Search results for "Networks"

showing 10 items of 3260 documents

Segmenting the audience of a cause-related marketing viral campaign

2021

Abstract This paper analyses the attitudinal effect of a cause-related marketing campaign which becomes viral through social networks. This attitudinal response is observed in three Internet user segments with different affinity levels: i) strong (familiar with the sponsoring brand and the promoted cause); ii) intermediate (familiar with the brand or the cause); and iii) weak (without previous experiences of either the brand or the social cause). To develop our experiment, 360 Internet surfers agree to participate. Their attitudes were measured before and after the showing of a viral spot in which a pet food brand encourages pet adoption. Our results show that a viral campaign works perfect…

Computer Networks and Communicationsbusiness.industry05 social sciences02 engineering and technologyLibrary and Information SciencesPet foodMarket segmentation020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineering050211 marketingThe InternetMarketing campaignMarketingbusinesshealth care economics and organizationsInformation SystemsInternational Journal of Information Management
researchProduct

Default effects in app selection: German adolescents’ tendency to adhere to privacy or social relatedness features in smartphone apps

2019

Cognitive biases such as default effects impact on user preferences for a broad range of different choices. This paper investigates these default effects among adolescents configuring apps that either satisfy relatedness or enhance autonomy by protecting privacy. Relatedness and privacy are two innate needs that adolescents can satisfy with the use of smartphone apps. This study argues that adolescents’ choice of features supporting either privacy protection or social relatedness is a consequence of default effects, so that adolescents adhere to preselected defaults. We test this assumption in an experimental survey design including four app configuration tasks with N = 280 German adolesce…

Computer Networks and Communicationsbusiness.industryCommunicationInternet privacyCognitive biaslanguage.human_languageGermanSmartphone appMedia TechnologylanguagePsychologybusinessSelection (genetic algorithm)Range (computer programming)Social relatednessMobile Media & Communication
researchProduct

An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility

2017

Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors de…

Computer Networks and Communicationsbusiness.industryComputer science020206 networking & telecommunications02 engineering and technologyIntrusion detection systemIPv6Key distribution in wireless sensor networksClone (algebra)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessWireless sensor networkInformation SystemsComputer networkInternational Journal on Semantic Web and Information Systems
researchProduct

The generalized method of equal areas for the design of sum-of-cisoids simulators for mobile Rayleigh fading channels with arbitrary Doppler spectra

2011

We present in this paper a generalized version of the method of equal areas (MEA) that is well suited for the design of sum-of-cisoids (SOC) simulators for narrowband mobile Rayleigh fading channels characterized by any type of Doppler power spectral densities (DPSDs). Unlike the original MEA, the generalized MEA (GMEA) can be applied to the simulation of fading channels with asymmetrical DPSDs. This is an important feature because the simulation of such channels is of great interest for the laboratory analysis of mobile communication systems under non-isotropic scattering conditions. We show that irrespective of the underlying DPSD, the GMEA results in a very good approximation to the auto…

Computer Networks and Communicationsbusiness.industryComputer scienceAutocorrelationPower (physics)symbols.namesakeNarrowbandsymbolsFadingElectrical and Electronic EngineeringTelecommunicationsbusinessEnvelope (mathematics)Doppler effectAlgorithmComputer Science::Information TheoryInformation SystemsCommunication channelRayleigh fadingWireless Communications and Mobile Computing
researchProduct

Performance of power control in inter-cell interference coordination for frequency reuse

2010

To mitigate inter-cell interference in 3G evolution systems, a novel inter-cell interference coordination scheme called soft fractional frequency reuse is proposed in this article, which enables to improve the data rate in cell-edge. On this basis, an inter-cell power control is presented for the inter-cell interference coordination, and the inter-cell balanced signal to interference plus noise ratio (SINR) among users is established for power allocation, which enables mitigation of inter-cell interference. Especially, the power control is based on a novel exponential kernel equation at higher convergence speed than the traditional arithmetic kernel equations. Numerical results show that th…

Computer Networks and Communicationsbusiness.industryComputer scienceBlocking (statistics)Interference (wave propagation)Quantitative Biology::Cell BehaviorPower (physics)Exponential functionTelecomunicacióKernel (statistics)Signal ProcessingConvergence (routing)Electronic engineeringTelecommunicationsbusinessComunicació i tecnologiaThroughput (business)Information SystemsPower controlThe Journal of China Universities of Posts and Telecommunications
researchProduct

An optimized mass storage FFT for vector computers

1995

Abstract The performance of a segmented FFT algorithm which allows the out-of-core computation of the Fourier transform of a very large mass storage data array is presented. The code is particularly optimized for vector computers. Tests performed mainly on a CONVEX C210 vector computer showed that, for very long transforms, tuning of the main parameters involved leads to computation speed and global efficiency better than for FFTs performed in-core. The use of tunable parameters allows optimization of the algorithm on machines with different configurations.

