Search results for "SJ"

showing 10 items of 2539 documents

Doppler Shift Characterization of Wideband Mobile Radio Channels

2019

The prevailing approach for characterizing the Doppler shift (DS) of mobile radio channels assumes the transmission of an unmodulated carrier. This consideration is valid for the analysis of narrowband channels, but its pertinence is questionable in regards to the modeling of wideband channels. In this correspondence, we redefine the DS from a time-frequency analysis perspective that does not depend on the aforementioned assumption. We systematically demonstrate that the DS can be characterized by the instantaneous frequency of the channel transfer function. This generic definition makes evident a fundamental aspect of the DS that is seldom acknowledged, namely, the DS is a frequency-varyin…

Computer Networks and CommunicationsComputer sciencePerspective (graphical)Aerospace EngineeringPropagation delayInstantaneous phaseVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420symbols.namesakeNarrowbandTransmission (telecommunications)Automotive EngineeringsymbolsElectronic engineeringElectrical and Electronic EngineeringWidebandDoppler effectVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Communication channel
researchProduct

Fuzzy-set Qualitative Comparative Analysis (fsQCA): Guidelines for research practice in Information Systems and marketing

2021

Abstract The increasing interest in fuzzy-set Qualitative Comparative Analysis (fsQCA) in Information Systems and marketing raises the need for a tutorial paper that discusses the basic concepts and principles of the method, provide answers to typical questions that editors, reviewers, and authors would have when dealing with a new tool of analysis, and practically guide researchers on how to employ fsQCA. This article helps the reader to gain richer information from their data and understand the importance of avoiding shallow information‐from‐data reporting. To this end, it proposes a different research paradigm that includes asymmetric, configurational‐focused case‐outcome theory construc…

Computer Networks and CommunicationsComputer scienceQualitative comparative analysis05 social sciencesFuzzy set02 engineering and technologyVariance (accounting)Library and Information SciencesOutcome (game theory)020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringInformation system050211 marketingMarketingVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Information Systems
researchProduct

Exploring Lightweight Deep Learning Solution for Malware Detection in IoT Constraint Environment

2022

The present era is facing the industrial revolution. Machine-to-Machine (M2M) communication paradigm is becoming prevalent. Resultantly, the computational capabilities are being embedded in everyday objects called things. When connected to the internet, these things create an Internet of Things (IoT). However, the things are resource-constrained devices that have limited computational power. The connectivity of the things with the internet raises the challenges of the security. The user sensitive information processed by the things is also susceptible to the trusability issues. Therefore, the proliferation of cybersecurity risks and malware threat increases the need for enhanced security in…

Computer Networks and CommunicationsHardware and ArchitectureControl and Systems EngineeringSignal ProcessingElectrical and Electronic EngineeringInternet of Things; deep learning; natural language processing; RNN; LSTM; malware detectionVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420Electronics; Volume 11; Issue 24; Pages: 4147
researchProduct

Methodology for Structured Data-Path Implementation in VLSI Physical Design: A Case Study

2022

State-of-the-art modern microprocessor and domain-specific accelerator designs are dominated by data-paths composed of regular structures, also known as bit-slices. Random logic placement and routing techniques may not result in an optimal layout for these data-path-dominated designs. As a result, implementation tools such as Cadence’s Innovus include a Structured Data-Path (SDP) feature that allows data-path placement to be completely customized by constraining the placement engine. A relative placement file is used to provide these constraints to the tool. However, the tool neither extracts nor automatically places the regular data-path structures. In other words, the relative placement f…

Computer Networks and CommunicationsHardware and ArchitectureControl and Systems Engineeringdata-path; placement; routing; innovus; electronic design automation; physical designSignal ProcessingElectrical and Electronic EngineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Electronics
researchProduct

Seeking Information on Social Commerce: An Examination of the Impact of User- and Marketer-generated Content Through an Eye-tracking Study

2021

Following the growing popularity of social commerce sites, there is an increased interest in understanding how consumers decide what products to purchase based on the available information. Consumers nowadays are confronted with the task of assessing marketer-generated (MGC) as well as user-generated information (UGC) in a range of different forms to make informed purchase-related decisions. This study examines the information types and forms that influence consumers in their decision-making process on social commerce. Building on uses and gratifications and dual-process theories, we distinguish between marketer and user generated content, and differentiate formats into informational and no…

