Academic literature on the topic 'Communications and networks technologies, n.e.c'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Communications and networks technologies, n.e.c.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Communications and networks technologies, n.e.c"

1

Mendoza Navarrete, Martha Lorena, Yenny Alexandra Zambrano Villegas, Lilia del Rocio Bermudez Cevallos, and Yanina Alexandra Viteri Alcivar. "New technologies and new paradigms: the new technological societies approach." Universidad Ciencia y Tecnología 25, no. 110 (August 26, 2021): 155–63. http://dx.doi.org/10.47460/uct.v25i110.487.

Full text
Abstract:
New technologies represent novelty depending on the era in which they are viewed, but in all cases they represent social evolution in some way. At present, new technologies are associated with the use of computer tools that strengthen processes, mechanisms, and undoubtedly, social communication. This paper evaluates new technologies focused on social transformations, their impact on human behavior and the social repercussions they may bring with their prevalence over time. Several academic documents of a scientific and technical nature are evaluated, with a view to defining the paradigms of technologies in their evolutionary process through societies. The most outstanding results show that the modern world is subject to a significant impact of information technology, that it encompasses not only educational aspects but also family, personal and economic aspects, and that the implications of traditional substitution by technology may be detrimental to mankind. Keywords: Technological implications, new societies, technological impact. References [1]C. Renfrew y P. Bahn, Arqueología: Teoría, métodos y práctica., Madrid: Akal, 1993. [2]Y. Laniuk, «Freedom in the Society of Control: Ethical challenges,» Ethics and Bioethics, vol. 10, nº 34, pp. 203-220, 2021. [3]J. Chaves, «Desarrollo tecnológico en la Primera Revolución Industrial,» Universidad de Extremadura, Servicio de Publicaciones, Extremadura, 2004. [4]A. Bessarab, O. Mitchuk, A. Baranetska, N. Kodatska, O. Kvasnytsia y G. Mykytiv, «Social networks as a phenomenon of the information society,» Journal of Optimization in Industrial Engineering, vol. 14, nº 1, pp. 35-42, 2021. [5]E. Popkova, A. Bogoviz y B. Sergi, «Towards digital society management and ‘capitalism 4.0’ in contemporary Russia,» Humanities and Social Sciences Communications, vol. 8, nº 1, p. 77, 2021. [6]A. Núñez, «Riesgo e Incertidumbre en las Sociedades Tecnológicas complejas.,» Cuaderno del ateneo, pp. 44-57, 2007. [7]wikipedia, «Accidente del transbordador espacial Challenger,» 1989. [Online]. Available: https://es.wikipedia.org/wiki/Accidente_del_transbordador_espacial_Challenger. [Last access: 2021]. [8]J. Martínez, «La innovación tecnológica en las sociedades cooperativas y otras organizaciones de participación,» Rev.Est. Coop., vol. 48, 2001. [9]J. Echeverría, «Ética y sociedades tecnológicas,» Isegoría, vol. 41, pp. 217-229, 2009. [10]R. Pardo, «La cultura científico-tecnológica de las sociedades de la modernidad tardía,» Comunicar ciencia, vol. 51, pp. 35-86, 2001. [11]A. Zatls, «Metales, ambiente y las sociedades tecnológicas: ¿hacia dónde nos dirigimos?,» Química viva, vol. 10, nº 2, pp. 1-20, 2011.
APA, Harvard, Vancouver, ISO, and other styles
2

Sgurev, Vassil, Vladimir Jotsov, and Mincho Hadjiski. "Intelligent Systems: Methodology, Models, and Applications in Emerging Technologies." Journal of Advanced Computational Intelligence and Intelligent Informatics 9, no. 1 (January 20, 2005): 3–4. http://dx.doi.org/10.20965/jaciii.2005.p0003.

Full text
Abstract:
From year to year the number of investigations on intelligent systems grows rapidly. For example this year 245 papers from 45 countries were sent for the Second International IEEE Conference on Intelligent Systems (www.ieee-is.org; www.fnts-bg.org/is) and this is an increase of more than 50% by all indicators. The presented papers on intelligent systems were marked by big audiences and they provoked a significant interest that ultimately led to the formation of vivid discussions, exchange of ideas and locally provoked the creation of working groups for different applied projects. All this reflects the worldwide tendencies for the leading role of the research on intelligent systems theoretically and practically. The greater part of the presented research dealt with traditional for the intelligent systems problems like artificial intelligence, knowledge engineering, intelligent agents, neural and fuzzy networks, intelligent data processing, intelligent control and decision making systems, and also new interdisciplinary problems like ontology and semantics in Internet, fuzzy intuitionistic logic. The majority of papers from the European and American researchers are dedicated to the theory and the applications of the intelligent systems with machine learning, fuzzy inference or uncertainty. Another big group of papers focuses on the domain of building and integrating ontologies of applications with heterogeneous multiagent systems. A great number of papers on intelligent systems deals with fuzzy sets. The papers of many other researchers underscore the significance of the contemporary perception-oriented methods and also of different applications in the intelligent systems. On the first place this is valid for the paradigm of L. A. Zadeh 'computing with words'. The Guest Editors in the present specialized journal volume would like to introduce a wealth of research with an applied and theoretical character that possesses a common characteristic and it is the conference best papers complemented and updated by the new elaborations of the authors during the last half a year. A short description of the presented in the volume papers follows. In 'Combining Local and Global Access to Ontologies in a Multiagent System' <B>R. Brena and H. Ceballos (Mexico)</B> proposed an original way for operation with ontologies where a part of the ontology is processed by a client's component and the rest is transmitted to the other agents by an ontology agent. The inter-agent communication is improved in this way. In 'Fuzzy Querying of Evolutive Situations: Application to Driving Situations' <B>S. Ould Yahia and S. Loriette-Rougegrez (France)</B> present an approach to analysis of driving situations using multimedia images and fuzzy estimates that will improve the driver's security. In 'Rememberng What You Forget in an Online Shopping Context' <B>M. Halvey and M. Keane (Ireland)</B> presented their approach to constructing online system that predicts the items for future shopping sessions using a novel idea called Memory Zones. In 'Reinforcement Learning for Online Industrial Process Control' the authors <B>J. Govindhasamy et al. (Ireland)</B> use a synthesis of dynamic programming, reinforcement learning and backpropagation for a goal of modeling and controlling an industrial grinding process. The felicitous combination of methods contributes for a greater effectiveness of the applications compared to the existing controllers. In 'Dynamic Visualization of Information: From Database to Dataspace' the authors <B>C. St-Jacques and L. Paquin (Canada)</B> suggested a friendly online access to large multimedia databases. <B>W. Huang (UK)</B> redefines in 'Towards Context-Aware Knowledge Management in e-Enterprises' the concept of context in intelligent systems and proposes a set of meta-information elements for context description in a business environment. His approach is applicable in the E-business, in the Semantic Web and in the Semantic Grid. In 'Block-Based Change Detection in the Presence of Ambient Illuminaion Variations' <B>T. Alexandropoulos et al. (Greece)</B> use a statistic analysis, clustering and pattern recognition algorithms, etc. for the goal of noise extraction and the global illumination correction. In 'Combining Argumentation and Web Search Technology: Towards a Qualitative Approach for Ranking Results' <B>C. Chesñevar (Spain) and A. Maguitman (USA)</B> proposed a recommender system for improving the WEB search. Defeasible argumentation and decision support methods have been used in the system. In 'Modified Axiomatic Basis of Subjective Probability' <B>K. Tenekedjiev et al. (Bulgaria)</B> make a contribution to the axiomatic approach to subjective uncertainty by introducing a modified set of six axioms to subjective probabilities. In 'Fuzzy Rationality in Quantitative Decision Analysis' <B>N. Nikolova et al. (Bulgaria)</B> present a discussion on fuzzy rationality in the elicitation of subjective probabilities and utilities. The possibility to make this special issue was politely offered to the Guest Editors by Prof. Kaoru Hirota, Prof. Toshio Fukuda and we thank them for that. Due to the help of Kenta Uchino and also due to the new elaborations presented by explorers from Europe and America the appearance of this special issue became possible.
APA, Harvard, Vancouver, ISO, and other styles
3

