Search results for "Computer network"
showing 10 items of 1634 documents
The Mediation of Politics through Twitter: An Analysis of Messages posted during the Campaign for the German Federal Election 2013
2015
Patterns found in digital trace data are increasingly used as evidence of social phenomena. Still, the role of digital services not as mirrors but instead as mediators of social reality has been neglected. We identify characteristics of this mediation process by analyzing Twitter messages referring to politics during the campaign for the German federal election 2013 and comparing the thus emerging image of political reality with established measurements of political reality. We focus on the relationship between temporal dynamics in politically relevant Twitter messages and crucial campaign events, comparing dominant topics in politically relevant tweets with topics prominent in surveys and …
Distinct Patterns of Functional Connectivity During the Comprehension of Natural, Narrative Speech.
2020
Recent continuous task studies, such as narrative speech comprehension, show that fluctuations in brain functional connectivity (FC) are altered and enhanced compared to the resting state. Here, we characterized the fluctuations in FC during comprehension of speech and time-reversed speech conditions. The correlations of Hilbert envelope of source-level EEG data were used to quantify FC between spatially separate brain regions. A symmetric multivariate leakage correction was applied to address the signal leakage issue before calculating FC. The dynamic FC was estimated based on a sliding time window. Then, principal component analysis (PCA) was performed on individually concatenated and te…
On the first- and second-order statistics of the capacity of N*Nakagami-m channels for applications in cooperative networks
2012
This article deals with the derivation and analysis of the statistical properties of the instantaneous channel capacitya of N*Nakagami-m channels, which has been recently introduced as a suitable stochastic model for multihop fading channels. We have derived exact analytical expressions for the probability density function (PDF), cumulative distribution function (CDF), level-crossing rate (LCR), and average duration of fades (ADF) of the instantaneous channel capacity of N*Nakagami-m channels. For large number of hops, we have studied the first-order statistics of the instantaneous channel capacity by assuming that the fading amplitude of the channel can approximately be modeled as a lognor…
Evaluation of Deep Learning and Conventional Approaches for Image Recaptured Detection in Multimedia Forensics
2022
Image recaptured from a high-resolution LED screen or a good quality printer is difficult to distinguish from its original counterpart. The forensic community paid less attention to this type of forgery than to other image alterations such as splicing, copy-move, removal, or image retouching. It is significant to develop secure and automatic techniques to distinguish real and recaptured images without prior knowledge. Image manipulation traces can be hidden using recaptured images. For this reason, being able to detect recapture images becomes a hot research topic for a forensic analyst. The attacker can recapture the manipulated images to fool image forensic system. As far as we know, ther…
Familiarity with digital twin totality: Exploring the relation and perception of affordances through a Heideggerian perspective
2022
The concept of affordances has become central in information systems literature. However, existing perspectives fall short in providing details on the relational aspect of affordances, which can influence actors' perception of them. To increase granularity and specificity in this regard, researchers have suggested that it be supplemented with other concepts or theories. In this article, we argue that the Heideggerian concepts of ‘familiarity’ and ‘referential totality’ are well suited for increasing our understanding of the relational aspects of affordances in information systems research. To explore this idea, we conducted a case study of a project concerning the development of a digital t…
Machine Learning: The Backbone of Intelligent Trade Credit-Based Systems
2022
Technology has turned into a significant differentiator in the money and traditional recordkeeping systems for the financial industry. To depict two customers as potential investors, it is mandatory to give the complex innovation that they anticipate and urge to purchase. In any case, it is difficult to keep on top of and be a specialist in each of the new advancements that are accessible. By reappropriating IT administrations, monetary administrations firms can acquire prompt admittance to the most recent ability and direction. Financial systems, along with machine learning (ML) algorithms, are vital for critical concerns like secure financial transactions and automated trading. These are …
SDN@home: A Method for Controlling Future Wireless Home Networks
2016
Recent advances in wireless networking technologies are leading toward the proliferation of novel home network applications. However, the landscape of emerging scenarios is fragmented due to their varying technological requirements and the heterogeneity of current wireless technologies. We argue that the development of flexible software-defined wireless architectures, including such efforts as the wireless MAC processor, coupled with SDN concepts, will enable the support of both emerging and future home applications. In this article, we first identify problems with managing current home networks composed of separate network segments governed by different technologies. Second, we point out t…
Segmenting the audience of a cause-related marketing viral campaign
2021
Abstract This paper analyses the attitudinal effect of a cause-related marketing campaign which becomes viral through social networks. This attitudinal response is observed in three Internet user segments with different affinity levels: i) strong (familiar with the sponsoring brand and the promoted cause); ii) intermediate (familiar with the brand or the cause); and iii) weak (without previous experiences of either the brand or the social cause). To develop our experiment, 360 Internet surfers agree to participate. Their attitudes were measured before and after the showing of a viral spot in which a pet food brand encourages pet adoption. Our results show that a viral campaign works perfect…
Default effects in app selection: German adolescents’ tendency to adhere to privacy or social relatedness features in smartphone apps
2019
Cognitive biases such as default effects impact on user preferences for a broad range of different choices. This paper investigates these default effects among adolescents configuring apps that either satisfy relatedness or enhance autonomy by protecting privacy. Relatedness and privacy are two innate needs that adolescents can satisfy with the use of smartphone apps. This study argues that adolescents’ choice of features supporting either privacy protection or social relatedness is a consequence of default effects, so that adolescents adhere to preselected defaults. We test this assumption in an experimental survey design including four app configuration tasks with N = 280 German adolesce…
An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility
2017
Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors de…