Search results for "Computer network"
showing 10 items of 1634 documents
A two-phase insertion technique of unexpected customers for a dynamic dial-a-ride problem
2006
Abstract This work deals with a dynamic dial-a-ride problem with time window constraints. In particular, new unplanned requests for service may arise at a vehicle stop and the driver must decide in real-time whether to accept or reject them. For this problem, we have developed a two-phase insertion algorithm based on route perturbations: the first phase, which is run off-line when the vehicle moves between two successive stops, aims at creating a feasible neighborhood of the current route; while the second phase, which is run in real-time every time a new request occurs, inserts, when possible, the delivery stop of the new customer in the current route.
Automatic evaluation of information provider reliability and expertise
2013
Published version of an article in the journal: World Wide Web. Also available from the publisher at: http://dx.doi.org/10.1007/s11280-013-0249-x Q&A social media have gained a lot of attention during the recent years. People rely on these sites to obtain information due to a number of advantages they offer as compared to conventional sources of knowledge (e.g., asynchronous and convenient access). However, for the same question one may find highly contradicting answers, causing an ambiguity with respect to the correct information. This can be attributed to the presence of unreliable and/or non-expert users. These two attributes (reliability and expertise) significantly affect the quality o…
Digital advertising around paid spaces, e-advertising industry’s revenue engine : A review and research agenda
2017
We develop and describe a framework for research in a particular segment of digital advertising. Internet Advertising Paid Slots and Spaces (IAPS) is a neologism and work almost like a stock exchange for buying and selling advertising in various formats on designated spaces around web and make a significant contribution to Internet advertising revenues. These paid spaces were found to encompass diverse areas of Internet advertising that include search engine marketing, social media advertising and display advertising. Given the complexity of the modern digital advertising eco system, this literature review seeks to provide clarity, up-to-date knowledge and ongoing insights into Internet adv…
Examining the antecedents and consequences of perceived value : a case study of mobile banking application usage in the Kingdom of Saudi Arabia
2022
Recent advancements in information, communications, and mobile technologies have revolutionized banking and payment services as well as consumer behavior. This study examines the continuous usage experience of mobile financial services, and especially mobile banking services, in the Kingdom of Saudi Arabia (KSA), the context of this study. Data were collected from 300 experienced mobile banking users across the KSA using a pre-tested survey instrument. The partial least squares structural equation modelling (PLS-SEM) was used to analyze the data. The results supported most of the hypotheses and revealed that e-service quality, e-information quality, and experience flow have a significant an…
Learn to Cache: Machine Learning for Network Edge Caching in the Big Data Era
2018
The unprecedented growth of wireless data traffic not only challenges the design and evolution of the wireless network architecture, but also brings about profound opportunities to drive and improve future networks. Meanwhile, the evolution of communications and computing technologies can make the network edge, such as BSs or UEs, become intelligent and rich in terms of computing and communications capabilities, which intuitively enables big data analytics at the network edge. In this article, we propose to explore big data analytics to advance edge caching capability, which is considered as a promising approach to improve network efficiency and alleviate the high demand for the radio resou…
IEEE Access Special Section Editorial: Exploiting the Benefits of Interference in Wireless Networks: Energy Harvesting and Security
2018
Interference used to be viewed as a harmful factor in wireless networks, which can reduce the quality of information transmission. To combat against interference, many interference management techniques have emerged. Due to the latest research advances, interference (or noise) can also be exploited to offer some benefits to wireless networks. The first aspect is that interference in multi-user networks can be collected as a green power supply for the transceivers, known as wireless energy harvesting. Another application is that one can generate artificial noise to disrupt the adversarial eavesdropping, and guarantee the security of wireless networks. Therefore, conventional interference man…
A Double Auction Mechanism for Virtual Resource Allocation in SDN-based Cellular Network
2016
The explosively growing demands for mobile traffic service bring both challenges and opportunities to wireless net- works, among which, wireless network virtualization is proposed as the main evolution towards 5G. In this paper, we first propose a Software Defined Network (SDN) based wireless virtualization architecture for enabling multi-flow transmission in order to save capital expenses (CapEx) and operation expenses (OpEx) significantly with multiple Infrastructures Providers (InPs) and multiple Mobile Virtual Network Operators (MVNOs). We for- mulate the virtual resource allocation problem with diverse QoS requirements as a social welfare maximization problem with transaction cost. Due…
Energy Efficient Optimization for Wireless Virtualized Small Cell Networks With Large-Scale Multiple Antenna
2017
Wireless network virtualization is envisioned as a promising framework to provide efficient and customized services for next-generation wireless networks. In wireless virtualized networks (WVNs), limited radio resources are shared among different services providers for providing services to different users with heterogeneous demands. In this paper, we propose a resource allocation scheme for an orthogonal frequency division multiplexing-based WVN, where one small cell base station equipped with a large number of antennas serves the users with different service requirements. In particular, with the objective to obtain the energy efficiency in the uplink, a joint power, subcarrier, and antenn…
Underwater Multirobot Cooperative Intervention MAC Protocol
2020
This work introduces a Medium Access Control (MAC) protocol designed to allow a group of underwater robots that share a wireless communication channel to effectively communicate with each other. The goal of the Underwater Multirobot Cooperative Intervention MAC (UMCI-MAC) protocol presented in this work is to minimize the end to end delay and the jitter. The access to the medium in UMCI-MAC follows a Time Division Multiple Access (TDMA) strategy which is arbitrated by a master, which also has the capability to prioritize the transmission of some nodes over the rest of the network. Two experiments have been carried out with a team of four Autonomous Underwater Vehicles (AUV) in order to comp…
Trajectory Design and Resource Allocation for Multi-UAV Networks : Deep Reinforcement Learning Approaches
2023
The future mobile communication system is expected to provide ubiquitous connectivity and unprecedented services over billions of devices. The unmanned aerial vehicle (UAV), which is prominent in its flexibility and low cost, emerges as a significant network entity to realize such ambitious targets. In this work, novel machine learning-based trajectory design and resource allocation schemes are presented for a multi-UAV communications system. In the considered system, the UAVs act as aerial Base Stations (BSs) and provide ubiquitous coverage. In particular, with the objective to maximize the system utility over all served users, a joint user association, power allocation and trajectory desi…