Search results for "Computer network"
showing 10 items of 1634 documents
EHeBby: An evocative humorist chat-bot
2008
A conversational agent, capable to have a "sense of humor" is presented. The agent can both generate humorous sentences and recognize humoristic expressions introduced by the user during the dialogue. EHeBby is an entertainment oriented conversational agent implemented using the ALICE framework embedded into an Yahoo! Messenger client. It is characterized by two areas: a rational, rule-based area and an evocative area. The first one is based on well founded techniques of computational humor and a standard AIML KB. The second one is based on a conceptual space, automatically induced by a corpus of funny documents, where KB items and user sentences are mapped. This area emulates an associativ…
A Survey on Proxy Mobile IPv6 Handover
2016
[EN] As wireless technologies have been improving in recent years, a mobility management mechanism is required to provide seamless and ubiquitous mobility for end users who are roaming among points of attachment in wireless networks. Thus, Mobile IPv6 was developed by the Internet Engineering Task Force (IETF) to support the mobility service. However, Mobile IPv6 is unable to fulfill the requirements of real-time applications, such as video streaming service and voice over IP service, due to its high handover (HO) latency. To address this problem, Proxy Mobile IPv6 (PMIPv6) has been introduced by the IETF. In PMIPv6, which is a network-based approach, the serving network controls mobility m…
Private–Public Partnerships as Strategic Alliances
2008
A new approach to the design of concession contracts of port infrastructures that adapts some of the methods used in the design and start-up of strategic alliances is presented. From a cost–benefit analysis of the project, based on the industry benchmarks, a revenue-sharing model dependent on the investment interest and the risk undertaken or transferred by each partner was formulated. This model aids in the calculation of the amount of the canons (lease and royalty charges) that should be stated in the contract. Also, to avoid complicated renegotiations and undesired deadlock situations, methods are presented for the dynamic actualization of such canons according to changes that might occ…
The influence of financial features and country characteristics on B2B ICOs’ website traffic
2021
Abstract Technology, blockchain, and initial coin offerings (ICOs) have changed the established ways of financing companies and doing business. The changes that affect organizational communications, specifically marketing communications, remain unclear, especially in the context of business-to-business (B2B) organizations. The current trend is for B2B companies to view social media as an optimal way to enhance lasting and valuable relationships with other companies. There is little research on social media marketing strategies by B2B organizations. To fill this gap, this study uses a sample of 57 B2B ICOs completed by December 2019 and qualitative comparative analysis to examine how the com…
Usability analysis of a novel biometric authentication approach for android-based mobile devices
2014
Mobile devices are widely replacing the standard personal computers thanks to their small size and user-friendly use. As a consequence, the amount of information, often confidential, exchanged through these devices is raising. This makes them potential targets of malicious network hackers. The use of simple passwords or PIN are not sufficient to provide a suitable security level for those applications requiring high protection levels on data and services. In this paper a biometric authentication system, as a running Android application, has been developed and implemented on a real mobile device. A system test on real users has been also carried out in order to evaluate the human-machine int…
Hybrid chaotic firefly decision making model for Parkinson’s disease diagnosis
2020
Parkinson’s disease is found as a progressive neurodegenerative condition which affects motor circuit by the loss of up to 70% of dopaminergic neurons. Thus, diagnosing the early stages of incidence is of great importance. In this article, a novel chaos-based stochastic model is proposed by combining the characteristics of chaotic firefly algorithm with Kernel-based Naïve Bayes (KNB) algorithm for diagnosis of Parkinson’s disease at an early stage. The efficiency of the model is tested on a voice measurement dataset that is collected from “UC Irvine Machine Learning Repository.” The dynamics of chaos optimization algorithm will enhance the firefly algorithm by introducing six types of chao…
Firewall as a service in SDN OpenFlow network
2015
Protecting publicly available servers in internet today is a serious challenge, especially when encountering Distributed denial-of-service (DDoS) attacks. In traditional internet, there is narrow scope of choices one can take when ingress traffic overloads physical connection limits. This paper proposes Firewall as a service in internet service providers (ISP) networks allowing end users to request and install match-action rules in ISPs edge routers. In proposed scenario, ISP runs Software Defined Networking environment where control plane is separated from data plane utilizing OpenFlow protocol and ONOS controller. For interaction between end-users and SDN Controller author defines an Appl…
Semiactive–passive structural vibration control strategy for adjacent structures under seismic excitation
2012
Abstract The objective of this paper is to study a structural vibration control strategy for seismic protection of multi-structure systems that combines interstructure passive damping elements with local feedback control systems implemented in the substructures. These local feedback control systems are independently designed and operated, and use semiactive devices with limited actuation capacity as force actuators. The combined action of local semiactive feedback control systems and passive interstructure links can produce an appropriate reduction in the substructures' vibrational response and, simultaneously, provides additional protection against interstructure collisions. The proposed s…
Cognitive Radio Application for Smart Grid
2012
The communication infrastructure between energy generation, transmission, distribution and utilization will require multi-way communications, interoperability between the advanced and existing system, and end-to-end reliable and secure communications with low-latencies. Revolutionary communication architecture is required for effective operation and control of smart grid, and cognitive radio based communication architecture can provide a unique solution. By leveraging cognitive radio technology, the suggested communications infrastructure promises to utilize potentially all available spectrum resources efficiently in the smart grid. The radio agility allows the smart grid devices to sense t…
Enabling ubiquitous wireless sensor networks: A new fault tolerant RF architecture with perpetual electrical power based on 802.15.4 and RFID
2007
The wireless communications field is in continuous growth and revolution. The current trend toward the use of distributed wireless systems is due to these systems have demonstrated to be a good option due to its flexibility and power. In this line, nowadays there is an enormous demand of wireless connectivity for any industrial control applications, included critical systems. In this paper, we want to discuss possibilities and necessary developments to set up wireless communication for industrial applications in general and critical systems in particular. Furthermore, an abstract definition of a layered architecture for the development of intelligent and distributed control systems based on…