Search results for "Computer network"

showing 10 items of 1634 documents

The Mediation of Politics through Twitter: An Analysis of Messages posted during the Campaign for the German Federal Election 2013

2015

Patterns found in digital trace data are increasingly used as evidence of social phenomena. Still, the role of digital services not as mirrors but instead as mediators of social reality has been neglected. We identify characteristics of this mediation process by analyzing Twitter messages referring to politics during the campaign for the German federal election 2013 and comparing the thus emerging image of political reality with established measurements of political reality. We focus on the relationship between temporal dynamics in politically relevant Twitter messages and crucial campaign events, comparing dominant topics in politically relevant tweets with topics prominent in surveys and …

Computer Networks and CommunicationsSocial reality05 social sciencesMedia studiesComputingMilieux_LEGALASPECTSOFCOMPUTING050801 communication & media studieslanguage.human_language0506 political scienceComputer Science ApplicationsGermanTrace (semiology)Politics0508 media and communicationsDynamics (music)Political scienceMediation050602 political science & public administrationlanguageComputational sociologyFederal electionSocial psychologyJournal of Computer-Mediated Communication
researchProduct

Distinct Patterns of Functional Connectivity During the Comprehension of Natural, Narrative Speech.

2020

Recent continuous task studies, such as narrative speech comprehension, show that fluctuations in brain functional connectivity (FC) are altered and enhanced compared to the resting state. Here, we characterized the fluctuations in FC during comprehension of speech and time-reversed speech conditions. The correlations of Hilbert envelope of source-level EEG data were used to quantify FC between spatially separate brain regions. A symmetric multivariate leakage correction was applied to address the signal leakage issue before calculating FC. The dynamic FC was estimated based on a sliding time window. Then, principal component analysis (PCA) was performed on individually concatenated and te…

Computer Networks and CommunicationsSpeech comprehension050105 experimental psychologyTask (project management)03 medical and health sciences0302 clinical medicineConnectomeNatural (music)Humans0501 psychology and cognitive sciencesNarrativeCerebral CortexPrincipal Component AnalysisNeuronal PlasticityResting state fMRIFunctional connectivity05 social sciencesElectroencephalographySignal Processing Computer-AssistedGeneral MedicineComprehensionSpeech PerceptionNerve NetPsychologyComprehension030217 neurology & neurosurgeryCognitive psychologyInternational journal of neural systems
researchProduct

On the first- and second-order statistics of the capacity of N*Nakagami-m channels for applications in cooperative networks

2012

This article deals with the derivation and analysis of the statistical properties of the instantaneous channel capacitya of N*Nakagami-m channels, which has been recently introduced as a suitable stochastic model for multihop fading channels. We have derived exact analytical expressions for the probability density function (PDF), cumulative distribution function (CDF), level-crossing rate (LCR), and average duration of fades (ADF) of the instantaneous channel capacity of N*Nakagami-m channels. For large number of hops, we have studied the first-order statistics of the instantaneous channel capacity by assuming that the fading amplitude of the channel can approximately be modeled as a lognor…

Computer Networks and CommunicationsStochastic modellingComputer scienceCumulative distribution functionNakagami distributionComputer Science ApplicationsComputer Science::PerformanceChannel capacitySignal ProcessingLog-normal distributionStatisticsComputer Science::Networking and Internet ArchitectureFadingStatistical physicsComputer Science::Information TheoryCommunication channelEURASIP Journal on Wireless Communications and Networking
researchProduct

Evaluation of Deep Learning and Conventional Approaches for Image Recaptured Detection in Multimedia Forensics

2022

Image recaptured from a high-resolution LED screen or a good quality printer is difficult to distinguish from its original counterpart. The forensic community paid less attention to this type of forgery than to other image alterations such as splicing, copy-move, removal, or image retouching. It is significant to develop secure and automatic techniques to distinguish real and recaptured images without prior knowledge. Image manipulation traces can be hidden using recaptured images. For this reason, being able to detect recapture images becomes a hot research topic for a forensic analyst. The attacker can recapture the manipulated images to fool image forensic system. As far as we know, ther…

Computer Networks and CommunicationsVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420Computer Science ApplicationsMobile Information Systems
researchProduct

Familiarity with digital twin totality: Exploring the relation and perception of affordances through a Heideggerian perspective

2022

The concept of affordances has become central in information systems literature. However, existing perspectives fall short in providing details on the relational aspect of affordances, which can influence actors' perception of them. To increase granularity and specificity in this regard, researchers have suggested that it be supplemented with other concepts or theories. In this article, we argue that the Heideggerian concepts of ‘familiarity’ and ‘referential totality’ are well suited for increasing our understanding of the relational aspects of affordances in information systems research. To explore this idea, we conducted a case study of a project concerning the development of a digital t…

