Search results for " communication"

showing 10 items of 4937 documents

A Metaheuristic Bandwidth Allocation Scheme for FiWi Networks Using Ant Colony Optimization

2015

Optical-wireless access networks constitute a quite attractive solution to meet the ever-increasing bandwidth requirements of end-users, offering significant benefits such as ubiquitous coverage in the wireless domain and huge bandwidth in the optical domain. However, converging optical and wireless networking technologies, with Passive Optical Networks (PONs) and 4G wireless standards, such as the Worldwide Interoperability for Microwave Access (WiMAX) and the Long Term Evolution (LTE), entails major challenges that need to be addressed. In this context, designing an efficient and fair bandwidth distribution with Quality of Service (QoS) support is a difficult task due to the interdependen…

Access networkDynamic bandwidth allocationWireless networkbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWiMAXPassive optical networkBandwidth allocationComputer Networks and CommunicationAutomotive EngineeringBandwidth (computing)Radio resource managementbusinessComputer network
researchProduct

Phone-Controlled Delivery of NGN Services into Residential Environments

2008

The horizontally layered architecture of the IMS/NGN standards family enables the delivery of services independent of access network and requesting device. In this article, the authors propose a further separation of service control and delivery, allowing the requesting device - in particular a user's mobile phone - to invite other devices (we will focus on DLNA appliances) into the service delivery, enhancing both user experience and service design flexibility. The proposed solution builds on exploiting proximity technologies (e.g. barcodes, NFC) for pairing the control device with a remote environment. Motivated by scenarios, the architecture concepts are explained and a prototype that wa…

Access networkMultimediabusiness.industryService delivery frameworkComputer scienceService designcomputer.software_genreUser experience designMobile phoneUniversal Plug and PlayNext-generation networkVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Mobile telephonybusinesscomputerComputer network
researchProduct

Preamble Reservation Based Access for Grouped mMTC Devices with URLLC Requirements

2019

Author's accepted manuscript (postprint). © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Available from 16/07/2021. Ultra-reliable low latency communication (URLLC) and massive machine type communications (mMTC) are two of the three major technological pillars in 5G. For medium access in mMTC scenarios, e.g., smart cities, a major bottleneck for achieving reli…

Access networkbusiness.industryComputer science05 social sciencesReservation050801 communication & media studiesPreamble0508 media and communications0502 economics and business050211 marketingLatency (engineering)businessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 5505GRandom accessComputer networkCommunication channel
researchProduct

Oltrepassare le soglie per accedere alla conoscenza del patrimonio

2021

Rendere accessibili i monumenti, come le opere maggiori e minori, che costituiscono il nostro patrimonio culturale significa dotarli di apposite soglie per oltrepassare quegli sbarramenti determinati dalla presenza di barriere sia fisiche sia culturali. Se per il superamento delle prime si interviene con interventi strutturali e architettonici che necessariamente devono essere gestiti da esperti di restauro, per il superamento delle barriere culturali entra in azione la disciplina del design della comunicazione visiva e con essa i designer in grado di adottare i corretti registri di traduzione dei contenuti in forme visuali di modo che questi possano essere fruiti da un pubblico ampio, in c…

Accessibility Communication Design Tools KnowledgeSettore ICAR/13 - Disegno IndustrialeAccessibilità Comunicazione Design Strumenti Conoscenza
researchProduct

A Post-contentious Turning Point for the Contentious French? Crisis Without Protest in France

2018

International audience; This chapter shows that the ‘contentious French’ may not be that contentious anymore. The economic crisis provides a unique chance to argue that a post-contentious turning point is emerging in spite of a long-standing tradition of protesting. Yet the chapter suggests that this post-contentious turning point is not bringing about acquiescence but opens space for new forms of political participation, especially in connection with resources acquired through employment and educational track. In this case, we find a more extensive engagement in online activism and non-institutional forms of political participation, that is, the two forms of political participation that ar…

Acquiescence05 social sciences050801 communication & media studiesContext (language use)Online activismSpace (commercial competition)16. Peace & justice[SHS.SCIPO]Humanities and Social Sciences/Political science0506 political sciencecontentious FrenchPolitics0508 media and communicationsPolitical economyPolitical science050602 political science & public administrationSpiteTurning pointFrancepolitical activismpolitical participation
researchProduct

Marketing communication in Finnish industrial companies

2010

Marketing communication has a significant role for profitable businesses in industrial markets, and its role is only expected to rise in the future. Especially, integrated marketing communication (IMC) and customer-oriented approach are universally regarded fundamental developments in the field of marketing. Secondly, Finnish companies’ marketing competences are commonly considered insufficient in general. The purpose of this study was to describe how Finnish industrial companies execute their marketing communication. In addition, the study examines the marketing communication’s strengths, weaknesses, opportunities, threats, and targets for development; how different marketing communication…

Action-oriented researchasiakassuhdeIndustrial marketingMarketing communicationCustomer relationshipmarkkinointiviestintäteollisuusyritykset
researchProduct

Powers and Fundamental Rights in Cyber Security

2015

Protection of privacy and confidential communications are crucial fundamental rights in cyber security. The protection of privacy and confidential communications are twofold in the meaning that active security steps in communications may require interference with confidential communications. The detection and profiling of potential threats may raise suspects on innocent participants of communications. The NCSC-FI inside the Communications Authority has the initial task and powers to monitor the cyber security. The bill for the Code of Information Society introduces new obligations for information security and preparation for emergency situations. If new powers will be granted to authorities…

Active securityPolitical scienceAccountabilityFundamental rightsProfiling (information science)Information securityConfidential communicationsInformation societyComputer securitycomputer.software_genreEmergency situationscomputer
researchProduct

Espiral. Cuadernos del profesorado

2012

La música tiene la capacidad de transmitir conocimientos, habilidades y valores intrínsecos a la cultura del compositor, y al mismo tiempo transmite emociones y sentimientos comunes a todas las culturas; por ello puede decirse que la música es un instrumento idóneo para el establecimiento de un diálogo intercultural. La acción comunicativa musical siempre ha sido objeto de análisis; aunque ha sido la falta de diálogo cultural la que ha aumentado la consideración de que la música puede posibilitar el camino hacia la adquisición de la Interculturalidad. Este artículo muestra cómo la música favorece el proceso comunicativo intercultural, al considerarse como la principal herramienta de trabajo…

Activities of daily livinginvestigación sobre literatura científicaComunicació interculturalmedia_common.quotation_subjectCommunication by means of the music practiceWordsIdeal (ethics)Interculturalityeducación inter-culturalmétodo de enseñanzaCultural diversitycreatividadMusic creationProduct (category theory)Sociologymedia_commonMúsica EnsenyamentcomunicaciónIntercultural communicationIntercultural communicationInterculturalidadFeelingCreación musicalAestheticsCommunicative actionmúsicaComuniciación a través de la práctica musicalComunicación interculturalInterculturalismMúsicaEducació intercultural
researchProduct

A conceptual model of feedback mechanisms in adjusted affordances – Insights from usage of a mental mobile health application

2023

Affordance theory provides one of the most prominent lenses through which the socio-technical aspects of a system’s use can be investigated and understood. In this context, the literature has proposed that perceived and actualized affordances may be adjusted over time. Yet, how the adjustment of affordances occurs has not been explained in detail. Thus, in this article, we develop a conceptual model of feedback mechanisms that includes a more explicit description of how affordances are perceived by users, whether actualized and adjusted. With the model, we introduce the central concept of a generative base, out of which affordance perceptions emerge and which can be updated through affordan…

ActualizationComputer Networks and CommunicationsMental ModelsPerception000 Informatik Informationswissenschaft allgemeine Werke::000 Informatik Wissen Systeme::004 Datenverarbeitung; InformatikLibrary and Information SciencesFeedback MechanismsVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420AffordancesInformation Systems004
researchProduct

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct