Search results for "Network"
showing 10 items of 7718 documents
Effect of network pressure on apparent losses due to meters under-registration
2010
A Statecharts-Based Approach for WSN Application Development
2020
Wireless Sensor Network (WSN) software development challenges developers in two main ways: through system programming, which requires expertise in hardware and network management
Statistical validation of investment decisions and transactions in financial markets
Elasticity and stiffness evolution in random fibre networks
2003
Aftermarket strategy and business networks : case study of a hydraulic motor firm
2018
The aftermarket is a big potential for any business as it can be more profitable than sales of the primary product. Previous aftermarket studies are focused on a supply chain approach to the aftermarket using pricing and logistics strategies for different types of industrial markets and limited to case studies from the automotive industry. Small to medium sized enterprises such as hydraulic motor companies have gained international markets due to their technological superiority and have reached niche market segments all over the world. This research aimed to create a profitable aftermarket strategy for a hydraulic motor company with an international niche market. The unique challenges of th…
The Role of Leadership in Complex Strategic Networks: Enabling Effect Versus Emergence
2013
In today's knowledge-based economy, the sources of competitive advantage lie more and more in webs of interactions among a variety of actors (such as firms, universities, research organizations, government institutions and so on), that over time originate the emergence of strategic networks. The paper aims to shed light on the determinants of network interaction and the ensuing processes of knowledge and resource transfer and circulation, on which the networkbased sources of competitive advantage are rooted. Accordingly, by means of the adoption of the complexity system perspective, on the one hand, we underscore the emergent nature of network interactions stemming from the self-organizing …
COMMUNITY DETECTION IN TRIPARTITE NETWORKS OF UNIVERSITY STUDENT MOBILITY FLOWS
2021
The purpose of this study is to explore how the multimode network approach can be used to analyse network patterns derived from student mobility flows. We define a tripartite network based on a three-mode data structure, consisting of Italian provinces of residence, universities and fields of study, with student exchanges representing the links between them. A comparison of algorithms for detecting communities from tripartite networks based on modularity optimization is provided, revealing relevant information about the phenomenon under analysis over time. The findings are applied to a real dataset containing micro-level longitudinal information on Italian university students’ careers.
Student mobility in higher education: Sicilian outflow network and chain migrations
2019
The most important student mobility (SM) flow in Italy is from the Southern to the Central-Northern regions, a phenomenon that has been magnified by an increasing number of outgoing students from Sicily over the last decade. In this paper, we rely upon micro-data of university enrollment and students' personal records for three cohorts of freshmen, in order to investigate preferential patterns of SM from Sicily toward universities in other regions. Our main goal is to reveal the existence of chain migrations, where students from a particular geographical area move towards a particular destination to follow other students that have previously moved. The paper provides aspects that are innova…
Editorial: Neurobehavioural Mechanisms of Resilience and Vulnerability in Addictive Disorders
2021
Towards Automated Classification of Firmware Images and Identification of Embedded Devices
2017
Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…