Corrêa, André Garcia, and Daniel Ribeiro Silva Mill. "Hierarquia social dos objetos: o capital científico das tecnologias digitais de informação e comunicação no campo da educação (Social Hierarchy of objects: The scientific capital of the Digital Information and Communication Technologies in the field of Education)." Revista Eletrônica de Educação 14 (July 28, 2020): 3756106. http://dx.doi.org/10.14244/198271993756.

Full text
Abstract:
This research makes empirical tests of a Bourdieu concept for sociology of science: the social hierarchy of objects. Looking at the specific field of Education, the research sought to measure the position of Digital Information and Communication Technologies (DICT) within this hierarchy. To this end, we collected metadata of thesis defended in postgraduate programs in Education in Brazil with grade five and higher between 1996 and 2016. The data indicated the production by HEI and geographically. Also the keywords were analyzed in a Network and indicators of centrality and density were used to map the hierarchy of objects and, consequently, the distribution of scientific capital among them in the field. Empirical tests have shown that DICT and distance education, as necessarily mediated by a technology, have relevance within the field as a concentration of symbolic capital. The analysis showed that the Hierarchy formed by the technologies segment was denser than the total network and that there was a considerable weight for the distance education modality. Regarding the hierarchy of objects in the DE subfield, a certain autonomy was observed in relation to the complete field, since its objects turned to subjects more important to the modality related to the student. Finally, statements from other DE studies were compared with the research data that showed some quantitative divergences, but qualitative convergences emphasizing the same observed trends and corroborating the analyzes of this research.ResumoEsta investigação faz testes empíricos de um conceito de Bourdieu para a sociologia da ciência: a Hierarquia Social dos Objetos. Olhando para o campo específico da Educação, a investigação procurou mensurar a posição das Tecnologias Digitais de Informação e Comunicação (TDIC) dentro desta hierarquia. Para tanto, foram coletados metadados de teses defendidas em Programas de pós-graduação em Educação no Brasil com nota cinco e superior entre os anos de 1996 e 2016. Os dados indicaram a produção por IES e geograficamente bem como as palavras-chave foram analisadas em rede e indicadores de centralidade e densidade foram utilizados para mapear a hierarquia dos objetos e, por consequência, a distribuição de capital científico entre eles no campo. Os testes empíricos mostraram que as TDIC e também a EaD, por ter necessariamente mediação por uma tecnologia, têm relevância dentro do campo enquanto concentração de capital simbólico. As análises mostraram que a Hierarquia formada pelo recorte de Tecnologias chegava a ser mais densa que a rede total e que havia um peso considerável para a modalidade a distância. Sobre a hierarquia de objetos no subcampo EaD, observou-se uma certa autonomia em relação ao campo completo, pois seus objetos se voltavam a assuntos mais caros à modalidade relacionados ao aluno. Por fim, foram confrontadas afirmações de outras investigações sobre EaD com os dados da investigação que mostraram algumas divergências quantitativas, mas convergências qualitativas enfatizando as mesmas tendências observadas e corroborando as análises desta investigação.Palavras-chave: Educação, Sociologia da ciência, Produção científica, Tecnologias Digitais de Informação e Comunicação.Keywords: Education, Sociology of science, Scientific production, Digital information and communication technologies.ReferencesÁVILA, Patrícia. A distribuição do capital científico: diversidade interna e permeabilidade externa no campo científico. Sociologia – problemas e práticas, Lisboa – Portugal, n. 25, p. 9-49, 1997.BLONDEL, Vincent D.; GUILLAUME, Jean-Çoup; LAMBIOTTE, Renaud; LEFEBVRE, Etienne. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, Trieste – Itália, n.10, p. 1000, 2008.BORGATTI, Stephen P.; EVERETT, Martin G.; JOHNSON, Jeffrey C. Analyzing Social Networks. Londres: SAGE, 2013.BOURDIEU, Pierre. Método científico e hierarquia social dos objetos. In: NOGUEIRA, Maria Alice; CATANI, Afrânio (Org.). Escritos de educação. Petrópolis: Editora Vozes, 2007. p. 33-38.BOURDIEU, Pierre. Os usos sociais da ciência: por uma sociologia clínica do campo científico. 1. ed. São Paulo: Editora UNESP, 2004. 88 p.CABRAL, Ana Lúcia Tinoco; TARCIA, Rita Maria Lino. O novo papel do professor na Ead. In: LITTO, Fredric Michael; FORMIGA, Marcos. Educação a distância: o estado da arte. v. 2; São Paulo: Pearson Education do Brasil, 2011. 443p.CORRÊA, André Garcia; MILL, Daniel Ribeiro Silva. Análise da percepção do docente virtual no ensino de música pela educação a distância. Acta Scientiarum. Education, Maringá, v. 38, n. 4, p. 425-436, Out.-Dez., 2016.COSTA, Larissa et al. Redes: uma introdução às dinâmicas da conectividade e da auto-organização. 1. ed. Brasília: WWF-Brasil, 2003. 91 p.KENSKI, Vani Moreira; MEDEIROS, Rosângela de Araújo; ORDÉAS, Jean. Grupos que pesquisam Educação a Distância no Brasil: primeiras aproximações. In: MILL, Daniel Ribeiro Silva et al. (Orgs.). Educação a distância: dimensões da pesquisa, da mediação e da formação. 1. ed. São Paulo: Artesanato Educacional, 2018. 194 p.MILL, Daniel Ribeiro Silva; OLIVEIRA, Márcia Rozenfeld Gomes. A Educação a distância em pesquisas acadêmicas: uma análise bibliométrica em teses do campo educacional. Educar em Revista, Curitiba, Educação especial n.4, 2014. p.15-36.MOORE, Michael G.; KEARSLEY, Greg. Educação a distância: uma visão integrada. São Paulo: Cengage Learning, 2010. 398 p.PELLEGRINI, Thalita de Oliveira; SILVA, Sheila Serafim da; FERREIRA, Maxwel de Azevedo. O perfil da pesquisa acadêmica sobre educação a distância no Brasil e no mundo. REAd, Porto Alegre, v. 23, n. especial, p.371-393, dez. 2017.SANTOS, Elaine Maria dos et al. Educação a distância no Brasil: Evolução da produção científica. In: CONGRESSO INTERNACIONAL DE EDUCAÇÃO A DISTÂNCIA, 13., 2007, Curitiba. Anais [...]. São Paulo: ABED, 2007.e3756106
APA, Harvard, Vancouver, ISO, and other styles
4

Lu, Yun Fei, Ming He, and Xin Gao. "LTE Network Parameters Optimization Based on Automatic Cell Planning." Applied Mechanics and Materials 380-384 (August 2013): 1931–34. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.1931.

