Search results for " networking"
showing 10 items of 1264 documents
Impact of incentives on tourist activity in space-time
2020
Abstract No tourism study to date, has examined the ability of incentives to shape the spatio-temporal behaviour of tourists. Data collected from the port of Palermo in Sicily (Italy), using traditional survey instruments as well as GPS technology, was employed to investigate the effect of incentives on cruise passengers' space-time activities. The results show the incentives' clear and significant impact in influencing the space-time activities of cruise passengers' while visiting the city. Understanding the movement patterns of visitors at destinations can give destination managers information that can assist in dealing with the negative effects of overtourism that are caused due to high …
DiDuSoNet: A P2P architecture for Ditributed Dunbar-based Social Networks,
2015
Online Social Networks (OSNs) are becoming more and more popular on the Web. Distributed Online Social Networks (DOSNs) are OSNs which do not exploit a central server for storing users data and enable users to have more control on their profile content, ensuring a higher level of privacy. In a DOSN there are some technical challenges to face. One of the most important challenges is the data availability problem when a user is offline. In this paper we propose DiDuSoNet, a novel P2P Distributed Online Social Network where users can exercise full access control on their data. Our system exploits trust relationships for providing a set of important social services, such as trustness, informati…
Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments
2020
Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…
CORMORANT
2019
People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…
Can individuals’ neutralization techniques be overcome? A field experiment on password policy
2020
Individuals’ lack of adherence to password security policy is a persistent problem for organizations. This problem is especially worrisome because passwords remain the primary authentication mechanism for information systems, and the number of passwords has been increasing. For these reasons, determining methods to improve individuals’ adherence to password-security policies constitutes an important issue for organizations. Extant research has shown that individuals use neutralization techniques, i.e., types of rationalizations, to disregard organizational information-security policies. What has not been determined from extant information security research is whether these neutralizations c…
Detection and Discrimination of Inter-Turn Short Circuit and Demagnetization Faults in PMSMs Based on Structural Analysis
2021
This paper presents a fault diagnosis method based on structural analysis of permanent magnet synchronous motors (PMSMs), focusing on detecting and discriminating two of the most common faults in PMSMs, namely demagnetization and inter-turn short circuit faults. The structural analysis technique uses the dynamic mathematical model of the PMSM in matrix form to evaluate the system’s structural model. After obtaining the analytical redundancy using the over-determined part of the system, it is divided into redundant testable sub-models. Four structured residuals are designed to detect and isolate the investigated faults, which are applied to the system in different time intervals. Finally, th…
Reference-Plane Invariant Method for Measuring Electromagnetic Parameters of Materials
2010
This paper presents a simple and effective wideband method for the determination of material properties, such as the complex index of refraction and the complex permittivity and permeability. The method is explicit (non-iterative) and reference-plane invariant: it uses a certain combination of scattering parameters in conjunction with group-velocity data. This technique can be used to characterize both dielectric and magnetic materials. The proposed method is verified experimentally within a frequency range between 2 to 18 GHz on polytetrafluoroethylene and polyvinylchloride samples. A comprehensive error and stability analysis reveals that, similar to other methods based on transmission/re…
Spanning Trees and bootstrap reliability estimation in correlation based networks
2007
We introduce a new technique to associate a spanning tree to the average linkage cluster analysis. We term this tree as the Average Linkage Minimum Spanning Tree. We also introduce a technique to associate a value of reliability to links of correlation based graphs by using bootstrap replicas of data. Both techniques are applied to the portfolio of the 300 most capitalized stocks traded at New York Stock Exchange during the time period 2001-2003. We show that the Average Linkage Minimum Spanning Tree recognizes economic sectors and sub-sectors as communities in the network slightly better than the Minimum Spanning Tree does. We also show that the average reliability of links in the Minimum …
Anharmonic effects on the dynamic behavior’s of Klein Gordon model’s
2021
Abstract This work completes and extends the Ref. Tchakoutio Nguetcho et al. (2017), in which we have focused our attention only on the dynamic behavior of gap soliton solutions of the anharmonic Klein-Gordon model immersed in a parameterized on-site substrate potential. We expand our work now inside the permissible frequency band. These considerations have crucial effects on the response of nonlinear excitations that can propagate along this model. Moreover, working in the allowed frequency band is not only interesting from a physical point of view, it also provides an extraordinary mathematical model, a new class of differential equations possessing vital parameters and vertical singular …
Geometry-Based Statistical Modeling of Non-WSSUS Mobile-to-Mobile Rayleigh Fading Channels
2017
In this paper, we present a novel geometry-based statistical model for small-scale non-wide-sense stationary uncorrelated scattering (non-WSSUS) mobile-to-mobile (M2M) Rayleigh fading channels. The proposed model builds on the principles of plane wave propagation to capture the temporal evolution of the propagation delay and Doppler shift of the received multipath signal. This is different from existing non-WSSUS geometry-based statistical channel models, which are based on a spherical wave propagation approach, that in spite of being more realistic is more mathematically intricate. By considering an arbitrary geometrical configuration of the propagation area, we derive general expressions …