Search results for "Computer network"

showing 10 items of 1634 documents

A sliding mode approach to H∞ synchronization of master–slave time-delay systems with Markovian jumping parameters and nonlinear uncertainties

2012

Author's version of an article published in the journal: Journal of the Franklin Institute. Also available from the publisher at: http://dx.doi.org/10.1016/j.jfranklin.2011.09.015 In this paper, a sliding-mode approach is proposed for exponential H∞ synchronization problem of a class of masterslave time-delay systems with both discrete and distributed time-delays, norm-bounded nonlinear uncertainties and Markovian switching parameters. Using an appropriate LyapunovKrasovskii functional, some delay-dependent sufficient conditions and a synchronization law, which include the masterslave parameters are established for designing a delay-dependent mode-dependent sliding mode exponential H∞ synch…

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Computer Networks and CommunicationsComputer scienceApplied Mathematicssynchronization master-slave systems sliding mode delay H∞ performance nonlinear uncertaintiesVDP::Technology: 500::Mechanical engineering: 570Mode (statistics)Control engineeringMaster/slaveNonlinear systemControl and Systems EngineeringControl theorySignal ProcessingSynchronization (computer science)Markovian jumpingJournal of the Franklin Institute
researchProduct

Investigation of vehicle crash modeling techniques: theory and application

2013

Published version of an article in the journal: The International Journal of Advanced Manufacturing Technology. Also available from the publisher at: http://dx.doi.org/10.1007/s00170-013-5320-3 Creating a mathematical model of a vehicle crash is a task which involves considerations and analysis of different areas which need to be addressed because of the mathematical complexity of a crash event representation. Therefore, to simplify the analysis and enhance the modeling process, in this work, a brief overview of different vehicle crash modeling methodologies is proposed. The acceleration of a colliding vehicle is measured in its center of gravity—this crash pulse contains detailed informati…

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Feedforward neural network; Lumped parameter models; Multiresolution analysis; Vehicle crash modeling; Control and Systems Engineering; Software; Mechanical Engineering; Computer Science Applications1707 Computer Vision and Pattern Recognition; Industrial and Manufacturing EngineeringEvent (computing)Computer scienceReliability (computer networking)Mechanical Engineeringvehicle crash modelingVDP::Technology: 500::Mechanical engineering: 570lumped parameter modelsCrashControl engineeringComputer Science Applications1707 Computer Vision and Pattern RecognitionCollisionIndustrial and Manufacturing EngineeringComputer Science Applicationsmultiresolution analysisAutoregressive modelControl and Systems Engineeringfeedforward neural networkRepresentation (mathematics)SimulationSoftwareMotor vehicle crash
researchProduct

Modeling and Performance Analysis of Energy Efficiency Binary Power Control in MIMO-OFDM Wireless Communication Systems

2011

Published version of an article in the journal:International Journal of Distributed Sensor Networks. Also available from Hindawi Publishing: http://dx.doi.org/10.1155/2011/946258 The energy efficiency optimization of the binary power control scheme for MIMO-OFDM wireless communication systems is formulated, and then a global optimization solution of power allocation is derived. Furthermore, a new energy efficiency binary power control (EEBPC) algorithm is designed to improve the energy efficiency of MIMO-OFDM wireless communication systems. Simulation results show that the EEBPC algorithm has better energy efficiency and spectrum efficiency than the average power control algorithm in MIMO-O…

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Scheme (programming language)Theoretical computer scienceArticle SubjectComputer Networks and CommunicationsComputer scienceBinary numberData_CODINGANDINFORMATIONTHEORY02 engineering and technologylcsh:QA75.5-76.950203 mechanical engineeringVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Computer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringElectronic engineeringGlobal optimizationComputer Science::Information Theorycomputer.programming_languageComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSGeneral Engineering020206 networking & telecommunications020302 automobile design & engineeringSpectral efficiencyMIMO-OFDMPower (physics)lcsh:Electronic computers. Computer sciencecomputerPower controlEfficient energy useInternational Journal of Distributed Sensor Networks
researchProduct

Information diffusion model with homogeneous continuous time Markov chain on Indonesian Twitter users

2022

In this paper, a homogeneous continuous time Markov chain (CTMC) is used to model information diffusion or dissemination, also to determine influencers on Twitter dynamically. The tweeting process can be modeled with a homogeneous CTMC since the properties of Markov chains are fulfilled. In this case, the tweets that are received by followers only depend on the tweets from the previous followers. Knowledge Discovery in Database (KDD) in Data Mining is used to be research methodology including pre-processing, data mining process using homogeneous CTMC, and post-processing to get the influencers using visualization that predicts the number of affected users. We assume the number of affected u…

VDP::Samfunnsvitenskap: 200::Økonomi: 210Artificial IntelligenceComputer Networks and CommunicationsCommunicationSoftwareComputer Science ApplicationsInformation Systems
researchProduct

An Efficient Convolutional Neural Network with Transfer Learning for Malware Classification

2022

Rising prevalence of malicious software (malware) attacks represent a serious threat to online safety in the modern era. Malware is a threat to anyone who uses the Internet since it steals data and causes damage to computer systems. In addition, the exponential growth of malware hazards that affect many computer users, corporations, and governments has made malware detection, a popular issue in academic study. Current malware detection methods are slow and ineffectual because they rely on static and dynamic analysis of malware signatures and behavior patterns to detect unknown malware in real-time. Thus, this paper discusses the role of deep convolution neural networks in malware classifica…

