Search results for "Computer network"

showing 10 items of 1634 documents

Technostress and social networking services: Explaining users' concentration, sleep, identity, and social relation problems

2018

It is common for users of social networking sites and services (SNS) to suffer from technostress and the various associated strains that hinder their well‐being. Despite prior SNS stress studies having provided valuable knowledge regarding SNS stressors and their use consequences, they have not examined the various strains related to well‐being that those stressors can create nor the underlying SNS characteristics. To address this gap in the research, we used a qualitative approach involving narrative interviews. As a contribution, our findings reveal four types of strains related to well‐being (concentration problems, sleep problems, identity problems, and social relation problems) as well…

animal structuresComputer Networks and Communicationsverkostoituminensosiaalinen mediaIdentity (social science)02 engineering and technologystrainssosiaaliset verkostot020204 information systems0502 economics and businessTechnostress0202 electrical engineering electronic engineering information engineeringta512teknostressita11305 social sciencesStressorstressiIT characteristicsSleep in non-human animalsSocial relationrasitteetstressors050211 marketingsocial networking servicesPsychologySocial psychologystressitekijättechnostressSoftwareInformation SystemsInformation Systems Journal
researchProduct

Anomaly Detection and Classification of Household Electricity Data : A Time Window and Multilayer Hierarchical Network Approach

2022

With the increasing popularity of the smart grid, huge volumes of data are gathered from numerous sensors. How to classify, store, and analyze massive datasets to facilitate the development of the smart grid has recently attracted much attention. In particular, with the popularity of household smart meters and electricity monitoring sensors, a large amount of data can be obtained to analyze household electricity usage so as to better diagnose the leakage and theft behaviors, identify man-made tampering and data fraud, and detect powerline loss. In this paper, the time window method is first proposed to obtain the features and potential periodicity of household electricity data. Combining th…

autoencoderMains electricityComputer Networks and CommunicationsComputer sciencemultilayer hierarchical networkkotitaloudetverkot (järjestelmät)computer.software_genreanomaly detectionComputer Science Applicationshousehold electricitysähkönkulutussähködataclassificationHardware and ArchitectureTime windowspoikkeavuusSignal ProcessingAnomaly detectionData miningcomputerNetwork approachfeedforward networkInformation Systems
researchProduct

Quality, Reliability, Security and Robustness in Heterogeneous Systems

2020

This book constitutes the refereed post-conference proceedings of the 15th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2019, held in Shenzhen, China, in November 2019. The 16 revised full papers were carefully reviewed and selected from 55 submissions. The papers are organized thematically in tracks, starting with mobile systems, cloud resource management and scheduling, machine learning, telecommunication systems, and network management.

bandwidthartificial intelligenceinternetmobiledevicesrouterstelecommunication networksdata communication systemscomputing mobileWorld Wide Webroutingsensorcomputer networkstelecommunication trafficdata securitysignal processingwireless sensor networksnetworks sensorswireless telecommunication systems
researchProduct

Los poetas ciegos y la ceguera en la poesía árabe: algunos casos destacados

2013

This paper deals with the verses of some relevant and famous blind Arab classical poets that talked about their blindness like the cases of al-A‛¿à, Ba¿¿ār ibn Burd and Abū-l-ɈAlā¿ al-Ma‛arrī among others. The study shows how each one of them faced his disability and the influence that their blindness had on their poetic production. This paper contains also the translation from the Arabic and tha analysis of the verses inspired by blindness to some seeing poets of Granada and the moderm Arabic poetry. El artículo se ocupa de los versos de algunos poetas árabes ciegos que se han hecho famosos en la literatura árabe clásica y que nos hablan de la ceguera como es el caso de al-A‛ à, Ba ār ibn …

blind Arab poetsComputer Networks and Communicationspoesia arabe clasicaBaššār ibn BurdArab classical poetrycegueraLiteratura àrabHardware and ArchitectureAbū-l-‛Alā` al- Ma‛arrīAbū-l-'Alā` al-Ma‛arrīal-A‛šaSoftwarepoetas ciegosblindness
researchProduct

An Energy Blockchain, a Use Case on Tendermint

2018

The recent advances in distributed energy systems require new models for exchanging energy among prosumers in microgrids. The blockchain technology promises to solve the digital issues related to distributed systems without a trusted authority and to allow quick and secure energy transactions, which are verified and cryptographically protected. Transactions are approved and subsequently recorded on all the machines participating in the blockchain. This work demonstrates how users, which are nodes of the energy and digital networks, exchange energy supported by a customized blockchain based on Tendermint. We focus on the procedures for generating blocks and defining data structures for stori…

blockchainBlockchaintransactive energyEnvironmental EngineeringComputer science020209 energyEnergy Engineering and Power Technology02 engineering and technologyPeer-to-peercomputer.software_genreEnergy storageIndustrial and Manufacturing Engineeringenergy market0202 electrical engineering electronic engineering information engineeringEnergy marketElectrical and Electronic Engineeringpeer to peerSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniFocus (computing)business.industryRenewable Energy Sustainability and the Environment020208 electrical & electronic engineeringData structureSettore ING-IND/33 - Sistemi Elettrici Per L'EnergiamicrogridHardware and ArchitectureDistributed generationbusinesscomputerEnergy (signal processing)Computer network
researchProduct

Some Features of Modeling Ultrasound Propagation in Non-Destructive Control of Metal Structures Based on the Magnetostrictive Effect

2023

A method and mathematical models of direct and inverse problems of ultrasonic testing and diagnostics of complex metal structures for defects were developed and tested. A prototype of a system for magnetostrictive control of elements of the objects under study was manufactured and experimentally tested. Mathematical simulation of ultrasonic testing processes using MATLAB and the COMSOL Multiphysics software environment was carried out. The adequacy of the mathematical models was verified by the results of their comparison with real physical experiments. Information support and a methodology that implements it was developed, which ensure the functioning of the control facilities for these ob…

building metal structuresComputer Networks and CommunicationsHardware and ArchitectureControl and Systems Engineeringinverse problemsSignal ProcessingElectrical and Electronic Engineeringultrasonic testingdirect problemsbuilding metal structures; ultrasonic testing; small-aperture transducers; direct problems; inverse problemssmall-aperture transducersElectronics (Switzerland)
researchProduct

Improving IEEE 802.11 Performance in Chain Topologies through Distributed Polling and Network Coding

2009

Wireless multi-hop networks often rely on the use of IEEE 802.11 technology. Despite of the robustness of the IEEE 802.11 Distributed Coordination Function (DCF) for working in various network scenarios, it has been proven that critical inefficiencies can arise in the case of multi-hop packet forwarding. In this paper, we propose a MAC scheme, based on the virtualization of the Point Coordination Function, optimized for working on chain topologies with bidirectional traffic flows. Our scheme is based on a token-like access mechanism coupled with network coding. The basic idea is the use of multiple Point Coordinators (PCs) along the node chain, which are elected by passing special token fra…

business.industryBidirectional trafficComputer scienceSettore ING-INF/03 - TelecomunicazioniDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPacket forwardingThroughputnetwork codingDistributed coordination functionNetwork topologyWLANToken passingPoint coordination functionIEEE 802.11Linear network codingWireless lanTelecommunications linkComputer Science::Networking and Internet ArchitectureWirelessPollingbusinessComputer network
researchProduct

Medium access in WiFi networks: strategies of selfish nodes [Applications Corner]

2009

This article provides a game theoretical analysis of the WiFi MAC protocol to understand the risks or the advantages offered by possible modifications of MAC functionalities implemented at the driver level.

business.industryComputer scienceApplied MathematicsComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSignal ProcessingWireless lanThroughputMobile telephonyElectrical and Electronic EngineeringbusinessGame theoryProtocol (object-oriented programming)Computer networkIEEE Signal Processing Magazine
researchProduct

Optimization of the Relay Selection Scheme in Cooperative Retransmission Networks

2011

Cooperative MAC protocol design has attracted much attention recently thanks to the development of relaying techniques. In single-relay C-ARQ, the relay selection scheme cannot work efficiently in a dense network, due to high collision probability among different contending relays. In this paper, the throughput performance impairment from the collision is analysed in a typical network scenario. Thereby, we propose an optimized relay selection scheme aiming at maximizing system throughput by reducing collision probability. The throughput performance enhancement by the proposed optimal relay selection scheme is verified by simulations.

business.industryComputer scienceAutomatic repeat requestRetransmissionComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputData_CODINGANDINFORMATIONTHEORYlaw.inventionRelaylawComputer Science::Networking and Internet ArchitectureFadingbusinessThroughput (business)Selection (genetic algorithm)Relay channelComputer Science::Information TheoryComputer network2011 IEEE 73rd Vehicular Technology Conference (VTC Spring)
researchProduct

On the performance of hybrid-ARQ with code combining over double rayleigh fading channels

2011

In this paper, we study the performance of hybrid automatic repeat request (HARQ) with code combining (CC) over double Rayleigh channels. This channel can be utilized to model the fading envelope of vehicle-to-vehicle (V2V) channels. We derive analytical solutions for the characteristic quantities of double Rayleigh channels, such as the outage probability, the ergodic capacity, and the bit error probability (BEP). Moreover, we study the performance of HARQ with CC. Our analysis focuses on information theoretic aspects of HARQ with CC. closed-form analytical approximations are derived for the e-outage capacity, the average number of transmissions, and the average transmission rate of HARQ w…

business.industryComputer scienceAutomatic repeat requestTransmitterHybrid automatic repeat requestUpper and lower boundsChannel state informationFadingbusinessAlgorithmComputer Science::Information TheoryRayleigh fadingComputer networkCommunication channel2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications
researchProduct