scholarly journals Autodyne – a Multifunctional Element of Devices for the Formation and Processing of Radio Signals

2020 ◽  
Vol 4 (3) ◽  
pp. 293-317
Author(s):  
V. Ya. Noskov ◽  
◽  
R. G. Galeev ◽  
E. V. Bogatyrev ◽  
◽  
...  

The information about the history of invention and the development of autodyne topics related to the use of autodyne in devices for the formation and processing of radio signals is presented. This paper contains brief information about the English inventor of the autodyne H. Round, the inventor of the theremin L.S. Termene and others. The stages of formation and development of the field of autodyne application in transceiver devices are considered. The prospects of this direction of radio engineering associated with the practical use of autodyne in hybrid-integral and monolithic transceiver modules made by using modern CMOS technology are demonstrated. These modules, combined with active antennas, are in demand in last mile communication systems for the needs of the Internet and other services.

2014 ◽  
Vol 1 ◽  
pp. 112-124
Author(s):  
Ashiquddin Mohammad Maruf ◽  
Md Rabiul Islam ◽  
Bulbul Ahamed

With the advent of technology human beings are becoming exclusively dependant on automation and we can see its influence on all spheres of our life. The history of automation began when Babbage invented computer and especially a new horizon was opened before us with the invention of network particularly the Internet and World Wide Web (WWW). Internet has become the backbone of all kinds of communication systems and it is also one of the most important sources of knowledge in the present digitalized world. DOI: http://dx.doi.org/10.3329/nujl.v1i0.18529 Northern University Journal of Law Vol.1 2010: 112-124


Author(s):  
Dan Jerker B. Svantesson

Internet jurisdiction has emerged as one of the greatest and most urgent challenges online, severely affecting areas as diverse as e-commerce, data privacy, law enforcement, content take-downs, cloud computing, e-health, Cyber security, intellectual property, freedom of speech, and Cyberwar. In this innovative book, Professor Svantesson presents a vision for a new approach to Internet jurisdiction––for both private international law and public international law––based on sixteen years of research dedicated specifically to the topic. The book demonstrates that our current paradigm remains attached to a territorial thinking that is out of sync with our modern world, especially, but not only, online. Having made the claim that our adherence to the territoriality principle is based more on habit than on any clear and universally accepted legal principles, Professor Svantesson advances a new jurisprudential framework for how we approach jurisdiction. He also proposes several other reform initiatives such as the concept of ‘investigative jurisdiction’ and an approach to geo-blocking, aimed at equipping us to solve the Internet jurisdiction puzzle. In addition, the book provides a history of Internet jurisdiction, and challenges our traditional categorisation of different types of jurisdiction. It places Internet jurisdiction in a broader context and outlines methods for how properly to understand and work with rules of Internet jurisdiction. While Solving the Internet Puzzle paints a clear picture of the concerns involved and the problems that needs to be overcome, this book is distinctly aimed at finding practical solutions anchored in a solid theoretical framework.


Cryptography ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 14
Author(s):  
Xavier Boyen ◽  
Udyani Herath ◽  
Matthew McKague ◽  
Douglas Stebila

The conventional public key infrastructure (PKI) model, which powers most of the Internet, suffers from an excess of trust into certificate authorities (CAs), compounded by a lack of transparency which makes it vulnerable to hard-to-detect targeted stealth impersonation attacks. Existing approaches to make certificate issuance more transparent, including ones based on blockchains, are still somewhat centralized. We present decentralized PKI transparency (DPKIT): a decentralized client-based approach to enforcing transparency in certificate issuance and revocation while eliminating single points of failure. DPKIT efficiently leverages an existing blockchain to realize an append-only, distributed associative array, which allows anyone (or their browser) to audit and update the history of all publicly issued certificates and revocations for any domain. Our technical contributions include definitions for append-only associative ledgers, a security model for certificate transparency, and a formal analysis of our DPKIT construction with respect to the same. Intended as a client-side browser extension, DPKIT will be effective at fraud detection and prosecution, even under fledgling user adoption, and with better coverage and privacy than federated observatories, such as Google’s or the Electronic Frontier Foundation’s.


2003 ◽  
Vol 28 (1) ◽  
pp. 10-14 ◽  
Author(s):  
Christian David ◽  
Catherine Granger ◽  
Nicole Picot

The French national museum libraries service comprises 21 libraries specialising in the history of western art and archaeology. The central library, which is at the head of the network, was automated first and has completed its retrospective conversion. At first this library catalogued the material acquired for all the others; then a number of them were able in their turn to computerise and thus contribute directly to the union catalogue of the national museum libraries. This can now be consulted on the internet site of the Ministry of Culture.


