Academic literature on the topic 'Communication Networks and Services not elsewhere classified'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Communication Networks and Services not elsewhere classified.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Communication Networks and Services not elsewhere classified"

1

Lee, Chongdeuk. "Self-Detecting Traffic Interference Control for Multi-Zone Services under 5G-Based Cellular Networks." Sensors 21, no. 7 (March 31, 2021): 2409. http://dx.doi.org/10.3390/s21072409.

Full text
Abstract:
In this paper, we propose a multi-zone service control scheme to maximize the performance of each service zone when a large number of cellular service zones and Device-to-Device (D2D) service zones are composed into the 5G cellular network. This paper also improves performance of service zone by dividing traffic into real-time traffic and non-real-time traffic in order to minimize traffic interference. Real-time traffic and non-real-time traffic have a significant impact on communication performance. We propose a new self-detection traffic interference control technique to improve the Quality of Service (QoS) and throughput of D2D and Cellular-to-Device (C2D) communication in a cellular network, Self-detecting Traffic Interference Control Scheme (STICS). The proposed STICS mechanism distinguishes between short-term traffic congestion process and long-term traffic congestion process according to traffic characteristics to detect and control traffic. When the proposed scheme is applied to the 5G-based cellular network environment, it is expected that the traffic type will be efficiently classified by self-detecting the traffic according to the flow. Such classified traffic is less sensitive to communication between the D2D and C2D links, thereby reducing traffic overload. We evaluate the performance of the proposed scheme through simulation and show that the proposed scheme is more efficient than other comparison schemes.
APA, Harvard, Vancouver, ISO, and other styles
2

Pazhani.A, Azhagu Jaisudhan, P. Gunasekaran, Vimal Shanmuganathan, Sangsoon Lim, Kaliappan Madasamy, Rajesh Manoharan, and Amit Verma. "Peer–Peer Communication Using Novel Slice Handover Algorithm for 5G Wireless Networks." Journal of Sensor and Actuator Networks 11, no. 4 (November 29, 2022): 82. http://dx.doi.org/10.3390/jsan11040082.

Full text
Abstract:
The goal of 5G wireless networks is to address the growing need for network services among users. User equipment has progressed to the point where users now expect diverse services from the network. The latency, reliability, and bandwidth requirements of users can all be classified. To fulfil the different needs of users in an economical manner, while guaranteeing network resources are resourcefully assigned to consumers, 5G systems plan to leverage technologies like Software Defined Networks, Network Function Virtualization, and Network Slicing. For the purpose of ensuring continuous handover among network slices, while catering to the advent of varied 5G application scenarios, new mobility management techniques must be adopted in Sliced 5G networks. Users want to travel from one region of coverage to another region without any fading in their network connection. Different network slices can coexist in 5G networks, with every slice offering services customized to various QoS demands. As a result, when customers travel from one region of coverage to another, the call can be transferred to a slice that caters to similar or slightly different requirements. The goal of this study was to develop an intra- and inter-slice algorithm for determining handover decisions in sliced 5G networks and to assess performance by comparing intra- and inter-slice handovers. The proposed work shows that an inter-slice handover algorithm offers superior quality of service when compared to an intra-slice algorithm.
APA, Harvard, Vancouver, ISO, and other styles
3

Bi, Yuming, Lei Tian, Mengmeng Liu, Zhenzi Liu, and Wei Chen. "Research on Joint Handoff Algorithm in Vehicles Networks." Chinese Journal of Engineering 2016 (April 18, 2016): 1–10. http://dx.doi.org/10.1155/2016/3190264.

Full text
Abstract:
With the communication services evolution from the fourth generation (4G) to the fifth generation (5G), we are going to face diverse challenges from the new network systems. On the one hand, seamless handoff is expected to integrate universal access among various network mechanisms. On the other hand, a variety of 5G technologies will complement each other to provide ubiquitous high speed wireless connectivity. Because the current wireless network cannot support the handoff among Wireless Access for Vehicular Environment (WAVE), WiMAX, and LTE flexibly, the paper provides an advanced handoff algorithm to solve this problem. Firstly, the received signal strength is classified, and the vehicle speed and data rate under different channel conditions are optimized. Then, the optimal network is selected for handoff. Simulation results show that the proposed algorithm can well adapt to high speed environment, guarantee flexible and reasonable vehicles access to a variety of networks, and prevent ping-pong handoff and link access failure effectively.
APA, Harvard, Vancouver, ISO, and other styles
4

Zain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.

