Search results for "Communications"

showing 10 items of 3827 documents

A Post-contentious Turning Point for the Contentious French? Crisis Without Protest in France

2018

International audience; This chapter shows that the ‘contentious French’ may not be that contentious anymore. The economic crisis provides a unique chance to argue that a post-contentious turning point is emerging in spite of a long-standing tradition of protesting. Yet the chapter suggests that this post-contentious turning point is not bringing about acquiescence but opens space for new forms of political participation, especially in connection with resources acquired through employment and educational track. In this case, we find a more extensive engagement in online activism and non-institutional forms of political participation, that is, the two forms of political participation that ar…

Acquiescence05 social sciences050801 communication & media studiesContext (language use)Online activismSpace (commercial competition)16. Peace & justice[SHS.SCIPO]Humanities and Social Sciences/Political science0506 political sciencecontentious FrenchPolitics0508 media and communicationsPolitical economyPolitical science050602 political science & public administrationSpiteTurning pointFrancepolitical activismpolitical participation
researchProduct

Powers and Fundamental Rights in Cyber Security

2015

Protection of privacy and confidential communications are crucial fundamental rights in cyber security. The protection of privacy and confidential communications are twofold in the meaning that active security steps in communications may require interference with confidential communications. The detection and profiling of potential threats may raise suspects on innocent participants of communications. The NCSC-FI inside the Communications Authority has the initial task and powers to monitor the cyber security. The bill for the Code of Information Society introduces new obligations for information security and preparation for emergency situations. If new powers will be granted to authorities…

Active securityPolitical scienceAccountabilityFundamental rightsProfiling (information science)Information securityConfidential communicationsInformation societyComputer securitycomputer.software_genreEmergency situationscomputer
researchProduct

A conceptual model of feedback mechanisms in adjusted affordances – Insights from usage of a mental mobile health application

2023

Affordance theory provides one of the most prominent lenses through which the socio-technical aspects of a system’s use can be investigated and understood. In this context, the literature has proposed that perceived and actualized affordances may be adjusted over time. Yet, how the adjustment of affordances occurs has not been explained in detail. Thus, in this article, we develop a conceptual model of feedback mechanisms that includes a more explicit description of how affordances are perceived by users, whether actualized and adjusted. With the model, we introduce the central concept of a generative base, out of which affordance perceptions emerge and which can be updated through affordan…

ActualizationComputer Networks and CommunicationsMental ModelsPerception000 Informatik Informationswissenschaft allgemeine Werke::000 Informatik Wissen Systeme::004 Datenverarbeitung; InformatikLibrary and Information SciencesFeedback MechanismsVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420AffordancesInformation Systems004
researchProduct

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct

Middleware with QoS Support to Control Intelligent Systems

2008

This paper presents the architecture of a middleware for control component-based distributed systems. The fundamental idea underlying this architecture is the use of a hierarchical communications structure called "logical namespace tree" and a structured set of control processes interconnected, called "logical sensors graph". This architecture is named frame sensor adapter control (FSA-Ctrl). The aim of FSA-Ctrl is to provide a simple interface to specify the control actions and ensure a communication with some specified QoS parameters restrictions. In this architecture both systems, communication and control, manages the QoS policies. The communication system is based on the data distribut…

Adapter (computing)Computer sciencebusiness.industryQuality of serviceControl systemDistributed computingIntelligent decision support systemData Distribution ServiceNamespaceSoftware architecturebusinessCommunications systemComputer network2008 The Second International Conference on Advanced Engineering Computing and Applications in Sciences
researchProduct

A distributed real-time data prediction and adaptive sensing approach for wireless sensor networks

2018

International audience; Many approaches have been proposed in the literature to reduce energy consumption in Wireless Sensor Networks (WSNs). Influenced by the fact that radio communication and sensing are considered to be the most energy consuming activities in such networks. Most of these approaches focused on either reducing the number of collected data using adaptive sampling techniques or on reducing the number of data transmitted over the network using prediction models. In this article, we propose a novel prediction-based data reduction method. furthermore, we combine it with an adaptive sampling rate technique, allowing us to significantly decrease energy consumption and extend the …

Adaptive samplingComputer Networks and CommunicationsComputer scienceReal-time computing[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0202 electrical engineering electronic engineering information engineeringReal-time dataWork (physics)020206 networking & telecommunicationsEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science Applications[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Hardware and Architecture[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processing[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Wireless sensor networkSoftwarePredictive modellingEnergy (signal processing)Information SystemsData reductionPervasive and Mobile Computing
researchProduct

SINGLE-TRIAL BASED INDEPENDENT COMPONENT ANALYSIS ON MISMATCH NEGATIVITY IN CHILDREN

2010

Independent component analysis (ICA) does not follow the superposition rule. This motivates us to study a negative event-related potential — mismatch negativity (MMN) estimated by the single-trial based ICA (sICA) and averaged trace based ICA (aICA), respectively. To sICA, an optimal digital filter (ODF) was used to remove low-frequency noise. As a result, this study demonstrates that the performance of the sICA+ODF and aICA could be different. Moreover, MMN under sICA+ODF fits better with the theoretical expectation, i.e., larger deviant elicits larger MMN peak amplitude.

