Search results for " Network"

showing 10 items of 6428 documents

On the Influence of Walking People on the Doppler Spectral Characteristics of Indoor Channels

2017

Author´s accepted manuscript © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. When modelling mobile radio channels with moving scatterers, it is generally assumed that the angles of departure (AODs), angles of arrival (AOAs), and the speed of the scatterers are time-invariant. However, this assumption is violated as the AODs and AOAs vary with the positions of t…

symbols.namesakeComputer scienceAcousticsGaussian0103 physical sciences0202 electrical engineering electronic engineering information engineeringsymbols020206 networking & telecommunications02 engineering and technology010301 acoustics01 natural sciencesDoppler effectCommunication channel
researchProduct

Self-regulation mechanism of an ecosystem in a non-Gaussian fluctuation regime

1996

We study a dynamical model for an ecological network of many interacting species. We consider a Malthus-Verhulst type of self-regulation mechanism. In the framework of the mean field theory we study the nonlinear relaxation in three different cases: (a) towards the equilibrium state, (b) towards the absorbing barrier, (c) at the critical point. We obtain asymptotic behavior in all different cases for the time average of the process. The dynamical behavior of the system, in the limit of infinitely many interacting species, is investigated in the stability and instability conditions and theoretical results are compared with numerical simulations. \textcopyright{} 1996 The American Physical So…

symbols.namesakeNonlinear systemMean field theoryThermodynamic equilibriumCritical point (thermodynamics)GaussiansymbolsTime averageStatistical physicsInstabilityEcological networkMathematics
researchProduct

Quenched and annealed free energies

1984

This paper gives a simple exposition of the Nishimori method to solve certain quenched, random bond spin-glass models. It allows a transparent physical interpretation in terms of annealed systems. As an application a special solution of the Sherrington-Kirkpatrick model with a discrete probability distribution is obtained and shown to agree with the solution for the Gaussian case. This substantiates the claim that the averaged free energy does not depend on the details of the probability distribution Expose simple de la methode de Nishimori pour resoudre certains modeles de verres de spin avec interactions aleatoires. Interpretation transparente en termes de systemes recuits. Presentation d…

symbols.namesakeSpin glassCondensed matter physicsChemistrySpecial solutionGaussiansymbolsProbability distributionFree energiesIsing modelCondensed Matter::Disordered Systems and Neural NetworksMathematical physicsJournal de Physique
researchProduct

Violent Conflicts and the New Mediatization: The Impact of Social Media on the European Parliamentary Agenda Regarding the Syrian War

2018

As key institutions in Western democracies, parliaments have gained importance regarding foreign affairs issues in recent years. Their increasing role as moral tribunes and discussion forums on conflict prevention and resolution have led to the parliamentarization of international affairs. The examination of the parliamentary agenda and the actors who shape it constitutes a fundamental part of agenda-setting studies as applied to the media and political systems. Among these actors, mass media must be highlighted, taking into account the complex process of information gathering for members of Parliament, particularly in cases related to international violent conflicts. Moreover, in the speci…

syriasocial networksparliamentParliamentparliamentary agendaCommunicationmedia_common.quotation_subjectsocial mediaconflictlcsh:P87-96lcsh:Communication. Mass medialcsh:AdvertisingPolitical sciencePolitical economySocial medialcsh:HF5801-6182media_commonmediatization
researchProduct

Voice traffic bicasting enhancements in mobile HSPA network

2014

This paper discusses methods for improving the effectiveness of delivering voice traffic over High-Speed Downlink Packet Access (HSDPA) network by employing transmission diversity with Single-Frequency Dual-Cell (SF-DC) Aggregation that is part of the Multiflow specification. SF-DC Aggregation allows the user to be served at the same time by two different cells. The enhancements discussed in the paper capitalize strongly on the availability of the composed Channel Quality Indication (CQI) feedback at both serving cells. According to the results obtained from the network simulations, the ability to select the better channel for each voice transmission significantly decreases the required tra…

ta113Access networkta213Computer sciencebusiness.industryNetwork packetCSoHSbicastingThroughputTransmission (telecommunications)HandovermultiflowTelecommunications linkHSPAVoHSSF-DC aggregationbusinessComputer networkPower controlCommunication channel
researchProduct

Teaching Knowledge Management by Combining Wikis and Screen Capture Videos

2011

PurposeThis paper aims to report on the design and creation of a knowledge management course aimed at facilitating student creation and use of social interactive learning tools for enhanced learning.Design/methodology/approachThe era of social media and web 2.0 has enabled a bottom‐up collaborative approach and new ways to publish work on the web, promoted by tools such as YouTube video service. In this spirit a knowledge management course was designed aiming to facilitate university students to compose videos on different difficult concepts in the theory part of the course by searching for explanations on the web and by creating a Windows Media Player video focusing on the self‐defined pro…

ta113Collaborative writingKnowledge managementMultimediaComputer Networks and Communicationsbusiness.industryComputer scienceWindows MediaLibrary and Information Sciencescomputer.software_genreInteractive LearningWorld Wide WebProblem-based learningConstructivism (philosophy of education)The InternetSocial mediabusinessSocial constructivismcomputer
researchProduct

Introduction of Multiflow for HSDPA

2012

This paper introduces a multi-cell transmission scheme for High-Speed Downlink Packet Access (HSDPA) networks, called Multiflow. In this concept, downlink data is transmitted to a user terminal at the border of two cells from one or both of the cells. The cells may belong to same NodeB or to two different NodeBs. The data flows are separated by different scrambling codes used by each associated cell, thus the flows can be treated independently. This provides increased multi-user diversity by means of flexibility in downlink resource management, in addition to the spatial diversity of multiple transmission locations. Another important gain mechanism for this scheme is realized by short-term …

ta113Computer scienceNetwork packetbusiness.industryHSDPALoad balancing (computing)Antenna diversityMonipistelähetysScramblingHandoverTelecommunications linkNetwork performanceNodeBbusinessMultipoint transmissionComputer network2012 5th International Conference on New Technologies, Mobility and Security (NTMS)
researchProduct

A Network-Based Framework for Mobile Threat Detection

2018

Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, which increase the diversity of malicious applications. Thus, there is a need for an intelligent system that copes with this issue. This paper proposes a machine learning (ML) based framework to counter rapid evolution of mobile threats. This model is based on flow-based features, that will work on the network side. This model is designed with adversarial input in mind. The model uses 40 timebased network flow features, extracted from the real-time traffic of malicious and…

ta113Computer scienceintrusion detectionmobile threatsFeature extractionEvasion (network security)concept-driftAdversaryComputer securitycomputer.software_genreFlow networkMobile malwareanomaly detectionVariety (cybernetics)haittaohjelmatmachine learningkoneoppiminenmobiililaitteetMalwaretietoturvacomputerHumanoid robot
researchProduct

Shared and personal learning spaces: Challenges for pedagogical design

2012

Abstract The development of new tools for collaboration, such as social software, plays a crucial role in leisure time and work activities. The aim of this article is to summarize the research in the field of computer-supported collaborative learning (CSCL). This is done particularly from the perspective of the blurred line between individual (personal) and group-level (shared) learning that the use of the new tools has forced us to re-think. First, individual and group-level perspectives to learning are discussed to make sense of the major notions of how learning is understood in CSCL research. Second, based on this theoretical grounding, it will be further elaborated what this means to th…

ta113Cooperative learningKnowledge managementComputer Networks and CommunicationsComputer sciencebusiness.industryEducational technologyCollaborative learningOpen learningExperiential learningLearning sciencesComputer Science ApplicationsEducationSynchronous learningActive learningta516businessta515The Internet and Higher Education
researchProduct

Two-phase routing in three-dimensional blocked optical tori

2014

The contribution of this paper is an all-optical 3D network architecture. We describe scheduled, two-phase routing for it. The three-dimensional blocked optical torus BOT of block size b consists of b2 × b2 × b2 nodes for the first phase routing. Processors are evenly deployed at the underlying torus so that every bth node consists of a processor. Additionally, a BOT consists of b3 blocks of b × b × b subnetworks for the second phase routing. Routing of each packet is done in two phases. Firstly, packets are routed from source processor to an intermediate target node at the target block. Secondly, packets are routed from the intermediate targets at the target block to the target processor (…

ta113Dynamic Source Routingta213Computer sciencebusiness.industryNetwork packetNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSLink-state routing protocolDestination-Sequenced Distance Vector routingRouting (electronic design automation)businessBlock sizeComputer networkBlock (data storage)Proceedings of the 15th International Conference on Computer Systems and Technologies
researchProduct