Search results for "computer.software_genre"

showing 10 items of 3858 documents

The value of a network in the digital era: insights about Doctor Chat case study

2017

Networks are ubiquitous in our lives in their social, physical, and digital forms. A growing number of firms today rely entirely on networking and lack a physical location or material infrastructure; they are, so to speak, 'liquid'. Through a theoretical analysis and its application to the case of Doctor Chat mobile app, this paper aims to analyse the fundamental laws of networks and to answer the following questions: 1) are the traditional methods to estimate the network value still valid in the current digital age and in particular for mobile applications?; 2) how do the laws of networks work when networks expand? We conclude with some suggestions for a research agenda in order to inspire…

Value (ethics)Computer scienceInternet privacySarnoff's lawNetwork theorycomputer.software_genreManagement Information Systemsnetwork theoryReed's lawMetcalfe's lawmobile appManagement Information SystemOdlyzko and Tilly's lawBusiness and International Management060201 languages & linguisticsMarketingMultimediabusiness.industryMobile apps06 humanities and the artsManagement information systemsWork (electrical)Order (business)0602 languages and literatureMetcalfe's lawbusinessReed's lawcomputerInternational Journal of Electronic Marketing and Retailing
researchProduct

Human security: an analytical tool for disaster perception research

2015

Purpose – The purpose of this paper is to examine the possible benefits arising from the application of the human security concept to analysing the disaster impacts. Design/methodology/approach – A three-piece human security analytical tool is synthesized by combining the discoveries in human security studies over the last two decades with the perspective of disaster studies focusing on the resilience and securitabilities of the affected societies. To illustrate the merit of the proposed analytical framework a specifically tailored social survey is used to measure the resilience of Ogre’s (Latvia) society after it faces major floods in 2013. It foresees that community’s resilience is inver…

Value (ethics)GovernmentHealth (social science)Food securitymedia_common.quotation_subjectPublic Health Environmental and Occupational HealthManagement Monitoring Policy and LawComputer securitycomputer.software_genreHazardResilience (organizational)Risk analysis (engineering)OriginalityNatural hazardBusinesscomputerHuman securitymedia_commonDisaster Prevention and Management
researchProduct

On the evolution of e-Government: The user imperative

2003

Published version of a chapter published in Lecture Notes in Computer Science, 2739, 139-143. Also available from the publisher at: http://dx.doi.org/10.1007/10929179_25 This paper focuses the need for more research on user involvement and the investigation of stakeholders in e-Government initiatives. An investigation of existing work revealed a lack of research on those topics. As e-Government evolves and users mature, the value of their input can increase. The paper discusses the need and potential benefits of this approach. Finally, we suggest that existing stakeholder theory is investigated for adaptation into e-Government settings in order to map the complex body of interrelated stakeh…

Value (ethics)Process managementE-GovernmentComputer scienceUser involvementCivil serviceComputer securitycomputer.software_genreWork (electrical)Order (exchange)VDP::Social science: 200::Library and information science: 320::Information and communication systems: 321Adaptation (computer science)Stakeholder theorycomputer
researchProduct

Design of Scales to Assess the subjective social value of education for students in primary and secondary school.

2017

Abstract The devaluation of education, related with multiple socio-economic and psycho-school factors may be influencing decisively on academic results. A target level is observed that the socio-economic and cultural level of families can decide the student performance, however, this international trend shows inconsistent results. In addition, in different studies, we can observe that students from disadvantaged backgrounds statistics exceed expectations in performance, surpassing the expected results depending on their socioeconomic and cultural level; and students should achieve optimal results for their family situation do not get the expected performance. An interpretative hypothesis ma…

Value (ethics)media_common.quotation_subject05 social sciences050401 social sciences methods050301 educationcomputer.software_genreEducació InvestigacióDisadvantagedlaw.invention0504 sociologylawScale (social sciences)Educational assessmentItem response theoryCLARITYGeneral Materials ScienceQuality (business)Psychology0503 educationcomputerSocial psychologySocioeconomic statusmedia_common
researchProduct

Skeletons for parallel image processing: an overview of the SKiPPER project

2002

International audience; This paper is a general overview of the SKIPPER project, run at Blaise Pascal University between 1996 and 2002. The main goal of the SKIPPER project was to demonstrate the appli- cability of skeleton-based parallel programming techniques to the fast prototyping of reactive vision applications. This project has produced several versions of a full-fledged integrated pa- rallel programming environment (PPE). These PPEs have been used to implement realistic vi- sion applications, such as road following or vehicle tracking for assisted driving, on embedded parallel platforms embarked on semi-autonomous vehicles. All versions of SKIPPER share a common front-end and reperto…

Vehicle tracking system[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image ProcessingComputer Networks and CommunicationsComputer science02 engineering and technology[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processingcomputer.software_genreTheoretical Computer ScienceSoftware portability[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingArtificial Intelligence0202 electrical engineering electronic engineering information engineeringcomputer.programming_language020203 distributed computingbusiness.industryProgramming language020207 software engineeringPascal (programming language)Computer Graphics and Computer-Aided DesignSkeleton (computer programming)Parallel image processingData flow diagramHardware and ArchitectureSoftware engineeringbusinesscomputer[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingSoftware
researchProduct

Location Based Information Storage and Dissemination in Vehicular Ad Hoc Networks

2010

Vehicular Ad Hoc Networks (VANETs) is an emerging type of information networks in urban areas. A lot of research has been done in the area of increasing the vehicle awareness by disseminating collision and congestion warnings, and parking place availability information. In this paper we propose a novel idea and framework for dissemination of location based information, called digital maps, which are useful not only directly for the drivers and vehicle onboard navigation systems, but also external entities, such as tourists, environmental scientists, emergency services, advertisement companies. Centralized authority defines cooperative knowledge collection tasks and disseminates orders in th…

Vehicular ad hoc networkDigital mappingbusiness.industryWireless ad hoc networkComputer scienceMobile ad hoc networkComputer securitycomputer.software_genreCollisionSystems architectureLocation based informationbusinesscomputerDisseminationComputer network
researchProduct

How to prevent cyber-attacks in inter-vehicle communication network?

2015

In this work, we aim to secure communication in a vehicular network by providing a proactive mechanism that can detect and predict with a high accuracy the future behavior of malicious attacker. In fact, the mechanisms proposed in the literature consider only detection mechanisms and do not prevent attacks that may arise in the network. Simulation results show that our mechanism has a high detection rate, low false positive rate while generating a low communication overhead.

Vehicular ad hoc networkNetwork securitybusiness.industryComputer scienceMechanism (biology)Computer securitycomputer.software_genreTelecommunications networkSecure communicationOverhead (computing)False positive ratebusinesscomputerGame theoryComputer network2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS)
researchProduct

Machine Learning approach towards real time assessment of hand-arm vibration risk

2021

Abstract In industry 4,0, the establishment of an interconnected environment where human operators cooperate with the machines offers the opportunity for substantially improving the ergonomics and safety conditions of the workplace. This topic is discussed in the paper referring to the vibration risk, which is a well-known cause of work-related pathologies. A wearable device has been developed to collect vibration data and to segment the signals obtained in time windows. A machine learning classifier is then proposed to recognize the worker’s activity and to evaluate the exposure to vibration risks. The experimental results demonstrate the feasibility and effectiveness of the methodology pr…

VibrationLearning classifier systemControl and Systems EngineeringComputer scienceTime windowsbusiness.industryWearable computerArtificial intelligenceMachine learningcomputer.software_genrebusinesscomputerHand armIFAC-PapersOnLine
researchProduct

A Crisis Management Serious Game for Responding Extreme Weather Event

2017

Managing crisis with limited resources through a serious game is deemed as one of the ways of training and can be regarded as an alternative to the table-top exercise. This paper presents the so-called “Operasjon Tyrsdal” serious game, inspired by a real case of extreme weather that hit the west coast of Norway. This reference case is used to add realism to the game. The game is designed for a single player, while the mechanics are framed in such way that the player should deal with limited resources, and elevated event pressure over time to manage. Beside applying an iterative Scrum method with seven Sprint cycles, we combined the development work with desk research and involvement of test…

Video game developmentComputer sciencebusiness.industryEvent (computing)05 social sciencesEnvironmental resource managementComputingMilieux_PERSONALCOMPUTING02 engineering and technologyCrisis managementComputer securitycomputer.software_genreScrumExtreme weatherWork (electrical)Action (philosophy)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing0501 psychology and cognitive sciencesbusinesscomputer050107 human factorsDesk
researchProduct

Identifying critical incidents in naturalistic driving data: experiences from a promoting real life observation for gaining understanding of road use…

2013

The methodology of naturalistic driving observation aspires to observe the driver and his environment while driving in natural driving settings. It is of great importance in research on road safety as this method of observing road users eliminates the disadvantages of traditional methods like simulator studies or interviews. However, it produces vast such amounts of data and challenges data reduction and data analysis. Therefore automatic methods for filtering critical incidents based on thresholds for numerical data are often applied to select the data to be analysed. This study reports a small-scale field trial in Valencia, Spain, which was conducted within the promoting real life observa…

Video recordingEngineeringbusiness.industryMechanical EngineeringContrast (statistics)TransportationComputer securitycomputer.software_genreData scienceData qualityField trialScale (social sciences)Naturalistic drivingbusinessLawcomputerGeneral Environmental ScienceData reductionRoad userIET Intelligent Transport Systems
researchProduct