Full text
Abstract:
Wireless network optimization is an important link in the beginning of the wireless communication network construction process, which decides the construction of wireless communication network whether scientific. This paper focuses on the method and content of the LTE wireless network optimization, mainly involves in the planning process and key technologies of LTE wireless network. First, this paper discusses LTE network parameters optimization include PCI, Cells, RS, C\N and RSC\RSRP. Then, verify the scheme scientific based on Automatic Cell Planning. Finally, through the network experiment examine the feasibility of the scheme.
APA, Harvard, Vancouver, ISO, and other styles
5

Kovbych, Tetiana. "DIGITALIZATION VECTOR OF EU LABOR MARKET DEVELOPMENT." Economics & Education 7, no. 2 (August 31, 2022): 45–51. http://dx.doi.org/10.30525/2500-946x/2022-2-7.

Full text
Abstract:
The article is devoted to the development of digital economy and information networks on the basis of advances in information and telecommunication technologies, affecting the qualitative and structural changes in all sectors of social production, in particular in the EU labor market. This leads to the transformation of production systems, management and state regulation in most EU countries. Having recovered from World War II, humanity has launched a new economic model called "smart production and consumption". It is shown that the economy of the XXI century, acquiring more and more signs of digitalization, is significantly transformed into a global digital economy. The development of ICTs reflects notable changes in the organization of the production process and labor activities, as new technologies stop performing certain types of labor activities. At the same time, they create a demand for people with new professional and qualification characteristics and contribute to the emergence of new jobs, thus creating new opportunities and requirements that a modern automated worker should meet. The fact that new opportunities for Ukrainian IT specialists have appeared on the EU labor market deserves special attention, the number of which has increased significantly due to the military aggression of the Russian Federation against Ukraine. IT has become an integral part of modern life. Thus, at the beginning of 2022 there were 90 thousand IT specialists (programmers) working in Ukraine. However, it is worth noting that Ukraine is currently experiencing a very difficult military situation, which reflects an accelerated outflow of population to other regions of Ukraine and EU countries. About 3.5 million Ukrainians have moved to the European Union. Among the "forced migrants" there is a certain share of people with skills in the IT industry. Considerable attention is paid to the analysis of IT skills, which are the main driving force behind the digitalization of the EU labor market. In particular, these qualities include the ability to work with foreigners, to attract investment, to work with computer technology and use technology in various cases, and to learn quickly and know foreign languages. This makes IT specialists very demanding. On the EU labor market, professions such as IT recruiter, project manager, PR manager, product manager and system analyst are most attractive to men, while HR manager, SEO-marketer, copywriter and WEB-analyst are more popular among women. Methodology. The methodology of expert assessment of the level of digitalization in the EU labor market is determined by an integral indicator, namely the index of digitalization of the labor market. This index measures the share of employment in services, the share of employment in knowledge-intensive services, the level of access to ICTs, the level of use of ICTs, the level of adoption of new organizational models of work based on ICTs, the share of exports of information and communication services, and the share of exports of digital services. This methodology allows to rank the countries of the European Union on the degree of digitalization of the labor market and prove the ability of states to provide employment growth through the spread of digital technology and the development of a digital global space. Results. It has been argued that humans today are hostage to resource collapse. In this case there is a dilemma: either to move along the current path, or technologically to become part of nature, that is, to live at the expense of fundamentally new inexhaustible resources and technologies created by wildlife, but using the most modern technology. This means the convergence of science and technology, consisting of similarities in the device and function of relatively distant groups, namely the convergence in the evolution of such technologies as N-nano, B-bio, I-Information, C-cognitive, the so-called NBIC-technologies. It has been established that today's programmers come in different ranks: junior, middle, and senior, and are proficient in major programming languages such as C, C++, C#, Java, Python, JavaScript, and PHP. With these qualities, programmers can work in a variety of industries because they are highly adaptable to change and have patience, because technology is constantly changing. Therefore, undoubtedly, such employees in the field of digital technology are very desirable for employers. Practical implications. As an effective practical method of analyzing the digitalization of the EU labor market the system approach and the development of IT-technologies are proposed. They cover the whole complex of scientific and technical problems, which, for all their specificity and diversity, are similar in their understanding and consideration of the objects and systems they study. That is, sets of interrelated elements that act as a whole. The index of digitalization of the labor market is one of these elements. It is used to assess the large share of IT services in various areas of the EU labor market. Value/originality. The article discusses the current directions of IT influence on the digitalization of the EU labor market. It shows how exactly IT contributes to the implementation of automated labor at the current stage of development of the digital economy in the EU. The number of people engaged in technical and technological labor in the digital space is relatively increasing, which forms the digital employment market. The digitalization of the labor market is automated through information systems and the spread of information technology. It requires a new type of thinking from the modern worker, formed on the basis of general education and special knowledge and skills in the use of innovative information technologies.
APA, Harvard, Vancouver, ISO, and other styles
6

Rojas Sánchez, Ahuitz. "SITUACION DE ABUSO SEXUAL BASADO EN IMAGENES EN MEXICO ENTRE 2017 Y 2018 (IMAGED-BASED SEXUAL ABUSE IN MEXICO BETWEEN 2017 AND 2018)." Universos Jurídicos, no. 18 (June 8, 2022): 1–22. http://dx.doi.org/10.25009/uj.vi18.2621.

