Search results for "Information System"

showing 10 items of 2404 documents

Preface: Special issue on arc routing problems and other related topics

2020

Computer Networks and CommunicationsHardware and ArchitectureComputer sciencebusiness.industrybusinessArc routingSoftwareInformation SystemsComputer networkNetworks
researchProduct

Implementation of algorithms forK shortest loopless paths

1986

Implementations of loopless k shortest path algorithms are examined. Efficient storage structures for a large number of paths are given. A fast algorithm for determining the shortest paths in Yen's method is developed. Timing experiments show that a hybrid of Clarke's and Yen's methods is generally the fastest, although not significantly. Using upper bounds for the lengths of paths essentially improves all methods.

Computer Networks and CommunicationsHardware and ArchitectureShortest path problemK shortest path routingFloyd–Warshall algorithmAlgorithmFast algorithmYen's algorithmSoftwareInformation SystemsMathematicsNetworks
researchProduct

Los Estereotipos de género en las producciones audiovisuales: diseño y validación de la tabla de análisis EG_5x4

2022

Los productos culturales de la educación no formal, y en concreto los difundidos por televisión y plataformas streaming, incluidas no ficción y animación infantil, proponen entre sus figuraciones personajes estereotipados en su construcción de género. Según investigaciones previas, identificarlos y combatirlos favorece la erradicación de ideas sexistas relacionadas con violencias machistas. Por ello, el objetivo que se planteó fue diseñar y validar una tabla de análisis de estereotipos sexuales presentes en cualquier producto audiovisual. El proceso siguió un protocolo de 3 fases (Garrido et al., 2015): 1) Se revisó la literatura publicada, se extrajeron rasgos relacionados con estereotipos…

Computer Networks and CommunicationsInstrumentos de MediciónCoeducationCoeducaciónMeasuring InstrumentsComputer Science ApplicationsEducationEstereotipos de GéneroEducación No FormalCiència EnsenyamentEducació socialNonformal EducationGender StereotypesAdolescents Conducta sexualInformation Systems
researchProduct

Seeking Information on Social Commerce: An Examination of the Impact of User- and Marketer-generated Content Through an Eye-tracking Study

2021

Following the growing popularity of social commerce sites, there is an increased interest in understanding how consumers decide what products to purchase based on the available information. Consumers nowadays are confronted with the task of assessing marketer-generated (MGC) as well as user-generated information (UGC) in a range of different forms to make informed purchase-related decisions. This study examines the information types and forms that influence consumers in their decision-making process on social commerce. Building on uses and gratifications and dual-process theories, we distinguish between marketer and user generated content, and differentiate formats into informational and no…

Computer Networks and CommunicationsProcess (engineering)User-generated contentCognitionVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420PopularityTheoretical Computer ScienceTask (project management)Selection (linguistics)Eye trackingNormativeMarketingPsychologyVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550SoftwareInformation SystemsInformation Systems Frontiers
researchProduct

Identifying the combinations of motivations and emotions for creating satisfied users in SNSs: An fsQCA approach

2020

Social Networking Sites (SNSs) play an important role in our daily lives and the number of their users increases regularly. To understand how users can be satisfied in the complex digital environment of SNSs, this study examines how motivations and emotions combine with each other to explain high satisfaction. Users’ motivations comprise four attributes, entertainment, information, social-psychological, and convenience. Emotions are divided into their two main categories, that is positive and negative emotions. We draw on complexity and configuration theories, present a conceptual model along with propositions and perform a fuzzy-set qualitative comparative analysis (fsQCA). Through an empi…

Computer Networks and CommunicationsQualitative comparative analysismedia_common.quotation_subject05 social sciences02 engineering and technologyLibrary and Information SciencesPeer reviewEntertainment020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringConceptual model050211 marketingPsychologyVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Social psychologyInformation Systemsmedia_commonInternational Journal of Information Management
researchProduct

A Wideband MIMO Channel Model Derived From the Geometric Elliptical Scattering Model

2006

In this paper, we present a reference model for a wideband multiple-input multiple-output (MIMO) channel based on the geometric elliptical scattering model. The model takes into account the exact relationship between the angle of departure (AOD) and the angle of arrival (AOA). Based on this relationship, the statistical properties of the reference model are studied. Analytical solutions are presented for the three- dimensional (3D) space-time cross-correlation function (CCF), the temporal autocorrelation function (ACF), the 2D space CCF, and finally the frequency correlation function (FCF). The correlation properties are studied and visualized under the assumption of isotropic as well as no…

Computer Networks and CommunicationsScatteringComputer scienceAutocorrelationMathematical analysisMIMOCorrelation function (statistical mechanics)Channel capacityAngle of arrivalElectrical and Electronic EngineeringWidebandReference modelInformation SystemsComputer Science::Information Theory2006 3rd International Symposium on Wireless Communication Systems
researchProduct

Familiarity with digital twin totality: Exploring the relation and perception of affordances through a Heideggerian perspective

2022

The concept of affordances has become central in information systems literature. However, existing perspectives fall short in providing details on the relational aspect of affordances, which can influence actors' perception of them. To increase granularity and specificity in this regard, researchers have suggested that it be supplemented with other concepts or theories. In this article, we argue that the Heideggerian concepts of ‘familiarity’ and ‘referential totality’ are well suited for increasing our understanding of the relational aspects of affordances in information systems research. To explore this idea, we conducted a case study of a project concerning the development of a digital t…

Computer Networks and CommunicationsVDP::Samfunnsvitenskap: 200::Biblioteks- og informasjonsvitenskap: 320::Informasjons- og kommunikasjonssystemer: 321SoftwareInformation SystemsVDP::Samfunnsvitenskap: 200::Biblioteks- og informasjonsvitenskap: 320
researchProduct

Machine Learning: The Backbone of Intelligent Trade Credit-Based Systems

2022

Technology has turned into a significant differentiator in the money and traditional recordkeeping systems for the financial industry. To depict two customers as potential investors, it is mandatory to give the complex innovation that they anticipate and urge to purchase. In any case, it is difficult to keep on top of and be a specialist in each of the new advancements that are accessible. By reappropriating IT administrations, monetary administrations firms can acquire prompt admittance to the most recent ability and direction. Financial systems, along with machine learning (ML) algorithms, are vital for critical concerns like secure financial transactions and automated trading. These are …

Computer Networks and CommunicationsVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Information Systems
researchProduct

Segmenting the audience of a cause-related marketing viral campaign

2021

Abstract This paper analyses the attitudinal effect of a cause-related marketing campaign which becomes viral through social networks. This attitudinal response is observed in three Internet user segments with different affinity levels: i) strong (familiar with the sponsoring brand and the promoted cause); ii) intermediate (familiar with the brand or the cause); and iii) weak (without previous experiences of either the brand or the social cause). To develop our experiment, 360 Internet surfers agree to participate. Their attitudes were measured before and after the showing of a viral spot in which a pet food brand encourages pet adoption. Our results show that a viral campaign works perfect…

Computer Networks and Communicationsbusiness.industry05 social sciences02 engineering and technologyLibrary and Information SciencesPet foodMarket segmentation020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineering050211 marketingThe InternetMarketing campaignMarketingbusinesshealth care economics and organizationsInformation SystemsInternational Journal of Information Management
researchProduct

An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility

2017

Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors de…

Computer Networks and Communicationsbusiness.industryComputer science020206 networking & telecommunications02 engineering and technologyIntrusion detection systemIPv6Key distribution in wireless sensor networksClone (algebra)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessWireless sensor networkInformation SystemsComputer networkInternational Journal on Semantic Web and Information Systems
researchProduct