VDP::Teknologi: 500Article SubjectComputer Networks and CommunicationsElectrical and Electronic EngineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550VDP::Teknologi: 500::Elektrotekniske fag: 540Information SystemsWireless Communications and Mobile Computing
researchProduct

Chasing Metaverses: Reflecting on Existing Literature to Understand the Business Value of Metaverses

2022

AbstractMetaverses refer to immersive virtual worlds in which people, places, and things of the physical world are represented by their digital representations. The wide adoption of metaverses is expected to widely disrupt the way we interact in the virtual world by elevating our online interactive experiences and bringing a plethora of implications for businesses. Following a structured literature review of related research published in the last decade, we shed light on our current understanding of metaverses and reflect on the potentially transformative value of metaverses for businesses in the near future. We draw on an established research framework to organize the insights of existing …

VDP::Teknologi: 500Computer Networks and CommunicationsSoftwareInformation SystemsTheoretical Computer Science
researchProduct

Investigation of data encryption impact on broadcasting visible light communications

2014

Este trabajo investiga el impacto de la encriptación y desencriptación de datos en un sistema de comunicaciones de luz visible (VLC) de difusión en interiores incrustado en la capa física. Se ha implementado el cifrado RSA para proporcionar una transmisión de datos segura en la capa física. El artículo muestra el rendimiento de la tasa de error de bits (BER) para los sistemas VLC seguros y no seguros (8 y 12 bits) para velocidades de datos de 2 y 12 Mbps. Para una BER de 10e-4 mostramos que hay penalizaciones de potencia de 2-4 dB con las VLC seguras. También se investiga el impacto de la longitud de la clave en la propagación del error y la penalización de potencia. EU Cost Action IC1101 T…

VLCUNESCO::CIENCIAS TECNOLÓGICAS::Tecnología de las telecomunicacionesBERbusiness.industryComputer sciencedecryptionPhysical layerVisible light communicationpower penaltyEncryptionUNESCO::MATEMÁTICAS::Ciencia de los ordenadores::Código y sistemas de codificación:CIENCIAS TECNOLÓGICAS::Tecnología de las telecomunicaciones [UNESCO]Broadcasting (networking)RSABroadcast communication networkBit error rate:MATEMÁTICAS::Ciencia de los ordenadores::Código y sistemas de codificación [UNESCO]businessComputer hardwareencryptionKey sizeComputer networkData transmission
researchProduct

The Affordances of Reading/Writing on Paper and Digitally in Finland

2014

The aim of this study is to investigate the impact of digital technologies on reading and writing in Finland. The perceived affordances of reading and writing on paper and digitally are compared by analysing written essays collected from 25 communication students in 2013. Research design is replicated from a study of Fortunati and Vincent that concerns Italian students. Results show that Finnish students perceive more positive than negative affordances regarding reading on paper, while reading on screen attracts fewer virtues. In this respect, results are in line with the Italian study. Unlike in Italy, students in Finland value writing on a keyboard especially because it enables editing th…

Value (ethics)Computer Networks and Communicationsmedia_common.quotation_subjectcomputer.software_genrelukeminenReading (process)Mathematics educationSociologyElectrical and Electronic Engineeringta518Affordancedigtaalinenmedia_commontarjoumaMultimediadigitalteknologinen kehysCountry differencespaperita5142affordanceDigital writingta5141technological framecomputerProductivity (linguistics)kirjoittaminen
researchProduct

Reward-based crowdfunding campaigns: Informational value and access to venture capital

2018

We consider an entrepreneur who designs a reward-based crowdfunding campaign when the campaign provides a signal about the future demand for the product and subsequent venture capital is needed. We find that both the informativeness of the campaign and considerations related to gaining access to venture capital funding affect the entrepreneur’s choice of campaign instruments, as well as her decision of whether to run a campaign. In particular, entrepreneurs should launch the campaign either when it is highly informative or when it is not informative at all. For relatively low levels of informativeness, but not so low that the venture capitalist (VC) completely ignores the campaign outcome …

Value (ethics)Information acquisitionInformation Systems and ManagementComputer Networks and CommunicationsInformation SystemLibrary and Information SciencesOutcome (game theory)Management Information Systems0502 economics and businessManagement Information SystemInformation acquisitionMarketingReward-based crowdfundingbusiness.industry05 social sciencesVenture capitalSettore ING-IND/35 - Ingegneria Economico-GestionalePreferenceVenture capitalProduct (business)Computer Networks and CommunicationNew product developmentNew product development050211 marketingbusiness050203 business & managementInformation Systems
researchProduct

Key factors of information management for crowdfunding investor satisfaction

2021

Abstract Crowdlending platforms are becoming increasingly important as a collective financing mechanism for entrepreneurs and small and medium-sized enterprises (SMEs), especially those at an early stage. This study, which is based on a survey of investors on a Spanish crowdlending platform, uses fuzzy-set qualitative comparative analysis (fsQCA) to examine investor satisfaction with crowdlending platforms. Specifically, the study examines communication policies and the quality of the investor experience based on the information provided by these platforms. The value of this article lies in its examination of the antecedents of crowdlending investor satisfaction. The analysis shows that the…

Value (ethics)Information managementComputer Networks and Communicationsmedia_common.quotation_subjectFsQCAComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyLibrary and Information SciencesCrowdlending platformsInformation managementCommunication policies020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringQuality (business)MarketingCommunication policiesmedia_commonInvestor experiencebusiness.industryQualitative comparative analysis05 social sciencesInvestment decisionsKey factorsPublishingORGANIZACION DE EMPRESAS050211 marketingbusinessInformation SystemsInvestor satisfaction
researchProduct