Search results for "Computer network"
showing 10 items of 1634 documents
Multilayer Network Analysis: The Identification of Key Actors in a Sicilian Mafia Operation
2021
Recently, Social Network Analysis studies have led to an improvement and to a generalization of existing tools to networks with multiple subsystems and layers of connectivity. These kind of networks are usually called multilayer networks. Multilayer networks in which each layer shares at least one node with some other layer in the network are called multiplex networks. Being a multiplex network does not require all nodes to exist on every layer. In this paper, we built a criminal multiplex network which concerns an anti-mafia operation called “Montagna” and it is based on the examination of a pre-trial detention order issued on March 14, 2007 by the judge for preliminary investigations of t…
The Role of Labour and Associated EU Liberalization Challenges: Insights from the Port Sector
2013
An influential argument holds that labour unions are not likely to succeed in their objectives through current European decision-making processes. In addition, the European Union has extensive leverage to introduce negative integration due to asymmetries towards liberalization in the treaties. Given such arguments it is of interest to study a case, where attempts of EU liberalization reform have failed and labour unions claim this is their victory. An in-depth analysis of the decision-making process of the proposal for a Port Directive highlights that labour unions are most influential when they are able to exploit the division of industry interests to resoundingly oppose policy change. Mor…
Capacity driven small cell deployment in heterogeneous cellular networks : Outage probability and rate coverage analysis
2020
Author's accepted manuscript. This is the peer reviewed version of the following article: Ullah, A., Haq Abbas, Z., Muhammad, F., Abbas, G. & Lei, J. (2020). Capacity driven small cell deployment in heterogeneous cellular networks: Outage probability and rate coverage analysis. Transactions on Emerging Telecommunications Technologies, 31(6): e3876, which has been published in final form at https://doi.org/10.1002/ett.3876. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions.
Experiences with the integration of protocol software tools
1996
An analysis of a number of protocol software tools that are widely used in the development of communication protocols in the Finnish telecommunications industry is presented. To analyse the integrated use of these tools, a non-trivial application layer protocol with ACSE, ROSE and a simple presentation layer has been designed and implemented with the help of these software tools. Particular attention has been paid to compose a complete protocol implementation from the fragments produced with separate tools. Our observations clearly indicate that this integration is a major problem with the current practices.
New novel idea for Cloud Computing: How can we use Kalman filter in security of Cloud Computing
2012
Cloud is a virtual image about some amount of undefined powers, that is widespread and had unknown power and inexact amount of hardware and software configurations, and because of we have not any information about clouds location and time dimensions and also the amounts of its sources we tell that Cloud Computing. This technology presents lots of abilities and opportunities such as processing power, storage and accessing it from everywhere, supporting, working - team group - with the latest versions of software and etc., by the means of internet. On the other hand, in such a large scale networks we should consider the reliability and powerfulness of such networks in facing with events such …
Mobile Security with Location-Aware Role-Based Access Control
2012
Published version of an article from the book: Security and privacy in mobile information and communication systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-30244-2_15 This paper describes how location-aware Role-Based Access Control (RBAC) can be implemented on top of the Geographically eXtensible Access Control Markup Language (GeoXACML). It furthermore sketches how spatial separation of duty constraints (both static and dynamic) can be implemented using GeoXACML on top of the XACML RBAC profile. The solution uses physical addressing of geographical locations which facilitates easy deployment of authorisation profiles to the mobile device. Location-aware RBAC c…
Psychoacoustic Annoyance Implementation With Wireless Acoustic Sensor Networks for Monitoring in Smart Cities
2020
Soundscape standard (ISO 12913) is mainly oriented to describe the psychoacoustic annoyance (PA) due to the perceived sound in different environments. The evaluation of this annoyance is commonly based on the Zwicker and Fastl model that defines several components related to this subjective annoyance, such as loudness, sharpness, roughness, and fluctuation strength. But due to their complexity, these components are difficult to be calculated on small board computers (SBCs) in real time in order to enable a wireless acoustic sensor network for PA monitoring. In this article, we describe the necessary procedures to implement the complete psychoacoustic model by Zwicker and Fastl in a precise …
5G IoT System for Real-Time Psycho-Acoustic Soundscape Monitoring in Smart Cities With Dynamic Computational Offloading to the Edge
2021
Environmental noise monitoring for smart cities need to be as much efficient as possible in order to mitigate its significant impact in the health of their inhabitants. 5G Internet of Things (IoT) systems offer a big opportunity to offload the computation from the sensor nodes, since it provides a series of new concepts for dynamic computing that the previous technologies did not offer. In this article, a complete 5G IoT system for psycho-acoustic monitoring has been designed and implemented using different options for offloading computation to different parts of the system. This offloading has been done by developing different functional splittings of the psycho-acoustic metrics algorithms…
The impact of spatial correlation on the statistical properties of the capacity of nakagami-m channels with MRC and EGC
2011
Published version of an article published in the journal: EURASIP Journal on Wireless Communications and Networking. Also available from the publisher at: http://dx.doi.org/10.1186/1687-1499-2011-116. OA In this article, we have studied the statistical properties of the instantaneous channel capacitya of spatially correlated Nakagami-m channels for two different diversity combining methods, namely maximal ratio combining (MRC) and equal gain combining (EGC). Specifically, using the statistical properties of the instantaneous signal-to-noise ratio, we have derived the analytical expressions for the probability density function (PDF), cumulative distribution function (CDF), level-crossing rat…
A limited feedback scheme based on spatially correlated channels for coordinated multipoint systems
2012
High spectral efficiency can be achieved in the downlink of multi-antenna coordinated multi-point systems provided that the multiuser interference is appropriately managed at the transmitter side. For this sake, downlink channel information needs to be sent back by the users, thus reducing the rate available at the uplink channel. The amount and type of feedback information required has been extensively studied and many limited feedback schemes have been proposed lately. A common pattern to all of them is that achieving low rates of feedback information is possible at the cost of increasing complexity at the user side and, sometimes, assuming that some statistics of the channel are known. I…