Journal articles on the topic 'Communications and networks technologies, n.e.c'

To see the other types of publications on this topic, follow the link: Communications and networks technologies, n.e.c.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Communications and networks technologies, n.e.c.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mendoza Navarrete, Martha Lorena, Yenny Alexandra Zambrano Villegas, Lilia del Rocio Bermudez Cevallos, and Yanina Alexandra Viteri Alcivar. "New technologies and new paradigms: the new technological societies approach." Universidad Ciencia y Tecnología 25, no. 110 (August 26, 2021): 155–63. http://dx.doi.org/10.47460/uct.v25i110.487.

Full text
Abstract:
New technologies represent novelty depending on the era in which they are viewed, but in all cases they represent social evolution in some way. At present, new technologies are associated with the use of computer tools that strengthen processes, mechanisms, and undoubtedly, social communication. This paper evaluates new technologies focused on social transformations, their impact on human behavior and the social repercussions they may bring with their prevalence over time. Several academic documents of a scientific and technical nature are evaluated, with a view to defining the paradigms of technologies in their evolutionary process through societies. The most outstanding results show that the modern world is subject to a significant impact of information technology, that it encompasses not only educational aspects but also family, personal and economic aspects, and that the implications of traditional substitution by technology may be detrimental to mankind. Keywords: Technological implications, new societies, technological impact. References [1]C. Renfrew y P. Bahn, Arqueología: Teoría, métodos y práctica., Madrid: Akal, 1993. [2]Y. Laniuk, «Freedom in the Society of Control: Ethical challenges,» Ethics and Bioethics, vol. 10, nº 34, pp. 203-220, 2021. [3]J. Chaves, «Desarrollo tecnológico en la Primera Revolución Industrial,» Universidad de Extremadura, Servicio de Publicaciones, Extremadura, 2004. [4]A. Bessarab, O. Mitchuk, A. Baranetska, N. Kodatska, O. Kvasnytsia y G. Mykytiv, «Social networks as a phenomenon of the information society,» Journal of Optimization in Industrial Engineering, vol. 14, nº 1, pp. 35-42, 2021. [5]E. Popkova, A. Bogoviz y B. Sergi, «Towards digital society management and ‘capitalism 4.0’ in contemporary Russia,» Humanities and Social Sciences Communications, vol. 8, nº 1, p. 77, 2021. [6]A. Núñez, «Riesgo e Incertidumbre en las Sociedades Tecnológicas complejas.,» Cuaderno del ateneo, pp. 44-57, 2007. [7]wikipedia, «Accidente del transbordador espacial Challenger,» 1989. [Online]. Available: https://es.wikipedia.org/wiki/Accidente_del_transbordador_espacial_Challenger. [Last access: 2021]. [8]J. Martínez, «La innovación tecnológica en las sociedades cooperativas y otras organizaciones de participación,» Rev.Est. Coop., vol. 48, 2001. [9]J. Echeverría, «Ética y sociedades tecnológicas,» Isegoría, vol. 41, pp. 217-229, 2009. [10]R. Pardo, «La cultura científico-tecnológica de las sociedades de la modernidad tardía,» Comunicar ciencia, vol. 51, pp. 35-86, 2001. [11]A. Zatls, «Metales, ambiente y las sociedades tecnológicas: ¿hacia dónde nos dirigimos?,» Química viva, vol. 10, nº 2, pp. 1-20, 2011.
APA, Harvard, Vancouver, ISO, and other styles
2

Sgurev, Vassil, Vladimir Jotsov, and Mincho Hadjiski. "Intelligent Systems: Methodology, Models, and Applications in Emerging Technologies." Journal of Advanced Computational Intelligence and Intelligent Informatics 9, no. 1 (January 20, 2005): 3–4. http://dx.doi.org/10.20965/jaciii.2005.p0003.

Full text
Abstract:
From year to year the number of investigations on intelligent systems grows rapidly. For example this year 245 papers from 45 countries were sent for the Second International IEEE Conference on Intelligent Systems (www.ieee-is.org; www.fnts-bg.org/is) and this is an increase of more than 50% by all indicators. The presented papers on intelligent systems were marked by big audiences and they provoked a significant interest that ultimately led to the formation of vivid discussions, exchange of ideas and locally provoked the creation of working groups for different applied projects. All this reflects the worldwide tendencies for the leading role of the research on intelligent systems theoretically and practically. The greater part of the presented research dealt with traditional for the intelligent systems problems like artificial intelligence, knowledge engineering, intelligent agents, neural and fuzzy networks, intelligent data processing, intelligent control and decision making systems, and also new interdisciplinary problems like ontology and semantics in Internet, fuzzy intuitionistic logic. The majority of papers from the European and American researchers are dedicated to the theory and the applications of the intelligent systems with machine learning, fuzzy inference or uncertainty. Another big group of papers focuses on the domain of building and integrating ontologies of applications with heterogeneous multiagent systems. A great number of papers on intelligent systems deals with fuzzy sets. The papers of many other researchers underscore the significance of the contemporary perception-oriented methods and also of different applications in the intelligent systems. On the first place this is valid for the paradigm of L. A. Zadeh 'computing with words'. The Guest Editors in the present specialized journal volume would like to introduce a wealth of research with an applied and theoretical character that possesses a common characteristic and it is the conference best papers complemented and updated by the new elaborations of the authors during the last half a year. A short description of the presented in the volume papers follows. In 'Combining Local and Global Access to Ontologies in a Multiagent System' <B>R. Brena and H. Ceballos (Mexico)</B> proposed an original way for operation with ontologies where a part of the ontology is processed by a client's component and the rest is transmitted to the other agents by an ontology agent. The inter-agent communication is improved in this way. In 'Fuzzy Querying of Evolutive Situations: Application to Driving Situations' <B>S. Ould Yahia and S. Loriette-Rougegrez (France)</B> present an approach to analysis of driving situations using multimedia images and fuzzy estimates that will improve the driver's security. In 'Rememberng What You Forget in an Online Shopping Context' <B>M. Halvey and M. Keane (Ireland)</B> presented their approach to constructing online system that predicts the items for future shopping sessions using a novel idea called Memory Zones. In 'Reinforcement Learning for Online Industrial Process Control' the authors <B>J. Govindhasamy et al. (Ireland)</B> use a synthesis of dynamic programming, reinforcement learning and backpropagation for a goal of modeling and controlling an industrial grinding process. The felicitous combination of methods contributes for a greater effectiveness of the applications compared to the existing controllers. In 'Dynamic Visualization of Information: From Database to Dataspace' the authors <B>C. St-Jacques and L. Paquin (Canada)</B> suggested a friendly online access to large multimedia databases. <B>W. Huang (UK)</B> redefines in 'Towards Context-Aware Knowledge Management in e-Enterprises' the concept of context in intelligent systems and proposes a set of meta-information elements for context description in a business environment. His approach is applicable in the E-business, in the Semantic Web and in the Semantic Grid. In 'Block-Based Change Detection in the Presence of Ambient Illuminaion Variations' <B>T. Alexandropoulos et al. (Greece)</B> use a statistic analysis, clustering and pattern recognition algorithms, etc. for the goal of noise extraction and the global illumination correction. In 'Combining Argumentation and Web Search Technology: Towards a Qualitative Approach for Ranking Results' <B>C. Chesñevar (Spain) and A. Maguitman (USA)</B> proposed a recommender system for improving the WEB search. Defeasible argumentation and decision support methods have been used in the system. In 'Modified Axiomatic Basis of Subjective Probability' <B>K. Tenekedjiev et al. (Bulgaria)</B> make a contribution to the axiomatic approach to subjective uncertainty by introducing a modified set of six axioms to subjective probabilities. In 'Fuzzy Rationality in Quantitative Decision Analysis' <B>N. Nikolova et al. (Bulgaria)</B> present a discussion on fuzzy rationality in the elicitation of subjective probabilities and utilities. The possibility to make this special issue was politely offered to the Guest Editors by Prof. Kaoru Hirota, Prof. Toshio Fukuda and we thank them for that. Due to the help of Kenta Uchino and also due to the new elaborations presented by explorers from Europe and America the appearance of this special issue became possible.
APA, Harvard, Vancouver, ISO, and other styles
3

Corrêa, André Garcia, and Daniel Ribeiro Silva Mill. "Hierarquia social dos objetos: o capital científico das tecnologias digitais de informação e comunicação no campo da educação (Social Hierarchy of objects: The scientific capital of the Digital Information and Communication Technologies in the field of Education)." Revista Eletrônica de Educação 14 (July 28, 2020): 3756106. http://dx.doi.org/10.14244/198271993756.

Full text
Abstract:
This research makes empirical tests of a Bourdieu concept for sociology of science: the social hierarchy of objects. Looking at the specific field of Education, the research sought to measure the position of Digital Information and Communication Technologies (DICT) within this hierarchy. To this end, we collected metadata of thesis defended in postgraduate programs in Education in Brazil with grade five and higher between 1996 and 2016. The data indicated the production by HEI and geographically. Also the keywords were analyzed in a Network and indicators of centrality and density were used to map the hierarchy of objects and, consequently, the distribution of scientific capital among them in the field. Empirical tests have shown that DICT and distance education, as necessarily mediated by a technology, have relevance within the field as a concentration of symbolic capital. The analysis showed that the Hierarchy formed by the technologies segment was denser than the total network and that there was a considerable weight for the distance education modality. Regarding the hierarchy of objects in the DE subfield, a certain autonomy was observed in relation to the complete field, since its objects turned to subjects more important to the modality related to the student. Finally, statements from other DE studies were compared with the research data that showed some quantitative divergences, but qualitative convergences emphasizing the same observed trends and corroborating the analyzes of this research.ResumoEsta investigação faz testes empíricos de um conceito de Bourdieu para a sociologia da ciência: a Hierarquia Social dos Objetos. Olhando para o campo específico da Educação, a investigação procurou mensurar a posição das Tecnologias Digitais de Informação e Comunicação (TDIC) dentro desta hierarquia. Para tanto, foram coletados metadados de teses defendidas em Programas de pós-graduação em Educação no Brasil com nota cinco e superior entre os anos de 1996 e 2016. Os dados indicaram a produção por IES e geograficamente bem como as palavras-chave foram analisadas em rede e indicadores de centralidade e densidade foram utilizados para mapear a hierarquia dos objetos e, por consequência, a distribuição de capital científico entre eles no campo. Os testes empíricos mostraram que as TDIC e também a EaD, por ter necessariamente mediação por uma tecnologia, têm relevância dentro do campo enquanto concentração de capital simbólico. As análises mostraram que a Hierarquia formada pelo recorte de Tecnologias chegava a ser mais densa que a rede total e que havia um peso considerável para a modalidade a distância. Sobre a hierarquia de objetos no subcampo EaD, observou-se uma certa autonomia em relação ao campo completo, pois seus objetos se voltavam a assuntos mais caros à modalidade relacionados ao aluno. Por fim, foram confrontadas afirmações de outras investigações sobre EaD com os dados da investigação que mostraram algumas divergências quantitativas, mas convergências qualitativas enfatizando as mesmas tendências observadas e corroborando as análises desta investigação.Palavras-chave: Educação, Sociologia da ciência, Produção científica, Tecnologias Digitais de Informação e Comunicação.Keywords: Education, Sociology of science, Scientific production, Digital information and communication technologies.ReferencesÁVILA, Patrícia. A distribuição do capital científico: diversidade interna e permeabilidade externa no campo científico. Sociologia – problemas e práticas, Lisboa – Portugal, n. 25, p. 9-49, 1997.BLONDEL, Vincent D.; GUILLAUME, Jean-Çoup; LAMBIOTTE, Renaud; LEFEBVRE, Etienne. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, Trieste – Itália, n.10, p. 1000, 2008.BORGATTI, Stephen P.; EVERETT, Martin G.; JOHNSON, Jeffrey C. Analyzing Social Networks. Londres: SAGE, 2013.BOURDIEU, Pierre. Método científico e hierarquia social dos objetos. In: NOGUEIRA, Maria Alice; CATANI, Afrânio (Org.). Escritos de educação. Petrópolis: Editora Vozes, 2007. p. 33-38.BOURDIEU, Pierre. Os usos sociais da ciência: por uma sociologia clínica do campo científico. 1. ed. São Paulo: Editora UNESP, 2004. 88 p.CABRAL, Ana Lúcia Tinoco; TARCIA, Rita Maria Lino. O novo papel do professor na Ead. In: LITTO, Fredric Michael; FORMIGA, Marcos. Educação a distância: o estado da arte. v. 2; São Paulo: Pearson Education do Brasil, 2011. 443p.CORRÊA, André Garcia; MILL, Daniel Ribeiro Silva. Análise da percepção do docente virtual no ensino de música pela educação a distância. Acta Scientiarum. Education, Maringá, v. 38, n. 4, p. 425-436, Out.-Dez., 2016.COSTA, Larissa et al. Redes: uma introdução às dinâmicas da conectividade e da auto-organização. 1. ed. Brasília: WWF-Brasil, 2003. 91 p.KENSKI, Vani Moreira; MEDEIROS, Rosângela de Araújo; ORDÉAS, Jean. Grupos que pesquisam Educação a Distância no Brasil: primeiras aproximações. In: MILL, Daniel Ribeiro Silva et al. (Orgs.). Educação a distância: dimensões da pesquisa, da mediação e da formação. 1. ed. São Paulo: Artesanato Educacional, 2018. 194 p.MILL, Daniel Ribeiro Silva; OLIVEIRA, Márcia Rozenfeld Gomes. A Educação a distância em pesquisas acadêmicas: uma análise bibliométrica em teses do campo educacional. Educar em Revista, Curitiba, Educação especial n.4, 2014. p.15-36.MOORE, Michael G.; KEARSLEY, Greg. Educação a distância: uma visão integrada. São Paulo: Cengage Learning, 2010. 398 p.PELLEGRINI, Thalita de Oliveira; SILVA, Sheila Serafim da; FERREIRA, Maxwel de Azevedo. O perfil da pesquisa acadêmica sobre educação a distância no Brasil e no mundo. REAd, Porto Alegre, v. 23, n. especial, p.371-393, dez. 2017.SANTOS, Elaine Maria dos et al. Educação a distância no Brasil: Evolução da produção científica. In: CONGRESSO INTERNACIONAL DE EDUCAÇÃO A DISTÂNCIA, 13., 2007, Curitiba. Anais [...]. São Paulo: ABED, 2007.e3756106
APA, Harvard, Vancouver, ISO, and other styles
4

Lu, Yun Fei, Ming He, and Xin Gao. "LTE Network Parameters Optimization Based on Automatic Cell Planning." Applied Mechanics and Materials 380-384 (August 2013): 1931–34. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.1931.

Full text
Abstract:
Wireless network optimization is an important link in the beginning of the wireless communication network construction process, which decides the construction of wireless communication network whether scientific. This paper focuses on the method and content of the LTE wireless network optimization, mainly involves in the planning process and key technologies of LTE wireless network. First, this paper discusses LTE network parameters optimization include PCI, Cells, RS, C\N and RSC\RSRP. Then, verify the scheme scientific based on Automatic Cell Planning. Finally, through the network experiment examine the feasibility of the scheme.
APA, Harvard, Vancouver, ISO, and other styles
5

Kovbych, Tetiana. "DIGITALIZATION VECTOR OF EU LABOR MARKET DEVELOPMENT." Economics & Education 7, no. 2 (August 31, 2022): 45–51. http://dx.doi.org/10.30525/2500-946x/2022-2-7.

Full text
Abstract:
The article is devoted to the development of digital economy and information networks on the basis of advances in information and telecommunication technologies, affecting the qualitative and structural changes in all sectors of social production, in particular in the EU labor market. This leads to the transformation of production systems, management and state regulation in most EU countries. Having recovered from World War II, humanity has launched a new economic model called "smart production and consumption". It is shown that the economy of the XXI century, acquiring more and more signs of digitalization, is significantly transformed into a global digital economy. The development of ICTs reflects notable changes in the organization of the production process and labor activities, as new technologies stop performing certain types of labor activities. At the same time, they create a demand for people with new professional and qualification characteristics and contribute to the emergence of new jobs, thus creating new opportunities and requirements that a modern automated worker should meet. The fact that new opportunities for Ukrainian IT specialists have appeared on the EU labor market deserves special attention, the number of which has increased significantly due to the military aggression of the Russian Federation against Ukraine. IT has become an integral part of modern life. Thus, at the beginning of 2022 there were 90 thousand IT specialists (programmers) working in Ukraine. However, it is worth noting that Ukraine is currently experiencing a very difficult military situation, which reflects an accelerated outflow of population to other regions of Ukraine and EU countries. About 3.5 million Ukrainians have moved to the European Union. Among the "forced migrants" there is a certain share of people with skills in the IT industry. Considerable attention is paid to the analysis of IT skills, which are the main driving force behind the digitalization of the EU labor market. In particular, these qualities include the ability to work with foreigners, to attract investment, to work with computer technology and use technology in various cases, and to learn quickly and know foreign languages. This makes IT specialists very demanding. On the EU labor market, professions such as IT recruiter, project manager, PR manager, product manager and system analyst are most attractive to men, while HR manager, SEO-marketer, copywriter and WEB-analyst are more popular among women. Methodology. The methodology of expert assessment of the level of digitalization in the EU labor market is determined by an integral indicator, namely the index of digitalization of the labor market. This index measures the share of employment in services, the share of employment in knowledge-intensive services, the level of access to ICTs, the level of use of ICTs, the level of adoption of new organizational models of work based on ICTs, the share of exports of information and communication services, and the share of exports of digital services. This methodology allows to rank the countries of the European Union on the degree of digitalization of the labor market and prove the ability of states to provide employment growth through the spread of digital technology and the development of a digital global space. Results. It has been argued that humans today are hostage to resource collapse. In this case there is a dilemma: either to move along the current path, or technologically to become part of nature, that is, to live at the expense of fundamentally new inexhaustible resources and technologies created by wildlife, but using the most modern technology. This means the convergence of science and technology, consisting of similarities in the device and function of relatively distant groups, namely the convergence in the evolution of such technologies as N-nano, B-bio, I-Information, C-cognitive, the so-called NBIC-technologies. It has been established that today's programmers come in different ranks: junior, middle, and senior, and are proficient in major programming languages such as C, C++, C#, Java, Python, JavaScript, and PHP. With these qualities, programmers can work in a variety of industries because they are highly adaptable to change and have patience, because technology is constantly changing. Therefore, undoubtedly, such employees in the field of digital technology are very desirable for employers. Practical implications. As an effective practical method of analyzing the digitalization of the EU labor market the system approach and the development of IT-technologies are proposed. They cover the whole complex of scientific and technical problems, which, for all their specificity and diversity, are similar in their understanding and consideration of the objects and systems they study. That is, sets of interrelated elements that act as a whole. The index of digitalization of the labor market is one of these elements. It is used to assess the large share of IT services in various areas of the EU labor market. Value/originality. The article discusses the current directions of IT influence on the digitalization of the EU labor market. It shows how exactly IT contributes to the implementation of automated labor at the current stage of development of the digital economy in the EU. The number of people engaged in technical and technological labor in the digital space is relatively increasing, which forms the digital employment market. The digitalization of the labor market is automated through information systems and the spread of information technology. It requires a new type of thinking from the modern worker, formed on the basis of general education and special knowledge and skills in the use of innovative information technologies.
APA, Harvard, Vancouver, ISO, and other styles
6

Rojas Sánchez, Ahuitz. "SITUACION DE ABUSO SEXUAL BASADO EN IMAGENES EN MEXICO ENTRE 2017 Y 2018 (IMAGED-BASED SEXUAL ABUSE IN MEXICO BETWEEN 2017 AND 2018)." Universos Jurídicos, no. 18 (June 8, 2022): 1–22. http://dx.doi.org/10.25009/uj.vi18.2621.

Full text
Abstract:
Resumen: El objetivo de la presente investigación es explorar la estructura y el contenido de una red de usuarios de abuso sexual basado en imágenes en Twitter. Para ello se analizaron los perfiles de Twitter que contienen la palabra "Quemón o “Nudes” utilizando análisis de redes, técnicas de procesamiento natural del lenguaje. Entre 2017 y 2018 hubo una comunidad de abuso sexual basado en imágenes en Twitter. Al menos 329 usuarios se dedicaron y se auto describieron como cuentas sexualmente explícitas, vengativas, y en donde contenido sexual no consensual podía ser compartido de forma anónima. Ya con seguidores, la red comprende a más de 130,000 personas. Esta es una estimación conservadora, más cuentas podrían utilizar diferentes palabras clave, no tener ninguna descripción, o formar parte de comunidades privadas. Estos resultados sugieren que los consumidores de contenido de abuso sexual basado en imágenes son los principales responsables de su propagación. Abstract: This study aimed to explore the structure and content of an image-based sexual abuse user network on Twitter. For this purpose, Twitter profiles containing the word “Quemones” or "Nudes" were analyzed using network analysis, natural language processing techniques. Between 2017 and 2018 there was a community of image-based sexual abuse on Twitter. At least 329 users engaged in and self- described themselves as sexually explicit, vindictive accounts, and where nonconsensual sexual content could be shared anonymously. Already with followers, the network comprises more than 130,000 people. This is a conservative estimate; more accounts could use different keywords, have no description, or be part of private communities. These results suggest that consumers of image-based sexual abuse content are primarily responsible for its spread. Fuentes de Consulta: Allen, W. D. (2007). The Reporting and Underreporting of Rape. Southern Economic Journal, 73(3), 623–641. https://doi.org/10.2307/20111915 Angelides, S. (2013). ‘Technology, hormones, and stupidity’: The affective politics of teenage sexting. Sexualities, 16(5–6), 665–689. https://doi.org/10.1177/1363460713487289 Baum, M. A., Cohen, D. K., & Yuri, M. C. (2018). Rape Culture and Its Effects: Evidence from U.S. Newspapers, 2000-2013. Quarterly Journal of Political Science, 13(3), 263–289. Blondel, V. D., Guillaume, J.-L., Lambiotte, R., & Lefebvre, E. (2008). Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, 2008(10), P10008. https://doi.org/10.1088/1742-5468/2008/10/P10008 Boeringer, S. B. (1994). Pornography and sexual aggression: Associations of violent and nonviolent depictions with rape and rape proclivity. Deviant Behavior, 15(3), 289–304. https://doi.org/10.1080/01639625.1994.9967974 Chou, W. S., Hunt, Y. M., Beckjord, E. B., Moser, R. P., & Hesse, B. W. (2009). Social Media Use in the United States: Implications for Health Communication. Journal of Medical Internet Research, 11(4). https://doi.org/10.2196/jmir.1249 CIET Africa. (1998). Prevention of sexual violence. A social Audit of the role of the police in the jurisdiction of Johannesburg’s Southern Metropolitan Local Council. Johannesburg. Citron, D. K., & Franks, M. A. (2016). Criminalizing Revenge Porn, 38. Crofts, T., Lee, M., McGovern, A., & Milivojevic, S. (2015). Sexting and Young People. UK: Palgrave Macmillan. Dir, A. L., & Cyders, M. A. (2015). Risks, Risk Factors, and Outcomes Associated with Phone and Internet Sexting Among University Students in the United States. Archives of Sexual Behavior, 44(6), 1675–1684. https://doi.org/10.1007/s10508-014-0370-7 Döring, N. (2014). Consensual sexting among adolescents: Risk prevention through abstinence education or safer sexting? Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 8(1). Retrieved from https://cyberpsychology.eu/article/view/4303 Duxbury, S. W., & Haynie, D. L. (2018). The Network Structure of Opioid Distribution on a Darknet Cryptomarket. Journal of Quantitative Criminology, 34(4), 921–941. https://doi.org/10.1007/s10940-017-9359-4 Faloutsos, M., Faloutsos, P., & Faloutsos, C. (1999). On Power-Law Relationships of the Internet Topology. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (pp. 251–262). Figueredo, A. J., Gladden, P. R., Sisco, M. M., Patch, E. A., & Jones, D. N. (2015). The Unholy Trinity: The Dark Triad, Sexual Coercion, and Brunswik-Symmetry. Evolutionary Psychology, 13(2), 147470491501300220. https://doi.org/10.1177/147470491501300208 Gámez-Guadix, M., Almendros, C., Borrajo, E., & Calvete, E. (2015). Prevalence and Association of Sexting and Online Sexual Victimization Among Spanish Adults. Sexuality Research and Social Policy, 12(2), 145–154. https://doi.org/10.1007/s13178-015-0186-9 Harkness, E. L., Mullan, B., & Blaszczynski, A. (2015). Association Between Pornography Use and Sexual Risk Behaviors in Adult Consumers: A Systematic Review. Cyberpsychology, Behavior, and Social Networking, 18(2), 59–71. https://doi.org/10.1089/cyber.2014.0343 Hsieh, H.-F., & Shannon, S. E. (2005). Three Approaches to Qualitative Content Analysis. Qualitative Health Research, 15(9), 1277–1288. https://doi.org/10.1177/1049732305276687 INEGI. (2017). Encuesta Nacional de Victimización y Percepción Sobe Seguridad Pública (ENVIPE) 2017 (p. 18). Mexico: Instituto Nacional de Estadística y Geografía. Retrieved from http://www.beta.inegi.org.mx/proyectos/enchogares/regulares/envipe/2017/ INEGI. (2018). Banco de Información Económica (BIE) (Data Base). Mexico: Instituto Nacional de Estadística y Geografía. Retrieved from http://www.inegi.org.mx/Sistemas/BIE/Default.aspx?Topic=0&idserPadre=10100360#D10100360 Jewkes, R., & Abrahams, N. (2002). The epidemiology of rape and sexual coercion in South Africa: an overview. Social Science & Medicine, 55(7), 1231–1244. https://doi.org/10.1016/S0277-9536(01)00242-8 Jonason, P. K., Girgis, M., & Milne-Home, J. (2017). The Exploitive Mating Strategy of the Dark Triad Traits: Tests of Rape-Enabling Attitudes. Archives of Sexual Behavior, 46(3), 697–706. https://doi.org/10.1007/s10508-017-0937-1 Karaian, L. (2014). Policing ‘sexting’: Responsibilization, respectability and sexual subjectivity in child protection/crime prevention responses to teenagers’ digital sexual expression. Theoretical Criminology, 18(3), 282–299. https://doi.org/10.1177/1362480613504331 Kjellgren, C., Priebe, G., Svedin, C. G., & Långström, N. (2010). Sexually Coercive Behavior in Male Youth: Population Survey of General and Specific Risk Factors. Archives of Sexual Behavior, 39(5), 1161–1169. https://doi.org/10.1007/s10508-009-9572-9 Kleinberg, J. M. (1999). Hubs, authorities, and communities. ACM Computing Surveys, 31(4es), 5-es. https://doi.org/10.1145/345966.345982 Makin, D. A., & Morczek, A. L. (2015). The Dark Side Of Internet Searches: A Macro Level Assessment Of Rape Culture. https://doi.org/10.5281/zenodo.22057 Marganski, A., & Melander, L. (2015). Intimate Partner Violence Victimization in the Cyber and Real World: Examining the Extent of Cyber Aggression Experiences and Its Association With In-Person Dating Violence. Journal of Interpersonal Violence, 1–25. Newman, M. E. J. (2001). Clustering and preferential attachment in growing networks. Physical Review E, 64(2). https://doi.org/10.1103/PhysRevE.64.025102 Newman, Mark E. J. (2016). Networks: an introduction (Reprinted). Oxford: Oxford University Press. Ojanen, T. T., Boonmongkon, P., Samakkeekarom, R., Samoh, N., Cholratana, M., & Guadamuz, T. E. (2015). Connections between online harassment and offline violence among youth in Central Thailand. Child Abuse & Neglect, 44, 159–169. https://doi.org/10.1016/j.chiabu.2015.04.001 Park, B., Wilson, G., Berger, J., Christman, M., Reina, B., Bishop, F., … Doan, A. (2016). Is Internet Pornography Causing Sexual Dysfunctions? A Review with Clinical Reports. Behavioral Sciences, 6(3), 17. https://doi.org/10.3390/bs6030017 Pina, A., Holland, J., & James, M. (2017). The Malevolent Side of Revenge Porn Proclivity: Dark Personality Traits and Sexist Ideology. International Journal of Technoethics, 8(1), 30–43. https://doi.org/10.4018/IJT.2017010103 Powell, A., & Henry, N. (2017). Sexual Violence in a Digital Age. Palgrave Macmillan. Powell, A., Henry, N., & Flynn, A. (2018). Image-Based Sexual Abuse. In Routledge Handbook of Critical Criminology (2nd Edition, pp. 305–315). Routledge. Priebe, G., & Svedin, C. G. (2012). Online or off-line victimisation and psychological well-being: a comparison of sexual-minority and heterosexual youth. European Child & Adolescent Psychiatry, 21(10), 569–582. https://doi.org/10.1007/s00787-012-0294-5 Reed, L. A., Tolman, R. M., & Ward, L. M. (2016). Snooping and Sexting: Digital Media as a Context for Dating Aggression and Abuse Among College Students. Violence Against Women, 22(13), 1556–1576. https://doi.org/10.1177/1077801216630143 SEGOB. (2018). Incidencia Delictiva del Fuero Común 2018 (pp. 1–68). Mexico: Secretaría de Gobernación; Secretariado Ejecutivo del Sistema Nacional de Seguridad Publica. Retrieved from http://secretariadoejecutivo.gob.mx/docs/pdfs/nueva-metodologia/CNSP-Delitos-2018.pdf Shearer, E., & Gottfried, J. (2017, September 7). News Use Across Social Media Platforms 2017. Retrieved February 22, 2018, from http://www.journalism.org/2017/09/07/news-use-across-social-media-platforms-2017/ Strohmaier, H., Murphy, M., & DeMatteo, D. (2014). Youth Sexting: Prevalence Rates, Driving Motivations, and the Deterrent Effect of Legal Consequences. Sexuality Research and Social Policy, 11(3), 245–255. https://doi.org/10.1007/s13178-014-0162-9 Thompson, M. P., & Morrison, D. J. (2013). Prospective predictors of technology-based sexual coercion by college males. Psychology of Violence, 3(3), 233–246. https://doi.org/10.1037/a0030904 Wagner, A. K., Soumerai, S. B., Zhang, F., & Ross-Degnan, D. (2002). Segmented regression analysis of interrupted time series studies in medication use research. Journal of Clinical Pharmacy and Therapeutics, 27(4), 299–309. https://doi.org/10.1046/j.1365-2710.2002.00430.x Walker, K., & Sleath, E. (2017). A systematic review of the current knowledge regarding revenge pornography and non-consensual sharing of sexually explicit media. Aggression and Violent Behavior, 36, 9–24. https://doi.org/10.1016/j.avb.2017.06.010 Walker, S., Sanci, L., & Temple-Smith, M. (2013). Sexting: Young Women’s and Men’s Views on Its Nature and Origins. Journal of Adolescent Health, 52(6), 697–701. https://doi.org/10.1016/j.jadohealth.2013.01.026
APA, Harvard, Vancouver, ISO, and other styles
7