Full text
Abstract:
Resumen: El objetivo de la presente investigación es explorar la estructura y el contenido de una red de usuarios de abuso sexual basado en imágenes en Twitter. Para ello se analizaron los perfiles de Twitter que contienen la palabra "Quemón o “Nudes” utilizando análisis de redes, técnicas de procesamiento natural del lenguaje. Entre 2017 y 2018 hubo una comunidad de abuso sexual basado en imágenes en Twitter. Al menos 329 usuarios se dedicaron y se auto describieron como cuentas sexualmente explícitas, vengativas, y en donde contenido sexual no consensual podía ser compartido de forma anónima. Ya con seguidores, la red comprende a más de 130,000 personas. Esta es una estimación conservadora, más cuentas podrían utilizar diferentes palabras clave, no tener ninguna descripción, o formar parte de comunidades privadas. Estos resultados sugieren que los consumidores de contenido de abuso sexual basado en imágenes son los principales responsables de su propagación. Abstract: This study aimed to explore the structure and content of an image-based sexual abuse user network on Twitter. For this purpose, Twitter profiles containing the word “Quemones” or "Nudes" were analyzed using network analysis, natural language processing techniques. Between 2017 and 2018 there was a community of image-based sexual abuse on Twitter. At least 329 users engaged in and self- described themselves as sexually explicit, vindictive accounts, and where nonconsensual sexual content could be shared anonymously. Already with followers, the network comprises more than 130,000 people. This is a conservative estimate; more accounts could use different keywords, have no description, or be part of private communities. These results suggest that consumers of image-based sexual abuse content are primarily responsible for its spread. Fuentes de Consulta: Allen, W. D. (2007). The Reporting and Underreporting of Rape. Southern Economic Journal, 73(3), 623–641. https://doi.org/10.2307/20111915 Angelides, S. (2013). ‘Technology, hormones, and stupidity’: The affective politics of teenage sexting. Sexualities, 16(5–6), 665–689. https://doi.org/10.1177/1363460713487289 Baum, M. A., Cohen, D. K., & Yuri, M. C. (2018). Rape Culture and Its Effects: Evidence from U.S. Newspapers, 2000-2013. Quarterly Journal of Political Science, 13(3), 263–289. Blondel, V. D., Guillaume, J.-L., Lambiotte, R., & Lefebvre, E. (2008). Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, 2008(10), P10008. https://doi.org/10.1088/1742-5468/2008/10/P10008 Boeringer, S. B. (1994). Pornography and sexual aggression: Associations of violent and nonviolent depictions with rape and rape proclivity. Deviant Behavior, 15(3), 289–304. https://doi.org/10.1080/01639625.1994.9967974 Chou, W. S., Hunt, Y. M., Beckjord, E. B., Moser, R. P., & Hesse, B. W. (2009). Social Media Use in the United States: Implications for Health Communication. Journal of Medical Internet Research, 11(4). https://doi.org/10.2196/jmir.1249 CIET Africa. (1998). Prevention of sexual violence. A social Audit of the role of the police in the jurisdiction of Johannesburg’s Southern Metropolitan Local Council. Johannesburg. Citron, D. K., & Franks, M. A. (2016). Criminalizing Revenge Porn, 38. Crofts, T., Lee, M., McGovern, A., & Milivojevic, S. (2015). Sexting and Young People. UK: Palgrave Macmillan. Dir, A. L., & Cyders, M. A. (2015). Risks, Risk Factors, and Outcomes Associated with Phone and Internet Sexting Among University Students in the United States. Archives of Sexual Behavior, 44(6), 1675–1684. https://doi.org/10.1007/s10508-014-0370-7 Döring, N. (2014). Consensual sexting among adolescents: Risk prevention through abstinence education or safer sexting? Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 8(1). Retrieved from https://cyberpsychology.eu/article/view/4303 Duxbury, S. W., & Haynie, D. L. (2018). The Network Structure of Opioid Distribution on a Darknet Cryptomarket. Journal of Quantitative Criminology, 34(4), 921–941. https://doi.org/10.1007/s10940-017-9359-4 Faloutsos, M., Faloutsos, P., & Faloutsos, C. (1999). On Power-Law Relationships of the Internet Topology. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (pp. 251–262). Figueredo, A. J., Gladden, P. R., Sisco, M. M., Patch, E. A., & Jones, D. N. (2015). The Unholy Trinity: The Dark Triad, Sexual Coercion, and Brunswik-Symmetry. Evolutionary Psychology, 13(2), 147470491501300220. https://doi.org/10.1177/147470491501300208 Gámez-Guadix, M., Almendros, C., Borrajo, E., & Calvete, E. (2015). Prevalence and Association of Sexting and Online Sexual Victimization Among Spanish Adults. Sexuality Research and Social Policy, 12(2), 145–154. https://doi.org/10.1007/s13178-015-0186-9 Harkness, E. L., Mullan, B., & Blaszczynski, A. (2015). Association Between Pornography Use and Sexual Risk Behaviors in Adult Consumers: A Systematic Review. Cyberpsychology, Behavior, and Social Networking, 18(2), 59–71. https://doi.org/10.1089/cyber.2014.0343 Hsieh, H.-F., & Shannon, S. E. (2005). Three Approaches to Qualitative Content Analysis. Qualitative Health Research, 15(9), 1277–1288. https://doi.org/10.1177/1049732305276687 INEGI. (2017). Encuesta Nacional de Victimización y Percepción Sobe Seguridad Pública (ENVIPE) 2017 (p. 18). Mexico: Instituto Nacional de Estadística y Geografía. Retrieved from http://www.beta.inegi.org.mx/proyectos/enchogares/regulares/envipe/2017/ INEGI. (2018). Banco de Información Económica (BIE) (Data Base). Mexico: Instituto Nacional de Estadística y Geografía. Retrieved from http://www.inegi.org.mx/Sistemas/BIE/Default.aspx?Topic=0&idserPadre=10100360#D10100360 Jewkes, R., & Abrahams, N. (2002). The epidemiology of rape and sexual coercion in South Africa: an overview. Social Science & Medicine, 55(7), 1231–1244. https://doi.org/10.1016/S0277-9536(01)00242-8 Jonason, P. K., Girgis, M., & Milne-Home, J. (2017). The Exploitive Mating Strategy of the Dark Triad Traits: Tests of Rape-Enabling Attitudes. Archives of Sexual Behavior, 46(3), 697–706. https://doi.org/10.1007/s10508-017-0937-1 Karaian, L. (2014). Policing ‘sexting’: Responsibilization, respectability and sexual subjectivity in child protection/crime prevention responses to teenagers’ digital sexual expression. Theoretical Criminology, 18(3), 282–299. https://doi.org/10.1177/1362480613504331 Kjellgren, C., Priebe, G., Svedin, C. G., & Långström, N. (2010). Sexually Coercive Behavior in Male Youth: Population Survey of General and Specific Risk Factors. Archives of Sexual Behavior, 39(5), 1161–1169. https://doi.org/10.1007/s10508-009-9572-9 Kleinberg, J. M. (1999). Hubs, authorities, and communities. ACM Computing Surveys, 31(4es), 5-es. https://doi.org/10.1145/345966.345982 Makin, D. A., & Morczek, A. L. (2015). The Dark Side Of Internet Searches: A Macro Level Assessment Of Rape Culture. https://doi.org/10.5281/zenodo.22057 Marganski, A., & Melander, L. (2015). Intimate Partner Violence Victimization in the Cyber and Real World: Examining the Extent of Cyber Aggression Experiences and Its Association With In-Person Dating Violence. Journal of Interpersonal Violence, 1–25. Newman, M. E. J. (2001). Clustering and preferential attachment in growing networks. Physical Review E, 64(2). https://doi.org/10.1103/PhysRevE.64.025102 Newman, Mark E. J. (2016). Networks: an introduction (Reprinted). Oxford: Oxford University Press. Ojanen, T. T., Boonmongkon, P., Samakkeekarom, R., Samoh, N., Cholratana, M., & Guadamuz, T. E. (2015). Connections between online harassment and offline violence among youth in Central Thailand. Child Abuse & Neglect, 44, 159–169. https://doi.org/10.1016/j.chiabu.2015.04.001 Park, B., Wilson, G., Berger, J., Christman, M., Reina, B., Bishop, F., … Doan, A. (2016). Is Internet Pornography Causing Sexual Dysfunctions? A Review with Clinical Reports. Behavioral Sciences, 6(3), 17. https://doi.org/10.3390/bs6030017 Pina, A., Holland, J., & James, M. (2017). The Malevolent Side of Revenge Porn Proclivity: Dark Personality Traits and Sexist Ideology. International Journal of Technoethics, 8(1), 30–43. https://doi.org/10.4018/IJT.2017010103 Powell, A., & Henry, N. (2017). Sexual Violence in a Digital Age. Palgrave Macmillan. Powell, A., Henry, N., & Flynn, A. (2018). Image-Based Sexual Abuse. In Routledge Handbook of Critical Criminology (2nd Edition, pp. 305–315). Routledge. Priebe, G., & Svedin, C. G. (2012). Online or off-line victimisation and psychological well-being: a comparison of sexual-minority and heterosexual youth. European Child & Adolescent Psychiatry, 21(10), 569–582. https://doi.org/10.1007/s00787-012-0294-5 Reed, L. A., Tolman, R. M., & Ward, L. M. (2016). Snooping and Sexting: Digital Media as a Context for Dating Aggression and Abuse Among College Students. Violence Against Women, 22(13), 1556–1576. https://doi.org/10.1177/1077801216630143 SEGOB. (2018). Incidencia Delictiva del Fuero Común 2018 (pp. 1–68). Mexico: Secretaría de Gobernación; Secretariado Ejecutivo del Sistema Nacional de Seguridad Publica. Retrieved from http://secretariadoejecutivo.gob.mx/docs/pdfs/nueva-metodologia/CNSP-Delitos-2018.pdf Shearer, E., & Gottfried, J. (2017, September 7). News Use Across Social Media Platforms 2017. Retrieved February 22, 2018, from http://www.journalism.org/2017/09/07/news-use-across-social-media-platforms-2017/ Strohmaier, H., Murphy, M., & DeMatteo, D. (2014). Youth Sexting: Prevalence Rates, Driving Motivations, and the Deterrent Effect of Legal Consequences. Sexuality Research and Social Policy, 11(3), 245–255. https://doi.org/10.1007/s13178-014-0162-9 Thompson, M. P., & Morrison, D. J. (2013). Prospective predictors of technology-based sexual coercion by college males. Psychology of Violence, 3(3), 233–246. https://doi.org/10.1037/a0030904 Wagner, A. K., Soumerai, S. B., Zhang, F., & Ross-Degnan, D. (2002). Segmented regression analysis of interrupted time series studies in medication use research. Journal of Clinical Pharmacy and Therapeutics, 27(4), 299–309. https://doi.org/10.1046/j.1365-2710.2002.00430.x Walker, K., & Sleath, E. (2017). A systematic review of the current knowledge regarding revenge pornography and non-consensual sharing of sexually explicit media. Aggression and Violent Behavior, 36, 9–24. https://doi.org/10.1016/j.avb.2017.06.010 Walker, S., Sanci, L., & Temple-Smith, M. (2013). Sexting: Young Women’s and Men’s Views on Its Nature and Origins. Journal of Adolescent Health, 52(6), 697–701. https://doi.org/10.1016/j.jadohealth.2013.01.026
APA, Harvard, Vancouver, ISO, and other styles
7