AdolescentLearning DisabilitiesComputer Networks and CommunicationsSpeech recognitionMismatch negativityElectroencephalographyGeneral MedicineIndependent component analysisNoiseAcoustic StimulationAttention Deficit Disorder with HyperactivityEvoked Potentials AuditoryHumansSingle trialChildEvoked PotentialsDigital filterAlgorithmsMathematicsInternational Journal of Neural Systems
researchProduct

An adoption model for mobile banking in Ghana

2009

The impact of social and cultural factors on the adoption of technology still requires much research. To investigate it more fully, we examine the reasons for the adoption and non-adoption of mobile banking in Ghana. Through a survey of 271 people in Ghana, it has been found that social and cultural factors in the form of perceived credibility, facilitating conditions, perceived elitisation and demographic factors do play a significant role in adoption decisions. It has been found that elitisation of technology and services can be a positive influence for adopters whilst being a negative influence for non-adopters. In addition, perceived credibility and facilitating conditions also influenc…

Adoption modelMobile bankingComputer Networks and Communicationsbusiness.industryInformation technologyPerceived credibilityContext (language use)Electrical and Electronic EngineeringMarketingbusinessComputer Science ApplicationsInternational Journal of Mobile Communications
researchProduct

P and R Wave Detection in Complete Congenital Atrioventricular Block

2009

Complete atrioventricular block (type III AVB) is characterized by an absence of P wave transmission to ventricles. This implies that QRS complexes are generated in an autonomous way and are not coordinated with P waves. This work introduces a new algorithm for the detection of P waves for this type of pathology using non-invasive electrocardiographic surface leads. The proposed algorithm is divided into three stages. In the first stage, the R waves located by a QRS detector are used to generate the RR series and time references for the other stages of the algorithm. In the second stage, the ventricular activity (QT segment) is removed by using an adaptive filter that obtains an averaged pa…

AdultAdolescentBiomedical EngineeringYoung AdultQRS complexHeart Conduction SystemmedicineHumansSensitivity (control systems)Atrioventricular BlockChildMathematicsSeries (mathematics)P waveDetectorSignal Processing Computer-Assistedmedicine.diseaseAdaptive filterTransmission (telecommunications)Child PreschoolElectrocardiography AmbulatoryEnginyeria biomèdicaAtrioventricular blockAlgorithmAlgorithmsAnnals of Biomedical Engineering
researchProduct

Metabolomic Changes after Coffee Consumption: New Paths on the Block

2021

Scope Several studies suggest that regular coffee consumption may help preventing chronic diseases, but the impact of daily intake and the contribution of coffee metabolites in disease prevention are still unclear. The present study aimed at evaluating whether and how different patterns of coffee intake (one cup of espresso coffee/day, three cups of espresso coffee/day, one cup of espresso coffee/day and two cocoa-based products containing coffee two times per day) might impact endogenous molecular pathways. Methods and results A three-arm, randomized, cross-over trial was performed in 21 healthy volunteers who consumed each treatment for one month. Urine samples were collected to perform u…

AdultMale0301 basic medicineEndocrinology Diabetes and MetabolismcoffeeEnergy metabolismMedicine (miscellaneous)030209 endocrinology & metabolismCoffee consumptionParallel computingUrine030204 cardiovascular system & hematologyBiology03 medical and health sciences0302 clinical medicineMetabolomicsArginine biosynthesisBlock (telecommunications)CaffeineCoffee intakeHumansxenobioticsFood scienceAmino AcidsMathematicsCacaoNutrition and Dietetics030109 nutrition & dieteticsDose-Response Relationship Drugmetabolomics3. Good healthMetabolic pathway030104 developmental biologycocoabiomarkerFemaleSteroidsDisease preventionCardiology and Cardiovascular Medicine[SDV.AEN]Life Sciences [q-bio]/Food and NutritionBiomarkersMetabolic Networks and PathwaysFood ScienceBiotechnology
researchProduct