Bordel Sánchez, Borja, Ramón Alcarria, Tomás Robles, and Antonio Jara. "Protecting Physical Communications in 5G C-RAN Architectures through Resonant Mechanisms in Optical Media." Sensors 20, no. 15 (July 23, 2020): 4104. http://dx.doi.org/10.3390/s20154104.

Full text
Abstract:
Future 5G networks are characterized by three basic ideas: enhanced mobile broadband communications, massive machine-type communications, and ultra-low-latency communications. Any of these requirements needs, to be fulfilled, the implementation of high-efficiency technologies at all levels. This includes some of the costliest mechanisms in terms of computational time and bitrate: information protection solutions. Typical techniques in this area employ complex algorithms and large protocol headers, which strongly reduces the effective baud rate and latency of future 5G networks and communications. This is especially relevant in the access network, which in 5G networks will follow a cloud-based architecture, where thousands of different devices must communicate, before aggregating all those streams to be sent to the backbone. Then, new and more efficient mechanisms are needed in the cloud radio access networks (C-RAN) for future 5G systems. Therefore, in this paper it is proposed a novel information protection scheme for C-RAN architectures based on resonant phenomena in optical fibers communicating the fronthaul and backhaul in 5G networks. Resonant structures and physical nonlinearities generate a chaotic signal which may encrypt and hide at physical level every communication stream in a very efficient manner. To evaluate the proposed mechanism, an experimental validation based on simulation techniques is also described and results discussed.
APA, Harvard, Vancouver, ISO, and other styles
8

Kelechi, Alsharif, Ramly, Abdullah, and Nordin. "The Four-C Framework for High Capacity Ultra-Low Latency in 5G Networks: A Review." Energies 12, no. 18 (September 6, 2019): 3449. http://dx.doi.org/10.3390/en12183449.

Full text
Abstract:
Network latency will be a critical performance metric for the Fifth Generation (5G) networks expected to be fully rolled out in 2020 through the IMT-2020 project. The multi-user multiple-input multiple-output (MU-MIMO) technology is a key enabler for the 5G massive connectivity criterion, especially from the massive densification perspective. Naturally, it appears that 5G MU-MIMO will face a daunting task to achieve an end-to-end 1 ms ultra-low latency budget if traditional network set-ups criteria are strictly adhered to. Moreover, 5G latency will have added dimensions of scalability and flexibility compared to prior existing deployed technologies. The scalability dimension caters for meeting rapid demand as new applications evolve. While flexibility complements the scalability dimension by investigating novel non-stacked protocol architecture. The goal of this review paper is to deploy ultra-low latency reduction framework for 5G communications considering flexibility and scalability. The Four (4) C framework consisting of cost, complexity, cross-layer and computing is hereby analyzed and discussed. The Four (4) C framework discusses several emerging new technologies of software defined network (SDN), network function virtualization (NFV) and fog networking. This review paper will contribute significantly towards the future implementation of flexible and high capacity ultra-low latency 5G communications.
APA, Harvard, Vancouver, ISO, and other styles
9

Agius, H. "Review: Mobile Commerce: Opportunities, Applications and Technologies of Wireless Business." Computer Bulletin 43, no. 5 (September 1, 2001): 31. http://dx.doi.org/10.1093/combul/43.5.31-c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

González-Nieto, Noé Abraham, Caridad García-Hernández, and Margarita Espinosa-Meneses. "School Culture and Digital Technologies: Educational Practices at Universities within the Context of the COVID-19 Pandemic." Future Internet 13, no. 10 (September 24, 2021): 246. http://dx.doi.org/10.3390/fi13100246.

Full text
Abstract:
The pandemic caused by COVID-19 led schools to continue their work by relying on digital technologies. Changes in this matter are observed within three dimensions in the theoretical and conceptual background: (a) the influence of ITC in education, (b) the macrosocial changes in the educational systems and public policy derived from the COVID-19 pandemic, and (c) the impact of the COVID-19 pandemic in higher education and its role for the future. The general objective of this research was to characterize the educational practices executed by the university community (students, professors, and managers) during the emerging remote classes derived from the pandemic at the Universidad Autonoma Metropolitana, Cuajimalpa Campus, a public educational institution in Mexico (through an explanation for each educational actor profile). As specific research objectives, this paper: (a) examines whether the professors and students had enough digital technology to continue with the classes, (b) defines the obstacles they had in the use of said digital technology, and (c) recognizes the existence of innovative educational practices and determines whether stated learning was achieved in educational programs. For this purpose, a mixed methodology was chosen, comprising the application of surveys to students and professors and semi-structured interviews with managers, professors, and students. It was found that there was innovation in the area of resources (material–economic dimension) and in the area of relationships (socio-political dimension), while the discursive dimension (cultural-discursive dimension) was negatively impacted. Based on the above, we conclude that the school culture of the UAM-C is solid and that it has the necessary technological resources to continue with the teaching–learning process. The educational practice was transformed, which resulted in advantages and disadvantages, but despite these situations, most students developed their learning.
APA, Harvard, Vancouver, ISO, and other styles
11

Sum, Chin-Sean, Gabriel Porto Villardi, Zhou Lan, Chen Sun, Yohannes Alemseged, Ha Nguyen Tran, Junyi Wang, and Hiroshi Harada. "Enabling Technologies for a Practical Wireless Communication System Operating in TV White Space." ISRN Communications and Networking 2011 (June 28, 2011): 1–12. http://dx.doi.org/10.5402/2011/147089.

Full text
Abstract:
This paper proposes the design of enabling technologies for practical wireless communication systems operating in the TV white space (TVWS). The main objective of this paper is to cover a macro perspective on the system design blocks including: (a) targeted use case applications and governing regulations, (b) channelization, physical (PHY) layer and medium access control (MAC) layer designs, and (c) achievable throughput and range. It is the intention of this paper to serve as a general guideline for designing wireless communication systems operating in TVWS. The core system design addresses both PHY and MAC layer issues with realistic system considerations. In the PHY layer, a channelization design that fits into the area-specific TV channels and a transceiver that enables data exchange in the TV bands are designed. In the MAC layer, a cognitive engine that manages access to vacant TV channels and MAC functionalities that facilitate effective medium access are also proposed. As a result, the system is capable of supporting up to a typical throughput of 80 Mbps, and a maximum number of 40 users, assuming all users performing the most bandwidth-hungry application in the use case scenario. The corresponding operating range is found reach up to 400 m.
APA, Harvard, Vancouver, ISO, and other styles
12

SUN, CHAO-MING, CHENG-KUAN LIN, HUA-MIN HUANG, and LIH-HSING HSU. "MUTUALLY INDEPENDENT HAMILTONIAN PATHS AND CYCLES IN HYPERCUBES." Journal of Interconnection Networks 07, no. 02 (June 2006): 235–55. http://dx.doi.org/10.1142/s0219265906001697.

Full text
Abstract:
Two hamiltonian paths P1 = 〈v1, v2, …, vn(G) 〉 and P2 = 〈 u1, u2, …, un(G) 〉 of G are independent if v1 = u1, vn(G) = un(G), and vi ≠ ui for 1 < i < n(G). A set of hamiltonian paths {P1, P2, …, Pk} of G are mutually independent if any two different hamiltonian paths in the set are independent. A bipartite graph G is hamiltonian laceable if there exists a hamiltonian path joining any two nodes from different partite sets. A bipartite graph is k-mutually independent hamiltonian laceable if there exist k-mutually independent hamiltonian paths between any two nodes from different partite sets. The mutually independent hamiltonian laceability of bipartite graph G, IHPL(G), is the maximum integer k such that G is k-mutually independent hamiltonian laceable. Let Qn be the n-dimensional hypercube. We prove that IHPL(Qn) = 1 if n ∈ {1,2,3}, and IHPL(Qn) = n - 1 if n ≥ 4. A hamiltonian cycle C of G is described as 〈 u1, u2, …, un(G), u1 〉 to emphasize the order of nodes in C. Thus, u1 is the beginning node and ui is the i-th node in C. Two hamiltonian cycles of G beginning at u, C1 = 〈 v1, v2, …, vn(G), v1 〉 and C2 = 〈 u1, u2, …, un(G), u1 〉, are independent if u = v1 = u1, and vi ≠ ui for 1 < i ≤ n(G). A set of hamiltonian cycles {C1, C2, …, Ck} of G are mutually independent if any two different hamiltonian cycles are independent. The mutually independent hamiltonianicity of graph G, IHC(G), is the maximum integer k such that for any node u of G there exist k-mutually independent hamiltonian cycles of G starting at u. We prove that IHC(Qn) = n - 1 if n ∈ {1,2,3} and IHC(Qn) = n if n ≥ 4.
APA, Harvard, Vancouver, ISO, and other styles
13

Urazova, Svetlana Leonidovna. "Screen Communications As a Form of Socialization and Individualization." Journal of Flm Arts and Film Studies 7, no. 2 (June 15, 2015): 142–49. http://dx.doi.org/10.17816/vgik72142-149.

