Search results for "Computer network"

showing 10 items of 1634 documents

Multilayer Network Analysis: The Identification of Key Actors in a Sicilian Mafia Operation

2021

Recently, Social Network Analysis studies have led to an improvement and to a generalization of existing tools to networks with multiple subsystems and layers of connectivity. These kind of networks are usually called multilayer networks. Multilayer networks in which each layer shares at least one node with some other layer in the network are called multiplex networks. Being a multiplex network does not require all nodes to exist on every layer. In this paper, we built a criminal multiplex network which concerns an anti-mafia operation called “Montagna” and it is based on the examination of a pre-trial detention order issued on March 14, 2007 by the judge for preliminary investigations of t…

Social and Information Networks (cs.SI)FOS: Computer and information sciencesPhysics - Physics and SocietyFocus (computing)Settore INF/01 - InformaticaMultilayer networksComputer sciencebusiness.industryNode (networking)Criminal networks; Multilayer networks; Social network analysisSocial network analysis (criminology)FOS: Physical sciencesComputer Science - Social and Information NetworksPhysics and Society (physics.soc-ph)Criminal networksSocial network analysisIdentification (information)PhoneKey (cryptography)Layer (object-oriented design)businessNetwork analysisComputer network
researchProduct

The Role of Labour and Associated EU Liberalization Challenges: Insights from the Port Sector

2013

An influential argument holds that labour unions are not likely to succeed in their objectives through current European decision-making processes. In addition, the European Union has extensive leverage to introduce negative integration due to asymmetries towards liberalization in the treaties. Given such arguments it is of interest to study a case, where attempts of EU liberalization reform have failed and labour unions claim this is their victory. An in-depth analysis of the decision-making process of the proposal for a Port Directive highlights that labour unions are most influential when they are able to exploit the division of industry interests to resoundingly oppose policy change. Mor…

Sociology and Political ScienceLiberalizationbusiness.industryVictoryInternational economicsInternational tradeDirectivePort (computer networking)Leverage (negotiation)ArgumentPolitical Science and International RelationsEuropean integrationEconomicsmedia_common.cataloged_instanceEuropean unionbusinessmedia_commonJournal of European Integration
researchProduct

Capacity driven small cell deployment in heterogeneous cellular networks : Outage probability and rate coverage analysis

2020

Author's accepted manuscript. This is the peer reviewed version of the following article: Ullah, A., Haq Abbas, Z., Muhammad, F., Abbas, G. & Lei, J. (2020). Capacity driven small cell deployment in heterogeneous cellular networks: Outage probability and rate coverage analysis. Transactions on Emerging Telecommunications Technologies, 31(6): e3876, which has been published in final form at https://doi.org/10.1002/ett.3876. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions.

Software deploymentbusiness.industryComputer scienceCellular networkOutage probabilityElectrical and Electronic EngineeringbusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Computer network
researchProduct

Experiences with the integration of protocol software tools

1996

An analysis of a number of protocol software tools that are widely used in the development of communication protocols in the Finnish telecommunications industry is presented. To analyse the integrated use of these tools, a non-trivial application layer protocol with ACSE, ROSE and a simple presentation layer has been designed and implemented with the help of these software tools. Particular attention has been paid to compose a complete protocol implementation from the fragments produced with separate tools. Our observations clearly indicate that this integration is a major problem with the current practices.

SoftwareSIMPLE (military communications protocol)Computer Networks and CommunicationsPresentation layerComputer sciencebusiness.industryDistributed computingCommunications protocolSoftware engineeringbusinessComputer-aided software engineeringProtocol (object-oriented programming)Application layerComputer Communications
researchProduct

New novel idea for Cloud Computing: How can we use Kalman filter in security of Cloud Computing

2012

Cloud is a virtual image about some amount of undefined powers, that is widespread and had unknown power and inexact amount of hardware and software configurations, and because of we have not any information about clouds location and time dimensions and also the amounts of its sources we tell that Cloud Computing. This technology presents lots of abilities and opportunities such as processing power, storage and accessing it from everywhere, supporting, working - team group - with the latest versions of software and etc., by the means of internet. On the other hand, in such a large scale networks we should consider the reliability and powerfulness of such networks in facing with events such …

SoftwareUtility computingFilter (video)Computer sciencebusiness.industryReliability (computer networking)Distributed computingCloud testingThe InternetCloud computingKalman filterbusiness2012 6th International Conference on Application of Information and Communication Technologies (AICT)
researchProduct

Mobile Security with Location-Aware Role-Based Access Control

2012

Published version of an article from the book: Security and privacy in mobile information and communication systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-30244-2_15 This paper describes how location-aware Role-Based Access Control (RBAC) can be implemented on top of the Geographically eXtensible Access Control Markup Language (GeoXACML). It furthermore sketches how spatial separation of duty constraints (both static and dynamic) can be implemented using GeoXACML on top of the XACML RBAC profile. The solution uses physical addressing of geographical locations which facilitates easy deployment of authorisation profiles to the mobile device. Location-aware RBAC c…

