Search results for " networking"

showing 10 items of 1264 documents

Impact of incentives on tourist activity in space-time

2020

Abstract No tourism study to date, has examined the ability of incentives to shape the spatio-temporal behaviour of tourists. Data collected from the port of Palermo in Sicily (Italy), using traditional survey instruments as well as GPS technology, was employed to investigate the effect of incentives on cruise passengers' space-time activities. The results show the incentives' clear and significant impact in influencing the space-time activities of cruise passengers' while visiting the city. Understanding the movement patterns of visitors at destinations can give destination managers information that can assist in dealing with the negative effects of overtourism that are caused due to high …

Overtourismbusiness.industrySpace timeCruiseTourist space-time activityDevelopmentDestinationsPort (computer networking)GPS tracking technologieIncentiveCruise tourismTourism Leisure and Hospitality ManagementGlobal Positioning SystemMarketingbusinessIncentiveTourismAnnals of Tourism Research
researchProduct

DiDuSoNet: A P2P architecture for Ditributed Dunbar-based Social Networks,

2015

Online Social Networks (OSNs) are becoming more and more popular on the Web. Distributed Online Social Networks (DOSNs) are OSNs which do not exploit a central server for storing users data and enable users to have more control on their profile content, ensuring a higher level of privacy. In a DOSN there are some technical challenges to face. One of the most important challenges is the data availability problem when a user is offline. In this paper we propose DiDuSoNet, a novel P2P Distributed Online Social Network where users can exercise full access control on their data. Our system exploits trust relationships for providing a set of important social services, such as trustness, informati…

P2PExploitSocial networkbusiness.industryComputer scienceComputer Networks and CommunicationsControl (management)Face (sociological concept)020206 networking & telecommunicationsSocial Welfare02 engineering and technologyDistributed Online Social NetworksData availabilityDistributed Online Social NetworkSet (abstract data type)World Wide WebData availability0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingDistributed Online Social Networks; P2P; Data availability; DunbarDunbarArchitecturebusinessSoftware
researchProduct

Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments

2020

Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…

PROTOCOLSCRYPTOGRAPHYComputer Networks and CommunicationsComputer scienceGROUP COMMUNICATIONKey distributionCore networkRESEAU INFORMATIQUEAccess control02 engineering and technologySCALABILITYTECHNOLOGIE SANS FIL[SPI]Engineering Sciences [physics][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]TELECOMMUNICATIONForward secrecy0202 electrical engineering electronic engineering information engineeringRekeyingINTERNET OF THINGSElectrical and Electronic EngineeringINTERNETSECURITEDYNAMIC ENVIRONMENTSECURITYIOTTRAITEMENT DES DONNEESbusiness.industryKey distribution center020206 networking & telecommunicationsWIRELESS SENSOR NETWORKSRESEAU DE TELECOMMUNICATIONSGROUP KEY MANAGEMENTINFORMATIQUECommunication in small groupsScalabilityARCHITECTURE CLIENT-SERVEURbusinessCOMPUTER ARCHITECTUREACCESS CONTROLComputer network
researchProduct

CORMORANT

2019

People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…

PasswordAuthenticationBiometricsComputer Networks and CommunicationsEvent (computing)Computer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreHuman-Computer InteractionInformation sensitivityKeystroke dynamicsHardware and Architecture0202 electrical engineering electronic engineering information engineeringStrong authentication020201 artificial intelligence & image processingcomputerMobile deviceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
researchProduct

Can individuals’ neutralization techniques be overcome? A field experiment on password policy

2020

Individuals’ lack of adherence to password security policy is a persistent problem for organizations. This problem is especially worrisome because passwords remain the primary authentication mechanism for information systems, and the number of passwords has been increasing. For these reasons, determining methods to improve individuals’ adherence to password-security policies constitutes an important issue for organizations. Extant research has shown that individuals use neutralization techniques, i.e., types of rationalizations, to disregard organizational information-security policies. What has not been determined from extant information security research is whether these neutralizations c…

PasswordAuthenticationPassword policyGeneral Computer Scienceinformation securitybusiness.industryComputer scienceInternet privacytietoturvapolitiikka020206 networking & telecommunicationsContext (language use)02 engineering and technologyInformation securityneutralizationsalasanatpasswordsAuthentication (law)Password strengthinformation security policy0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingtietoturvabusinesshenkilöstökoulutusLawComputers & Security
researchProduct

Detection and Discrimination of Inter-Turn Short Circuit and Demagnetization Faults in PMSMs Based on Structural Analysis

2021

This paper presents a fault diagnosis method based on structural analysis of permanent magnet synchronous motors (PMSMs), focusing on detecting and discriminating two of the most common faults in PMSMs, namely demagnetization and inter-turn short circuit faults. The structural analysis technique uses the dynamic mathematical model of the PMSM in matrix form to evaluate the system’s structural model. After obtaining the analytical redundancy using the over-determined part of the system, it is divided into redundant testable sub-models. Four structured residuals are designed to detect and isolate the investigated faults, which are applied to the system in different time intervals. Finally, th…

Permanent magnet synchronous motorComputer scienceDemagnetizing field020206 networking & telecommunications02 engineering and technologyFault (power engineering)symbols.namesakeAdditive white Gaussian noiseControl theoryTurn (geometry)0202 electrical engineering electronic engineering information engineeringRedundancy (engineering)symbols020201 artificial intelligence & image processingSynchronous motorShort circuit2021 22nd IEEE International Conference on Industrial Technology (ICIT)
researchProduct

Reference-Plane Invariant Method for Measuring Electromagnetic Parameters of Materials

2010

This paper presents a simple and effective wideband method for the determination of material properties, such as the complex index of refraction and the complex permittivity and permeability. The method is explicit (non-iterative) and reference-plane invariant: it uses a certain combination of scattering parameters in conjunction with group-velocity data. This technique can be used to characterize both dielectric and magnetic materials. The proposed method is verified experimentally within a frequency range between 2 to 18 GHz on polytetrafluoroethylene and polyvinylchloride samples. A comprehensive error and stability analysis reveals that, similar to other methods based on transmission/re…

PermittivityCondensed Matter - Materials SciencePhysics - Instrumentation and DetectorsRadiationMaterials scienceStability criterionAcoustics020208 electrical & electronic engineeringPhysics::OpticsMaterials Science (cond-mat.mtrl-sci)FOS: Physical sciences020206 networking & telecommunications02 engineering and technologyDielectricInstrumentation and Detectors (physics.ins-det)Condensed Matter Physics0202 electrical engineering electronic engineering information engineeringScattering parametersMeasurement uncertaintyElectrical and Electronic EngineeringWidebandMaterial propertiesRefractive index
researchProduct

Spanning Trees and bootstrap reliability estimation in correlation based networks

2007

We introduce a new technique to associate a spanning tree to the average linkage cluster analysis. We term this tree as the Average Linkage Minimum Spanning Tree. We also introduce a technique to associate a value of reliability to links of correlation based graphs by using bootstrap replicas of data. Both techniques are applied to the portfolio of the 300 most capitalized stocks traded at New York Stock Exchange during the time period 2001-2003. We show that the Average Linkage Minimum Spanning Tree recognizes economic sectors and sub-sectors as communities in the network slightly better than the Minimum Spanning Tree does. We also show that the average reliability of links in the Minimum …

Physics - Physics and SocietySpanning treecorrelation analysiApplied MathematicsReliability (computer networking)FOS: Physical sciencesPhysics and Society (physics.soc-ph)Minimum spanning treeTerm (time)CorrelationTree (data structure)complex networkStock exchangeModeling and SimulationPhysics - Data Analysis Statistics and ProbabilityStatisticsAverage Linkage Cluster AnalysisbootstrapEngineering (miscellaneous)Data Analysis Statistics and Probability (physics.data-an)Mathematicscluster analysis
researchProduct

Anharmonic effects on the dynamic behavior’s of Klein Gordon model’s

2021

Abstract This work completes and extends the Ref. Tchakoutio Nguetcho et al. (2017), in which we have focused our attention only on the dynamic behavior of gap soliton solutions of the anharmonic Klein-Gordon model immersed in a parameterized on-site substrate potential. We expand our work now inside the permissible frequency band. These considerations have crucial effects on the response of nonlinear excitations that can propagate along this model. Moreover, working in the allowed frequency band is not only interesting from a physical point of view, it also provides an extraordinary mathematical model, a new class of differential equations possessing vital parameters and vertical singular …

Physics0209 industrial biotechnologyDynamical systems theoryDifferential equationApplied Mathematics020206 networking & telecommunications02 engineering and technologyComputational Mathematicssymbols.namesakeNonlinear system020901 industrial engineering & automationBifurcation theoryClassical mechanicsLine (geometry)0202 electrical engineering electronic engineering information engineeringsymbolsGravitational singularitySolitonKlein–Gordon equationApplied Mathematics and Computation
researchProduct

Geometry-Based Statistical Modeling of Non-WSSUS Mobile-to-Mobile Rayleigh Fading Channels

2017

In this paper, we present a novel geometry-based statistical model for small-scale non-wide-sense stationary uncorrelated scattering (non-WSSUS) mobile-to-mobile (M2M) Rayleigh fading channels. The proposed model builds on the principles of plane wave propagation to capture the temporal evolution of the propagation delay and Doppler shift of the received multipath signal. This is different from existing non-WSSUS geometry-based statistical channel models, which are based on a spherical wave propagation approach, that in spite of being more realistic is more mathematically intricate. By considering an arbitrary geometrical configuration of the propagation area, we derive general expressions …

PhysicsComputer Networks and CommunicationsAerospace Engineering020206 networking & telecommunications020302 automobile design & engineeringStatistical modelGeometry02 engineering and technologyCorrelation function (statistical mechanics)Fading distribution0203 mechanical engineeringChannel state informationRician fadingAutomotive Engineering0202 electrical engineering electronic engineering information engineeringFadingElectrical and Electronic EngineeringMultipath propagationComputer Science::Information TheoryRayleigh fading
researchProduct