Search results for " SHARING"
showing 10 items of 290 documents
Small world theory and the World Wide Web: linking small world properties and website centrality
2016
This qualitative paper aims to point out the incidence of small world characteristics in the World Wide Web. To this end, some theoretical implications of small world theory (SWT) are verified using information from focus groups and in-depth interviews administered to experts and users of the World Wide Web. The purpose of this study is to investigate whether it is possible to apply small world properties to online social networks while pointing out the key variables of website centrality in that context. Building on this, the paper traces possible contributions for better management of the World Wide Web in terms of the professional use of social media to facilitate information or product …
Charge measurement using an array of Faraday’s Cups on a printed circuit board
2014
Abstract An absolute method of measuring charge is to use a Faraday Cup (FC) principle. This study relates to a novel method of measuring charge on a flat substrate, which is coated with charged powder particles. The substrate consists of an array of FC with different dimensions. The sensor is manufactured using flame-retardant printed circuit board (PCB) technology. The objective of this work is to reduce the charge sharing by developing a grounded shield cup around each conductive cup in the array and accordingly increase cup-to-ground capacitance. The results have confirmed that the improved well shielding would provide a more accurate quantitative charge measurement.
Relationship between employee involvement and lean manufacturing and its effect on performance in a rigid continuous process industry
2015
Relationship between employee involvement and lean manufacturing and its effect on performance in a rigid continuous process industry DOI: 10.1080/00207543.2014.975852 Juan A. Marin-Garciaa* & Tomas Bonaviab Received: 1 Aug 2013 Accepted: 30 Sep 2014 Published online: 04 Nov 2014 This research aims to empirically test the effect of employee involvement on lean manufacturing (LM), and the effect of LM on production outcomes. Employee involvement is operationalised through four related variables: empowerment, training, contingent remuneration and communication. The effects are tested by recording management perceptions in a different industrial sector from those usually studied in previous re…
OPENNESS AND KNOWLEDGE AS LEADING TENDENCIES IN DEVELOPMENT OF MICRO ENTERPRISES
2012
Small and micro businesses are the key elements of market economy and most dynamic, flexible business sales form. Establishment and development of micro enterprises are a necessary condition for forming normal economic environment, what promotes manufacturing goods and competition between service companies. Micro enterprises are important source of work-places, create spirit of entrepreneurship and innovation in European Union and therefor are essential for strenghtening empoyment and competition. Lately there are heard a lot of speeches in media about importance of small and medium enterprises in the European Union and national level, but rarely are mentioned that most of these enterprises…
Two Levels SPF-Based System to Interconnect Partially Decentralized P2P File Sharing Networks
2005
Partially decentralized P2P (PDP2P) networks are a subset of P2P networks. Roles of nodes are different according to their functionality in the network. Nowadays, there are many PDP2P networks, with different characteristics. It is necessary to find a way to join those autonomous networks. We have not found any interconnection system, so in this article we present a new hierarchical system for interconnecting peers from different PDP2P networks. It will allow sharing data, content and resources between networks. It can be employed between sensor networks, P2P networks, and generally, overlay networks. Oldest superpeers or brokers with higher bandwidth in the PDP2P network will belong to hig…
Notice of Violation of IEEE Publication Principles: Distributed Multimedia Digital Libraries on Peer-to-Peer Networks
2007
This paper presents an original approach to image sharing in large, distributed digital libraries, in which a user is able to interactively search interesting resources by means of content-based image retrieval techniques. The approach described here addresses the issues arising when the content is managed through a peer-to-peer architecture. In this case, the retrieval facilities are likely to be limited to queries based on unique identifiers or small sets of keywords, which may be quite inadequate, so we propose a novel algorithm for routing user queries that exploits compact representations of multimedia resources shared by each peer in order to dynamically adapt the network topology to …
Performance of LoRa for Bike-Sharing Systems
2019
Today bike sharing systems are becoming popular in many cities as short-distance transit vehicles. More than 18 million bicycles are available worldwide for public use and one of the main problems that afflicts such sharing systems is the loss of bikes, which can be stolen or simply left in unknown locations. Thus, many bikes are docked or tracked using GPS and costly cellular connections. In this paper, we consider the emerging Long Range (LoRa) technology for use in bike sharing systems. LoRa exploits free ISM bands and has been conceived for low power and low data rate applications. Additionally, LoRa is characterized by large cells and heterogeneous application domains, which may lead t…
A gap analysis of Internet-of-Things platforms
2016
We are experiencing an abundance of Internet-of-Things (IoT) middleware solutions that provide connectivity for sensors and actuators to the Internet. To gain a widespread adoption, these middleware solutions, referred to as platforms, have to meet the expectations of different players in the IoT ecosystem, including device providers, application developers, and end-users, among others. In this article, we evaluate a representative sample of these platforms, both proprietary and open-source, on the basis of their ability to meet the expectations of different IoT users. The evaluation is thus more focused on how ready and usable these platforms are for IoT ecosystem players, rather than on t…
Finite state verifiers with constant randomness
2014
We give a new characterization of $\mathsf{NL}$ as the class of languages whose members have certificates that can be verified with small error in polynomial time by finite state machines that use a constant number of random bits, as opposed to its conventional description in terms of deterministic logarithmic-space verifiers. It turns out that allowing two-way interaction with the prover does not change the class of verifiable languages, and that no polynomially bounded amount of randomness is useful for constant-memory computers when used as language recognizers, or public-coin verifiers. A corollary of our main result is that the class of outcome problems corresponding to O(log n)-space …
A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud
2020
Healthcare data in cloud computing facilitates the treatment of patients efficiently by sharing information about personal health data between the healthcare providers for medical consultation. Furthermore, retaining the confidentiality of data and patients' identity is a another challenging task. This paper presents the concept of an access control-based (AC) privacy preservation model for the mutual authentication of users and data owners in the proposed digital system. The proposed model offers a high-security guarantee and high efficiency. The proposed digital system consists of four different entities, user, data owner, cloud server, and key generation center (KGC). This approach makes…