Search results for "Information Systems"
showing 10 items of 1926 documents
Familiarity with digital twin totality: Exploring the relation and perception of affordances through a Heideggerian perspective
2022
The concept of affordances has become central in information systems literature. However, existing perspectives fall short in providing details on the relational aspect of affordances, which can influence actors' perception of them. To increase granularity and specificity in this regard, researchers have suggested that it be supplemented with other concepts or theories. In this article, we argue that the Heideggerian concepts of ‘familiarity’ and ‘referential totality’ are well suited for increasing our understanding of the relational aspects of affordances in information systems research. To explore this idea, we conducted a case study of a project concerning the development of a digital t…
Machine Learning: The Backbone of Intelligent Trade Credit-Based Systems
2022
Technology has turned into a significant differentiator in the money and traditional recordkeeping systems for the financial industry. To depict two customers as potential investors, it is mandatory to give the complex innovation that they anticipate and urge to purchase. In any case, it is difficult to keep on top of and be a specialist in each of the new advancements that are accessible. By reappropriating IT administrations, monetary administrations firms can acquire prompt admittance to the most recent ability and direction. Financial systems, along with machine learning (ML) algorithms, are vital for critical concerns like secure financial transactions and automated trading. These are …
Segmenting the audience of a cause-related marketing viral campaign
2021
Abstract This paper analyses the attitudinal effect of a cause-related marketing campaign which becomes viral through social networks. This attitudinal response is observed in three Internet user segments with different affinity levels: i) strong (familiar with the sponsoring brand and the promoted cause); ii) intermediate (familiar with the brand or the cause); and iii) weak (without previous experiences of either the brand or the social cause). To develop our experiment, 360 Internet surfers agree to participate. Their attitudes were measured before and after the showing of a viral spot in which a pet food brand encourages pet adoption. Our results show that a viral campaign works perfect…
An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility
2017
Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors de…
The generalized method of equal areas for the design of sum-of-cisoids simulators for mobile Rayleigh fading channels with arbitrary Doppler spectra
2011
We present in this paper a generalized version of the method of equal areas (MEA) that is well suited for the design of sum-of-cisoids (SOC) simulators for narrowband mobile Rayleigh fading channels characterized by any type of Doppler power spectral densities (DPSDs). Unlike the original MEA, the generalized MEA (GMEA) can be applied to the simulation of fading channels with asymmetrical DPSDs. This is an important feature because the simulation of such channels is of great interest for the laboratory analysis of mobile communication systems under non-isotropic scattering conditions. We show that irrespective of the underlying DPSD, the GMEA results in a very good approximation to the auto…
Performance of power control in inter-cell interference coordination for frequency reuse
2010
To mitigate inter-cell interference in 3G evolution systems, a novel inter-cell interference coordination scheme called soft fractional frequency reuse is proposed in this article, which enables to improve the data rate in cell-edge. On this basis, an inter-cell power control is presented for the inter-cell interference coordination, and the inter-cell balanced signal to interference plus noise ratio (SINR) among users is established for power allocation, which enables mitigation of inter-cell interference. Especially, the power control is based on a novel exponential kernel equation at higher convergence speed than the traditional arithmetic kernel equations. Numerical results show that th…
Mobile Ontologies
2008
The number of mobile subscribers in the world is soon reaching the three billion mark. According to the newest estimates, majority of the subscribers are already in the developing countries, whereas the number of subscribers in the industrialized countries is about to stagnate around one billion. Because especially in the developing countries the only access to Internet are mobile devices, developing high quality services based on them grows in importance. Ontologies are an important ingredient towards more complicated mobile services and wider usage of mobile terminals. In this article, we first discuss ontology and epistemology concepts in general. After that, we review ontologies in the …
Does higher datarate perform better in IEEE 802.11-based multihop ad hoc networks?
2007
Due to the nature that high datarate leads to shorter transmission range, the performance enhancement by high datarate 802.11 WLANs may be degraded when applying high datarate to an 802.11 based multihop ad hoc network. In this paper, we evaluate, through extensive simulations, the performance of multihop ad hoc networks at multiple transmission datarates, in terms of the number of hops between source and destination, throughput, end-to-end delay and packet loss. The study is conducted based on both stationary chain topology and mesh topologies with or without node mobility. From numerical results on network performance based on chain topology, we conclude that there is almost no benefit by…
Channel-dependent load balancing in wireless packet networks
2004
This paper refers to a wireless cellular packet network scenario where fast retransmission of corrupted packets is used to improve the packet error ratio. Since the ‘gross’ packet transmission rate (including retransmission) depends on the channel quality perceived, admitted calls weight unevenly in terms of effective resource consumption. In this paper, we suggest using channel quality information to drive load balancing mechanisms. We propose two novel metrics to determine the best cell to attach to, during handover or new call origination. Extensive simulation results prove the superiority of our proposed schemes with respect to traditional load balancing, which base their operation on t…
User behaviours after critical mobile application incidents: the relationship with situational context
2015
Users occasionally have critical incidents with information systems IS. A critical IS incident is an IS product or service experience that a user considers to be unusually positive or negative. Critical IS incidents are highly influential in terms of users' overall perceptions and customer relationships; thus, they are crucial for IS product and service providers. Therefore, it is important to study user behaviours after such incidents. Within IS, the relationships between the situational context and user behaviours after critical incidents have not been addressed at all. Prior studies on general mobile use as a related research area have recognized the influence of the situational context,…