Computer Networks and CommunicationsProcess (engineering)User-generated contentCognitionVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420PopularityTheoretical Computer ScienceTask (project management)Selection (linguistics)Eye trackingNormativeMarketingPsychologyVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550SoftwareInformation SystemsInformation Systems Frontiers
researchProduct

Identifying the combinations of motivations and emotions for creating satisfied users in SNSs: An fsQCA approach

2020

Social Networking Sites (SNSs) play an important role in our daily lives and the number of their users increases regularly. To understand how users can be satisfied in the complex digital environment of SNSs, this study examines how motivations and emotions combine with each other to explain high satisfaction. Users’ motivations comprise four attributes, entertainment, information, social-psychological, and convenience. Emotions are divided into their two main categories, that is positive and negative emotions. We draw on complexity and configuration theories, present a conceptual model along with propositions and perform a fuzzy-set qualitative comparative analysis (fsQCA). Through an empi…

Computer Networks and CommunicationsQualitative comparative analysismedia_common.quotation_subject05 social sciences02 engineering and technologyLibrary and Information SciencesPeer reviewEntertainment020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringConceptual model050211 marketingPsychologyVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Social psychologyInformation Systemsmedia_commonInternational Journal of Information Management
researchProduct

Evaluation of Deep Learning and Conventional Approaches for Image Recaptured Detection in Multimedia Forensics

2022

Image recaptured from a high-resolution LED screen or a good quality printer is difficult to distinguish from its original counterpart. The forensic community paid less attention to this type of forgery than to other image alterations such as splicing, copy-move, removal, or image retouching. It is significant to develop secure and automatic techniques to distinguish real and recaptured images without prior knowledge. Image manipulation traces can be hidden using recaptured images. For this reason, being able to detect recapture images becomes a hot research topic for a forensic analyst. The attacker can recapture the manipulated images to fool image forensic system. As far as we know, ther…

Computer Networks and CommunicationsVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420Computer Science ApplicationsMobile Information Systems
researchProduct

Familiarity with digital twin totality: Exploring the relation and perception of affordances through a Heideggerian perspective

2022

The concept of affordances has become central in information systems literature. However, existing perspectives fall short in providing details on the relational aspect of affordances, which can influence actors' perception of them. To increase granularity and specificity in this regard, researchers have suggested that it be supplemented with other concepts or theories. In this article, we argue that the Heideggerian concepts of ‘familiarity’ and ‘referential totality’ are well suited for increasing our understanding of the relational aspects of affordances in information systems research. To explore this idea, we conducted a case study of a project concerning the development of a digital t…

Computer Networks and CommunicationsVDP::Samfunnsvitenskap: 200::Biblioteks- og informasjonsvitenskap: 320::Informasjons- og kommunikasjonssystemer: 321SoftwareInformation SystemsVDP::Samfunnsvitenskap: 200::Biblioteks- og informasjonsvitenskap: 320
researchProduct

Machine Learning: The Backbone of Intelligent Trade Credit-Based Systems

2022

Technology has turned into a significant differentiator in the money and traditional recordkeeping systems for the financial industry. To depict two customers as potential investors, it is mandatory to give the complex innovation that they anticipate and urge to purchase. In any case, it is difficult to keep on top of and be a specialist in each of the new advancements that are accessible. By reappropriating IT administrations, monetary administrations firms can acquire prompt admittance to the most recent ability and direction. Financial systems, along with machine learning (ML) algorithms, are vital for critical concerns like secure financial transactions and automated trading. These are …

Computer Networks and CommunicationsVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Information Systems
researchProduct

Enabling early sleeping and early data transmission in wake-up radio-enabled IoT networks

2019

Abstract Wireless sensor networks (WSNs) are one of the key enabling technologies for the Internet of things (IoT). In such networks, wake-up radio (WuR) is gaining its popularity thanks to its on-demand transmission feature and overwhelming energy consumption superiority. Despite this advantage, overhearing still occurs when a wake-up receiver decodes the address of a wake-up call (WuC) which is not intended to it, causing a certain amount of extra energy waste in the network. Moreover, long latency may occur due to WuC address decoding since WuCs are transmitted at a very low data rate. In this paper, we propose two schemes, i.e., early sleeping (ES) and early data transmission (EDT), to …

Computer Networks and Communicationsbusiness.industryNetwork packetComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTestbedLatency (audio)020206 networking & telecommunications02 engineering and technologyEnergy consumptionTransmission (telecommunications)0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processingbusinessWireless sensor networkVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Computer networkData transmission
researchProduct