Full text
Abstract:
Common exposure to various kinds of mobile and stationary devices based on screen technologies produce substantiation for the term screen communications. The relevancy of its usage is specified, also the principles of functioning in context of updating social practices and multimedia informational space are substantiated in the article. The issue is due to the fact that the term screen communications has not yet been put into academic usage, unlike such terms as communication, mass communication and social communication. Nevertheless contemporary social practices for using the screen (cell phone, e-book, tablet, etc.) have turned into a daily routine and even demonstrate screen-phobia. The evolution of the technologies, new media (multimedia, multi-platforms), growth of information flows, form and content diversity of informational products, socialization effect and accumulation of empirical experience urge society to resort to the screen for receiving information (film-, video-, TV-production, Internet sites, social networks, computers, cell phones, tablets, e-books, electronic billboards, videoinformational systems, etc.). The article analyzes characteristics of well-known communications forms and types when superimposed to the term screen communications. The problem raised a need for thorough analysis of screen communications which different strata of society master; moreover, a great significance of studying peculiarities of screen culture in the digital era is emphasized. The article cites information about the emergence of Generation C, formed by social networks (a lecture on Nielsen Consumer 360 Conference). The Connected Collective Consumer has a distinguished identity and is ready for self-expression (ideas, cultural projects, etc.) within the group. As a conclusion it substantiates the nonlinearity of the social systems development, including social networks which are exposed to both the socialization effect and diversification and disintegration processes, which leads to a communication connections collapse.
APA, Harvard, Vancouver, ISO, and other styles
14

Xiao, Jun, Minjuan Wang, Lamei Wang, and Xiaoxiao Zhu. "Design and Implementation of C-iLearning." International Journal of Distance Education Technologies 11, no. 3 (July 2013): 79–97. http://dx.doi.org/10.4018/jdet.2013070106.

Full text
Abstract:
The gradual development of intelligent learning (iLearning) systems has prompted the changes of teaching and learning. This paper presents the architecture of an intelligent learning (iLearning) system built upon the recursive iLearning model and the key technologies associated with this model. Based on this model and the technical structure of a cloud-based intelligent system, the authors developed an exemplary iLearning system-”Mobile Class”, accessible from the Shanghai Lifelong Learning Network, an online platform for the continuing education of Shanghai residents. This cloud-based intelligent learning (C-iLearning) system can adopt the cloud management model and synchronize users' learning process in the clouds, so as to support users' continuous learning with different devices. Formal testing with target users revealed the effectiveness of this system in supporting anytime anywhere learning.
APA, Harvard, Vancouver, ISO, and other styles
15

Naudts, Dries, Vasilis Maglogiannis, Seilendria Hadiwardoyo, Daniel van den Akker, Simon Vanneste, Siegfried Mercelis, Peter Hellinckx, Bart Lannoo, Johann Marquez-Barja, and Ingrid Moerman. "Vehicular Communication Management Framework: A Flexible Hybrid Connectivity Platform for CCAM Services." Future Internet 13, no. 3 (March 22, 2021): 81. http://dx.doi.org/10.3390/fi13030081.

Full text
Abstract:
In the upcoming decade and beyond, the Cooperative, Connected and Automated Mobility (CCAM) initiative will play a huge role in increasing road safety, traffic efficiency and comfort of driving in Europe. While several individual vehicular wireless communication technologies exist, there is still a lack of real flexible and modular platforms that can support the need for hybrid communication. In this paper, we propose a novel vehicular communication management framework (CAMINO), which incorporates flexible support for both short-range direct and long-range cellular technologies and offers built-in Cooperative Intelligent Transport Systems’ (C-ITS) services for experimental validation in real-life settings. Moreover, integration with vehicle and infrastructure sensors/actuators and external services is enabled using a Distributed Uniform Streaming (DUST) framework. The framework is implemented and evaluated in the Smart Highway test site for two targeted use cases, proofing the functional operation in realistic environments. The flexibility and the modular architecture of the hybrid CAMINO framework offers valuable research potential in the field of vehicular communications and CCAM services and can enable cross-technology vehicular connectivity.
APA, Harvard, Vancouver, ISO, and other styles
16

ZHAO, JUTAO, and SHIYING WANG. "Connectivity and Nature Diagnosability of Leaf-Sort Graphs." Journal of Interconnection Networks 20, no. 03 (September 2020): 2050011. http://dx.doi.org/10.1142/s0219265920500115.

Full text
Abstract:
The connectivity and diagnosability of a multiprocessor system or an interconnection network is an important research topic. The system and interconnection network has a underlying topology, which usually presented by a graph. As a famous topology structure of interconnection networks, the n-dimensional leaf-sort graph CFn has many good properties. In this paper, we prove that (a) the restricted edge connectivity of CFn (n ≥ 3) is 3n − 5 for odd n and 3n − 6 for even n; (b) CFn (n ≥ 5) is super restricted edge-connected; (c) the nature diagnosability of CFn (n ≥ 4) under the PMC model is 3n − 4 for odd n and 3n − 5 for even n; (d) the nature diagnosability of CFn (n ≥ 5) under the MM* model is 3n − 4 for odd n and 3n − 5 for even n.
APA, Harvard, Vancouver, ISO, and other styles
17

TSAI, CHANG-HSIUNG, JIMMY J. M. TAN, YEN-CHU CHUANG, and LIH-HSING HSU. "HAMILTONIAN PROPERTIES OF FAULTY RECURSIVE CIRCULANT GRAPHS." Journal of Interconnection Networks 03, no. 03n04 (September 2002): 273–89. http://dx.doi.org/10.1142/s0219265902000677.

Full text
Abstract:
We present some results concerning hamiltonian properties of recursive circulant graphs in the presence of faulty vertices and/or edges. The recursive circulant graph G(N, d) with d ≥ 2 has vertex set V(G) = {0, 1, …, N - 1} and the edge set E(G) = {(v, w)| ∃ i, 0 ≤ i ≤ ⌈ log d N⌉ - 1, such that v = w + di (mod N)}. When N = cdk where d ≥ 2 and 2 ≤ c ≤ d, G(cdk, d) is regular, node symmetric and can be recursively constructed. G(cdk, d) is a bipartite graph if and only if c is even and d is odd. Let F, the faulty set, be a subset of V(G(cdk, d)) ∪ E(G(cdk, d)). In this paper, we prove that G(cdk, d) - F remains hamiltonian if |F| ≤ deg (G(cdk, d)) - 2 and G(cdk, d) is not bipartite. Moreover, if |F| ≤ deg (G(cdk, d)) - 3 and G(cdk, d) is not a bipartite graph, we prove a more stronger result that for any two vertices u and v in V(G(cdk, d)) - F, there exists a hamiltonian path of G(cdk, d) - F joining u and v.
APA, Harvard, Vancouver, ISO, and other styles
18

Saad, Malik Muhammad, Muhammad Toaha Raza Khan, Syed Hassan Ahmed Shah, and Dongkyun Kim. "Advancements in Vehicular Communication Technologies: C-V2X and NR-V2X Comparison." IEEE Communications Magazine 59, no. 8 (August 2021): 107–13. http://dx.doi.org/10.1109/mcom.101.2100119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Giaretta, Alberto, Nicola Dragoni, and Fabio Massacci. "S×C4IoT: A Security-by-contract Framework for Dynamic Evolving IoT Devices." ACM Transactions on Sensor Networks 18, no. 1 (February 28, 2022): 1–51. http://dx.doi.org/10.1145/3480462.

Full text
Abstract:
The Internet of Things (IoT) revolutionised the way devices, and human beings, cooperate and interact. The interconnectivity and mobility brought by IoT devices led to extremely variable networks, as well as unpredictable information flows. In turn, security proved to be a serious issue for the IoT, far more serious than it has been in the past for other technologies. We claim that IoT devices need detailed descriptions of their behaviour to achieve secure default configurations, sufficient security configurability, and self-configurability. In this article, we propose S×C4IoT, a framework that addresses these issues by combining two paradigms: Security by Contract (S×C) and Fog computing. First, we summarise the necessary background such as the basic S×C definitions. Then, we describe how devices interact within S×C4IoT and how our framework manages the dynamic evolution that naturally result from IoT devices life-cycles. Furthermore, we show that S×C4IoT can allow legacy S×C-noncompliant devices to participate with an S×C network, we illustrate two different integration approaches, and we show how they fit into S×C4IoT. Last, we implement the framework as a proof-of-concept. We show the feasibility of S×C4IoT and we run different experiments to evaluate its impact in terms of communication and storage space overhead.
APA, Harvard, Vancouver, ISO, and other styles
20

Giaretta, Alberto, Nicola Dragoni, and Fabio Massacci. "S×C4IoT: A Security-by-contract Framework for Dynamic Evolving IoT Devices." ACM Transactions on Sensor Networks 18, no. 1 (February 28, 2022): 1–51. http://dx.doi.org/10.1145/3480462.

Full text
Abstract:
The Internet of Things (IoT) revolutionised the way devices, and human beings, cooperate and interact. The interconnectivity and mobility brought by IoT devices led to extremely variable networks, as well as unpredictable information flows. In turn, security proved to be a serious issue for the IoT, far more serious than it has been in the past for other technologies. We claim that IoT devices need detailed descriptions of their behaviour to achieve secure default configurations, sufficient security configurability, and self-configurability. In this article, we propose S×C4IoT, a framework that addresses these issues by combining two paradigms: Security by Contract (S×C) and Fog computing. First, we summarise the necessary background such as the basic S×C definitions. Then, we describe how devices interact within S×C4IoT and how our framework manages the dynamic evolution that naturally result from IoT devices life-cycles. Furthermore, we show that S×C4IoT can allow legacy S×C-noncompliant devices to participate with an S×C network, we illustrate two different integration approaches, and we show how they fit into S×C4IoT. Last, we implement the framework as a proof-of-concept. We show the feasibility of S×C4IoT and we run different experiments to evaluate its impact in terms of communication and storage space overhead.
APA, Harvard, Vancouver, ISO, and other styles
21

Zahera, Hamada M., and Ashraf Bahgat El-Sisi. "Accelerating Training Process in Logistic Regression Model using OpenCL Framework." International Journal of Grid and High Performance Computing 9, no. 3 (July 2017): 34–45. http://dx.doi.org/10.4018/ijghpc.2017070103.

Full text
Abstract:
In this paper, the authors propose a new parallel implemented approach on Graphics Processing Units (GPU) for training logistic regression model. Logistic regression has been applied in many machine learning applications to build building predictive models. However, logistic training regularly requires a long time to adapt an accurate prediction model. Researchers have worked out to reduce training time using different technologies such as multi-threading, Multi-core CPUs and Message Passing Interface (MPI). In their study, the authors consider the high computation capabilities of GPU and easy development onto Open Computing Language (OpenCL) framework to execute logistic training process. GPU and OpenCL are the best choice with low cost and high performance for scaling up logistic regression model in handling large datasets. The proposed approach was implement in OpenCL C/C++ and tested by different size datasets on two GPU platforms. The experimental results showed a significant improvement in execution time with large datasets, which is reduced inversely by the available GPU computing units.
APA, Harvard, Vancouver, ISO, and other styles
22

Silajdžić, Lamija, and Anida Dudić. "Youth and addiction to information and communications technology: Internet, social networks and mobile phones." CM: Communication and Media 15, no. 47 (2020): 57–84. http://dx.doi.org/10.5937/cm15-26423.

Full text
Abstract:
Addiction, dysfunctional use of "new technologies" and difficulties in limiting time spent using it, are not unusual due to the increasing usage of the internet. Young people, who are almost constantly connected, are particularly vulnerable. Recognizing the risk of pathological addiction, this paper explores the use of Internet, social networks and mobile phones among young people (N=310) in Bosnia and Herzegovina. The aim of the research is to examine the extent to which young people use the internet, social networks and mobile phones, and what consequences this has on the emotional, cognitive and social functioning of youth. The study was conducted using the most commonly used diagnostic tool for measuring internet addiction, the so-called Internet Addiction Test, and a survey questionnaire created for this research. Results of the study showed a mild level of "new addiction" in youth, which included emotional and cognitive preoccupation with "new" ICT, neglect of work, lack of self-control and social problems caused by preoccupation with the Internet, social networks and mobile phones.
APA, Harvard, Vancouver, ISO, and other styles
23

Brandwajn, Alexandre, and Thomas Begin. "Reduced complexity in M/Ph/c/N queues." Performance Evaluation 78 (August 2014): 42–54. http://dx.doi.org/10.1016/j.peva.2014.06.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Li, Ming, Lanlan Wang, and Haiju Fan. "Privacy-preserved data hiding using compressive sensing and fuzzy C-means clustering." International Journal of Distributed Sensor Networks 16, no. 2 (February 2020): 155014772090874. http://dx.doi.org/10.1177/1550147720908748.

Full text
Abstract:
Nowadays, digital images are confronted with notable privacy and security issues, and many research works have been accomplished to countermeasure these risks. In this article, a novel scheme for data hiding in encrypted domain is proposed using fuzzy C-means clustering and compressive sensing technologies to protect privacy of the host image. The original image is preprocessed first to generate multiple highly correlated classes with fuzzy C-means clustering algorithm. Then, all classes are further divided into two parts according to proper threshold. One is encrypted by stream cipher, and the other is encrypted and compressed simultaneously with compressive sensing technology for easy data embedding by information hider. The receiver can extract additional data and recover the original image with data-hiding key and encryption key. Experiments and analysis demonstrate that the proposed scheme can achieve higher embedding rate about additional data and better visual quality of recovered image than other state-of-the-art schemes.
APA, Harvard, Vancouver, ISO, and other styles
25

Javed Ali, Ahmad Jusoh, Norhalimah Idris, Naveed Akhtar Qureshi, Saeed Abbas Shah, and Alhamzah F. Abbas. "Combining Mobile Technologies, Healthcare & Service Quality. A Bibliometric Analysis." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 13 (July 11, 2022): 140–59. http://dx.doi.org/10.3991/ijim.v16i13.30613.

Full text
Abstract:
The purpose of the paper is to identify the links and connections among main themes of the search i.e., Mobile Technologies, Service Quality and Healthcare. It also aims at identifying the valuable contributions from authors, journals, countries, and institutions in the searched area. Data has been extracted from Scopus database and it covers the timeline from 2005 to 2021. The final documents (n=245) have been analysed through VOSviewer software and MS Excel. Results show that Guo, X., International Journal of Medical Informatics, Harbin Institute of Technology, China and United States are top performing author, journal, institution and countries respectively. According to the results for collaborations and associations, Bhuiya A., United States and Mobile Healthcare are the most prominent author, country and keyword with highest score of total link strength (TLS). Findings suggested important and valuable avenues for future research directions in terms of underperforming countries, under-utilized subject areas and under-explored themes (keywords). This study, to best of our knowledge, is the first of its kind in mapping the literature of combined themes (Mobile Technologies, Service Quality and Healthcare).
APA, Harvard, Vancouver, ISO, and other styles
26

Stonkienė, Marija. "Formalioji mokslo komunikacija teoriniuose modeliuose: kaitos įžvalgos." Informacijos mokslai 49 (January 1, 2009): 48–69. http://dx.doi.org/10.15388/im.2009.0.3320.

Full text
Abstract:
Straipsnyje, analizuojant teorinius mokslo komunikacijos modelius, tiriama formaliosios mokslo komunikacijos kaita.Tradicinės formaliosios mokslo komunikacijos modelių analizė atskleidė tipinių mokslo komunikacijos veikėjų ir tipinių jų funkcijų esatį, mokslo komunikacijos vyksmą informacijos grandine. Formaliosios dokumentinės mokslo komunikacijos modelių analizė leido konstatuoti šiuose modeliuose vyraujančią procesinę komunikacijos sampratą.Analizuojant informacijos ir komunikacijos technologijų taikymą mokslo komunikacijai ir su šiuo taikymu susijusius mokslo komunikacijos kultūros pokyčius įvertinančius mokslo komunikacijos modelius pastebėti tokie mokslo komunikacijos pokyčiai: naujų mokslo komunikacijos subjektų radimasis, komunikacijos vyksmas informacijos tinklu, formaliosios ir neformaliosios mokslo komunikacijos susiliejimas, persiklojimas, mokslininko komunikacinių intencijų reikšminimas. Ne tik šios įžvalgos, bet ir pastebėta pakitusi mokslo komunikacijos pranešimo artikuliacija leido konstatuoti klostantis naują mokslo komunikacijos paradigmą, grįstą semantine komunikacijos samprata.Pagrindiniai žodžiai: mokslinės informacijos sklaida, mokslo žinių sklaida, mokslo komunikacijos teorija, formali dokumentinė mokslo komunikacija, mokslo komunikacijos modeliai.Formal science communication in theoretical models: providence of changeMarija Stonkienė SummaryThe article presents an analys of W. Garveys and B. Griffith’s (1971, 1972, 1979), UNISIST (1971), F. W. Lankaster’s (1978), N. Fjallbrant’s (1997), T. M. Aitchison’s (1988), E. Buck’s, R. Flagan’s and B. Coles (1999), J. Hurd’s (2000), T. F. Sondergaard’s, J. Andersen’s, B. Hjorland’s revising and updating UNISIST (2003), Kling’s, G. McKim’s and A. King’ (2003), J. M. Makenzy Owen’s (2000, 2007), B.-C. Bjork’s (2007) theoretical models of science communication. The analysis of traditional formal science communication in these models indicated typical science communication subjects and functions in science communication. In the traditional formal science communication model, the process of science communication is perceived as an information chain. The analysis showed that the teorethical basis of these models is the concept of process communication. Information and communication technologies have been applied to science communication. Due to these technologies, communication culture in sciences has changed. The analysis of science communication models, which evaluate technological and cultural changes, showed the coming of new communication mediators and multifuncionality of all communication subjects. In the new science communication models the process of science communication is perceived as an alternative and the intersecting information chains as an information network. One apparent change is the convergence of formal and informal science communication. Due to this convergence, the concept of communicated message has changed. New tendencies allow to consider the emerging semantic approach to the concept of communication in science communication.
APA, Harvard, Vancouver, ISO, and other styles
27

CHIN, CHERNG, HUAI-CHIH CHEN, LIH-HSING HSU, SHANG-CHIA CHIOU, and KUO-TUNG LAI. "SUPER SPANNING CONNECTIVITY OF THE FULLY CONNECTED CUBIC NETWORKS." Journal of Interconnection Networks 11, no. 01n02 (March 2010): 61–70. http://dx.doi.org/10.1142/s0219265910002738.

Full text
Abstract:
A k-containerC(u, v) of G between u and v is a set of k internally disjoint paths between u and v. A k-container C(u,v) of G is a k*-container if it contains all vertices of G. A graph G is k*-connected if there exists a k*-container between any two distinct vertices. The spanning connectivity of G, κ*(G), is defined to be the largest integer k such that G is w*-connected for all 1 ≤ w ≤ k if G is a 1*-connected graph and undefined otherwise. A graph G is super spanning connected if κ* (G) = κ(G). In this paper, we prove that the n-dimensional fully connected cubic network FCCNn is super spanning connected.
APA, Harvard, Vancouver, ISO, and other styles
28

Boualam, Soukayna Riffi, Mariya Ouaissa, Mariyam Ouaissa, and Abdellatif Ezzouhairi. "Secure and efficient routing protocol for low-power and lossy networks for IoT networks." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 1 (July 1, 2022): 478. http://dx.doi.org/10.11591/ijeecs.v27.i1.pp478-487.

Full text
Abstract:
R outing p rotocol for l ow p ower and l ossy (RPL) is destined to support the specific requirements of l ow p ower and l ossy n etworks (LLN). This type of network suffers from the problem of determining and securing a routing protocol to best suit an environment. This article aims to present a new version of the efficient and secure RPL protocol. The proposed scheme consists of two parts : i) Proposing a new o bjective f unction (OF) based RPL which combines three nodes and links metrics are: e xpected r etransmission n umber (ETX), h ope c ount (HC), and the residual energy in order to have a precise decision to c hoose the optimal way to the des tination. ii) To securing the new efficient RPL protocol by combining an improved Diffie - Hellman (DH) algorithm for a robust key exchange model with k eyed - h ash m essage a uthentication c ode (HMAC) to ensure the authentication and integrity of RPL data exchan ged. To verify the level of security, we apply a formal verification using AVISPA tool which indicate that the s ecure and e fficient RPL (SE-RPL) achieve all security requirements. Simulation results on the Contiki platform illustrate that our proposed is m ore efficient in terms of p acket d elivery r atio (PDR) and energy compared to others standard OF.
APA, Harvard, Vancouver, ISO, and other styles
29

Silva, Rodrigo, and Heitor Silvério Lopes. "A Benchmark for Multi-Objective Routing in Vehicle Ad-Hoc Networks Using The Ant Colony Optimization Algorithm." Learning and Nonlinear Models 19, no. 2 (December 31, 2021): 15–28. http://dx.doi.org/10.21528/lnlm-vol19-no2-art2.

Full text
Abstract:
The growing number of vehicles in cities has a great impact on our quality of life, such as air and noise pollution, traffic jams and traffic accidents. Cooperative Intelligent Transportation System (C-ITS) relies on communication technologies to provide innovative services and applications for transportation and traffic management. In the C-ITS context, users, roadside infrastructure and vehicles need to be connected and, for this purpose, a wide variety of wireless technologies can be used (e.g, vehicular WiFi, cellular and visible light communication). In this work we consider a VANET (Vehicular Ad-hoc NETwork) using vehicular WiFi (based on 802.11p). The communications in VANET networks have been studied for years and several routing algorithms have been developed for such a kind of network. However, a benchmark to compare the performance of such algorithms is still lacking. To fill this gap, the present work proposes a benchmark composed by instances of data routing for different scenarios in the VANET. Moreover, we propose a multi-objective algorithm based on ACO (Ant Colony Optimization) to compare with such benchmark. The results of simulations show the impact of several factors in the VANET connectivity, such as vehicle density, geographical location, propagation and fading models. The results are promising and indicate the importance of choosing appropriated simulation models.
APA, Harvard, Vancouver, ISO, and other styles
30

LISNA, P. C., and M. S. SUNITHA. "On the b-Chromatic Sum of Mycielskian of Km, n, Kn and Cn." Journal of Interconnection Networks 20, no. 02 (June 2020): 2050007. http://dx.doi.org/10.1142/s0219265920500073.

Full text
Abstract:
A b-coloring of a graph G is a proper coloring of the vertices of G such that there exists a vertex in each color class joined to at least one vertex in each other color classes. The b-chromatic number of a graph G, denoted by φ(G), is the largest integer k such that G has a b-coloring with k colors. The b-chromatic sum of a graph G(V, E), denoted by φ′(G) is defined as the minimum of sum of colors c(v) of v for all v ∈ V in a b-coloring of G using φ(G) colors. The Mycielskian or Mycielski, μ(H) of a graph H with vertex set {v1, v2,…, vn} is a graph G obtained from H by adding a set of n + 1 new vertices {u, u1, u2, …, un} joining u to each vertex ui(1 ≤ i ≤ n) and joining ui to each neighbour of vi in H. In this paper, the b-chromatic sum of Mycielskian of cycles, complete graphs and complete bipartite graphs are discussed. Also, an application of b-coloring in image processing is discussed here.
APA, Harvard, Vancouver, ISO, and other styles
31

Chochliouros, Ioannis P., Anastasia S. Spiliopoulou, Alexandros Kostopoulos, George Agapiou, Pavlos Lazaridis, Zaharias Zaharias, Tao Chen, et al. "C-V2X Communications for the Support of a Green Light Optimized Speed Advisory (GLOSA) Use Case." Journal of Telecommunications and Information Technology 2 (March 30, 2021): 93–106. http://dx.doi.org/10.26636/jtit.2021.152321.

Full text
Abstract:
Rapid expansion of 5G affects a number of sectors, including vehicular communications relying on cooperative intelligent transportation systems (C-ITS). More specifically, in the context of the Internet of Vehicles (IoV), a particular emphasis is placed on modern cellular V2X (C-V2X) technologies aiming to further improve road safety. This work originates from the detailed scope of the ongoing 5G-DRIVE research project promoting cooperation between the EU and China, with the aim of demonstrating IoV services that rely on vehicle-to-infrastructure (V2I) communications. With the C-V2X approach serving as a point of departure, we analyze and describe a specific green light-optimized speed advisory (GLOSA) use case, for which we provide a detailed descriptive framework, a proposed architectural framework for trials, as well as specific KPIs for the joint assessment of trials between the EU and China. We also discuss the context for performance test procedures to be conducted as part of the intended trials. GLOSA provides end-users with short-term information on upcoming traffic light status to optimize traffic flows, help prevent speed limit violations, improve fuel efficiency, and reduce pollution
APA, Harvard, Vancouver, ISO, and other styles
32

Мазурков, Михаил Иванович, and Максим Юрьевич Герасименко. "Быстрые ортогональные преобразования на основе совершенных двоичных решеток." Известия высших учебных заведений. Радиоэлектроника 49, no. 9 (September 6, 2006): 54–60. http://dx.doi.org/10.20535/s0021347006090068.

Full text
Abstract:
Предложено правило построения нового класса быстрых ортогональных преобразований – матриц C, порядков n = (2k)2 и n = (3•2k)2, k = 1, 2, … построенных на основе совершенных двоичных решеток порядков N = 2k, либо N = 3•2k. Показано, что бинарные ортогональные матрицы C обладают практически привлекательным свойством многопелевого циклического сдвига (N-сдвига), что обеспечивает эффективную процедуру скользящего метода расчета коэффициентов преобразования.
APA, Harvard, Vancouver, ISO, and other styles
33

Antonov, Sergey, and Igor Katorgin. "Mapping the characteristics of climate change in Stavropol region." InterCarto. InterGIS 27, no. 3 (2021): 171–82. http://dx.doi.org/10.35595/2414-9179-2021-3-27-171-182.

Full text
Abstract:
Currently, there is dynamic global climate change, as evidenced by the reports of the Intergovernmental Panel on Climate Change (IPCC). For many agricultural regions, including the South of Russia, such changes increase the already high natural and climatic risks. The Stavropol Territory, like most other regions of Russia, has insufficient coverage of the territory with a network of meteorological stations, in connection with which it becomes necessary to use modern GIS technologies for analyzing spatial data. In this work, the interpolation method “Natural Neighbor” was used to analyze climate data. The use of geoinformation technologies made it possible to identify regional features of climate change throughout the Stavropol Territory over the past 60 years (1961–2020). In the region, there has been an increase in the average annual air temperature over the past 30 years by 0.9°C, while maintaining the current growth rate by 2050, the average annual temperature may increase by another 0.6°C. The intraannual heterogeneity of the temperature increase was revealed, so in January, February, March and August it ranges from +1.8 to +2.0°C, in October to +1.6°C, and for the rest of the months the increase does not exceed 1°C, and only in November, the temperature drops to -0.6°C. One of the main limiting factors of the efficiency of crop production is the moisture supply of the territory. Analysis of the deviations of the annual precipitation amount in the Stavropol Territory does not allow us to reveal a reliable trend in their change, since there are significant fluctuations over the years, which can lead to the occurrence of unfavorable arid phenomena. It was found that for the period 1961–2020. droughts of various durations occur annually. At the same time, there is a likelihood of extremely unfavorable 5-month droughts, which can provoke a whole range of adverse events, such as dry winds and dust storms. On the basis of geoinformation technologies, a series of maps was created that describes the climatic conditions of the period 1991–2020, which is a new climatic norm for the territory of the Stavropol Territory.
APA, Harvard, Vancouver, ISO, and other styles
34

D'Elia, Alfredo, Fabio Viola, Luca Roffia, Paolo Azzoni, and Tullio Salmon Cinotti. "Enabling Interoperability in the Internet of Things." International Journal on Semantic Web and Information Systems 13, no. 1 (January 2017): 147–67. http://dx.doi.org/10.4018/ijswis.2017010109.

Full text
Abstract:
Semantic Web technologies act as an interoperability glue among different formats, protocols and platforms, providing a uniform vision of heterogeneous devices and services in the Internet of Things (IoT). Semantic Web technologies can be applied to a broad range of application contexts (i.e., industrial automation, automotive, health care, defense, finance, smart cities) involving heterogeneous actors (i.e., end users, communities, public authorities, enterprises). Smart-M3 is a semantic publish-subscribe software architecture conceived to merge the Semantic Web and the IoT domains. It is based on a core component (SIB, Semantic Information Broker) where data is stored as RDF graphs, and software agents using SPARQL to update, retrieve and subscribe to changes in the data store. This article describes a OSGi SIB implementation extended with a new persistent SPARQL update primitive. The OSGi SIB performance has been evaluated and compared with the reference C implementation. Eventually, a first porting on Android is presented.
APA, Harvard, Vancouver, ISO, and other styles
35

Kuoppamäki, Sanna, Sylvaine Tuncer, Sara Eriksson, and Donald McMillan. "Designing Kitchen Technologies for Ageing in Place." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 5, no. 2 (June 23, 2021): 1–19. http://dx.doi.org/10.1145/3463516.

Full text
Abstract:
Assistive technologies can significantly increase older adults' independent living if these technologies are designed to meet their needs and abilities. This study investigates conditions and present possibilities for assistive technology to provide physical and cognitive support to older adults in a specific domestic task, which is cooking a meal at home. The empirical material consists of six video recordings of adults aged 65 and over preparing a meal in their kitchen. The study unpacks the complexity of kitchen tasks, from the physical interactions involved to the temporal and spatial alignment of objects and goals in the kitchen. We focus on a) Physical manipulation, such as chopping, opening packages, and moving objects around the kitchen, b) Organisation and coordination, including switching, synchronising and monitoring cooking tasks, and c) Reorchestration and reorganisation in the form of inserting additional tasks, and rearranging tools and ingredients when adjustments need to be made in the cooking process. The study outlines design principles for operational and organisational interventions to support cooking a meal for independent living. The study concludes with discussing design implications for conversational user interfaces in the kitchen, and the significance of assistive kitchen technologies for ageing in place.
APA, Harvard, Vancouver, ISO, and other styles
36

Warmansyah, Jhoni, Elis Komalasari, Eliza Febriani, Gusmiati, and Amalina. "Factors Affecting Teacher Readiness for Online Learning (TROL) in Early Childhood Education: TISE and TPACK." JPUD - Jurnal Pendidikan Usia Dini 16, no. 1 (April 30, 2022): 32–51. http://dx.doi.org/10.21009/jpud.161.03.

Full text
Abstract:
This study aims to find empirical information about the effect of Technological Pedagogical Content Knowledge (TPACK), and Technology Integration Self Efficacy (TISE) on Teacher Readiness for Online Learning (TROL). This study uses a quantitative survey method with path analysis techniques. This study measures the readiness of kindergarten teachers in distance learning in Tanah Datar Regency, West Sumatra Province, Indonesia with a sampling technique using simple random sampling involving 105 teachers. Empirical findings reveal that; 1) there is a direct positive effect of Technology Integration Self Efficacy on Teacher Readiness for Online Learning; 2) there is a direct positive effect of PACK on Teacher Readiness for Online Learning; 3) there is a direct positive effect of Technology Integration Self Efficacy on TPACK. If want to improve teacher readiness for online learning, Technological Pedagogical Content Knowledge (TPACK) must be improved by paying attention to Technology Integration Self Efficacy (TISE). Keywords: TROL, TPACK, TISE, Early Childhood Education References: Abbitt, J. T. (2011). An Investigation of the Relationship between Self-Efficacy Beliefs about Technology Integration and Technological Pedagogical Content Knowledge (TPACK) among Preservice Teachers. Journal of Digital Learning in Teacher Education, 27(4), 134–143. Adedoyin, O. B., & Soykan, E. (2020). Covid-19 pandemic and online learning: The challenges and opportunities. Interactive Learning Environments, 1–13. https://doi.org/10.1080/10494820.2020.1813180 Adnan, M. (2020). Online learning amid the COVID-19 pandemic: Students perspectives. Journal of Pedagogical Sociology and Psychology, 1(2), 45–51. https://doi.org/10.33902/JPSP.2020261309 Alqurashi, E. (2016). Self-Efficacy in Online Learning Environments: A Literature Review. Contemporary Issues in Education Research (CIER), 9(1), 45–52. https://doi.org/10.19030/cier.v9i1.9549 Amir, H. (2016). Korelasi Pengaruh Faktor Efikasi Diri Dan Manajemen Diri Terhadap Motivasi Berprestasi Pada Mahasiswa Pendidikan Kimia Unversitas Bengkulu. Manajer Pendidikan, 10(4). Anderson, T. (2008). The theory and practice of online learning. Athabasca University Press. Anggraeni, N., Ridlo, S., & Setiati, N. (2018). The Relationship Between TISE and TPACK among Prospective Biology Teachers of UNNES. Journal of Biology Education, 7(3), 305–311. https://doi.org/10.15294/jbe.v7i3.26021 Ariani, D. N. (2015). Hubungan antara Technological Pedagogical Content Knowledge dengan Technology Integration Self Efficacy Guru Matematika di Sekolah Dasar. Muallimuna: Jurnal Madrasah Ibtidaiyah, 1(1), 79–91. Birisci, S., & Kul, E. (2019). Predictors of Technology Integration Self-Efficacy Beliefs of Preservice Teachers. Contemporary Educational Technology, 10(1). https://doi.org/10.30935/cet.512537 Bozkurt, A., Jung, I., Xiao, J., Vladimirschi, V., Schuwer, R., Egorov, G., Lambert, S. R., Al-freih, M., Pete, J., Olcott, D., Rodes, V., Aranciaga, I., Bali, M., Alvarez, A. V, Roberts, J., Pazurek, A., Raffaghelli, J. E., Panagiotou, N., Coëtlogon, P. De, … Paskevicius, M. (2020). UVicSPACE: Research & Learning Repository Navigating in a time of uncertainty and crisis. Asian Journal of Distance Education, 15(1), 1–126. Brinkley-Etzkorn, K. E. (2018). Learning to teach online: Measuring the influence of faculty development training on teaching effectiveness through a TPACK lens. The Internet and Higher Education, 38, 28–35. https://doi.org/10.1016/j.iheduc.2018.04.004 Butnaru, G. I., Niță, V., Anichiti, A., & Brînză, G. (2021). The effectiveness of online education during covid 19 pandemic—A comparative analysis between the perceptions of academic students and high school students from romania. Sustainability (Switzerland), 13(9). https://doi.org/10.3390/su13095311 Carliner, S. (2003). Modeling information for three-dimensional space: Lessons learned from museum exhibit design. Technical Communication, 50(4), 554–570. Cengiz, C. (2015). The development of TPACK, Technology Integrated Self-Efficacy and Instructional Technology Outcome Expectations of pre-service physical education teachers. Asia-Pacific Journal of Teacher Education, 43(5), 411–422. https://doi.org/10.1080/1359866X.2014.932332 Chou, P., & Ph, D. (2012). Effect of Students ’ Self -Directed Learning Abilities on Online Learning Outcomes: Two Exploratory Experiments in Electronic Engineering Department of Education. 2(6), 172–179. Crawford, J., Butler-Henderson, K., Rudolph, J., Malkawi, B., Burton, R., Glowatz, M., Magni, P. A., & Lam, S. (2020). COVID-19: 20 countries’ higher education intra-period digital pedagogy responses. Journal of Applied Learning & Teaching, 3(1). https://doi.org/10.37074/jalt.2020.3.1.7 Dolighan, T., & Owen, M. (2021). Teacher efficacy for online teaching during the COVID-19 pandemic. Brock Education Journal, 30(1), 95. https://doi.org/10.26522/brocked.v30i1.851 Dong, Y., Chai, C. S., Sang, G.-Y., Koh, J. H. L., & Tsai, C.-C. (2015). Exploring the Profiles and Interplays of Pre-service and In-service Teachers’ Technological Pedagogical Content Knowledge (TPACK) in China. International Forum of Educational Technology & Society, 18(1), 158–169. Donitsa-Schmidt, S., & Ramot, R. (2020). Opportunities and challenges: Teacher education in Israel in the Covid-19 pandemic. Journal of Education for Teaching, 46(4), 586–595. https://doi.org/10.1080/02607476.2020.1799708 Elas, N. I. B., Majid, F. B. A., & Narasuman, S. A. (2019). Development of Technological Pedagogical Content Knowledge (TPACK) For English Teachers: The Validity and Reliability. International Journal of Emerging Technologies in Learning (IJET), 14(20), 18. https://doi.org/10.3991/ijet.v14i20.11456 Ghozali, I. (2011). Aplikasi multivariate dengan program IBM SPSS 19. Badan Penerbit Universitas Diponegoro. Giles, R. M., & Kent, A. M. (2016). An Investigation of Preservice Teachers ’ Self-Efficacy for Teaching with Technology. 1(1), 32–40. https://doi.org/10.20849/aes.v1i1.19 Gil-flores, J., & Rodríguez-santero, J. (2017). Computers in Human Behavior Factors that explain the use of ICT in secondary-education classrooms: The role of teacher characteristics and school infrastructure. Computers in Human Behavior, 68, 441–449. https://doi.org/10.1016/j.chb.2016.11.057 Habibi, A., Yusop, F. D., & Razak, R. A. (2019). The role of TPACK in affecting pre-service language teachers’ ICT integration during teaching practices: Indonesian context. Education and Information Technologies. https://doi.org/10.1007/s10639-019-10040-2 Harris, J. B., & Hofer, M. J. (2011). Technological Pedagogical Content Knowledge (TPACK) in Action. Journal of Research on Technology in Education, 43(3), 211–229. https://doi.org/10.1080/15391523.2011.10782570 Hatlevik, I. K. R., & Hatlevik, O. E. (2018). Examining the relationship between teachers’ ICT self-efficacy for educational purposes, collegial collaboration, lack of facilitation and the use of ICT in teaching practice. Frontiers in Psychology, 9(JUN), 1–8. https://doi.org/10.3389/fpsyg.2018.00935 Hung, M. L. (2016). Teacher readiness for online learning: Scale development and teacher perceptions. Computers and Education, 94, 120–133. https://doi.org/10.1016/j.compedu.2015.11.012 Hung, M. L., Chou, C., Chen, C. H., & Own, Z. Y. (2010). Learner readiness for online learning: Scale development and student perceptions. Computers and Education, 55(3), 1080–1090. https://doi.org/10.1016/j.compedu.2010.05.004 Juanda, A., Shidiq, A. S., & Nasrudin, D. (2021). Teacher Learning Management: Investigating Biology Teachers’ TPACK to Conduct Learning During the Covid-19 Outbreak. Jurnal Pendidikan IPA Indonesia, 10(1), 48–59. https://doi.org/10.15294/jpii.v10i1.26499 Karatas, M. A.-K. (2020). COVID - 19 Pandemisinin Toplum Psikolojisine Etkileri ve Eğitime Yansımaları. Journal of Turkish Studies, Volume 15(Volume 15 Issue 4), 1–13. https://doi.org/10.7827/TurkishStudies.44336 Kaymak, Z. D., & Horzum, M. B. (2013). Relationship between online learning readiness and structure and interaction of online learning students. Kuram ve Uygulamada Egitim Bilimleri, 13(3), 1792–1797. https://doi.org/10.12738/estp.2013.3.1580 Keser, H., Karaoğlan Yılmaz, F. G., & Yılmaz, R. (2015). TPACK Competencies and Technology Integration Self-Efficacy Perceptions of Pre-Service Teachers. Elementary Education Online, 14(4), 1193–1207. https://doi.org/10.17051/io.2015.65067 Kim, J. (2020). Learning and Teaching Online During Covid-19: Experiences of Student Teachers in an Early Childhood Education Practicum. International Journal of Early Childhood, 52(2), 145–158. https://doi.org/10.1007/s13158-020-00272-6 Koehler, M. J., Mishra, P., & Cain, W. (2013). What is Technological Pedagogical Content Knowledge (TPACK)? Journal of Education, 193(3), 13–19. https://doi.org/10.1177/002205741319300303 Lee, Y., & Lee, J. (2014). Enhancing pre-service teachers’ self-efficacy beliefs for technology integration through lesson planning practice. Computers and Education, 73, 121–128. https://doi.org/10.1016/j.compedu.2014.01.001 Mallillin, L. L. D., Mendoza, L. C., Mallillin, J. B., Felix, R. C., & Lipayon, I. C. (2020). Implementation and Readiness of Online Learning Pedagogy: A Transition To Covid 19 Pandemic. European Journal of Open Education and E-Learning Studies, 5(2), 71–90. https://doi.org/10.46827/ejoe.v5i2.3321 Mishra, P. (2019). Considering Contextual Knowledge: The TPACK Diagram Gets an Upgrade. Journal of Digital Learning in Teacher Education, 35(2), 76–78. https://doi.org/10.1080/21532974.2019.1588611 Moorhouse, B. L. (2020). Adaptations to a face-to-face initial teacher education course ‘forced’ online due to the COVID-19 pandemic. Journal of Education for Teaching, 46(4), 609–611. https://doi.org/10.1080/02607476.2020.1755205 Mulyadi, D., Wijayatingsih, T. D., Budiastuti, R. E., Ifadah, M., & Aimah, S. (2020). Technological Pedagogical and Content Knowledge of ESP Teachers in Blended Learning Format. International Journal of Emerging Technologies in Learning (IJET), 15(06), 124. https://doi.org/10.3991/ijet.v15i06.11490 Murtaza, G., Mahmood, K., & Fatima, N. (2021). Readiness for Online Learning during COVID-19 pandemic: A survey of Pakistani LIS students The Journal of Academic Librarianship Readiness for Online Learning during COVID-19 pandemic: A survey of Pakistani LIS students. The Journal of Academic Librarianship, 47(3), 102346. https://doi.org/10.1016/j.acalib.2021.102346 Mustika, M., & Sapriya. (2019). Kesiapan Guru IPS dalam E-learning Berdasarkan: Survei melalui Pendekatan TPACK. 32–35. https://doi.org/10.1145/3306500.3306566 Niess, M. L. (2011). Investigating TPACK: Knowledge Growth in Teaching with Technology. Journal of Educational Computing Research, 44(3), 299–317. https://doi.org/10.2190/EC.44.3.c Oketch, & Otchieng, H. (2013). University of Nairobi, H. A. (2013). E-Learning Readiness Assessment Model in Kenyas’ Higher Education Institutions: A Case Study of University of Nairobi by: Oketch, Hada Achieng a Research Project Submitted in Partial Fulfillment of the Requirement of M. October. Pamuk, S., Ergun, M., Cakir, R., Yilmaz, H. B., & Ayas, C. (2015). Exploring relationships among TPACK components and development of the TPACK instrument. Education and Information Technologies, 20(2), 241–263. https://doi.org/10.1007/s10639-013-9278-4 Paraskeva, F., Bouta, H., & Papagianni, A. (2008). Individual characteristics and computer self-efficacy in secondary education teachers to integrate technology in educational practice. Computers and Education, 50(3), 1084–1091. https://doi.org/10.1016/j.compedu.2006.10.006 Putro, S. T., Widyastuti, M., & Hastuti, H. (2020). Problematika Pembelajaran di Era Pandemi COVID-19 Stud Kasus: Indonesia, Filipina, Nigeria, Ethiopia, Finlandia, dan Jerman. Geomedia Majalah Ilmiah Dan Informasi Kegeografian, 18(2), 50–64. Qudsiya, R., Widiyaningrum, P., & Setiati, N. (2018). The Relationship Between TISE and TPACK among Prospective Biology Teachers of UNNES. Journal of Biology Education, 7(3), 305–311. https://doi.org/10.15294/jbe.v7i3.26021 Reflianto, & Syamsuar. (2018). Pendidikan dan Tantangan Pembelajaran Berbasis Teknologi Informasi di Era Revolusi Industri 4.0. Jurnal Ilmiah Teknologi Pendidikan, 6(2), 1–13. Reski, A., & Sari, K. (2020). Analisis Kemampuan TPACK Guru Fisika Se-Distrik Merauke. Jurnla Kreatif Online, 8(1), 1–8. Ruggiero, D., & Mong, C. J. (2015). The teacher technology integration experience: Practice and reflection in the classroom. Journal of Information Technology Education, 14. Santika, V., Indriayu, M., & Sangka, K. B. (2021). Profil TPACK Guru Ekonomi di Indonesia sebagai Pendekatan Integrasi TIK selama Pembelajaran Jarak Jauh pada Masa Pandemi Covid-19. Duconomics Sci-Meet (Education & Economics Science Meet), 1, 356–369. https://doi.org/10.37010/duconomics.v1.5470 Semiz, K., & Ince, M. L. (2012). Pre-service physical education teachers’ technological pedagogical content knowledge, technology integration self-efficacy and instructional technology outcome expectations. Australasian Journal of Educational Technology, 28(7). https://doi.org/10.14742/ajet.800 Senthilkumar, Sivapragasam, & Senthamaraikannan. (2014). Role of ICT in Teaching Biology. International Journal of Research, 1(9), 780–788. Setiaji, B., & Dinata, P. A. C. (2020). Analisis kesiapan mahasiswa jurusan pendidikan fisika menggunakan e-learning dalam situasi pandemi Covid-19 Analysis of e-learning readiness on physics education students during Covid-19 pandemic. 6(1), 59–70. Siagian, H. S., Ritonga, T., & Lubis, R. (2021). Analisis Kesiapan Belajar Daring Siswa Kelas Vii Pada Masa Pandemi Covid-19 Di Desa Simpang. JURNAL MathEdu (Mathematic Education Journal), 4(2), 194–201. Sintawati, M., & Indriani, F. (2019). Pentingnya Technological Pedagogical Content Knowledge (TPACK) Guru di Era Revolusi Industri 4.0. Seminar Nasional Pagelaran Pendidikan Dasar Nasional (PPDN), 1(1), 417–422. Sojanah, J., Suwatno, Kodri, & Machmud, A. (2021). Factors affecting teachers’ technological pedagogical and content knowledge (A survey on economics teacher knowledge). Cakrawala Pendidikan, 40(1), 1–16. https://doi.org/10.21831/cp.v40i1.31035 Subhan, M. (2020). Analisis Penerapan Technological Pedagogical Content Knowledge Pada Proses Pembelajaran Kurikulum 2013 di Kelas V. International Journal of Technology Vocational Education and Training, 1(2), 174–179. Sum, T. A., & Taran, E. G. M. (2020). Kompetensi Pedagogik Guru PAUD dalam Perencanaan dan Pelaksanaan Pembelajaran. Jurnal Obsesi : Jurnal Pendidikan Anak Usia Dini, 4(2), 543. https://doi.org/10.31004/obsesi.v4i2.287 Suryawati, E., Firdaus, L. N., & Yosua, H. (2014). Analisis keterampilan technological pedagogical content knowledge (TPCK) guru biologi SMA negeri kota Pekanbaru. Jurnal Biogenesis, 11(1), 67-72. Suyamto, J., Masykuri, M., & Sarwanto, S. (2020). Analisis Kemampuan Tpack (Technolgical, Pedagogical, and Content, Knowledge) Guru Biologi Sma Dalam Menyusun Perangkat Pembelajaran Materi Sistem Peredaran Darah. INKUIRI: Jurnal Pendidikan IPA, 9(1), 46. https://doi.org/10.20961/inkuiri.v9i1.41381 Tiara, D. R., & Pratiwi, E. (2020). Pentingnya Mengukur Kesiapan Guru Sebagai Dasar Pembelajaran Daring. Jurnal Golden Age, 04(2), 362–368. Trionanda, S. (2021). Analisis kesiapan dan pelaksanaan pembelajaran matematika jarak jauh berdasarkan profil TPACK di SD Katolik Tanjungpinang tahun ajaran 2020 / 2021. In Prosiding Seminar Nasional Matematika Dan Pendidikan Matematika, 6, 69–76. Tsai, C.-C., & Chai, C. S. (2012). The ‘third’-order barrier for technology-integration instruction: Implications for teacher education. Australasian Journal of Educational Technology, 28(6). https://doi.org/10.14742/ajet.810 Wahyuni, F. T. (2019). Hubungan Antara Technological Pedagogical Content Knowledge (Tpack) Dengan Technology Integration Self Efficacy (Tise) Guru Matematika Di Madrasah Ibtidaiyah. Jurnal Pendidikan Matematika (Kudus), 2(2), 109–122. https://doi.org/10.21043/jpm.v2i2.6358 Wang, L., Ertmer, P. A., & Newby, T. J. (2014). Journal of Research on Technology in Education Increasing Preservice Teachers’ Self-Efficacy Beliefs for Technology Integration. Journal of Research on Technology in Education, 36(3), 37–41. https://doi.org/10.1080/15391523.2004.10782414 Warden, C. A., Yi-Shun, W., Stanworth, J. O., & Chen, J. F. (2020). Millennials’ technology readiness and self-efficacy in online classes. Innovations in Education and Teaching International, 00(00), 1–11. https://doi.org/10.1080/14703297.2020.1798269 Widarjono, A. (2015). Analisis Multivariat Terapan edisi kedua. UPP STIM YKPN. Wiresti, R. D. (2021). Analisis Dampak Work from Home pada Anak Usia Dini di Masa Pandemi Covid-19. Jurnal Obsesi: Jurnal Pendidikan Anak Usia Dini, 5(1), 641653. https://doi.org/10.31004/obsesi.v5i1.563 Yildiz Durak, H. (2019). Modeling of relations between K-12 teachers’ TPACK levels and their technology integration self-efficacy, technology literacy levels, attitudes toward technology and usage objectives of social networks. Interactive Learning Environments, 1–27. https://doi.org/10.1080/10494820.2019.1619591 Yudha, F., Aziz, A., & Tohir, M. (2021). Pendampingan Siswa Terdampak Covid-19 Melalui Media Animasi Sebagai Inovasi Pembelajaran Online. JMM (Jurnal Masyarakat Mandiri), 5(3), 964–978. Yurdugül, H., & Demir, Ö. (2017). An investigation of Pre-service Teachers’ Readiness for E-learning at Undergraduate Level Teacher Training Programs: The Case of Hacettepe University. The Case of Hacettepe University.
APA, Harvard, Vancouver, ISO, and other styles
37

Barbounakis, Ioannis S., Peter Stavroulakis, and John Gardiner. "General aspects of digital technologies for wireless local loops." International Journal of Communication Systems 13, no. 3 (2000): 187–206. http://dx.doi.org/10.1002/1099-1131(200005)13:3<187::aid-dac426>3.0.co;2-c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Yang, Songtao, and Qingfeng Jiang. "Towards Region Queries with Strong Location Privacy in Mobile Network." Mobile Information Systems 2021 (November 18, 2021): 1–12. http://dx.doi.org/10.1155/2021/5972486.

Full text
Abstract:
With the interaction of geographic data and social data, the inference attack has been mounting up, calling for new technologies for privacy protection. Although there are many tangible contributions of spatial-temporal cloaking technologies, traditional technologies are not enough to resist privacy intrusion. Malicious attackers still steal user-sensitive information by analyzing the relationship between location and query semantics. Reacting to many interesting issues, oblivious transfer (OT) protocols are introduced to guarantee location privacy. To our knowledge, OT is a cryptographic primitive between two parties and can be used as a building block for any arbitrary multiparty computation protocol. Armed with previous privacy-preserving technologies, for example, OT, in this work, we first develop a novel region queries framework that can provide robust privacy for location-dependent queries. We then design an OT-assist privacy-aware protocol (or OTPA) for location-based service with rigorous security analysis. In short, the common query of the client in our solution can be divided into two parts, the region query R q and the content query C q , to achieve location k -anonymity, location m -diversity, and query r -diversity, which ensure the privacy of two parties (i.e., client and server). Lastly, we instantiate our OTPA protocol, and experiments show that the proposed OTPA protocol is reasonable and effective.
APA, Harvard, Vancouver, ISO, and other styles
39

Medeiros, Gleison O., João C. W. A. Costa, Diego L. Cardoso, and Adam D. F. Santos. "An Intelligent SDN Framework Based on QoE Predictions for Load Balancing in C-RAN." Wireless Communications and Mobile Computing 2020 (June 18, 2020): 1–15. http://dx.doi.org/10.1155/2020/7065202.

Full text
Abstract:
The rapid growth of the Internet and technological advances are forcing mobile operators to increasingly invest in network infrastructures. C-RAN and SDN are regarded as enabling technologies that can overcome the limitations faced by operators, by reducing costs, increasing scalability, and paving the way for the next generation of 5G cellular networks. In this paper, an architectural solution based on SDN and computational intelligence is proposed for C-RAN, which can adjust BBU-RRH mapping through network load balancing rules by predicting subjective and objective QoE metrics for UHD video streaming. The simulation results achieved gains between 59% and 129%, in scenarios without activating a new BBU and scenarios that involve activating a new BBU, respectively.
APA, Harvard, Vancouver, ISO, and other styles
40

Zeleke, Seifu Girma, Beneyam Berehanu Haile, and Ephrem Teshale Bekele. "Data-driven optimal antenna planning for enhanced 4G mobile networks under realistic environment." Indonesian Journal of Electrical Engineering and Computer Science 26, no. 3 (June 1, 2022): 1436. http://dx.doi.org/10.11591/ijeecs.v26.i3.pp1436-1443.

Full text
Abstract:
Recently different capacity boosting technologies, <span>including 3D beamforming and expanding operating bandwidth have been investigated and included in the enhanced fourth generation (4G) and fifth-generation standards. For mobile operators to enhance their network performance, applying these advanced technologies is vital. To achieve that, planning and optimization work need to consider the spatiotemporal distribution of users. Although the capacity impact of advanced antenna technologies is investigated well, deployment options to exploit their benefits in a cost-effective manner considering a realistic network environment are seldom reported. This work presents a data driven and multi-objective based optimal vertical beams placement for an enhanced 4G mobile network with the newly introduced C-band. The method is utilized for an area located in Addis Ababa, Ethiopia, taking into account the existing 4G mobile network as a reference configuration. Users are distributed based on the data collected by ethio-telecom network management system. Findings indicate that optimal vertical beams placement achieved for gradual deployment with consideration cell edge and aggregate throughput performances while reducing network cost. While being cost-effective, up to 69.2% and 73.8% cell edge performance gain is achieved at 20 and 30 pareto points relative to an existing macro mobile network.</span>
APA, Harvard, Vancouver, ISO, and other styles
41

Liu, Shuo, Gil Keren, Emilia Parada-Cabaleiro, and Björn Schuller. "N-HANS: A neural network-based toolkit for in-the-wild audio enhancement." Multimedia Tools and Applications 80, no. 18 (June 3, 2021): 28365–89. http://dx.doi.org/10.1007/s11042-021-11080-y.

Full text
Abstract:
AbstractThe unprecedented growth of noise pollution over the last decades has raised an always increasing need for developing efficient audio enhancement technologies. Yet, the variety of difficulties related to processing audio sources in-the-wild, such as handling unseen noises or suppressing specific interferences, makes audio enhancement a still open challenge. In this regard, we present (the Neuro-Holistic Audio-eNhancement System), a Python toolkit for in-the-wild audio enhancement that includes functionalities for audio denoising, source separation, and —for the first time in such a toolkit—selective noise suppression. The architecture is specially developed to automatically adapt to different environmental backgrounds and speakers. This is achieved by the use of two identical neural networks comprised of stacks of residual blocks, each conditioned on additional speech- and noise-based recordings through auxiliary sub-networks. Along to a Python API, a command line interface is provided to researchers and developers, both of them carefully documented. Experimental results indicate that achieves great performance w. r. t. existing methods, preserving also the audio quality at a high level; thus, ensuring a reliable usage in real-life application, e. g., for in-the-wild speech processing, which encourages the development of speech-based intelligent technology.
APA, Harvard, Vancouver, ISO, and other styles
42

Altowaijri, Saleh M. "Efficient Next-Hop Selection in Multi-Hop Routing for IoT Enabled Wireless Sensor Networks." Future Internet 14, no. 2 (January 21, 2022): 35. http://dx.doi.org/10.3390/fi14020035.

Full text
Abstract:
The Internet of Things (IoT) paradigm allows the integration of cyber and physical worlds and other emerging technologies. IoT-enabled wireless sensor networks (WSNs) are rapidly gaining interest due to their ability to aggregate sensing data and transmit it towards the central or intermediate repositories, such as computational clouds and fogs. This paper presents an efficient multi-hop routing protocol (EMRP) for efficient data dissemination in IoT-enabled WSNs where hierarchy-based energy-efficient routing is involved. It considers a rank-based next-hop selection mechanism. For each device, it considers the residual energy to choose the route for data exchange. We extracted the residual energy at each node and evaluated it based on the connection degree to validate the maximum rank. It allowed us to identify the time slots for measuring the lifetime of the network. We also considered the battery expiry time of the first node to identify the network expiry time. We validated our work through extensive simulations using Network Simulator. We also implemented TCL scripts and C language code to configure low-power sensing devices, cluster heads and sink nodes. We extracted results from the trace files by utilizing AWK scripts. Results demonstrate that the proposed EMRP outperforms the existing related schemes in terms of the average lifetime, packet delivery ratio, time-slots, communication lost, communication area, first node expiry, number of alive nodes and residual energy.
APA, Harvard, Vancouver, ISO, and other styles
43

Chen, Shanzhi, Jinling Hu, Yan Shi, Li Zhao, and Wen Li. "A Vision of C-V2X: Technologies, Field Testing, and Challenges With Chinese Development." IEEE Internet of Things Journal 7, no. 5 (May 2020): 3872–81. http://dx.doi.org/10.1109/jiot.2020.2974823.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Setthawong, Pisai, and Surat Tanterdtid. "Non-Flooding Bridging Solutions for Resilient Packet Rings." ECTI Transactions on Electrical Engineering, Electronics, and Communications 6, no. 1 (June 21, 2007): 38–46. http://dx.doi.org/10.37936/ecti-eec.200861.171753.

Full text
Abstract:
Resilient Packet Ring (RPR) is one of the IP-based technologies that have been proposed to replace SONET/SDH in metropolitan area networks because it is well-adapted to handle diverse tra±c, including multimedia traffic, found in present-day networks. Additionally, the RPR network is used efficiently with nodes transmitting simultaneously as long as the paths of the packets do not overlap. However, when bridging RPR networks, packets are flooded on the bridged RPR network if the packet destination is on a remote network other than the source network. As a result, the network is used inefficiently, decreasing the available bandwidth for other traffic. In this paper, we propose enhanced topology discovery protocol and enhanced spanning tree protocol to prevent the flooding of packets on the bridged RPR network. Simulations were performed in order to evaluate the proposed solutions. The results show that the flooding of packets is successfully prevented and that the network is used more e±ciently as compared to the RPR
APA, Harvard, Vancouver, ISO, and other styles
45

Fan, Yuanyuan, Liu Liu, Shuoshuo Dong, Lingfan Zhuang, Jiahui Qiu, Chao Cai, and Meng Song. "Network Performance Test and Analysis of LTE-V2X in Industrial Park Scenario." Wireless Communications and Mobile Computing 2020 (December 3, 2020): 1–12. http://dx.doi.org/10.1155/2020/8849610.

Full text
Abstract:
As one of the mainstream technologies of vehicle-to-everything (V2X) communication, Cellular-V2X (C-V2X) provides high reliability and low latency V2X communications. And with the development of mobile cellular systems, C-V2X is evolving from long-term evolution-V2X (LTE-V2X) to new radio-V2X (NR-V2X). However, C-V2X test specification has not been completely set in the industry. In order to promote the formulation of relevant standards and accelerate the implementation of industrialization, the field test and analysis based on LTE-V2X in the industrial park scenario is conducted in this paper. Firstly, key technologies of LTE-V2X are introduced. Then, the specific methods and contents of this test are proposed, which consists of functional and network performance tests to comprehensively evaluate the communication property of LTE-V2X. Static and dynamic tests are required in both line-of-sight (LOS) and non-line-of-sight (NLOS) scenarios to evaluate network performance. Next, the test results verify that all functions are normal, and the performance evaluation indexes are appraised and analyzed. Finally, it summarizes the whole paper and puts forward the future work.
APA, Harvard, Vancouver, ISO, and other styles
46

Isroatul Khusna, Nur, Sumarmi, Syamsul Bachri, I. Komang Astina, Dwi Astuti Wahyu Nurhayati, and Rajendra P Shresthai. "New Technologies for Project-Based Empathy Learning in Merdeka Belajar (Freedom to Learn): The Use of inaRISK Application and Biopore Technology." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 22 (November 29, 2022): 94–110. http://dx.doi.org/10.3991/ijim.v16i22.36153.

Full text
Abstract:
The Freedom to Learn curriculum in higher education provides autonomous and flexible learning that is innovative, independent, and relevant to student needs. The use of new technologies such as inaRISK and biopore in project-based consideration learning is thought to be able to improve students' cognitive, affective, and psychomotor abilities. The purpose of this study was to determine the effect of using the inaRISK application and biopori technology in project based empathy learning. This research used a mixed method with a research and development (R n D) methods to determine the effectiveness of the learning model, a quasi-experiment to measure cognitive aspects, and applied descriptive statistics to measure affective and psychomotor aspects. To analyze R n D using ADDIE method then cognitive aspects, this research used homogeneity test, normality test, and t-test using SPSS 21 for Windows. The overall analysis (cognitive, affective, and psychomotor aspects) made use of a data sub code system through MAXQDA software, while network analysis was done by using Gephi 0.9.2 software. The results showed that there was a significant and positive influence of the inaRISK application and biopore technology on the students' cognitive, affective, and psychomotor aspects in the project-based consideration learning of Freedom to Learn.
APA, Harvard, Vancouver, ISO, and other styles
47

Hasrol Jono, Mohd Nor Hajar, Rahayu Hasanordin, Mohamad Ibrahim, Nor Azilah Mohd Asarani, and Azlan Abdul Aziz. "e-Materials Application Presentation Using Gagne Learning Theory for “Introduction to C++ Computer Programming”." International Journal of Systems Applications, Engineering & Development 15 (November 28, 2021): 202–7. http://dx.doi.org/10.46300/91015.2021.15.30.

Full text
Abstract:
The need to integrate multimedia in the process of teaching and learning at all levels of education is becoming more vital. Multimedia based on e-learning is seen as an effective alternative in teaching and learning process. This method is able to create a student-centered learning where students are encouraged of being independence; study at their own pace and at their own place. Nevertheless, the rapid development of information and communication technologies (ICT) in today's world has necessitate a new trend in the presentation of information in the form of Flash Video, which is more easy to understand and accessible instantly to users. The research is undertaken by introducing an e-based multimedia content by maintaining the concept of Gagne Learning Theory. An e-material entitled "Introduction to Computer Programming C++" has been developed containing learning activities that allow users to interact simultaneously with the material. The material is expected to be an effective teaching aid to entice students in the subject of programming.
APA, Harvard, Vancouver, ISO, and other styles
48

Reyneri, L. M., M. Chiaberge, L. Lavagno, B. Pino, and E. Miranda. "SIMULINK-BASED HW/SW CODESIGN OF EMBEDDED NEURO-FUZZY SYSTEMS." International Journal of Neural Systems 10, no. 03 (June 2000): 211–26. http://dx.doi.org/10.1142/s0129065700000193.

Full text
Abstract:
We propose a semi-automatic HW/SW codesign flow for low-power and low-cost Neuro-Fuzzy embedded systems. Applications range from fast prototyping of embedded systems to high-speed simulation of Simulink models and rapid design of Neuro-Fuzzy devices. The proposed codesign flow works with different technologies and architectures (namely, software, digital and analog). We have used The Mathworks' Simulink© environment for functional specification and for analysis of performance criteria such as timing (latency and throughput), power dissipation, size and cost. The proposed flow can exploit trade-offs between SW and HW as well as between digital and analog implementations, and it can generate, respectively, the C, VHDL and SKILL codes of the selected architectures.
APA, Harvard, Vancouver, ISO, and other styles
49

Takagi, Tasuku. "Research and development on EMC/EMI measurements and technologies in Japan." Electronics and Communications in Japan (Part I: Communications) 82, no. 11 (November 1999): 83–92. http://dx.doi.org/10.1002/(sici)1520-6424(199911)82:11<83::aid-ecja9>3.0.co;2-n.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Alzahrani, Ali, Theyazn H. H. Aldhyani, Saleh Nagi Alsubari, and Ans D. Alghamdi. "Network Traffic Forecasting in Network Cybersecurity: Granular Computing Model." Security and Communication Networks 2022 (June 20, 2022): 1–14. http://dx.doi.org/10.1155/2022/3553622.

Full text
Abstract:
Industry 4.0, also known as the Internet of Things, is a concept that encompasses the joint applicability of operation, the Internet, and information technologies to expand the efficiency expectation of automation to include green and flexible processes and innovative products and services. Industrial network infrastructures must be modified to accommodate extra traffic from a variety of technologies in order to achieve this integration. In order to successfully implement cutting-edge wireless technologies, high-quality service (QoS) must be provided to end users. It is thus important to keep an eye on the functioning of the whole network without impacting base station throughput. Improved network performance is constantly needed, even for already-deployed cellular networks, such as the 4th generation (4G) and 3rd generation (3G). For the purpose of forecasting network traffic, an integrated model based on the long short-term memory (LSTM) model was used to combine clustering rough k-means (RKM) and fuzzy c-means (FCM). Clustering granules derived from FCM and RKM were also utilized to examine the network data for each calendar year. The novelty of our proposed model is the integration of the prediction and forecasting results obtained using existing prediction models with centroids of clusters. The WIDE backbone network’s live network traffic statistics were used to evaluate the proposed solution. The integrated model’s outcomes were assessed using a variety of statistical markers, including mean square error (MSE), root mean square error (RMSE), and standard error. The suggested technique was able to provide findings that were very accurate. The prediction error of LSTM with FCM was less on the basis of the MSE of 0.00783 and RMSE of 0.0885 at the training phase, where the prediction values of LSTM with the RKM had an MSE of 0.00564 and RMSE of 0.7511. Finally, the suggested model may substantially increase the prediction accuracy attained using FCM and RKM clustering.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography