Search results for "Computer network"
showing 10 items of 1634 documents
Reversal of Gender Disparity in Journalism Education- Study of Ghana Institute of Journalism
2017
Journalism has practically become a feminine profession across the world. To understand the root of the flow of women into the Journalism profession it is pertinent to begin at the university education level. Gallagher’s 1992 worldwide survey of female students in 83 journalism institutions reveals a significant increase in number of female students. Djerf-Pierre (2007) and others argue along Bourdieu’s conception of education as a form of social capital which empowers, enables and enhances women’s competitiveness in a pre-dominantly androgynous social arena. The study analyses 16 years of enrolment data of the Academic Affairs Unit of the Ghana Institute of Journalism (GIJ), a leading Jour…
Data Analytics in Healthcare: A Tertiary Study
2022
AbstractThe field of healthcare has seen a rapid increase in the applications of data analytics during the last decades. By utilizing different data analytic solutions, healthcare areas such as medical image analysis, disease recognition, outbreak monitoring, and clinical decision support have been automated to various degrees. Consequently, the intersection of healthcare and data analytics has received scientific attention to the point of numerous secondary studies. We analyze studies on healthcare data analytics, and provide a wide overview of the subject. This is a tertiary study, i.e., a systematic review of systematic reviews. We identified 45 systematic secondary studies on data analy…
On achieving intelligent traffic-aware consolidation of virtual machines in a data center using Learning Automata
2018
Unlike the computational mechanisms of the past many decades, that involved individual (extremely powerful) computers or clusters of machines, cloud computing (CC) is becoming increasingly pertinent and popular. Computing resources such as CPU and storage are becoming cheaper, and the servers themselves are becoming more powerful. This enables clouds to host more virtual machines (VMs). A natural consequence ofthis is that many modern-day data centers experience very high internaltraffic within the data centers themselves. This is, of course, due to the occurrence of servers that belong to the same tenant, communicating between themselves. The problem is accentuated when the VM deployment t…
IEEE Access Special Section Editorial : Cloud and Big Data-Based Next-Generation Cognitive Radio Networks
2019
In cognitive radio networks (CRN), secondary users (SUs) are required to detect the presence of the licensed users, known as primary users (PUs), and to find spectrum holes for opportunistic spectrum access without causing harmful interference to PUs. However, due to complicated data processing, non-real-time information exchange and limited memory, SUs often suffer from imperfect sensing and unreliable spectrum access. Cloud computing can solve this problem by allowing the data to be stored and processed in a shared environment. Furthermore, the information from a massive number of SUs allows for more comprehensive information exchanges to assist the resource allocation and interference ma…
Energy Efficient Scheduling in Content Distribution Collaborative Mobile Clusters
2020
Most of the existing literatures on green communications aimed to improve the energy efficiency at the base station or data server. However, in order to fully experience high rate broadband multimedia services, prolonging the battery life of user equipment is also critical for the mobile terminals, especially for the smartphone users. In this work, we investigate the problem of designing a content distribution mobile platform named collaborative mobile clusters (CMC) via user cooperation to reduce the energy consumption at the terminal side. Specifically, given numbers of users interested in downloading a common content from the operator, both centralized and distributed user grouping and s…
Analysis of the Past Lifetime in a Replacement Model through Stochastic Comparisons and Differential Entropy
2020
A suitable replacement model for random lifetimes is extended to the context of past lifetimes. At a fixed time u an item is planned to be replaced by another one having the same age but a different lifetime distribution. We investigate the past lifetime of this system, given that at a larger time t the system is found to be failed. Subsequently, we perform some stochastic comparisons between the random lifetimes of the single items and the doubly truncated random variable that describes the system lifetime. Moreover, we consider the relative ratio of improvement evaluated at x &isin
Bio-Eco-Analysis for Risk Factors using GIS Software
2013
Agriculture is a business sector ideally suited for the application of Geographic Information Systems (GIS) because it is natural resource based, requires the movement, distribution, and/or utilization of large quantities of products, goods, and services, and is increasingly required to record details of its business operations from the field to the marketplace. Nearly all agricultural data has some form of spatial component, and a GIS allows you to visualize information that might otherwise be difficult to interpret. Environment has a major impact on agriculture. In this paper we presented how GIS software can be used to analyze risk factors that influence agricultural production naturally…
ARQ Aware Scheduling for the IEEE 802.16 Base Station
2008
The IEEE 802.16 technology defines the ARQ mechanism that enables a connection to resend data at the MAC level if an error is detected. In this paper, we analyze the ARQ aware scheduling for the 802.16 base station. In particular, we consider how the BS scheduler can account for the ARQ block size, absence of the ARQ block rearrangement, and the ARQ transmission window. We propose a set of constraints that can be applied to any base station scheduler algorithm. To test them, we run a number of simulation scenarios. The simulations results confirm that the ARQ aware scheduling can improve the overall performance.
Performance analysis of the ieee 802.16 arq mechanism
2007
The IEEE 802.16 technology defines the ARQ mechanism that enables a connection to resend data at the MAC level if an error is detected. In this paper, we analyze the key features and parameters of the 802.16 ARQ mechanism. In particular, we consider a choice for the ARQ feedback type, an algorithm to build block sequences, a scheduling of the ARQ feedbacks and retransmissions, the ARQ block rearrangement, ARQ transmission window and ARQ block size. We run a number of simulation scenarios to study these parameters and how they impact a performance of application protocols. The simulation results reveal that the ARQ mechanism and its correct configuration play an important role in transmittin…
On ARQ feedback intensity of the IEEE 802.16 ARQ mechanism
2008
The IEEE 802.16 standard defines the ARQ mechanism as a part of the MAC layer. The functioning of the ARQ mechanism depends on a number of parameters. The IEEE 802.16 specification defines them but it does not provide concrete values and solutions. We ran simulation scenarios to study how the ARQ feedback intensity impacts the performance of application protocols. The simulation results reveal that a low ARQ feedback intensity results only in a marginal improvement. Though it is possible to optimize the ARQ feedback intensity, it is reasonable to rely upon more frequent ARQ feedback messages as they do not result in a performance degradation. At the same time, ARQ connections, which work on…