Computer Networks and CommunicationsVDP::Samfunnsvitenskap: 200::Biblioteks- og informasjonsvitenskap: 320::Informasjons- og kommunikasjonssystemer: 321SoftwareInformation SystemsVDP::Samfunnsvitenskap: 200::Biblioteks- og informasjonsvitenskap: 320
researchProduct

Machine Learning: The Backbone of Intelligent Trade Credit-Based Systems

2022

Technology has turned into a significant differentiator in the money and traditional recordkeeping systems for the financial industry. To depict two customers as potential investors, it is mandatory to give the complex innovation that they anticipate and urge to purchase. In any case, it is difficult to keep on top of and be a specialist in each of the new advancements that are accessible. By reappropriating IT administrations, monetary administrations firms can acquire prompt admittance to the most recent ability and direction. Financial systems, along with machine learning (ML) algorithms, are vital for critical concerns like secure financial transactions and automated trading. These are …

Computer Networks and CommunicationsVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Information Systems
researchProduct

SDN@home: A Method for Controlling Future Wireless Home Networks

2016

Recent advances in wireless networking technologies are leading toward the proliferation of novel home network applications. However, the landscape of emerging scenarios is fragmented due to their varying technological requirements and the heterogeneity of current wireless technologies. We argue that the development of flexible software-defined wireless architectures, including such efforts as the wireless MAC processor, coupled with SDN concepts, will enable the support of both emerging and future home applications. In this article, we first identify problems with managing current home networks composed of separate network segments governed by different technologies. Second, we point out t…

Computer Networks and CommunicationsWireless ad hoc networkComputer science02 engineering and technology03 medical and health sciences0302 clinical medicineHome automation0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic EngineeringNetwork architectureResidential gatewaySettore ING-INF/03 - TelecomunicazioniWireless networkbusiness.industryComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsWireless WANService providerNetworking hardwareComputer Science ApplicationsWireless site surveyKey distribution in wireless sensor networksComputer Networks and CommunicationSoftware-defined networkingbusinessTelecommunicationsHeterogeneous networkMunicipal wireless network030215 immunologyComputer network
researchProduct

Segmenting the audience of a cause-related marketing viral campaign

2021

Abstract This paper analyses the attitudinal effect of a cause-related marketing campaign which becomes viral through social networks. This attitudinal response is observed in three Internet user segments with different affinity levels: i) strong (familiar with the sponsoring brand and the promoted cause); ii) intermediate (familiar with the brand or the cause); and iii) weak (without previous experiences of either the brand or the social cause). To develop our experiment, 360 Internet surfers agree to participate. Their attitudes were measured before and after the showing of a viral spot in which a pet food brand encourages pet adoption. Our results show that a viral campaign works perfect…

Computer Networks and Communicationsbusiness.industry05 social sciences02 engineering and technologyLibrary and Information SciencesPet foodMarket segmentation020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineering050211 marketingThe InternetMarketing campaignMarketingbusinesshealth care economics and organizationsInformation SystemsInternational Journal of Information Management
researchProduct

Default effects in app selection: German adolescents’ tendency to adhere to privacy or social relatedness features in smartphone apps

2019

Cognitive biases such as default effects impact on user preferences for a broad range of different choices. This paper investigates these default effects among adolescents configuring apps that either satisfy relatedness or enhance autonomy by protecting privacy. Relatedness and privacy are two innate needs that adolescents can satisfy with the use of smartphone apps. This study argues that adolescents’ choice of features supporting either privacy protection or social relatedness is a consequence of default effects, so that adolescents adhere to preselected defaults. We test this assumption in an experimental survey design including four app configuration tasks with N = 280 German adolesce…

Computer Networks and Communicationsbusiness.industryCommunicationInternet privacyCognitive biaslanguage.human_languageGermanSmartphone appMedia TechnologylanguagePsychologybusinessSelection (genetic algorithm)Range (computer programming)Social relatednessMobile Media & Communication
researchProduct

An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility

2017

Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors de…

Computer Networks and Communicationsbusiness.industryComputer science020206 networking & telecommunications02 engineering and technologyIntrusion detection systemIPv6Key distribution in wireless sensor networksClone (algebra)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessWireless sensor networkInformation SystemsComputer networkInternational Journal on Semantic Web and Information Systems
researchProduct