Search results for "550"

showing 10 items of 1192 documents

A systematic literature review on cyberstalking : An analysis of past achievements and future promises

2020

Individuals’ excessive use of technology-enabled communication platforms, such as social media, has led to scholarly recognition of rising incidences of cyberstalking. Despite considerable studies directed at its examination, the current research on cyberstalking is limited by a lack of clarity on its characterization and prevalence, coupled with a fragmented research focus. To address this limitation, a Systematic Literature Review (SLR) on cyberstalking has been undertaken. Rigorous protocols were applied to identify 49 empirical studies via Scopus and Web of Science, based on specific keywords and article selection criteria. Findings reveal four emergent research themes on characteristic…

business.industry020209 energy:Samfunnsvitenskap: 200 [VDP]05 social sciencesVDP::Technology: 500::Information and communication technology: 55002 engineering and technologyPublic relationsService providerlaw.inventionEmpirical researchSystematic reviewConceptual frameworklawManagement of Technology and Innovation0502 economics and business0202 electrical engineering electronic engineering information engineeringCyberstalkingCLARITYSocial mediaBusiness and International ManagementThematic analysisbusinessPsychology050203 business & managementApplied Psychology
researchProduct

WiHAR : From Wi-Fi Channel State Information to Unobtrusive Human Activity Recognition

2020

A robust and unobtrusive human activity recognition system is essential to a multitude of applications, such as health care, active assisted living, robotics, sports, and tele-immersion. Existing well-performing activity recognition methods are either vision- or wearable sensor-based. However, they are not fully passive. In this paper, we develop WiHAR—an unobtrusive Wi-Fi-based activity recognition system. WiHAR uses the Wi-Fi network interface card to capture the channel state information (CSI) data. These CSI data are effectively processed, and then amplitude and phase information is used to obtain the spectrogram. In the subsequent step, the time-variant mean Doppler shift (MDS) caused …

business.industryComputer science05 social sciencesDecision treeWearable computer050801 communication & media studies020206 networking & telecommunicationsComputingMilieux_LEGALASPECTSOFCOMPUTING02 engineering and technologyLinear discriminant analysisActivity recognitionSupport vector machine0508 media and communicationsChannel state information0202 electrical engineering electronic engineering information engineeringSpectrogramComputer visionArtificial intelligencebusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

Directive local color transfer based on dynamic look-up table

2019

Abstract Color transfer in image processing usually suffers from misleading color mapping and loss of details. This paper presents a novel directive local color transfer method based on dynamic look-up table (D-DLT) to solve these problems in two steps. First, a directive mapping between the source and the reference image is established based on the salient detection and the color clusters to obtain directive color transfer intention. Then, dynamic look-up tables are created according to the color clusters to preserve the details, which can suppress pseudo contours and avoid detail loss. Subjective and objective assessments are presented to verify the feasibility and the availability of the…

business.industryComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020206 networking & telecommunicationsImage processing02 engineering and technologyVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550::Annen informasjonsteknologi: 559DirectiveLocal colorSalientTransfer (computing)Signal ProcessingColor mappingLookup table0202 electrical engineering electronic engineering information engineeringTable (database)020201 artificial intelligence & image processingComputer visionComputer Vision and Pattern RecognitionArtificial intelligenceElectrical and Electronic EngineeringbusinessSoftwareSignal Processing: Image Communication
researchProduct

A spatial role-based authorization framework for sensor network-assisted indoor WLANs

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…

business.industryComputer scienceData securityPermissionlaw.inventionResource (project management)lawServerVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Wi-FiMobile telephonybusinessWireless sensor networkFormal verificationComputer network2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology
researchProduct

Priority Enabled Grant-Free Access With Dynamic Slot Allocation for Heterogeneous mMTC Traffic in 5G NR Networks

2021

Although grant-based mechanisms have been a predominant approach for wireless access for years, the additional latency required for initial handshake message exchange and the extra control overhead for packet transmissions have stimulated the emergence of grant-free (GF) transmission. GF access provides a promising mechanism for carrying low and moderate traffic with small data and fits especially well for massive machine type communications (mMTC) applications. Despite a surge of interest in GF access, how to handle heterogeneous mMTC traffic based on GF mechanisms has not been investigated in depth. In this paper, we propose a priority enabled GF access scheme which performs dynamic slot …

business.industryComputer scienceNetwork packet05 social sciencesMarkov process050801 communication & media studies020206 networking & telecommunications02 engineering and technologyDynamic priority schedulingsymbols.namesake0508 media and communicationsSubframeTransmission (telecommunications)0202 electrical engineering electronic engineering information engineeringsymbolsOverhead (computing)WirelessElectrical and Electronic EngineeringbusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 5505GComputer networkIEEE Transactions on Communications
researchProduct

AI-enabled adaptive learning systems: A systematic mapping of the literature

2021

Abstract Mobile internet, cloud computing, big data technologies, and significant breakthroughs in Artificial Intelligence (AI) have all transformed education. In recent years, there has been an emergence of more advanced AI-enabled learning systems, which are gaining traction due to their ability to deliver learning content and adapt to the individual needs of students. Yet, even though these contemporary learning systems are useful educational platforms that meet students’ needs, there is still a low number of implemented systems designed to address the concerns and problems faced by many students. Based on this perspective, a systematic mapping of the literature on AI-enabled adaptive le…

business.industryComputer sciencePerspective (graphical)Big dataPsychological interventionCloud computingQA75.5-76.95Data scienceComputer Science ApplicationsEducationVisualizationIdentification (information)Artificial IntelligenceAIElectronic computers. Computer scienceAI-Enabled learning systemsAdaptive learningSystematic mappingbusinessAdaptive learning systemsVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

A Hybrid Algorithm Based on WiFi for Robust and Effective Indoor Positioning

2019

Indoor positioning based on the Wireless Fidelity (WiFi) protocol and the Pedestrian Dead Reckoning (PDR) approach is widely exploited because of the existing WiFi infrastructure in buildings and the advancement of built-in smartphone sensors. In this work, a hybrid algorithm that combines WiFi fingerprinting and PDR to both exploit their advantages as well as limiting the impact of their disadvantages is proposed. Specifically, to build a probability map from noisy Received Signal Strength (RSS), a Gaussian Process (GP) regression is deployed to estimate and construct the RSS fingerprints with incomplete data. Mean and variance of generated points are used to estimate WiFi fingerprinting p…

business.industryComputer scienceRSSReal-time computingComputingMilieux_LEGALASPECTSOFCOMPUTING020206 networking & telecommunications02 engineering and technologycomputer.file_formatHybrid algorithmData setsymbols.namesakeInertial measurement unitDead reckoning0202 electrical engineering electronic engineering information engineeringsymbolsWireless020201 artificial intelligence & image processingbusinessParticle filterVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Gaussian processcomputer2019 19th International Symposium on Communications and Information Technologies (ISCIT)
researchProduct

An enhanced TCP congestion avoidance scheme and its performance evaluation in high speed satellite networks

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE." Article also available from publisher: http://dx.doi.org/10.1109/ICICS.2009.5397691 High speed satellite communication networks are emerging as part of the future global wireless communication systems. However, existing transmission control protocols for satellite networks do not provide satisfactory performance over high speed satellite links due to their ine…

business.industryComputer scienceTransmission Control ProtocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingTCP tuningScalable TCPVDP::Technology: 500::Information and communication technology: 550ThroughputH-TCPNetwork congestionComputer Science::Networking and Internet ArchitectureCommunications satellitebusinessBIC TCPComputer network2009 7th International Conference on Information, Communications and Signal Processing (ICICS)
researchProduct

Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context

2010

Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11277-010-0069-6 The paper proposes a location-aware mobile Intrusion Prevention System (mIPS) architecture with enhanced privacy that is integrated in Managed Security Service (MSS). The solution is envisaged in a future fifth generation telecommunications (5G) context with increased but varying bandwidth, a virtualised execution environment and infrastructure that allows threads, processes, virtual machines and storage to be migrated to cloud computing services on demand, to dynamically scale performance and save power. 5G mob…

business.industryComputer scienceVDP::Technology: 500::Information and communication technology: 550Context (language use)Cloud computingIntrusion detection systemManaged security servicecomputer.software_genreComputer securityComputer Science ApplicationsInformation sensitivityVirtual machineMalwareElectrical and Electronic EngineeringIntrusion prevention systembusinesscomputerMobile deviceComputer networkWireless Personal Communications
researchProduct

Achieving agility and quality in product development -an empirical study of hardware startups

2020

Context: Startups aim at scaling their business, often by developing innovative products with limited human and financial resources. The development of software products in the startup context is known as opportunistic, agility-driven, and with high tolerance for technical debt. The special context of hardware startups calls for a better understanding of state-of-the-practice of hardware startups’ activities. Objective: This study aimed to identify whether and how startups can achieve product quality while maintaining focus on agility. Method: We conducted an exploratory study with 13 hardware startups, collecting data through semi-structured interviews and analysis of documentation. We pro…

business.industryComputer sciencemedia_common.quotation_subjectExploratory researchContext (language use)Peer reviewSoftwareEmpirical researchDocumentationHardware and ArchitectureTechnical debtNew product developmentQuality (business)Product (category theory)businessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550SoftwareComputer hardwareInformation Systemsmedia_common
researchProduct