Search results for "computer networks"
showing 10 items of 860 documents
Modeling and Performance Analysis of Energy Efficiency Binary Power Control in MIMO-OFDM Wireless Communication Systems
2011
Published version of an article in the journal:International Journal of Distributed Sensor Networks. Also available from Hindawi Publishing: http://dx.doi.org/10.1155/2011/946258 The energy efficiency optimization of the binary power control scheme for MIMO-OFDM wireless communication systems is formulated, and then a global optimization solution of power allocation is derived. Furthermore, a new energy efficiency binary power control (EEBPC) algorithm is designed to improve the energy efficiency of MIMO-OFDM wireless communication systems. Simulation results show that the EEBPC algorithm has better energy efficiency and spectrum efficiency than the average power control algorithm in MIMO-O…
Information diffusion model with homogeneous continuous time Markov chain on Indonesian Twitter users
2022
In this paper, a homogeneous continuous time Markov chain (CTMC) is used to model information diffusion or dissemination, also to determine influencers on Twitter dynamically. The tweeting process can be modeled with a homogeneous CTMC since the properties of Markov chains are fulfilled. In this case, the tweets that are received by followers only depend on the tweets from the previous followers. Knowledge Discovery in Database (KDD) in Data Mining is used to be research methodology including pre-processing, data mining process using homogeneous CTMC, and post-processing to get the influencers using visualization that predicts the number of affected users. We assume the number of affected u…
An Efficient Convolutional Neural Network with Transfer Learning for Malware Classification
2022
Rising prevalence of malicious software (malware) attacks represent a serious threat to online safety in the modern era. Malware is a threat to anyone who uses the Internet since it steals data and causes damage to computer systems. In addition, the exponential growth of malware hazards that affect many computer users, corporations, and governments has made malware detection, a popular issue in academic study. Current malware detection methods are slow and ineffectual because they rely on static and dynamic analysis of malware signatures and behavior patterns to detect unknown malware in real-time. Thus, this paper discusses the role of deep convolution neural networks in malware classifica…
Chasing Metaverses: Reflecting on Existing Literature to Understand the Business Value of Metaverses
2022
AbstractMetaverses refer to immersive virtual worlds in which people, places, and things of the physical world are represented by their digital representations. The wide adoption of metaverses is expected to widely disrupt the way we interact in the virtual world by elevating our online interactive experiences and bringing a plethora of implications for businesses. Following a structured literature review of related research published in the last decade, we shed light on our current understanding of metaverses and reflect on the potentially transformative value of metaverses for businesses in the near future. We draw on an established research framework to organize the insights of existing …
The Affordances of Reading/Writing on Paper and Digitally in Finland
2014
The aim of this study is to investigate the impact of digital technologies on reading and writing in Finland. The perceived affordances of reading and writing on paper and digitally are compared by analysing written essays collected from 25 communication students in 2013. Research design is replicated from a study of Fortunati and Vincent that concerns Italian students. Results show that Finnish students perceive more positive than negative affordances regarding reading on paper, while reading on screen attracts fewer virtues. In this respect, results are in line with the Italian study. Unlike in Italy, students in Finland value writing on a keyboard especially because it enables editing th…
Reward-based crowdfunding campaigns: Informational value and access to venture capital
2018
We consider an entrepreneur who designs a reward-based crowdfunding campaign when the campaign provides a signal about the future demand for the product and subsequent venture capital is needed. We find that both the informativeness of the campaign and considerations related to gaining access to venture capital funding affect the entrepreneur’s choice of campaign instruments, as well as her decision of whether to run a campaign. In particular, entrepreneurs should launch the campaign either when it is highly informative or when it is not informative at all. For relatively low levels of informativeness, but not so low that the venture capitalist (VC) completely ignores the campaign outcome …
Key factors of information management for crowdfunding investor satisfaction
2021
Abstract Crowdlending platforms are becoming increasingly important as a collective financing mechanism for entrepreneurs and small and medium-sized enterprises (SMEs), especially those at an early stage. This study, which is based on a survey of investors on a Spanish crowdlending platform, uses fuzzy-set qualitative comparative analysis (fsQCA) to examine investor satisfaction with crowdlending platforms. Specifically, the study examines communication policies and the quality of the investor experience based on the information provided by these platforms. The value of this article lies in its examination of the antecedents of crowdlending investor satisfaction. The analysis shows that the…
Business continuity of business models : Evaluating the resilience of business models for contingencies
2019
Company business models are vulnerable to various contingencies in the business environment that may unexpectedly render their business logic ineffective. In particular, technological advancements, such as the Internet of things, big data, sharing economy and crowdsourcing, have enabled new forms of business models that can effectively and abruptly make traditional business models obsolete. By disrupting or even diminishing companies’ revenue streams, environmental contingencies may present a significant threat to business continuity (BC). Evaluating the resilience of business models against these contingencies should therefore be a core area of BC. However, existing BC approaches tend to f…
Soft variable structure controller design for singular systems
2015
Abstract A novel soft variable structure control (SVSC) scheme is addressed for a class of singular systems under I-controllable in this paper. The structural features of SVSC with differential equations are investigated. The stability of singular systems based on SVSC scheme is guaranteed by an equivalent characterization theory, and then a soft variable structure controller is designed. The concrete algorithm of SVSC with differential equations is proposed. The developed SVSC law for singular systems is carried out for the purpose of achieving rapid regulative rate, and shortening arrival time. Moreover, system chattering can be attenuated in the process of approaching to the equilibrium …
Skeletons for parallel image processing: an overview of the SKiPPER project
2002
International audience; This paper is a general overview of the SKIPPER project, run at Blaise Pascal University between 1996 and 2002. The main goal of the SKIPPER project was to demonstrate the appli- cability of skeleton-based parallel programming techniques to the fast prototyping of reactive vision applications. This project has produced several versions of a full-fledged integrated pa- rallel programming environment (PPE). These PPEs have been used to implement realistic vi- sion applications, such as road following or vehicle tracking for assisted driving, on embedded parallel platforms embarked on semi-autonomous vehicles. All versions of SKIPPER share a common front-end and reperto…