Search results for "Network"

showing 10 items of 7718 documents

Effect of network pressure on apparent losses due to meters under-registration

2010

starting flowwater meter under-registrationnetwork pressureApparent losse
researchProduct

A Statecharts-Based Approach for WSN Application Development

2020

Wireless Sensor Network (WSN) software development challenges developers in two main ways: through system programming, which requires expertise in hardware and network management

statechartsprogramming frameworklcsh:Twireless sensorComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSsensoriverkotWSN applicationohjelmointiohjelmistokehityslcsh:TechnologyWSNJournal of Sensor and Actuator Networks
researchProduct

Statistical validation of investment decisions and transactions in financial markets

statistical validation network science behavioral finance order book speculative bubbles
researchProduct

Elasticity and stiffness evolution in random fibre networks

2003

stiffnessrandom fibre networkselasticity
researchProduct

Aftermarket strategy and business networks : case study of a hydraulic motor firm

2018

The aftermarket is a big potential for any business as it can be more profitable than sales of the primary product. Previous aftermarket studies are focused on a supply chain approach to the aftermarket using pricing and logistics strategies for different types of industrial markets and limited to case studies from the automotive industry. Small to medium sized enterprises such as hydraulic motor companies have gained international markets due to their technological superiority and have reached niche market segments all over the world. This research aimed to create a profitable aftermarket strategy for a hydraulic motor company with an international niche market. The unique challenges of th…

strategiataftermarketbusiness networksniche marketindustrial marketinternationalizationkansainvälistyminen
researchProduct

The Role of Leadership in Complex Strategic Networks: Enabling Effect Versus Emergence

2013

In today's knowledge-based economy, the sources of competitive advantage lie more and more in webs of interactions among a variety of actors (such as firms, universities, research organizations, government institutions and so on), that over time originate the emergence of strategic networks. The paper aims to shed light on the determinants of network interaction and the ensuing processes of knowledge and resource transfer and circulation, on which the networkbased sources of competitive advantage are rooted. Accordingly, by means of the adoption of the complexity system perspective, on the one hand, we underscore the emergent nature of network interactions stemming from the self-organizing …

strategic network complex adaptive system emergence complex network leadership enabling leadership effectsSettore SECS-P/08 - Economia E Gestione Delle Imprese
researchProduct

COMMUNITY DETECTION IN TRIPARTITE NETWORKS OF UNIVERSITY STUDENT MOBILITY FLOWS

2021

The purpose of this study is to explore how the multimode network approach can be used to analyse network patterns derived from student mobility flows. We define a tripartite network based on a three-mode data structure, consisting of Italian provinces of residence, universities and fields of study, with student exchanges representing the links between them. A comparison of algorithms for detecting communities from tripartite networks based on modularity optimization is provided, revealing relevant information about the phenomenon under analysis over time. The findings are applied to a real dataset containing micro-level longitudinal information on Italian university students’ careers.

student mobility tripartite networks modularity optimisationstudent mobilitystudent mobility; tripartite networks; modularity optimisationmodularity optimisationtripartite networks
researchProduct

Student mobility in higher education: Sicilian outflow network and chain migrations

2019

The most important student mobility (SM) flow in Italy is from the Southern to the Central-Northern regions, a phenomenon that has been magnified by an increasing number of outgoing students from Sicily over the last decade. In this paper, we rely upon micro-data of university enrollment and students' personal records for three cohorts of freshmen, in order to investigate preferential patterns of SM from Sicily toward universities in other regions. Our main goal is to reveal the existence of chain migrations, where students from a particular geographical area move towards a particular destination to follow other students that have previously moved. The paper provides aspects that are innova…

student mobilitynetworkschain migration
researchProduct

Editorial: Neurobehavioural Mechanisms of Resilience and Vulnerability in Addictive Disorders

2021

substance use disorderanimal modelCognitive NeuroscienceAddictionmedia_common.quotation_subjectvulnerabilityVulnerabilityAlcohol use disorderalcohol use disordermedicine.diseaselcsh:RC321-571Substance abuseBehavioral NeuroscienceNeuropsychology and Physiological PsychologyAnimal modelmedicinePsychologyResilience (network)resiliencelcsh:Neurosciences. Biological psychiatry. NeuropsychiatryClinical psychologymedia_commonFrontiers in Behavioral Neuroscience
researchProduct

Towards Automated Classification of Firmware Images and Identification of Embedded Devices

2017

Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…

sulautettu tietotekniikkaComputer scienceVendorvulnerability02 engineering and technologycomputer.software_genreSoftware020204 information systems0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]tietoturvadata securityhaavoittuvuusbusiness.industryFirmwareFingerprint (computing)020206 networking & telecommunicationsubiquitous computingRandom forestIdentification (information)koneoppiminenmachine learningEmbedded systemUser interfaceHardware_CONTROLSTRUCTURESANDMICROPROGRAMMINGbusinesscomputerPrivate network
researchProduct