Search results for "Computer Networks"
showing 10 items of 860 documents
Robust Energy Scheduling in Vehicle-to-Grid Networks
2017
The uncertainties brought by intermittent renewable generation and uncoordinated charging behaviors of EVs pose great challenges to the reliable operation of power systems, which motivates us to explore the integration of robust optimization with energy scheduling in V2G networks. In this article, we first introduce V2G robust energy scheduling problems and review the stateof- the art contributions from the perspectives of renewable energy integration, ancillary service provision, and proactive demand-side participation in the electricity market. Second, for each category of V2G applications, the corresponding problem formulations, robust solution concepts, and design approaches are describ…
Efficient protocol for qubit initialization with a tunable environment
2017
We propose an efficient qubit initialization protocol based on a dissipative environment that can be dynamically adjusted. Here the qubit is coupled to a thermal bath through a tunable harmonic oscillator. On-demand initialization is achieved by sweeping the oscillator rapidly into resonance with the qubit. This resonant coupling with the engineered environment induces fast relaxation to the ground state of the system, and a consecutive rapid sweep back to off resonance guarantees weak excess dissipation during quantum computations. We solve the corresponding quantum dynamics using a Markovian master equation for the reduced density operator of the qubit-bath system. This allows us to optim…
Special Issue: Enhancing Sustainable Performance in Organizational and Inter-Institutional Systems
2013
Sustainability is not just for Christmas… it’s for life. Sustainable solutions, whether sought in terms of business strategies, social policies, or the exploitation of natural resources have to serve organizations and communities in the long term, sometimes very long term, as well as the short term. Static analysis is unlikely to be able to evaluate candidate solutions fully, and is more likely to focus on the short-term future to the detriment of the longer-term. Sustainable solutions are more likely to be developed from studies based on deep analysis using systems approaches, and from system dynamics (SD) approaches in particular.
Recent Advances in Security and Privacy for Future Intelligent Networks
2020
The articles in this special section focus on recent advances in security and privacy for future intelligent networks. Recent booming advancements in networking techniques have led to an evolution toward future intelligent networks (FINs). This trend takes place under a circumstance in which a great number of devices are connected for specific purposes by a variety of novel techniques. In FINs, we envision the benefits of integrating intelligence into networks. Contemporarily, these emerging techniques are still at the exploration stage, leaving many privacy and security challenges unaddressed. Existing researchers have already uncovered a great amount of attacks and threats. The situation …
Optimum pulse shape for minimum spectral occupancy in FSK signals
1984
The characteristics of a frequency shift keying (FSK) signal giving rise to maximum power within a prescribed frequency band are determined. The baseband pulse shape extends over any integer number of bit periods. An integral equation for the optimum pulse shape is derived and some simple properties of the solution are investigated. The equation has been solved for some values of the product of the prescribed band times the pulse duration and the signal shape is shown. Our results for the particular case of pulses only one bit period long are presented for purpose of comparison with results known in the literature. Plots of out-of-band power for some values of the prescribed band and of pul…
Protection Motivation Theory in Information Systems Security Research
2021
Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new roa…
Distributed medical images analysis on a Grid infrastructure
2007
In this paper medical applications on a Grid infrastructure, the MAGIC-5 Project, are presented and discussed. MAGIC-5 aims at developing Computer Aided Detection (CADe) software for the analysis of medical images on distributed databases by means of GRID Services. The use of automated systems for analyzing medical images improves radiologists’ performance; in addition, it could be of paramount importance in screening programs, due to the huge amount of data to check and the cost of related manpower. The need for acquiring and analyzing data stored in different locations requires the use of Grid Services for the management of distributed computing resources and data. Grid technologies allow…
Reversal of Gender Disparity in Journalism Education- Study of Ghana Institute of Journalism
2017
Journalism has practically become a feminine profession across the world. To understand the root of the flow of women into the Journalism profession it is pertinent to begin at the university education level. Gallagher’s 1992 worldwide survey of female students in 83 journalism institutions reveals a significant increase in number of female students. Djerf-Pierre (2007) and others argue along Bourdieu’s conception of education as a form of social capital which empowers, enables and enhances women’s competitiveness in a pre-dominantly androgynous social arena. The study analyses 16 years of enrolment data of the Academic Affairs Unit of the Ghana Institute of Journalism (GIJ), a leading Jour…
Data Analytics in Healthcare: A Tertiary Study
2022
AbstractThe field of healthcare has seen a rapid increase in the applications of data analytics during the last decades. By utilizing different data analytic solutions, healthcare areas such as medical image analysis, disease recognition, outbreak monitoring, and clinical decision support have been automated to various degrees. Consequently, the intersection of healthcare and data analytics has received scientific attention to the point of numerous secondary studies. We analyze studies on healthcare data analytics, and provide a wide overview of the subject. This is a tertiary study, i.e., a systematic review of systematic reviews. We identified 45 systematic secondary studies on data analy…
Bio-Eco-Analysis for Risk Factors using GIS Software
2013
Agriculture is a business sector ideally suited for the application of Geographic Information Systems (GIS) because it is natural resource based, requires the movement, distribution, and/or utilization of large quantities of products, goods, and services, and is increasingly required to record details of its business operations from the field to the marketplace. Nearly all agricultural data has some form of spatial component, and a GIS allows you to visualize information that might otherwise be difficult to interpret. Environment has a major impact on agriculture. In this paper we presented how GIS software can be used to analyze risk factors that influence agricultural production naturally…