Software_OPERATINGSYSTEMSMarkup languagebusiness.industryComputer scienceSeparation of dutiesXACMLComputerApplications_COMPUTERSINOTHERSYSTEMSAccess controlComputer securitycomputer.software_genreFirewall (construction)Software deploymentVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Role-based access controlbusinesscomputerMobile deviceComputer networkcomputer.programming_language
researchProduct

Psychoacoustic Annoyance Implementation With Wireless Acoustic Sensor Networks for Monitoring in Smart Cities

2020

Soundscape standard (ISO 12913) is mainly oriented to describe the psychoacoustic annoyance (PA) due to the perceived sound in different environments. The evaluation of this annoyance is commonly based on the Zwicker and Fastl model that defines several components related to this subjective annoyance, such as loudness, sharpness, roughness, and fluctuation strength. But due to their complexity, these components are difficult to be calculated on small board computers (SBCs) in real time in order to enable a wireless acoustic sensor network for PA monitoring. In this article, we describe the necessary procedures to implement the complete psychoacoustic model by Zwicker and Fastl in a precise …

SoundscapeComputer Networks and CommunicationsComputer sciencebusiness.industry010401 analytical chemistryReal-time computingAcoustic sensorAnnoyance02 engineering and technology01 natural sciences0104 chemical sciencesComputer Science ApplicationsLoudnessHardware and ArchitectureSignal Processing0202 electrical engineering electronic engineering information engineeringWireless020201 artificial intelligence & image processingPsychoacousticsbusinessInformation SystemsIEEE Internet of Things Journal
researchProduct

5G IoT System for Real-Time Psycho-Acoustic Soundscape Monitoring in Smart Cities With Dynamic Computational Offloading to the Edge

2021

Environmental noise monitoring for smart cities need to be as much efficient as possible in order to mitigate its significant impact in the health of their inhabitants. 5G Internet of Things (IoT) systems offer a big opportunity to offload the computation from the sensor nodes, since it provides a series of new concepts for dynamic computing that the previous technologies did not offer. In this article, a complete 5G IoT system for psycho-acoustic monitoring has been designed and implemented using different options for offloading computation to different parts of the system. This offloading has been done by developing different functional splittings of the psycho-acoustic metrics algorithms…

SoundscapeComputer Networks and Communicationsbusiness.industryComputer scienceDistributed computingComputation020206 networking & telecommunications02 engineering and technologyComputer Science ApplicationsHardware and ArchitecturePerformance comparisonSmart citySignal Processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingEnhanced Data Rates for GSM EvolutionInternet of ThingsbusinessEnvironmental noise5GInformation SystemsIEEE Internet of Things Journal
researchProduct

The impact of spatial correlation on the statistical properties of the capacity of nakagami-m channels with MRC and EGC

2011

Published version of an article published in the journal: EURASIP Journal on Wireless Communications and Networking. Also available from the publisher at: http://dx.doi.org/10.1186/1687-1499-2011-116. OA In this article, we have studied the statistical properties of the instantaneous channel capacitya of spatially correlated Nakagami-m channels for two different diversity combining methods, namely maximal ratio combining (MRC) and equal gain combining (EGC). Specifically, using the statistical properties of the instantaneous signal-to-noise ratio, we have derived the analytical expressions for the probability density function (PDF), cumulative distribution function (CDF), level-crossing rat…

Spatial correlationComputer sciencebusiness.industryComputer Networks and CommunicationsCumulative distribution functionTransmitterNakagami distributionAntenna diversityComputer Science ApplicationsChannel capacityDiversity combiningModulationStatisticsVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Signal ProcessingMaximal-ratio combiningTelecommunicationsbusinessCommunication channelComputer Science::Information TheoryEURASIP Journal on Wireless Communications and Networking
researchProduct

A limited feedback scheme based on spatially correlated channels for coordinated multipoint systems

2012

High spectral efficiency can be achieved in the downlink of multi-antenna coordinated multi-point systems provided that the multiuser interference is appropriately managed at the transmitter side. For this sake, downlink channel information needs to be sent back by the users, thus reducing the rate available at the uplink channel. The amount and type of feedback information required has been extensively studied and many limited feedback schemes have been proposed lately. A common pattern to all of them is that achieving low rates of feedback information is possible at the cost of increasing complexity at the user side and, sometimes, assuming that some statistics of the channel are known. I…

Spatial correlationWireless communicationsComputer Networks and CommunicationsComputer scienceMIMOData_CODINGANDINFORMATIONTHEORYPrecodingTelecomunicacióControl theoryTEORIA DE LA SEÑAL Y COMUNICACIONESTelecommunications linkZero-forcing precodingWirelessComunicació i tecnologiaComputer Science::Information Theorybusiness.industryQuantization (signal processing)TransmitterLimited feedbackPrecodingComputer Science ApplicationsMIMOSignal ProcessingBit error ratebusinessAlgorithmCommunication channelEURASIP Journal on Wireless Communications and Networking
researchProduct