Search results for "Computer network"
showing 10 items of 1634 documents
Technostress and social networking services: Explaining users' concentration, sleep, identity, and social relation problems
2018
It is common for users of social networking sites and services (SNS) to suffer from technostress and the various associated strains that hinder their well‐being. Despite prior SNS stress studies having provided valuable knowledge regarding SNS stressors and their use consequences, they have not examined the various strains related to well‐being that those stressors can create nor the underlying SNS characteristics. To address this gap in the research, we used a qualitative approach involving narrative interviews. As a contribution, our findings reveal four types of strains related to well‐being (concentration problems, sleep problems, identity problems, and social relation problems) as well…
Anomaly Detection and Classification of Household Electricity Data : A Time Window and Multilayer Hierarchical Network Approach
2022
With the increasing popularity of the smart grid, huge volumes of data are gathered from numerous sensors. How to classify, store, and analyze massive datasets to facilitate the development of the smart grid has recently attracted much attention. In particular, with the popularity of household smart meters and electricity monitoring sensors, a large amount of data can be obtained to analyze household electricity usage so as to better diagnose the leakage and theft behaviors, identify man-made tampering and data fraud, and detect powerline loss. In this paper, the time window method is first proposed to obtain the features and potential periodicity of household electricity data. Combining th…
Quality, Reliability, Security and Robustness in Heterogeneous Systems
2020
This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2019, held in Shenzhen, China, in November 2019. The 16 revised full papers were carefully reviewed and selected from 55 submissions. The papers are organized thematically in tracks, starting with mobile systems, cloud resource management and scheduling, machine learning, telecommunication systems, and network management.
Los poetas ciegos y la ceguera en la poesía árabe: algunos casos destacados
2013
This paper deals with the verses of some relevant and famous blind Arab classical poets that talked about their blindness like the cases of al-A‛¿à, Ba¿¿ār ibn Burd and Abū-l-ɈAlā¿ al-Ma‛arrī among others. The study shows how each one of them faced his disability and the influence that their blindness had on their poetic production. This paper contains also the translation from the Arabic and tha analysis of the verses inspired by blindness to some seeing poets of Granada and the moderm Arabic poetry. El artículo se ocupa de los versos de algunos poetas árabes ciegos que se han hecho famosos en la literatura árabe clásica y que nos hablan de la ceguera como es el caso de al-A‛ à, Ba ār ibn …
An Energy Blockchain, a Use Case on Tendermint
2018
The recent advances in distributed energy systems require new models for exchanging energy among prosumers in microgrids. The blockchain technology promises to solve the digital issues related to distributed systems without a trusted authority and to allow quick and secure energy transactions, which are verified and cryptographically protected. Transactions are approved and subsequently recorded on all the machines participating in the blockchain. This work demonstrates how users, which are nodes of the energy and digital networks, exchange energy supported by a customized blockchain based on Tendermint. We focus on the procedures for generating blocks and defining data structures for stori…
Some Features of Modeling Ultrasound Propagation in Non-Destructive Control of Metal Structures Based on the Magnetostrictive Effect
2023
A method and mathematical models of direct and inverse problems of ultrasonic testing and diagnostics of complex metal structures for defects were developed and tested. A prototype of a system for magnetostrictive control of elements of the objects under study was manufactured and experimentally tested. Mathematical simulation of ultrasonic testing processes using MATLAB and the COMSOL Multiphysics software environment was carried out. The adequacy of the mathematical models was verified by the results of their comparison with real physical experiments. Information support and a methodology that implements it was developed, which ensure the functioning of the control facilities for these ob…
Improving IEEE 802.11 Performance in Chain Topologies through Distributed Polling and Network Coding
2009
Wireless multi-hop networks often rely on the use of IEEE 802.11 technology. Despite of the robustness of the IEEE 802.11 Distributed Coordination Function (DCF) for working in various network scenarios, it has been proven that critical inefficiencies can arise in the case of multi-hop packet forwarding. In this paper, we propose a MAC scheme, based on the virtualization of the Point Coordination Function, optimized for working on chain topologies with bidirectional traffic flows. Our scheme is based on a token-like access mechanism coupled with network coding. The basic idea is the use of multiple Point Coordinators (PCs) along the node chain, which are elected by passing special token fra…
Medium access in WiFi networks: strategies of selfish nodes [Applications Corner]
2009
This article provides a game theoretical analysis of the WiFi MAC protocol to understand the risks or the advantages offered by possible modifications of MAC functionalities implemented at the driver level.
Optimization of the Relay Selection Scheme in Cooperative Retransmission Networks
2011
Cooperative MAC protocol design has attracted much attention recently thanks to the development of relaying techniques. In single-relay C-ARQ, the relay selection scheme cannot work efficiently in a dense network, due to high collision probability among different contending relays. In this paper, the throughput performance impairment from the collision is analysed in a typical network scenario. Thereby, we propose an optimized relay selection scheme aiming at maximizing system throughput by reducing collision probability. The throughput performance enhancement by the proposed optimal relay selection scheme is verified by simulations.
On the performance of hybrid-ARQ with code combining over double rayleigh fading channels
2011
In this paper, we study the performance of hybrid automatic repeat request (HARQ) with code combining (CC) over double Rayleigh channels. This channel can be utilized to model the fading envelope of vehicle-to-vehicle (V2V) channels. We derive analytical solutions for the characteristic quantities of double Rayleigh channels, such as the outage probability, the ergodic capacity, and the bit error probability (BEP). Moreover, we study the performance of HARQ with CC. Our analysis focuses on information theoretic aspects of HARQ with CC. closed-form analytical approximations are derived for the e-outage capacity, the average number of transmissions, and the average transmission rate of HARQ w…