Bordel Sánchez, Borja, Ramón Alcarria, Tomás Robles, and Antonio Jara. "Protecting Physical Communications in 5G C-RAN Architectures through Resonant Mechanisms in Optical Media." Sensors 20, no. 15 (July 23, 2020): 4104. http://dx.doi.org/10.3390/s20154104.

Full text
Abstract:
Future 5G networks are characterized by three basic ideas: enhanced mobile broadband communications, massive machine-type communications, and ultra-low-latency communications. Any of these requirements needs, to be fulfilled, the implementation of high-efficiency technologies at all levels. This includes some of the costliest mechanisms in terms of computational time and bitrate: information protection solutions. Typical techniques in this area employ complex algorithms and large protocol headers, which strongly reduces the effective baud rate and latency of future 5G networks and communications. This is especially relevant in the access network, which in 5G networks will follow a cloud-based architecture, where thousands of different devices must communicate, before aggregating all those streams to be sent to the backbone. Then, new and more efficient mechanisms are needed in the cloud radio access networks (C-RAN) for future 5G systems. Therefore, in this paper it is proposed a novel information protection scheme for C-RAN architectures based on resonant phenomena in optical fibers communicating the fronthaul and backhaul in 5G networks. Resonant structures and physical nonlinearities generate a chaotic signal which may encrypt and hide at physical level every communication stream in a very efficient manner. To evaluate the proposed mechanism, an experimental validation based on simulation techniques is also described and results discussed.
APA, Harvard, Vancouver, ISO, and other styles
8

Kelechi, Alsharif, Ramly, Abdullah, and Nordin. "The Four-C Framework for High Capacity Ultra-Low Latency in 5G Networks: A Review." Energies 12, no. 18 (September 6, 2019): 3449. http://dx.doi.org/10.3390/en12183449.

Full text
Abstract:
Network latency will be a critical performance metric for the Fifth Generation (5G) networks expected to be fully rolled out in 2020 through the IMT-2020 project. The multi-user multiple-input multiple-output (MU-MIMO) technology is a key enabler for the 5G massive connectivity criterion, especially from the massive densification perspective. Naturally, it appears that 5G MU-MIMO will face a daunting task to achieve an end-to-end 1 ms ultra-low latency budget if traditional network set-ups criteria are strictly adhered to. Moreover, 5G latency will have added dimensions of scalability and flexibility compared to prior existing deployed technologies. The scalability dimension caters for meeting rapid demand as new applications evolve. While flexibility complements the scalability dimension by investigating novel non-stacked protocol architecture. The goal of this review paper is to deploy ultra-low latency reduction framework for 5G communications considering flexibility and scalability. The Four (4) C framework consisting of cost, complexity, cross-layer and computing is hereby analyzed and discussed. The Four (4) C framework discusses several emerging new technologies of software defined network (SDN), network function virtualization (NFV) and fog networking. This review paper will contribute significantly towards the future implementation of flexible and high capacity ultra-low latency 5G communications.
APA, Harvard, Vancouver, ISO, and other styles
9

Agius, H. "Review: Mobile Commerce: Opportunities, Applications and Technologies of Wireless Business." Computer Bulletin 43, no. 5 (September 1, 2001): 31. http://dx.doi.org/10.1093/combul/43.5.31-c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

González-Nieto, Noé Abraham, Caridad García-Hernández, and Margarita Espinosa-Meneses. "School Culture and Digital Technologies: Educational Practices at Universities within the Context of the COVID-19 Pandemic." Future Internet 13, no. 10 (September 24, 2021): 246. http://dx.doi.org/10.3390/fi13100246.