Full text
Abstract:
In recent times, secure communication protocols over web such as HTTPS (Hypertext Transfer Protocol Secure) are being widely used instead of plain web communication protocols like HTTP (Hypertext Transfer Protocol). HTTPS provides end-to-end encryption between the user and service. Nowadays, organizations use network firewalls and/or intrusion detection and prevention systems (IDPS) to analyze the network traffic to detect and protect against attacks and vulnerabilities. Depending on the size of organization, these devices may differ in their capabilities. Simple network intrusion detection system (NIDS) and firewalls generally have no feature to inspect HTTPS or encrypted traffic, so they rely on unencrypted traffic to manage the encrypted payload of the network. Recent and powerful next-generation firewalls have Secure Sockets Layer (SSL) inspection feature which are expensive and may not be suitable for every organizations. A virtual private network (VPN) is a service which hides real traffic by creating SSL-protected channel between the user and server. Every Internet activity is then performed under the established SSL tunnel. The user inside the network with malicious intent or to hide his activity from the network security administration of the organization may use VPN services. Any VPN service may be used by users to bypass the filters or signatures applied on network security devices. These services may be the source of new virus or worm injected inside the network or a gateway to facilitate information leakage. In this paper, we have proposed a novel approach to detect VPN activity inside the network. The proposed system analyzes the communication between user and the server to analyze and extract features from network, transport, and application layer which are not encrypted and classify the incoming traffic as malicious, i.e., VPN traffic or standard traffic. Network traffic is analyzed and classified using DNS (Domain Name System) packets and HTTPS- (Hypertext Transfer Protocol Secure-) based traffic. Once traffic is classified, the connection based on the server’s IP, TCP port connected, domain name, and server name inside the HTTPS connection is analyzed. This helps in verifying legitimate connection and flags the VPN-based traffic. We worked on top five freely available VPN services and analyzed their traffic patterns; the results show successful detection of the VPN activity performed by the user. We analyzed the activity of five users, using some sort of VPN service in their Internet activity, inside the network. Out of total 729 connections made by different users, 329 connections were classified as legitimate activity, marking 400 remaining connections as VPN-based connections. The proposed system is lightweight enough to keep minimal overhead, both in network and resource utilization and requires no specialized hardware.
APA, Harvard, Vancouver, ISO, and other styles
5

Ruliyanta, Ruliyanta, Mohd Riduan Ahmad, and Azmi Awang Md Isa. "Adaptive Wi-Fi offloading schemes in heterogeneous networks, the survey." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 1 (October 1, 2022): 254. http://dx.doi.org/10.11591/ijeecs.v28.i1.pp254-268.

Full text
Abstract:
At present, the need for data traffic is experiencing tremendous growth. The growth of smartphones technology offers new applications. On the other hand, the growth in cellular network access infrastructure has not been able to keep up with the increasing demand for data package services. For this reason, Wi-Fi offloading is needed, namely cellular users, using Wi-Fi access for their data needs. In 2016, global data communication traffic growth reached 63%. Many researchers have proposed the adaptive wireless fidelity (Wi-Fi) offloading (AAWO) algorithm to transfer data on heterogeneous networks. In this study, the proposed adaptive incentive scheme is classified, to obtain an adaptive scheme based on cost, energy, service quality, and others. From the survey results shown, there is no proposed adaptive algorithm based on the quality of experience (QoE). This provides an opportunity for further research where the Wi-Fi offloading scheme uses the perspective user or user experient options. In addition, open research uses artificial intelligence and machine learning methods as adaptive methods.
APA, Harvard, Vancouver, ISO, and other styles
6

Khafidin, Ahmad, Tatyantoro Andrasto, and Suryono Suryono. "Implementation flow control to improve quality of service on computer networks." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 3 (December 1, 2019): 1474. http://dx.doi.org/10.11591/ijeecs.v16.i3.pp1474-1481.