Computer Networks and Communicationsbusiness.industryComputer scienceComputationFast Fourier transformPrime-factor FFT algorithmArray data typeComputer Graphics and Computer-Aided DesignTheoretical Computer ScienceVector processorsymbols.namesakeFourier transformSplit-radix FFT algorithmArtificial IntelligenceHardware and ArchitectureComputer data storagesymbolsbusinessAlgorithmSoftwareParallel Computing
researchProduct

Cell Association With Load Balancing in Nonuniform Heterogeneous Cellular Networks: Coverage Probability and Rate Analysis

2017

To meet the ever-growing traffic demand and address the cell capacity shortage problem, associating end users to various tiers of cells in a multitier cellular network appears to be a promising approach. In this paper, we consider a nonuniform heterogeneous cellular network (NuHCN) and propose a cell association scheme that selectively mutes certain small-cell base stations (BSs) and covers end users by cell range extension (via cell biasing) for achieving load balancing. The envisaged NuHCN is comprised of two tiers of BSs, i.e., macro- and small-cell BSs, deployed according to three independent homogeneous Poisson point processes for BSs and end users, respectively. Accordingly, the avail…

Computer Networks and Communicationsbusiness.industryComputer scienceCoverage probabilityAerospace Engineering020206 networking & telecommunications020302 automobile design & engineering02 engineering and technologyLoad balancing (computing)Load managementBase station0203 mechanical engineeringAutomotive Engineering0202 electrical engineering electronic engineering information engineeringCellular networkMicrocellMacrocellElectrical and Electronic EngineeringbusinessComputer networkIEEE Transactions on Vehicular Technology
researchProduct

Cloud-based elastic architecture for distributed video encoding: Evaluating H.265, VP9, and AV1

2020

Abstract Areas with social and business impact such as entertainment, healthcare, surveillance, and e-learning would benefit from improvements in video coding and transcoding services. New codecs, such as AV1, are being developed to deal with new demands for high video resolutions with bandwidth constraints and quality requirements. However, these new codecs have high computational requirements and new strategies are needed to accelerate their processing. Cloud computing offers interesting features such as on-demand resource allocation, multitenancy, elasticity, and resiliency among others. Deploying video coding and transcoding services on these infrastructures is suitable because it allow…

Computer Networks and Communicationsbusiness.industryComputer scienceDistributed computing020206 networking & telecommunicationsCloud computing02 engineering and technologyTranscodingcomputer.software_genreComputer Science ApplicationsHardware and ArchitectureVideo encodingServerScalability0202 electrical engineering electronic engineering information engineeringCodec020201 artificial intelligence & image processingbusinessEncodercomputerJournal of Network and Computer Applications
researchProduct

A new system architecture for crowd simulation

2009

Crowd simulation requires both rendering visually plausible images and managing the behavior of autonomous agents. Therefore, these applications need an efficient design that allows them to simultaneously handle these two requirements. Although several proposals have focused on the software architectures for these systems, no proposals have focused on the computer systems supporting them. In this paper, we analyze the computer architectures used in the literature to support distributed virtual environments. Also, we propose a distributed computer architecture which is efficient enough to support simulations of thousand of autonomous agents. This proposal consists of a cluster of interconnec…

Computer Networks and Communicationsbusiness.industryComputer scienceDistributed computingAutonomous agentComputer Science ApplicationsSoftwareHardware and ArchitectureRobustness (computer science)Embedded systemScalabilitySystems architectureReference architectureCrowd simulationSoftware architecturebusinessJournal of Network and Computer Applications
researchProduct

Comparison of WSN and IoT approaches for a real-time monitoring system of meal distribution trolleys: A case study

2018

Abstract International regulations determine that food in hospitals and elderly homes must be served at given temperature ranges. However, the real-time surveillance of the meal distribution trolleys along all the institutions facilities, guaranteeing conformity to rules from the instant when all the meals are put in the distribution trolley until they are delivered to the patients, is still a challenge. In this paper, we present a comparison of two approaches based on Wireless Sensor Networks (WSN) and Internet of Things (IoT) technologies for implementing a Real-Time Monitoring System of Meal Distribution Trolleys in a hospital. The performance evaluation results show that the IoT impleme…

Computer Networks and Communicationsbusiness.industryComputer scienceElderly homesLatency (audio)Distribution (economics)020206 networking & telecommunicationsMonitoring system02 engineering and technologyHardware and Architecture0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingInternet of ThingsbusinessSoftwareComputer networkFuture Generation Computer Systems
researchProduct