Full text
Abstract:
The pandemic caused by COVID-19 led schools to continue their work by relying on digital technologies. Changes in this matter are observed within three dimensions in the theoretical and conceptual background: (a) the influence of ITC in education, (b) the macrosocial changes in the educational systems and public policy derived from the COVID-19 pandemic, and (c) the impact of the COVID-19 pandemic in higher education and its role for the future. The general objective of this research was to characterize the educational practices executed by the university community (students, professors, and managers) during the emerging remote classes derived from the pandemic at the Universidad Autonoma Metropolitana, Cuajimalpa Campus, a public educational institution in Mexico (through an explanation for each educational actor profile). As specific research objectives, this paper: (a) examines whether the professors and students had enough digital technology to continue with the classes, (b) defines the obstacles they had in the use of said digital technology, and (c) recognizes the existence of innovative educational practices and determines whether stated learning was achieved in educational programs. For this purpose, a mixed methodology was chosen, comprising the application of surveys to students and professors and semi-structured interviews with managers, professors, and students. It was found that there was innovation in the area of resources (material–economic dimension) and in the area of relationships (socio-political dimension), while the discursive dimension (cultural-discursive dimension) was negatively impacted. Based on the above, we conclude that the school culture of the UAM-C is solid and that it has the necessary technological resources to continue with the teaching–learning process. The educational practice was transformed, which resulted in advantages and disadvantages, but despite these situations, most students developed their learning.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Communications and networks technologies, n.e.c"

1

India), TENCON (1989 Bombay. Information technologies for the 90's: E²C², energy, electronics, computers, communications. New York, NY: Institute of Electrical and Electronics Engineers, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Trends in Electronics Conference (4th 1989 Bombay, India). "Information technologies for the 90's": E²C², energy, electronics, computers, communications. [Bombay, India?]: IEEE, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Makki, Kia. 4th International Conference on Computer Communications and Networks ( I C C N '95). Institute of Electrical & Electronics Enginee, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Communications and networks technologies, n.e.c"

1

Wittevrongel, Sabine, Herwig Bruneel, and Bart Vinck. "Analysis of the Discrete-Time G(G)/Geom/c Queueing Model." In NETWORKING 2002: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications, 757–68. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-47906-6_61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lin, Cheng-Min, and Tzong-Jye Liu. "Data Communications Inside Vehicular Environments." In Wireless Technologies, 847–62. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-101-6.ch320.

Full text
Abstract:
ZigBee is based on IEEE 802.15.4 which specifies the physical layer and medium access control (MAC) for low-cost and low-power LR-WPAN. The technology can be applied in intelligent key, A/C operation and steering wheel inside vehicles. There are two types of devices in ZigBee, FFD and RFD. A FFD can communicate with RFDs and other FFDs, while a RFD can only communicate with a FFD. In ZigBee physical layer, it follows IEEE 802.15.4 standard and operates in unlicensed RF worldwide (2.4GHz global, 915MHz Americas or 868 MHz Europe). A superframe contained an active portion and an inactive portion is used in the MAC layer of ZigBee. The active portion includes CAP and CFP. In the inactive partition, the coordinator can enter sleep mode to save its power. Three main topologies of ZigBee are star, mesh, and tree. However, ZigBee is successfully produced into a low-cost controller applied for automotive applications, including vehicle control and status monitoring. According to the forecast of ON World in 2005 (ON WORLD, 2009), the deployed wireless sensing network nodes will increase to 127 million in 2010 from 1.2 million in 2005. It can be applied in home automation, battlefield surveillance, health care applications and vehicular environments. A wireless sensor network (WSN) constitutes a lot of wireless sensing nodes. In addition, a node in WSN consists of one or more sensors, a radio transceiver, and a microcontroller. The sensor can be used for sensing temperature, pressure, sound, vibration, motion or position, etc. to collect status from devices or environments. The transceiver is used to relay the information of the collected status computed by the microcontroller to a center node, called a gateway or sink. Therefore, a WSN belongs to one type of wireless ad-hoc networks. However, the nodes in a WSN are usually smaller than that in traditional wireless ad-hoc networks regarding node size, computing power, memory size, and transmission rage. In other words, the transmission ability, computing power, and memory size of WSN nodes are limited.
APA, Harvard, Vancouver, ISO, and other styles
3

AbdelHakeem, Shimaa Abdelnaby, Anar Abdel Hady, and HyungWon Kim. "Optimizing 5G in V2X Communications." In Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society, 972–1011. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7708-0.ch041.

Full text
Abstract:
Recently, the automotive industries have accelerated the deployment of Cellular V2X as a motivation to integrate vehicular communication with NewRadio-5G (NR-5G) technology. Nowadays, two critical technologies are concurrently supporting V2X communication: IEEE802.11p and cellular technologies. C-V2X is standardized and designed by the Third Generation Partnership Project (3GPP) for automotive services. C-V2X supports two communication modes through a single platform to provide Wifi-short-range and cellular-long-range communication. Wifi-short-range communication doesn't require network subscription or coverage while the cellular-long-range requires network subscription and coverage. LTE-V2X is the current standard of C-V2X which completed in March-2017 as the 3GPP-Release 14 and enhanced to support the upcoming 3GPP-Release 16 which support the NR-5G capabilities, enhancement, and services. In this chapter, the authors propose the Optimizing of 5G with V2X and analyzing the current V2X standards, introducing the evolution of 5G, challenges, features, requirements, design, and technologies.
APA, Harvard, Vancouver, ISO, and other styles
4

Cui, Tao, Lantao Li, Zhaoyu Zhang, and Chen Sun. "C-V2X Vision in the Chinese Roadmap: Standardization, Field Tests, and Industrialization." In Vehicular Networks - Principles, Enabling Technologies and Perspectives [Working Title]. IntechOpen, 2022. http://dx.doi.org/10.5772/intechopen.107933.

Full text
Abstract:
Cellular-based V2X (C-V2X) technology promoted by Third Generation Partnership Project (3GPP) is gaining increasing attention globally, after many year-long competition with dedicated short-range communications (DSRC) supported by the Institute of Electrical and Electronics Engineers (IEEE) for vehicular to everything communication. As a rising star, China continuously and actively focuses on and contributes to the C-V2X technology development in this technology marathon. Starting from the standardization progress, a quite few Chinese-specific use cases and communication messages are defined for the complicated urban traffics. Based on these dedicatedly designed higher layer protocols, the annual field tests are progressively conducted to testify the interoperability among chipsets, modules, security certificates, and original equipment manufacturer (OEM). Putting enough efforts on industry standards and tests, China is fast commercializing the C-V2X-based road services, for example, robotaxi and robot-bus in representative cities. Thus, in this chapter, we propose to provide sufficient technology views and a summary to show such advanced Chinese C-V2X philosophy.
APA, Harvard, Vancouver, ISO, and other styles
5

Dholakia, Nikhilesh, Morten Rask, and Ruby Roy Dholakia. "It's an M-World After All." In Global Information Technologies, 3604–31. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-939-7.ch256.

Full text
Abstract:
n this concluding chapter, we gather together the lessons emerging from the patterns of mobile commerce evident in the preceding chapters. Mobile applications, commercial and others, are based on four core CLIP functionalities — communications (C), locatability (L), information (I) exchange and payment (P) facilitation. How these capabilities are deployed depends on resources, corporate imaginations, market development and cultural and personal preferences. The chapter authors, based on their close first-hand contextual observations as well as conceptual insights,
APA, Harvard, Vancouver, ISO, and other styles
6

Tuyisenge, Livinus, Marwane Ayaida, Samir Tohme, and Lissan-Eddine Afilal. "Handover Mechanisms in Internet of Vehicles (IoV)." In Global Advancements in Connected and Intelligent Mobility, 1–64. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9019-4.ch001.

Full text
Abstract:
Vertical handover is one of the key technologies that will enable the connected and autonomous vehicles deployment. The emergence of vehicular networks—V2V, V2I, V2X—communications has enabled new applications, such as cooperative intelligent transport systems (C-ITS), real-time applications. However, these networks are characterized by a high level of mobility and dynamic change in the topology, which generates scattered networks. To address this problem and ensure a high level of performance, a new concept denoted heterogeneous vehicular networks (HVN) emerged, which is a key concept of the internet of vehicles (IoV). It consists in a hybridization the vehicular network (IEEE 802.11p) and cellular networks (3G/LTE/4G). In this chapter, authors introduced this new concept of IOV and its architectures and communication layers. Then they explored the different existing data relaying mechanisms in order to propose a new classification of handover approaches. After that, they presented the support of handover mechanisms in LTE and finally highlighted some handover challenges and issues.
APA, Harvard, Vancouver, ISO, and other styles
7

Statica, Robert, and Fadi P. Deek. "Topology for Intelligent Mobile Computing." In Mobile Computing, 589–96. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-054-7.ch051.

Full text
Abstract:
We discuss an interconnectivity framework for data and content delivery to mobile devices that allows data of higher priority to reach the mobile unit in the shortest time possible. Two possible scenarios are presented; one that connects the servers in an N-cube configuration network, and another that shows the same N servers connected in a grid type network. The goal is to minimize the rate of data jumps from server to server until it reaches the mobile device. As the mobile user travels, the mobile device registers itself with the next server and the session is migrated from the old server to the new one without interruptions, in an analogous way, cell phones move from one cell to another. Starting with the idea that all data is not equal (in importance/priority), this article suggest a framework topology for intelligent mobile computing that guarantees data will reach the mobile device in a minimum amount of time, assuring at the same time the privacy of transmission. The integration of this type of technology into the 3r d Generation (3G), and 4t h Generation (4G) mobile computing is also discussed. Pervasive computing is rapidly emerging as the next generation of computing with the underlying premise of simplicity (of use), minimal technical expertise, reliability, and intuitive interactions. As technology continues to advance and mobile devices become more and more omnipresent, the aim towards achieving easier computing, more availability and prevalence is becoming a given. Through the clever use of advanced technologies, the new generation of intelligent mobile computing has the opportunity to serve user needs via prevalent computing devices that are ever more transportable and connected to an increasingly ubiquitous network structure. Mobile communication is changing as the trends of media convergence including the Internet and its related electronic communication technologies and satellite communications collide into one. A change is being ushered by the 3G (3r d Generation) mobile technology with the usability and usefulness of information delivered to mobile devices taking on added features. For example, multimedia messaging, as opposed to voice transmissions, being delivered to cell phones has rendered such mobile devices an integral part of people’s lives and a core part of how they conduct their daily business rather than an add on tool (Buckingham, 2001). The 3G mobile phone system aims at unifying the disparate standards of current second generation wireless systems. The idea is to eliminate the different types of global networks being adopted with a single standard network. This will allow for the delivery of multimedia content and propagation through the network without the need for conversion from one standard to another. 3G systems need smaller cells thus the need for more base stations (mostly due to their operating frequency, power requirements, and modulation) and in many cases will not be feasible to install them in areas where population is not so dense (i.e., rural areas) (Garber, 2002). Because of these requirements and conditions, a better way to deliver the communication must be established. However, global access to such mobile devices will create data delivery challenges and servers can become clogged with unwanted communication, like that of wired Internet access. The need for moving relevant data to mobile devices in the shortest time possible becomes of utmost importance.
APA, Harvard, Vancouver, ISO, and other styles
8

Baecker, Ronald M. "Digital inclusion." In Computers and Society. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198827085.003.0006.

Full text
Abstract:
J. C. R. Licklider, Vannevar Bush, Doug Engelbart, Ted Nelson, and Alan Kay optimistically and exuberantly imagined how computers could better the lives of people. Much of this has come to pass. The Internet supports learning by ‘students’ at all levels. Information on laws, procedures, diseases, and medical care may be found on the web. The Internet now provides the easiest, or in some cases the only, way to pay bills or order items such as books, groceries, and even clothing. It is a means of communication with family, friends, individuals one would like to meet, individuals with whom one could share insights, and potential employers. Music, films, and other means of entertainment stream to our digital devices. This implies that those for whom digital technology is not available are at a disadvantage. The gap between the technology-haves and the technology-have-nots became known in the 1990s as a digital divide. The concept is nuanced; we can speak of availability or scarcity of hardware, such as personal computers (PCs) and mobile phones; of infrastructure such as cellular networks; of communications bandwidth that enables a smooth media viewing experience; of expertise in using the technology; of commitment to its use; and of engagement in the process. Some only consume information; others contribute their ideas via methods such as blogging and tweeting. Yet a better way to describe digital technology widely accessible is the goal of social inclusion, to allow all individuals, regardless of socioeconomic status, location, race, gender, or ability or disability, to take advantage of the benefits of modern computing and telecommunications. To have terminology that is even more evocative, we shall use the more modern and descriptive term of digital inclusion. This has been defined by the International Telecommunications Union as ‘empowering people through information and communication technologies (ICTs)’. The term ‘people’ is meant here to imply all people throughout the world. This chapter will first examine the digital divide between the haves and the have-nots (often the rich and the poor) within several nations. Examples of the benefits of digital inclusion will be cited.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Communications and networks technologies, n.e.c"

1

Heymans, Yolande. "Exploring Open Education Practices (OEP) in Undergraduate, Interprofessional Education (IPE)." In Tenth Pan-Commonwealth Forum on Open Learning. Commonwealth of Learning, 2022. http://dx.doi.org/10.56059/pcf10.3965.