Full text
Abstract:
<p>Quality of Service (QoS) is the collective effect of service performances, which determine the degree of satisfaction of a user of the service. In addition, QoS defined as the ability of a network to provide good service. QoS aims to provide different quality of services for various needs in the IP network. QoS parameters that can be used to analyze the data communication services are jitter, packet loss, throughput, and delay. The quality of QoS parameters in the network is affected by congestion. Congestion occurs because there is an excessive queue in the network. Congestion can be prevented by implementing flow control on network. Flow control is a method to control the data packet flow in a network. By controlling of the data packet flow, it can improve of QoS. This study intends to find out value of QoS on the internet network at Faculty Engineering, State University of Semarang by measuring network performance using QoS parameters. Then, in this research will be implemented the token bucket method as a flow control mechanism at the network to improve the QoS. After research and data analysis, internet network at Faculty Engineering State University of Semarang has QoS value was 3,5 with 87,5 % of percentage and classified in satisfying of category. When measuring the network performance, there are decreases of performance at access point that having data rates 150 Mbps with many users connected. It has 9,0 ms of delay value, 0.046 ms of jitter, 16,6% of packet loss and, 1293407 bps of throughput. After token bucket was applied as flow control mechanism that be simulated on Graphical Network Simulator 3, the internet network has QoS values 3,75 with 93,75 % of percentage and classified as “satisfying” category. Furthermore, the percentage of the throughput value obtained on network by implementing flow control is 62%, while on the existing network is 41%.</p>
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Min-Gu, Hoon Ko, and Sung Bum Pan. "A Study on User Recognition Using 2D ECG Image Based on Ensemble Networks for Intelligent Vehicles." Wireless Communications and Mobile Computing 2019 (February 3, 2019): 1–11. http://dx.doi.org/10.1155/2019/6458719.

Full text
Abstract:
IoT enabled smart car era is expected to begin in the near future as convergence between car and IT accelerates. Current smart cars can provide various information and services needed by the occupants via wearable devices or Vehicle to Everything (V2X) communication environment. In order to provide such services, a system to analyze wearable device information on the smart car platform needs to be designed. In this paper a real time user recognition method using 2D ECG (Electrocardiogram) images, a biometric signal that can be obtained from wearable devices, will be studied. ECG (Electrocardiogram) signal can be classified by fiducial point method using feature points detection or nonfiducial point method due to time change. In the proposed algorithm, a CNN based ensemble network was designed to improve performance by overcoming problems like overfitting which occur in a single network. Test results show that 2D ECG image based user recognition accuracy improved by 1%~1.7% for the fiducial point method and by 0.9%~2% for the nonfiducial point method. By showing 13% higher performance compared to the single network in which recognition rate reduction occurs because similar characteristics are shown between classes, capability for use in a smart vehicle platform based user recognition system that requires reliability was demonstrated by the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
8

Keti, Faris, Salih M. S. Atroshey, and Jalil A. Hamadamin. "A REVIEW OF NEW IMPROVEMENTS IN RESOURCE ALLOCATION PROBLEM OPTIMIZATION IN 5G USING NON-ORTHOGONAL MULTIPLE ACCESS." Academic Journal of Nawroz University 11, no. 4 (November 8, 2022): 245–54. http://dx.doi.org/10.25007/ajnu.v11n4a1308.

Full text
Abstract:
Because of the arising requirements of emerging networks (Fifth generation and beyond) such as supporting diverse Quality of Services (QoS), low latency, and high spectral efficiency; the previous and traditional generations of communication systems are becoming inappropriate. Furthermore, due to the huge connectivity and ever-growing demands of diverse services and high data rate applications, more effective radio access techniques are required for the purpose of a full-scale implementation of the fifth generation (5G) and beyond wireless systems. Therefore; the researchers are looking for new mechanisms to accomplish these demands, and one of the key techniques been proposed is NOMA due to its capability of spectrum efficiency enhancement. In NOMA-Based systems, the information signals of various users are superimposed at the transmitter side, by utilizing the differences of channel gain to work for different users simultaneously. In this study, recent papers on resource allocation problem based on Power-Doman NOMA (PD-NOMA) in 5G networks were reviewed and the goal (objective function), optimization methods used, and obtained results of each analyzed paper are investigated. In addition, the discussed resource allocation problems were classified into: optimal rate problems and power/energy-efficient problems and the proposed solutions in each of it are analyzed. Finally, this study highlights some of the present and future challenges in this field.
APA, Harvard, Vancouver, ISO, and other styles
9

Nawaz Jadoon, Rab, Mohsin Fayyaz, WuYang Zhou, Muhammad Amir Khan, and Ghulam Mujtaba. "PCOI: Packet Classification‐Based Optical Interconnect for Data Centre Networks." Mathematical Problems in Engineering 2020 (July 17, 2020): 1–11. http://dx.doi.org/10.1155/2020/2903157.

Full text
Abstract:
To support cloud services, Data Centre Networks (DCNs) are constructed to have many servers and network devices, thus increasing the routing complexity and energy consumption of the DCN. The introduction of optical technology in DCNs gives several benefits related to routing control and energy efficiency. This paper presents a novel Packet Classification based Optical interconnect (PCOI) architecture for DCN which simplifies the routing process by classifying the packet at the sender rack and reduces energy consumption by utilizing the passive optical components. This architecture brings some key benefits to optical interconnects in DCNs which include (i) routing simplicity, (ii) reduced energy consumption, (iii) scalability to large port count, (iv) packet loss avoidance, and (v) all-to-one communication support. The packets are classified based on destination rack and are arranged in the input queues. This paper presents the input and output queuing analysis of the PCOI architecture in terms of mathematical analysis, the TCP simulation in NS2, and the physical layer analysis by conducting simulation in OptiSystem. The packet loss in the PCOI has been avoided by adopting the input and output queuing model. The output queue of PCOI architecture represents an M/D/32 queue. The simulation results show that PCOI achieved a significant improvement in terms of throughput and low end-to-end delay. The eye-diagram results show that a good quality optical signal is received at the output, showing a very low Bit Error Rate (BER).
APA, Harvard, Vancouver, ISO, and other styles
10

Durga, S., Esther Daniel, J. Andrew Onesimu, and Yuichi Sei. "Resource Provisioning Techniques in Multi-Access Edge Computing Environments: Outlook, Expression, and Beyond." Mobile Information Systems 2022 (December 19, 2022): 1–24. http://dx.doi.org/10.1155/2022/7283516.

Full text
Abstract:
Mobile cloud computing promises a research foundation in information and communication technology (ICT). Multi-access edge computing is an intermediate solution that reduces latency by delivering cloud computing services close to IoT and mobile clients (MCs), hence addressing the performance issues of mobile cloud computing. However, the provisioning of resources is a significant and challenging process in mobile cloud-based environments as it organizes the heterogeneous sensing and processing capacities to provide the customers with an elastic pool of resources. Resource provisioning techniques must meet quality of service (QoS) considerations such as availability, responsiveness, and reliability to avoid service-level agreement (SLA) breaches. This investigation is essential because of the unpredictable change in service demands from diverse regions and the limits of MEC’s available computing resources. In this study, resource provisioning approaches for mobile cloud computing are thoroughly and comparatively studied and classified as taxonomies of previous research. The paper concludes with an insightful summary that gives recommendations for future enhancements.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Communication Networks and Services not elsewhere classified"

1

Teh, Anselm. "Providing quality of service for realtime traffic in heterogeneous wireless infrastructure networks." 2009. http://arrow.unisa.edu.au/vital/access/manager/Repository/unisa:41467.

Full text
Abstract:
In recent years, there has been a rapid growth in deployment and usage of realtime network applications, such as Voice-over-IP, video calls/video conferencing, live network seminars, and networked gaming. The continued increase in the popularity of realtime applications requires a more intense focus on the provision of strict guarantees for Quality of Service (QoS) parameters such as delay, jitter and packet loss in access networks. At the same time, wireless networking technologies have become increasingly popular with a wide array of devices such as laptop computers, Personal Digital Assistants (PDAs), and cellular phones being sold with built-in WiFi and WiMAX interfaces. For realtime applications to be popular over wireless networks, simple, robust and effective QoS mechanisms suited for a variety of heterogeneous wireless networks must be devised. Implementing the same QoS mechanisms across multiple neighbouring networks aids seamless handover by ensuring that a flow will be treated in the same way, both before and after handover. To provide guaranteed QoS, an access network should limit load using an admission control algorithm. In this research, we propose a method to provide effective admission control for variable bit rate realtime flows, based on the Central Limit Theorem. Our objective is to estimate the percentage of packets that will be delayed beyond a predefined delay threshold, based on the mean and variance of all the flows in the system. Any flow that will increase the percentage of delayed packets beyond an acceptable threshold can then be rejected. Using simulations we have shown that the proposed method provides a very effective control of the total system load, guaranteeing the QoS for a set of accepted flows with negligible reductions in the system throughput. To ensure that flow data is transmitted according to the QoS requirements of a flow, a scheduling algorithm must handle data intelligently. We propose methods to allow more efficient scheduling by utilising existing Medium Access Control mechanisms to exchange flow information. We also propose a method to determine the delay-dependent "value" of a packet based on the QoS requirements of the flow. Using this value in scheduling is shown to increase the number of packets sent before a predetermined deadline. We propose a measure of fairness in scheduling that is calculated according to how well each flow's QoS requirements are met. We then introduce a novel scheduling paradigm, Delay Loss Controlled-Earliest Deadline First (DLC-EDF), which is shown to provide better QoS for all flows compared to other scheduling mechanisms studied. We then study the performance of our admission control and scheduling methods working together, and propose a feedback mechanism that allows the admission control threshold to be tuned to maximise the efficient usage of available bandwidth in the network, while ensuring that the QoS requirements of all realtime flows are met. We also examine heterogeneous/vertical handover, providing an overview of the technologies supporting seamless handover. The issues studied in this area include a method of using the Signal to Noise Ratio to trigger handover in heterogeneous networks and QoS Mapping between heterogeneous networks. Our proposed method of QoS mapping establishes the minimum set of QoS parameters applicable to individual flows, and then maps these parameters into system parameter formats for both 802.11e and 802.16e networks.
APA, Harvard, Vancouver, ISO, and other styles
2

(11200116), Ashleigh N. Shields. "LEARN TO LISTEN: ASSESSING THE EFFICACY OF AN EATING DISORDER COMMUNICATION INTERVENTION AMONG ADOLESCENTS." Thesis, 2021.

Find full text
Abstract:

Listening (Janusik, 2002; Miller, 2018; Wolvin & Coakley, 1996) and eating disorders (EDs; National Centre for Eating Disorders (NCFED), 2018) are often not taught within schools, especially among adolescents. To address this, a school-based brief motivational interviewing (MI) intervention on listening when talking about EDs was created, implemented, and evaluated among adolescents (n = 260) from two middle schools within the Midwestern part of the United States. Specifically, School 1 (n = 100), and School 2 (n = 160) and three teachers (i.e., Teacher 1, Teacher 2, Teacher 3) allowed the researcher to present and collect data. In other words, three total teachers between the two schools, and one teacher, Teacher 1 (n = 100), was from School 1, and the other two teachers, Teacher 2 (n = 120) and Teacher 3 (n = 40) were from School 2. Participants were randomly placed into either the 1) the EDs listening intervention (education-plus) with an MI component (n = 6 classes) or 2) an education-plus Q&A intervention (n = 7 classes). All the participants were involved in the guest lecture and the pre-test and post-test survey, but data was only saved and analyzed from participants that had guardians/parents who consented (n = 75). The methodology for this dissertation project was a 2 (pre/post, unmatched) X 2 (condition) subject’s design. This dissertation project had two independent variables: (1) experimental condition (e.g., education plus MI and education plus Q&A), and (2) time (e.g., pre and post). This dissertation project had five dependent variables: (1) knowledge of listening, (2) knowledge of EDs, (3) listening self-efficacy, (4) knowledge of OARS, and (5) knowledge of the righting reflex. This dissertation project also had the random factor of schools (e.g., School 1 (A) and School 2 (B), and the fixed factor of gender identity (e.g., male and female). The results revealed a promise of efficacy and increased knowledge regarding EDs and aspects of listening, specifically through MI (e.g., OARS). Other areas of knowledge improved but not significantly. In other words, there were no significant differences in knowledge gains between MI and Q&A, but MI compared to Q&A showed a more extensive influence on self-efficacy. The main limitation of this study was the limited guardian/parental consent, resulting in a small sample size.



APA, Harvard, Vancouver, ISO, and other styles
3

(10214267), Chih-Hua Chang. "Optimal Network Coding Under Some Less-Restrictive Network Models." Thesis, 2021.

Find full text
Abstract:
Network Coding is a critical technique when designing next-generation network systems, since the use of network coding can significantly improve the throughput and performance (delay/reliability) of the system. In the traditional design paradigm without network coding, different information flows are transported in a similar way like commodity flows such that the flows are kept separated while being forwarded in the network. However, network coding allows nodes in the network to not only forward the packet but also process the incoming information messages with the goal of either improving the throughput, reducing delay, or increasing the reliability. Specifically, network coding is a critical tool when designing absolute Shannon-capacity-achieving schemes for various broadcasting and multi-casting applications. In this thesis, we study the optimal network schemes for some applications with less restrictive network models. A common component of the models/approaches is how to use network coding to take advantage of a broadcast communication channel.

In the first part of the thesis, we consider the system of one server transmitting K information flows, one for each of K users (destinations), through a broadcast packet erasure channels with ACK/NACK. The capacity region of 1-to-K broadcast packet erasure channels with ACK/NACK is known for some scenarios, e.g., K<=3, etc. However, existing achievability schemes with network coding either require knowing the target rate in advance, and/or have a complicated description of the achievable rate region that is difficult to prove whether it matches the capacity or not. In this part, we propose a new network coding protocol with the following features: (i) Its achievable rate region is identical to the capacity region for all the scenarios in which the capacity is known; (ii) Its achievable rate region is much more tractable and has been used to derive new capacity rate vectors; (iii) It employs sequential encoding that naturally handles dynamic packet arrivals; (iv) It automatically adapts to unknown packet arrival rates; (v) It is based on GF(q) with q>=K. Numerically, for K=4, it admits an average control overhead 1.1% (assuming each packet has 1000 bytes), average encoding memory usage 48.5 packets, and average per-packet delay 513.6 time slots, when operating at 95% of the capacity.

In the second part, we focus on the coded caching system of one server and K users, each user k has cache memory size Mk and demand a file among the N files currently stored at server. The coded caching system consists of two phases: Phase 1, the placement phase: Each user accesses the N files and fills its cache memory during off-peak hours; and Phase 2, the delivery phase: During the peak hours, each user submits his/her own file request and the server broadcasts a set of packet simultaneously to K users with the goal of successfully delivering the desired packets to each user. Due to the high complexity of coded caching problem with heterogeneous file size and heterogeneous cache memory size for arbitrary N and K, prior works focus on solving the optimal worst-case rate with homogeneous file size and mostly focus on designing order-optimal coded caching schemes with user-homogeneous file popularity that attain the lower bound within a constant factor. In this part, we derive the average rate capacity for microscopic 2-user/2-file (N=K=2) coded caching problem with heterogeneous files size, cache memory size, and user-dependent heterogeneous file popularity. The study will shed some further insights on the complexity and optimal scheme design of general coded caching problem with full heterogeneity.

In the third part, we further study the coded caching system of one server, K= 2 users, and N>=2 files and focus on the user-dependent file popularity of the two users. In order to approach the exactly optimal uniform average rate of the system, we simplify the file demand popularity to binary outputs, i.e., each user either has no interest (with probability 0) or positive uniform interest (with a constant probability) to each of the N file. Under this model, the file popularity of each user is characterized by his/her file demand set of positive interest in the N files. Specifically, we analyze the case of two user (K=2). We show the exact capacity results of one overlapped file of the two file demand sets for arbitrary N and two overlapped files of the two file demand sets for N = 3. To investigate the performance of large overlapped files we also present the average rate capacity under the constraint of selfish and uncoded prefetching with explicit prefetching schemes that achieve those capacities. All the results allow for arbitrary (and not necessarily identical) users' cache capacities and number of files in each file demand set.
APA, Harvard, Vancouver, ISO, and other styles
4

(6997697), Devin T. Knighton. "Tapping the Untapped Potential of Big Data to Assess the Type of Organization-Stakeholder Relationship on Social Media." Thesis, 2019.

Find full text
Abstract:
Social media is impacting the practice of public relations inmany different ways, but the focus of this dissertation is on the power of big data from social media to identify and assess the relationship that stakeholders have with the organization. Social media analytics have tended to measure reactions to messages, rather than the strength of the relationship, even though public relations is responsible for building strong relationships with the organization’s stakeholders. Yet, social media provides insight into the conversations that stakeholders have with other stakeholders about the organization and thus can reveal insight into the quality of the relationship they have with the organization.

This dissertation takes a networked approach to understandthe strength of the relationship that the organization has with its stakeholders, meaning it acknowledges that the relationships two entities have with each other are influenced by the relationships those entities have with others in common. In this case, the relationship that a stakeholder has with the organizationis influenced by the relationship the stakeholder has with other stakeholders. Thus, one way to study the relationship that a stakeholder has with the organization is to look at the conversation and the postings on social media among the various stakeholders. The ultimate aim of the dissertation is to show how the relationship can be assessed, so the organization can create strategies that develop mutually beneficial relationships over time.

The context for the study is based on two major events where companies deliberately gather together their stakeholders to interact in person and onsocial media about issues and products related to the organization’sfuture. The first event is Adobe Creative Max, which Adobe hosts each year for creative professionals. The second context for the study is Dreamforce, which is hosted by Salesforce.com and includes so many attendees that the company has to bring in cruise ships to dock in the San Francisco Bay during the event since all the hotels in the area sell out far in advance. These two events provide a specific situation where stakeholders interact with other stakeholders outside of a crisis, which represents the majority of day-to-day public relations practice. Twitter data was collected during for each week of each conference, and all company tweets were filtered out of the data sample. Atext-mining approach was then used to examine the conversations among the stakeholders at the events.

Findings indicate that the strongest relationship was developed by Salesforce.com with its stakeholders at the Dreamforce 2018 event in large part because ofthe CEO’s keynote andthe organizational commitment to social justice and sustainability. Granted, Salesforce hadalready worked to develop a culture among employees and customers based on the concept, “family,”or “Ohana.” However, the text of the conversations reveal that the focus at this conference was on societal issues presented by the CEO. In contrast, the findings from the Adobe conference suggest the organization has a transactional relationship with its stakeholders, in part because the CEO keynote focused heavily on products and technology. The implications of these findings indicate that big data from social media can be used to assess relationships, especially when social media data represents conversations and interactions among stakeholders. The findings also show the influence of CEO communications on the relationship and the vital role that public relations practitioners play in setting that CEO communications agenda.
APA, Harvard, Vancouver, ISO, and other styles
5

(10723737), Navin Bhartoor Lingaraju. "Spectral Multiplexing and Information Processing for Quantum Networks." Thesis, 2021.

Find full text
Abstract:
Modern fiber-optic networks leverage massive parallelization of communications channels in the spectral domain, as well as low-noise recovery of optical signals, to achieve high rates of information transfer. However, quantum information imposes additional constraints on optical transport networks – the no-cloning theorem forbids use of signal regeneration and many network protocols are premised on operations like Bell state measurements that prize spectral indistinguishability. Consequently, a key challenge for quantum networks is identifying a path to high-rate and high-fidelity quantum state transport.

To bridge this gap between the capabilities of classical and quantum networks, we developed techniques that harness spectral multiplexing of quantum channels, as well as that support frequency encoding. In relation to the former, we demonstrated reconfigurable connectivity over arbitrary subgraphs in a multi-user quantum network. In particular, through flexible provisioning of the pair source bandwidth, we adjusted the rate at which entanglement was distributed over any user-to-user link. To facilitate networking protocols compatible with both spectral multiplexing and frequency encoding, we synthesized a Bell state analyzer based on mixing outcomes that populate different spectral modes, in contrast to conventional approaches that are based on mixing outcomes that populate different spatial paths. This advance breaks the tradeoff between the fidelity of remote entanglement and the spectral distinguishability of photons participating in a joint measurement.

Finally, we take steps toward field deployment by developing photonic integrated circuits to migrate the aforementioned functionality to a chip-scale platform while also achieving the low loss transmission and high-fidelity operation needed for practical quantum networks.
APA, Harvard, Vancouver, ISO, and other styles
6

(7013471), NIRANJAN RAVI. "Integration of UAVS with Real Time Operating Systems and Establishing a Secure Data Transmission." Thesis, 2019.

Find full text
Abstract:
In today’s world, the applications of Unmanned Aerial Vehicle (UAV) systems are leaping by extending their scope from military applications on to commercial and medical sectors as well. Owing to this commercialization, the need to append external hardware with UAV systems becomes inevitable. This external hardware could aid in enabling wireless data transfer between the UAV system and remote Wireless Sensor Networks (WSN) using low powered architecture like Thread, BLE (Bluetooth Low Energy). The data is being transmitted from the flight controller to the ground control station using a MAVlink (Micro Air Vehicle Link) protocol. But this radio transmission method is not secure, which may lead to data leakage problems. The ideal aim of this research is to address the issues of integrating different hardware with the flight controller of the UAV system using a light-weight protocol called UAVCAN (Unmanned Aerial Vehicle Controller Area Network). This would result in reduced wiring and would harness the problem of integrating multiple systems to UAV. At the same time, data security is addressed by deploying an encryption chip into the UAV system to encrypt the data transfer using ECC (Elliptic curve cryptography) and transmitting it to cloud platforms instead of radio transmission.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Communication Networks and Services not elsewhere classified"

1

Office, General Accounting. Information security: Controls over unofficial access to classified information : report to the Chairman, Subcommittee on Federal Services, Post Office, and Civil Service, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: U.S. General Accounting Office, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Office, General Accounting. Information security: Progress and challenges to an effective defense-wide information assurance program : report to the Chairman, Committee on Armed Services, House of Representatives. Washington, D.C. (P.O. Box 37050, Washington 20013): U.S. General Accounting Office, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Office, General Accounting. Information security: Many NASA mission-critical systems face serious risks : report to the Committee on Governmental Affairs, U.S. Senate. Washington D.C. (P.O. Box 37050, Washington D.C. 20013): The Office, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Office, General Accounting. Information security: Computer attacks at Department of Defense pose increasing risks : report to Congressional requesters. Washington, D.C: The Office, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Office, General Accounting. Information security: Weak controls place DC Highway Trust Fund and other data at risk : report to the Mayor of the District of Columbia. Washington, D.C: The Office, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Office, General Accounting. Information security: Further efforts needed to address serious weaknesses at USDA : report to congressional requesters. Washington, D.C: United States General Accounting Office, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Office, General Accounting. Information security: Weak controls place Interior's financial and other data at risk : report to the Secretary of the Interior. Washington, D.C: The Office, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Office, General Accounting. Information security: Advances and remaining challenges to adoption of public key infrastructure technology : report to the Chairman, Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, Committee on Government Reform, House of Representatives. Washington, D.C: The Office, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Office, General Accounting. Information security: Serious and widespread weaknesses persist at federal agencies : report to the Chairman, Subcommittee on Government Management, Information, and Technology, Committee on Government Reform, House of Representatives. Washington, D.C: The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Office, General Accounting. Information security: Safeguarding of data in excessed Department of Energy computers : report to the Chairman, Committee on Science, House of Representatives. Washington, D.C. (P.O. Box 37050, Washington 20013): U.S. General Accounting Office, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Communication Networks and Services not elsewhere classified"

1

Kliazovich, Dzmitry, Fabrizio Granelli, Nelson Fonseca, and Pascal Bouvry. "Architectures and Information Signaling Techniques for Cognitive Networks." In Advances in Wireless Technologies and Telecommunication, 286–300. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-4189-1.ch012.

Full text
Abstract:
The introduction of self-awareness, self-management, and self-healing into networks leads to a novel paradigm known as cognitive networking. This chapter overviews recent developments of this concept, discussing possible cognitive node structure and candidate cognitive network architecture. It explains the functionality of cognitive algorithms and discusses opportunities for potential optimization. Furthermore, the concept of cognitive information services is introduced. Information signaling techniques are then classified, reviewed in details, and compared among them. Finally, the performance of cognitive communication protocols is presented for a choice of examples.
APA, Harvard, Vancouver, ISO, and other styles
2

Osman, T. "Web Services Hybrid Dynamic Composition Models for Enterprises." In Enterprise Architecture and Integration, 240–54. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59140-887-1.ch013.

Full text
Abstract:
Web services are used in enterprise distributed computing technology including ubiquitous and pervasive computing and communication networks. Composition models of such Web services are an active research area. Classified as static, dynamic, and semiautomatic composition models, these models address different application areas and requirements. Thus far, the most successful practical approach to Web services composition, largely endorsed by industry, borrows from business processes’ workflow management. Unfortunately, standards subscribing to this approach fall under the static composition category, therefore the service selection and flow management are done a priori and manually. The second approach to Web services composition aspires to achieve more dynamic composition by semantically describing the process model of the Web service and thus making it comprehensible to reasoning engines and software agents. In this chapter, we attempt to bridge the gap between the two approaches by introducing semantics to workflow-based composition. We aim to present a composition framework based on a hybrid solution that merges the benefit of practicality of use and adoption popularity of workflow-based composition with the advantage of using semantic descriptions to aid both service developers and composers in the composition process and facilitate the dynamic integration of Web services into it.
APA, Harvard, Vancouver, ISO, and other styles
3

Kavitha, A. R., Adlene Ebenezer P., and Sahaya Sakila V. "6G With Smart Healthcare Systems." In Advances in Wireless Technologies and Telecommunication, 284–302. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-9636-4.ch014.

Full text
Abstract:
6G is a sixth-generation telecommunications standard that is presently being developed for wireless communications technologies that support cellular data networks. The ongoing deployment of 5G technology has urged researchers to explore what occurs next. From 2030 onward, 6G is a prospective communication technology that will enable wireless healthcare to become a reality. The current trend in the smart healthcare system has obstacles like risk of failure, security, and privacy. Healthcare will be absolutely AI-driven and reliant on 6G connectivity technologies, transforming our lifestyle perceptions. In order to have access, creative solutions must be introduced to improve our way of life including intelligent wearable devices, hospital-to-home services, intelligent internet of medical thing, quality of life (QoL), and new business strategy. The proposed intelligent healthcare system is classified into three major modules: hospital atmosphere, remote medical care, and disaster retaliation.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography