low temperatures, the PIR sensor designed to track human activity on the LCD display, the flame sensor used to signify the intensity of flames and the forest fire observed on the LCD display. Once large, image processing is used to determine the accuracy of the fire rate. Wireless Sensor Network (WSN) for data processing to be used as input data in our control system. WSN comprising of temperature sensor system and GPS module to sense forest fire by measuring the level and sending its position to the server utilizing GSM communication contact and GPS functionality. Raspberry Pi cluster, a complicated computation is broken into multiple parts using MPI, and each component runs on separate raspberry pi device. Such sections will be analysed in sequence and then MPI must merge the output and turn it over to the user, essentially they operate as individual units (but in tandem and together) to produce very quick results.
APA, Harvard, Vancouver, ISO, and other styles
2

Bussler, Christoph. "Business-to-Business (B2B) Integration." In Handbook of Research on Innovations in Database Technologies and Applications. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-242-8.ch087.

Full text
Abstract:
Businesses world-wide started exchanging electronic business messages with each other around 1970. This coincides with the emergence of wide-area computer networks. Immediately businesses realized the potential in sending electronic messages instead of paper letters in order to conduct business electronically with each other. Computer networks provided a significant increase of transmission speed, less failures due to message loss and direct processing of messages upon receipt without error prone manual transcripts from paper to computer terminals or vice versa. Overall, business interactions became a lot more reliable and efficient.
APA, Harvard, Vancouver, ISO, and other styles
3

Grahn, Kaj, Göran Pulkkis, Jonny Karlsson, and Dai Tran. "Security Architectures of Mobile Computing." In Mobile Computing. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-054-7.ch202.

Full text
Abstract:
Mobile Internet users expect the same network service quality as over a wire. Technologies, protocols, and standards supporting wired and wireless Internet are converging. Mobile devices are resource constrained due to size, power, and memory. The portability making these devices attractive also causes data exposure and network penetration risks. Mobile devices can connect to many different wireless network types, such as cellular networks, personal area networks, wireless local area networks (WLANs), metropolitan area networks (MANs), and wide area networks (satellite-based WANs). Wireless network application examples are e-mailing, Web browsing, m-commerce, electronic payments, synchronization with a desktop computer, network monitoring/management, and reception of video/audio streams.
APA, Harvard, Vancouver, ISO, and other styles
4

Grahn, K. "Security Architectures of Mobile Computing." In Encyclopedia of Mobile Computing and Commerce. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-002-8.ch142.

Full text
Abstract:
Mobile Internet users expect the same network service quality as over a wire. Technologies, protocols, and standards supporting wired and wireless Internet are converging. Mobile devices are resource constrained due to size, power, and memory. The portability making these devices attractive also causes data exposure and network penetration risks. Mobile devices can connect to many different wireless network types, such as cellular networks, personal area networks, wireless local area networks (WLANs), metropolitan area networks (MANs), and wide area networks (satellite-based WANs). Wireless network application examples are e-mailing, Web browsing, m-commerce, electronic payments, synchronization with a desktop computer, network monitoring/management, and reception of video/audio streams.
APA, Harvard, Vancouver, ISO, and other styles
5

A., Reyana, Krishnaprasath V. T., and Preethi J. "A Novel Framework on Biomedical Image Analysis Based on Shape and Texture Classification for Complex Disease Diagnosis." In Deep Neural Networks for Multimodal Imaging and Biomedical Applications. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-3591-2.ch008.

Full text
Abstract:
The wide acceptance of applying computer technology in medical imaging system for manipulation, display, and analysis contribute better improvement in achieving diagnostic confidence and accuracy on predicting diseases. Therefore, the need for biomedical image analysis to diagnose a particular type of disease or disorder by combining diverse images of human organs is a major challenge in most of the biomedical application systems. This chapter contributes an overview on the nature of biomedical images in electronic form facilitating computer processing and analysis of data. This describes the different types of images in the context of information gathering, screening, diagnosis, monitor, therapy, and control and evaluation. The characterization and digitization of the image content is important in the analysis and design of image transmission.
APA, Harvard, Vancouver, ISO, and other styles
6

Bussler, Christoph. "Business-to-Business Integration." In Encyclopedia of Database Technologies and Applications. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-560-3.ch010.

Full text
Abstract:
Businesses worldwide started exchanging electronic business messages with each other around 1970. This coincides with the establishment of wide-area computer networks. Businesses realized the potential immediately to send electronic messages instead of paper letters in order to conduct business electronically. Computer networks provided a significant increase of transmission speed, less failures due to message losses, and direct processing of messages upon receipt without manual transcript from paper to computer terminals or vice versa. Overall, business interactions became a lot more reliable and efficient.
APA, Harvard, Vancouver, ISO, and other styles
7

Al-Hamdani, Wasim A. "E-Mail, Web Service and Cryptography." In Applied Cryptography for Cyber Security and Defense. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch003.

Full text
Abstract:
Cryptography is the study and practice of protecting information and has been used since ancient times in many different shapes and forms to protect messages from being intercepted. However, since 1976, when data encryption was selected as an official Federal Information Processing Standard (FIPS) for the United States, cryptography has gained large attention and a great amount of application and use. Furthermore, cryptography started to be part of protected public communication when e-mail became commonly used by the public. There are many electronic services. Some are based on web interaction and others are used as independent servers, called e-mail hosting services, which is an Internet hosting service that runs e-mail servers. Encrypting e-mail messages as they traverse the Internet is not the only reason to understand or use various cryptographic methods. Every time one checks his/her e-mail, the password is being sent over the wire. Many Internet service providers or corporate environments use no encryption on their mail servers and the passwords used to check mail are submitted to the network in clear text (with no encryption). When a password is put into clear text on a wire, it can easily be intercepted. Encrypting email will keep all but the most dedicated hackers from intercepting and reading a private communications. Using a personal email certificate one can digitally sign an email so that recipients can verify that it’s really from the sender as well as encrypt the messages so that only the intended recipients can view it. Web service is defined as “a software system designed to support interoperable machine-to-machine interaction over a network” and e-mail is “communicate electronically on the computer”. This chapter focus on introduce three topics: E-mail structure and organization, web service types, their organization and cryptography algorithms which integrated in the E-mail and web services to provide high level of security. The main issue in this article is to build the general foundation through Definitions, history, cryptography algorithms symmetric and asymmetric, hash algorithms, digital signature, suite B and general principle to introduce the use of cryptography in the E-mailand web service
APA, Harvard, Vancouver, ISO, and other styles
8

O’Hagan, Minako. "Teletranslation." In Encyclopedia of Multimedia Technology and Networking, Second Edition. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch186.

Full text
Abstract:
Translation as a form of language mediation is called upon to convert the source text written in one natural language into the target text in another, to assimilate or disseminate information across language barriers. Prior to the ubiquitous availability of the Internet, translators worked without the benefit of fast and affordable online access to up-to-date information in a wide variety of languages or to fellow translators in different geographical locations to share knowledge. Translation texts were largely in printed form and their circulation was dependent on physical delivery systems. In response to the widespread use of information and communication technology (ICT) leading to the advent of the Internet, the concept of teletranslation was first proposed (O’Hagan, 1996) to demarcate an emerging translation paradigm based on electronic networks of global communication rather than one where physical transportation was the main means for moving texts. It represented the new modus operandi where translators, which may include machine translation (MT), and customers are electronically linked with online access to translation tools and to other translators for knowledge sharing. It presupposes the translation text to be in electronic form and thus able to be seamlessly transmitted, stored, and processed by electronic means. Today, teletranslation has been embodied in Web-based platforms on the Internet, allowing the translator not only to receive and transmit translation text, but also to procure translation jobs, conduct research as well as collaborate in teams. Furthermore, an increasing array of computer applications has made computeraided translation (CAT) commonplace (Quah, 2006) where technology is indispensable for the production of translation. On the basis of the infrastructure supported by ICT networks as well as the prevailing use of CAT, teletranslation continues to develop as the predominant paradigm in the translation industry. The term translation embraces different modes of language mediation. According to the strict use of the terminology, however, “translating” refers to the act of mediating communication in written form, which typically takes place asynchronously whereas “interpreting” facilitates oral communication in synchronous mode as in conference interpreting. So far, the impact of ICT has been far more prominent in translation than in interpretation where text-processing tools play a limited role in oral communication and face-to-face mode prevails with little dependence on electronic means, with a few exceptions of remote interpreting modes. These language mediation modes serve to facilitate a given communicative situation where the sender and the receiver of the message do not share a common language, therefore requiring the source language to be converted into the target language in a required form. The language mediator plays the unique role of simultaneously being the receiver of the source text and the sender of the target text where translating or interpreting forms an act of communication embedded in another act of communication (Hatim &amp; Mason, 1997, pp. 1–2). This fundamental role played by the language mediator remains the same in teletranslation. This article provides the background to the emergence of teletranslation, its current status, and future prospects with reference to relevant research and developments in related fields.
APA, Harvard, Vancouver, ISO, and other styles
9

Chochliouros, Ioannis, Anastasia S. Spiliopoulou, and Stergios P. Chochliouros. "Digital Video Broadcasting (DVB) Evolution." In Encyclopedia of Multimedia Technology and Networking, Second Edition. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch053.

Full text
Abstract:
Achieving widespread access by all European citizens to new services and advanced applications of the information society is one of the crucial goals of the European Union’s (EU) strategic framework for the future. Towards realizing this primary target, multiple access platforms are expected to become available, using different access methods for delivery of services (and of related digital content) to a wide variety of end-user terminals, thus creating an “always-on” and properly “converged” technological and business environment, all able to support and to promote innovation and growth (Commission of the European Communities, 2005). The result will be a “complementarity” of services and markets in an increasingly sophisticated way. Economic and technology choices imply certain networks for certain service options. As these networks become more powerful, the temptation is to adapt certain characteristics of the network technology to make it suitable for modern services. The challenge is to build “bridges” or “links” between the different convergent technologies without undermining the business models on which they are built. In such a context, converging technology means that innovative systems and services are under development with inputs, contributions, and traditions from multiple industries, including telecommunications, broadcasting, Internet service provision, computer and software industries, and media and publishing industries, where the significance of standardization and interoperability can be fundamental. In any case, digital technology can offer the potential for realizing the future electronic information highways or integrated broadband communications. However, for the multiplatform environment to proliferate in liberalized markets and for the platforms themselves to complement each other, the related prerequisites and the governing regulatory environment must favor technologically neutral conditions for competition, without giving preference to one platform over others (Chochliouros &amp; Spiliopoulou, 2005a). Among the latest European priorities for further development of the information society sector as described above were several efforts for extending the role of digital television based on a multiplatform approach (European Commission, 2002a). If widely implemented, digital (interactive) television may complement existing PC- and Internet-based access, thus offering a potential alternative for market evolution (Chochliouros, Spiliopoulou, Chochliouros, &amp; Kaloxylos, 2006). In particular, following current market trends, digital television and third generation (3G) mobile systems driven by commonly adopted standards can open up significant possibilities for a variety of platform access to services, offering great features of substitution and complementarity. The same option holds for the supporting networks as well (European Commission, 2003a). Within the above fast developing and fully evolutionary context, the thematic objective of digital video broadcasting (DVB) applications (including both the underlying network infrastructures and corresponding services offered) can influence a great variety of areas (http://www.dvb.org). In particular, DVB stands as a suite of internationally accepted open standards, mainly related to digital television- and data-oriented applications. These standards (in most cases already tested and adopted in the global marketplace) are maintained by the so-called DVB Project, an industry-driven consortium with more than 300 distinct members, and they are officially published by a joint technical committee (JTC) of the European Telecommunications Standards Institute (ETSI), the European Committee for Electrotechnical Standardization (CENELEC), and the European Broadcasting Union (EBU). The existing DVB standards cover all aspects of digital television, that is, from transmission through interfacing, conditional access, and interactivity for digital video, audio, and data. In particular, DVB not only includes the transmission and distribution of television program material in digital format over various media, but also a choice of associated features (considered for exploiting capabilities of all underlying technologies). However, market benefits can be best achieved if a “harmonized” approach, based on a longterm perspective, is adopted since the beginning of all corresponding efforts, intending to facilitate a progressive development towards new (and more advanced) services in a smooth and compatible manner (Oxera, 2003). An essential precondition for this progress is the adoption, in the market sector, of common standards which, while providing necessary clarity for both producers and consumers in the short term for early introduction of digital television facilities, also supply the potential for subsequent smooth upgrading to new and higher grades of service. Thus, in the framework of competitive and liberalized environments DVB can support major efforts for the penetration (and the effective adoption) of enhanced multimedia-based services (Fenger &amp; Elwood-Smith, 2000) independently of the type and/or format of the content offered while simultaneously promoting broadband opportunities. Furthermore, being fully conformant to the requirements imposed by convergence’s aspect, DVB can advance optimized solutions for different technical communications platforms. The European market has been widely developed in the area of (interactive) digital television (Chochliouros et al., 2006; European Commission, 2003b) and the EU is now leading further deployment through DVB procedures. The focus provided by a common set of technical standards and specifications has given a market advantage and spurred the appearance of innovation perspectives. Baseband: 1) In radio communications systems, the range of frequencies, starting at 0 Hz (DC) and extending up to an upper frequency as required to carry information in electronic form, such as a bitstream, before it is modulated onto a carrier in transmission or after it is demodulated from a carrier in reception. 2) In cable communications, such as those of a local area network (LAN), a method whereby signals are transmitted without prior frequency conversion.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Wide area networks (Computer networks) Electronic data processing"

1

Chung, Joaquin, Mainak Adhikari, Satish Narayana Srirama, Eun-Sung Jung, and Rajkumar Kettimuthu. "Resource Management for Processing Wide Area Data Streams on Supercomputers." In 2020 29th International Conference on Computer Communications and Networks (ICCCN). IEEE, 2020. http://dx.doi.org/10.1109/icccn49398.2020.9209669.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vasar, Cristian, Octavian Prostean, Ioan Filip, Iosif Szeidert, and Andreea Robu. "Using data aggregation to prolong the lifetime of wide-area wireless sensor networks." In 2008 International Conference on Intelligent Computer Communication and Processing. IEEE, 2008. http://dx.doi.org/10.1109/iccp.2008.4648379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!