2016 ◽  
Vol 39 (3) ◽  
pp. 341-356 ◽  
Author(s):  
Olivia Rose Marcus ◽  
Merrill Singer

In this article, the authors provide a layered analysis of Ebola-chan, a visual cultural artifact of the 2014–2015 Ebola outbreak. Rather than considering her as a two-dimensional anime character (i.e. as a simple iconic coping mechanism and/or a fear response), this recent Internet meme is analyzed using an integrated semiotic and structural approach that involves discussion of the genesis of disaster humor in light of the changing world of the Internet, the history of anthropomorphism of disease, and the biosocial nature of an infectious disease epidemic. Our analysis is designed to advance both the anthropology of the Internet and the anthropology of infectious disease. As a multi-vocal symbol with different meanings for different audiences, Ebola-chan represents a social response to a lethal epidemic in the digital age.


Author(s):  
Dave Headlam

The information age has pushed music performance into the era of music informance, in which information and performance are combined in an integrated way. The types of presentation formats and analytical information found in public music theory are ideal for music informance, and present-day explorations of informance on the Internet have a history of noted musical informants including Leonard Bernstein and Glenn Gould. In order to continue to be relevant and to thrive in our connected world, live and recorded music scenarios need to develop ever more innovative ways to enhance music performance with information effectively presented in music informance.


2014 ◽  
Vol 55 (4) ◽  
pp. 1034-1035
Author(s):  
Jonathan Coopersmith
Keyword(s):  

2008 ◽  
Vol 2 (2) ◽  
Author(s):  
Alan Sondheim

The Internet Text is an extended analysis of the environment of Internet communication, an extended meditation on the psychology and philosophy of Net exchange. As such, it is concerned primarily with virtual or electronic subjectivity – the simultaneous presence and absence of the user, the sorts of libidinal projections that result, the nature of flamewars, and the ontological or epistemological issues that underlie these processes. Internet Text begins with a brief, almost corrosive, account of the subject – an account based on the concepts of Address, Protocol, and Recognition. This section “reduces” virtual subjectivity to packets of information, Internet sputterings, and an ontology of the self based on Otherness – your recognition of me is responsible for my Net-presence. The reduction then begins to break down through a series of further texts detailing the nature of this presence; a nature which is both sexualized/gendered, and absenting, the result of an imaginary site. Eventually, it has become clear that everything revolves around issues of the virtual subject, who is only virtual on the Net, but who has a very real body elsewhere. So Internet Text has evolved more and more in a meditation on this subject – a subject which will perhaps be one of the dominant modes of being within the next millennium. Finally, it should be noted that there are no conclusions to be drawn in Internet Text, no series of protocol statements or declarations creating any sort of ultimate defining or explanatory position. The entire history of philosophy mitigates against this; instead, I side with the Schlegels, with Nietzsche, Bataille, Jabes, and others, for whom the fragment is crucial to an understanding of contemporary life... It is dedicated to Michael Current and Clara Hielo.


Author(s):  
AnasGhassan Kanaan ◽  
Shahizan Bin Hassan

This paper presents a study which examines several e-government success factors in Jordan. Due to the pace of globalization and rapid global growth of technology and the Internet information, many governments around the world have turned their services from traditional services into e-government services. Were the citizens, business organizations and other stakeholders are served via the internet. Jordan is one of the rare countries in the Middle East with a history of commitment to good governance and ICT-related initiatives. In recent years, Jordan’s efforts to provide e-government services to the public have been recognized. But still Jordan faces the problem of low usage levels of these electronic services, plus several scholars addressed that several studies were conducted from citizen perspective but few for businesses perspective. For a better understanding of e-government and its influence on the society as all and on the business society in particular the researchers carried out this study to identify the success factors which affect e-government adoption in Jordan, also to investigate the factors that determine business organization satisfaction towards e-government in Jordan. In this paper the researcher will discuss four factors that affect the success of e-government services from businesses perspective in Jordan as followed: e-service quality, perceived usefulness, trust, personalization.


2020 ◽  
Vol 8 (6) ◽  
pp. 5643-5646

Since last decade, the exponential growth of the internet users and the size of data over the internet is increasing day by day, which lead to increase the complexity of the systems by implementing policies and security to avoid attacks on systems and networks. It is very important to understand and analyses the real time data traffic of the communication systems. The purpose of this paper to design a customized Java based application which enables analysts to capture the traffic at the bottleneck under the mean field communication environment where a large number of devices are communicating with each other. The sending data for further processing for analysis the trend to overcome vulnerabilities or to manage the effectiveness of the communication systems. The proposed application enables to capture 8 different types of protocol traffic such as HTTP, HTTPS, SMTP, UDP, TCP, ICMP and POP3. The application allows for analysis of the incoming/outgoing traffic in the visual to understand the nature of communication networks which lead to improve the performance of the networks with respect to hardware, software, data storage, security and reliability.


Sign in / Sign up

Export Citation Format

Share Document