Full text
Abstract:
Advancement in information and communication technology (ICT) laid the foundation for open education practices (OEP). The open educational resources (OER) movement has been high on the accessibility and inclusivity agenda, however, the OPAL report: Beyond OER – Shifting Focus to Open Educational Practices (OPAL, 2011) suggests extending the focus beyond the use of OER in higher education to innovative OEP. OEP is defined as “a broad description of collaborative practices that include the creation, use, and reuse of OER, as well as pedagogical practices employing participatory technologies and social networks for interaction, peer-learning, knowledge creation, and empowerment of learners” (Cronin, 2017, p. 18). // Lecturers introduced OEP into a second-year module. Working in interprofessional teams, health and social care students (N:1734) conducted research and used open technologies to design a learning object. Learning objects were assessed, and with students’ consent, shared as OER. Within the evolving OEP domain, this SoTL research project explored students’ perceptions on the use of OEP in undergraduate, interprofessional education (IPE). Ethics approval was granted. Voluntary non-probability sampling was used. The study population comprised of all students registered for the module (N:1734) with 1145 (n) students giving written consent. // This qualitative study was anchored in a constructivist-interpretivist paradigm. A scoping review provided the theoretical foundation and empirical data was collected through an online reflection activity. Data was anonymised, thematically analysed, co-coded, and interpreted. // Participants perceived the introduction of OEP as very positive. Participants valued working collaboratively, gaining insight into diverse disciplinary approaches, and learning with, form, and about their peers. OEP allowed for increased engagement with the subject matter, better understanding, and knowledge retention. Participants valued learning new skills, being creative, co-constructing knowledge, and developing a learning object that can be used for more than just assessment purposes. Students recommended the inclusion of OEP in other modules. // References. Cronin, C. (2017). Openness and Praxis: Exploring the Use of Open Educational Practices in Higher Education. International Review of Research in Open and Distributed Learning, 18(5), 15–34 doi: https://doi.org/10.19173/irrodl.v18i5.3096
APA, Harvard, Vancouver, ISO, and other styles
2

Changqing, Gong, Bi Xiaoxia, and Wang Xiaoyan. "Improving Congestion Control Algorithm in Distributed Spaceflight TT&C Networks." In 2007 International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications. IEEE, 2007. http://dx.doi.org/10.1109/mape.2007.4393469.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Haifeng, Yang, Chai Lin, Hu Jianping, Li Dian, and Lei Li. "Optics and Microwave Photonics Technologies Illuminate the Future of Space TT&C System." In 2019 18th International Conference on Optical Communications and Networks (ICOCN). IEEE, 2019. http://dx.doi.org/10.1109/icocn.2019.8934056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Taleb, Samiha Ait, Hachem Slimani, and Mohamed Essaid Khanouche. "A routing approach based on (N, p)-equitable b-coloring of graphs for Wireless Sensor Networks." In 2018 International Conference on Smart Communications in Network Technologies (SaCoNeT). IEEE, 2018. http://dx.doi.org/10.1109/saconet.2018.8585585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Taylor, Max, Matthew Cunnien, and James Kleveland. "Mission System Needs for Small Unmanned Systems." In Vertical Flight Society 78th Annual Forum & Technology Display. The Vertical Flight Society, 2022. http://dx.doi.org/10.4050/f-0078-2022-17495.

Full text
Abstract:
The United States (US) Department of Defense (DoD) is looking to reverse the trend of new programs costing significantly more than their predecessors while providing advanced capabilities to the warfighter by supplementing existing manned platforms with small Unmanned Air Systems (sUAS). Traditionally sUAS were leveraged for limited tactical objectives with two-way communication to a single entity such as a ground station or as part of a single manned-unmanned team (MUM-T). However, advancements in collaborative networks, mature autonomy and continued miniaturization of key technologies have expanded the potential for a broader operational use of sUAS. The multi-domain connected battlespace of the future envisions significant strategic roles for sUAS to provide actionable information more broadly to the joint forces. The expanded use of sUAS platforms is evident in the future US Army strategy to augment the existing and future capabilities of its own vertical lift platforms. In order to dis-integrate and exploit enemy threat systems the US Army intends to leverage sUAS systems such as Air Launched Effects (ALE) and Future Tactical Unmanned Aircraft Systems (FTUAS) (Ref. 1). These will be part of the Future Attack Reconnaissance Aircraft (FARA) ecosystem allowing extended reconnaissance, security, and attack operations. The US Air Force is also identifying new Concepts of Operation (CONOPS) which can leverage sUAS as a force multiplier to help against emerging threats (Ref. 2). This includes existing continued enhancement of intelligence, surveillance, and reconnaissance (ISR) capabilities as well as new MUM-T and swarming CONOPS. In this new role, there are several challenges that emerge for sUAS mission systems. - Existing sUAS security boundaries are focused on vulnerabilities between the aircraft and the ground station or controlling vehicle. Introduction of sUAS in the connected multi-domain battlespace opens the security boundary to include all participants consuming data from these vehicles. This results in additional attack vectors for adversaries requiring new security considerations for a sUAS. - Secure and available communications are key to supporting multi-domain battlespace doctrine at the timing and tempo required to gain advantage on the adversary. Introduction of sUAS to this assumes the ability to interconnect securely with existing and future communication protocols at a significantly reduced size, weight and power. Availability of secure communication from sUAS is challenging when considering using these unmanned systems to support operations in contested environments. - Autonomous operations and processing on the edge are key to reaping the benefits of the sUAS operating in a MUM-T environment. Moving the processing of key capabilities to the edge allows for the quicker response times and the ability for the sUAS to continue operations in contested environments and report back when secure communications become available. It can be difficult to combine the processing resources and power required to perform the needed advanced autonomous behaviors in an extremely small form factor. - With advancements in technology, the emerging threats to warfighter are outpacing upgrades of existing mission systems (Ref. 3). The ability to rapidly update mission systems will be required to counter these threats. The mission system architectures for sUAS will need to be designed with Modular Open System Approach (MOSA) solutions that can allow rapid updates to hardware and software. This ability for fast third-party system update and integration will be required to keep sUAS relevant and maintain an operational advantage. The paper will offer analysis of the implications of the emerging role for sUAS with an emphasis on potential impacts to the vertical lift community. This resultant paper will examine how sUAS performing a more interconnected role will impact overall battlespace security. In addition, the paper will analyze and assess the impacts to the attributes of sUAS including size, weight, power, and cost (SWAP-C), life-cycle cost, mission system and payload integration and upgradability. Finally, the paper will identify technology considerations to address sUAS interoperability, safety, security, qualification, and accommodations for new, as well as legacy technology.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography