Search results for " SHARING"

showing 10 items of 290 documents

Small world theory and the World Wide Web: linking small world properties and website centrality

2016

This qualitative paper aims to point out the incidence of small world characteristics in the World Wide Web. To this end, some theoretical implications of small world theory (SWT) are verified using information from focus groups and in-depth interviews administered to experts and users of the World Wide Web. The purpose of this study is to investigate whether it is possible to apply small world properties to online social networks while pointing out the key variables of website centrality in that context. Building on this, the paper traces possible contributions for better management of the World Wide Web in terms of the professional use of social media to facilitate information or product …

EngineeringWeb 2.0Context (language use)02 engineering and technologyWorld Wide Web0502 economics and business0202 electrical engineering electronic engineering information engineeringSocial mediaProduct (category theory)Small world theoryGeneral Environmental ScienceSEO.SWTbusiness.industryInformation sharing05 social sciencesSocial media marketingSearch engine optimisationFocus groupSMMSEOWorld Wide WebWorld Wide Web; small world theory; SWT; social media marketing; SMM; search engine optimisation; SEO.General Earth and Planetary Sciences050211 marketing020201 artificial intelligence & image processingWeb intelligenceCentralitybusinessSettore SECS-P/08 - Economia E Gestione Delle ImpreseWorld Wide Web; Small world theory; SWT; Social media marketing; SMM; Search engine optimisation; SEO.050203 business & managementInternational Journal of Markets and Business Systems
researchProduct

Charge measurement using an array of Faraday’s Cups on a printed circuit board

2014

Abstract An absolute method of measuring charge is to use a Faraday Cup (FC) principle. This study relates to a novel method of measuring charge on a flat substrate, which is coated with charged powder particles. The substrate consists of an array of FC with different dimensions. The sensor is manufactured using flame-retardant printed circuit board (PCB) technology. The objective of this work is to reduce the charge sharing by developing a grounded shield cup around each conductive cup in the array and accordingly increase cup-to-ground capacitance. The results have confirmed that the improved well shielding would provide a more accurate quantitative charge measurement.

Engineeringbusiness.industryApplied MathematicsElectrical engineeringFaraday cupSubstrate (printing)Condensed Matter PhysicsCapacitancelaw.inventionCharge sharingPrinted circuit boardsymbols.namesakelawElectromagnetic shieldingsymbolsOptoelectronicsElectrical and Electronic EngineeringbusinessFaraday cageInstrumentationElectrical conductorMeasurement
researchProduct

Relationship between employee involvement and lean manufacturing and its effect on performance in a rigid continuous process industry

2015

Relationship between employee involvement and lean manufacturing and its effect on performance in a rigid continuous process industry DOI: 10.1080/00207543.2014.975852 Juan A. Marin-Garciaa* & Tomas Bonaviab Received: 1 Aug 2013 Accepted: 30 Sep 2014 Published online: 04 Nov 2014 This research aims to empirically test the effect of employee involvement on lean manufacturing (LM), and the effect of LM on production outcomes. Employee involvement is operationalised through four related variables: empowerment, training, contingent remuneration and communication. The effects are tested by recording management perceptions in a different industrial sector from those usually studied in previous re…

Engineeringparticipation in decision-makingbusiness.industryStrategy and Managementmedia_common.quotation_subjectInformation sharinglean productionManagement Science and Operations ResearchLean manufacturingIndustrial and Manufacturing Engineeringcompensationhuman resource managementSecondary sector of the economyHuman resource managementinformation sharingPartial least squares regressionRemunerationORGANIZACION DE EMPRESASProduction (economics)MarketingEmpowermentbusinesshigh-performance work practicesIndustrial organizationmedia_common
researchProduct

OPENNESS AND KNOWLEDGE AS LEADING TENDENCIES IN DEVELOPMENT OF MICRO ENTERPRISES

2012

Small and micro businesses are the key elements of market economy and most dynamic, flexible business sales form. Establishment and development of micro enterprises are a necessary condition for forming normal economic environment, what promotes manufacturing goods and competition between service companies. Micro enterprises are important source of work-places, create spirit of entrepreneurship and innovation in European Union and therefor are essential for strenghtening empoyment and competition. Lately there are heard a lot of speeches in media about importance of small and medium enterprises in the European Union and national level, but rarely are mentioned that most of these enterprises…

EntrepreneurshipService (economics)media_common.quotation_subjectGeneral partnershipOpenness to experienceEconomicsmedia_common.cataloged_instanceSmall and medium-sized enterprisesMarketingEuropean unionMicro-enterpriseKnowledge sharingmedia_commonECONOMICS AND MANAGEMENT
researchProduct

Two Levels SPF-Based System to Interconnect Partially Decentralized P2P File Sharing Networks

2005

Partially decentralized P2P (PDP2P) networks are a subset of P2P networks. Roles of nodes are different according to their functionality in the network. Nowadays, there are many PDP2P networks, with different characteristics. It is necessary to find a way to join those autonomous networks. We have not found any interconnection system, so in this article we present a new hierarchical system for interconnecting peers from different PDP2P networks. It will allow sharing data, content and resources between networks. It can be employed between sensor networks, P2P networks, and generally, overlay networks. Oldest superpeers or brokers with higher bandwidth in the PDP2P network will belong to hig…

Evolving networksFile sharingComputer sciencebusiness.industryInterdependent networksDistributed computingOverlay networkHierarchical control systemHierarchical network modelbusinessNetwork topologyWireless sensor networkComputer networkJoint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05)
researchProduct

Notice of Violation of IEEE Publication Principles: Distributed Multimedia Digital Libraries on Peer-to-Peer Networks

2007

This paper presents an original approach to image sharing in large, distributed digital libraries, in which a user is able to interactively search interesting resources by means of content-based image retrieval techniques. The approach described here addresses the issues arising when the content is managed through a peer-to-peer architecture. In this case, the retrieval facilities are likely to be limited to queries based on unique identifiers or small sets of keywords, which may be quite inadequate, so we propose a novel algorithm for routing user queries that exploits compact representations of multimedia resources shared by each peer in order to dynamically adapt the network topology to …

ExploitMultimediabusiness.industryComputer scienceImage sharingPeer-to-peercomputer.software_genreDigital libraryNetwork topologyUnique identifierWorld Wide WebbusinesscomputerImage retrievalContent management14th International Conference of Image Analysis and Processing - Workshops (ICIAPW 2007)
researchProduct

Performance of LoRa for Bike-Sharing Systems

2019

Today bike sharing systems are becoming popular in many cities as short-distance transit vehicles. More than 18 million bicycles are available worldwide for public use and one of the main problems that afflicts such sharing systems is the loss of bikes, which can be stolen or simply left in unknown locations. Thus, many bikes are docked or tracked using GPS and costly cellular connections. In this paper, we consider the emerging Long Range (LoRa) technology for use in bike sharing systems. LoRa exploits free ISM bands and has been conceived for low power and low data rate applications. Additionally, LoRa is characterized by large cells and heterogeneous application domains, which may lead t…

ExploitSettore ING-INF/03 - Telecomunicazionibusiness.industryComputer science020209 energy020208 electrical & electronic engineeringAutomotive industry02 engineering and technologyScalabilityLow data rate0202 electrical engineering electronic engineering information engineeringGlobal Positioning SystemBike sharingbusinessInternet of ThingsLoRa LoRaWAN Low Power Wide Area Net-works (LPWAN) Automotive Vehicular Network (VANET) bikebike-sharing tracker IoTComputer network2019 AEIT International Conference of Electrical and Electronic Technologies for Automotive (AEIT AUTOMOTIVE)
researchProduct

A gap analysis of Internet-of-Things platforms

2016

We are experiencing an abundance of Internet-of-Things (IoT) middleware solutions that provide connectivity for sensors and actuators to the Internet. To gain a widespread adoption, these middleware solutions, referred to as platforms, have to meet the expectations of different players in the IoT ecosystem, including device providers, application developers, and end-users, among others. In this article, we evaluate a representative sample of these platforms, both proprietary and open-source, on the basis of their ability to meet the expectations of different IoT users. The evaluation is thus more focused on how ready and usable these platforms are for IoT ecosystem players, rather than on t…

FOS: Computer and information sciencesComputer Networks and CommunicationsComputer science02 engineering and technologyGap analysiscomputer.software_genreWorld Wide WebComputer Science - Computers and SocietyOrder (exchange)Computers and Society (cs.CY)0202 electrical engineering electronic engineering information engineeringesineiden internetIoT ecosystemIoT marketplaceta113internet of Thingsbusiness.industry020206 networking & telecommunicationsIoT platformsData sharingMiddleware (distributed applications)Middleware020201 artificial intelligence & image processingThe InternetbusinessInternet of Thingsgap analysiscomputerComputer Communications
researchProduct

Finite state verifiers with constant randomness

2014

We give a new characterization of $\mathsf{NL}$ as the class of languages whose members have certificates that can be verified with small error in polynomial time by finite state machines that use a constant number of random bits, as opposed to its conventional description in terms of deterministic logarithmic-space verifiers. It turns out that allowing two-way interaction with the prover does not change the class of verifiable languages, and that no polynomially bounded amount of randomness is useful for constant-memory computers when used as language recognizers, or public-coin verifiers. A corollary of our main result is that the class of outcome problems corresponding to O(log n)-space …

FOS: Computer and information sciencesDiscrete mathematicsClass (set theory)Computer Science - Logic in Computer ScienceFinite-state machineGeneral Computer ScienceComputational Complexity (cs.CC)Binary logarithmLogic in Computer Science (cs.LO)Theoretical Computer ScienceComputer Science - Computational ComplexityBounded functionVerifiable secret sharingConstant (mathematics)Time complexityRandomnessMathematics
researchProduct

A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud

2020

Healthcare data in cloud computing facilitates the treatment of patients efficiently by sharing information about personal health data between the healthcare providers for medical consultation. Furthermore, retaining the confidentiality of data and patients' identity is a another challenging task. This paper presents the concept of an access control-based (AC) privacy preservation model for the mutual authentication of users and data owners in the proposed digital system. The proposed model offers a high-security guarantee and high efficiency. The proposed digital system consists of four different entities, user, data owner, cloud server, and key generation center (KGC). This approach makes…

FOS: Computer and information sciencesKey generationComputer Science - Cryptography and Security020205 medical informaticsbusiness.industryComputer science020206 networking & telecommunicationsAccess controlCloud computing02 engineering and technologyMutual authenticationEncryptionPublic-key cryptographyData sharingComputer Science - Computers and SocietyComputers and Society (cs.CY)0202 electrical engineering electronic engineering information engineeringSession keybusinessCryptography and Security (cs.CR)Computer network2020 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct