Search results for "internet"
showing 10 items of 2589 documents
Performance analysis of underlay two-way relay cooperation in cognitive radio networks with energy harvesting
2018
Abstract Cognitive radio and energy harvesting are two important approaches to solve the problem of spectrum scarcity and energy constraint in wireless communications. In this work, we study a two-way relay cooperation scheme in underlay cognitive radio networks (CRNs) with energy harvesting in which two secondary users exchange information via an energy harvesting relay node. Since the relay node collects energy from the received signals and utilizes it to forward the information, the secondary transmission power can be markedly reduced. Therefore the interference of the secondary network to the primary network can be substantially reduced. We derive the outage probability of the secondary…
Learning to collaborate: Designing collaboration in a 3-D game environment
2006
To respond to learning needs, Computer-Supported Collaborative Learning (CSCL) must provide instructional support. The particular focus of this paper is on designing collaboration in a 3-D virtual game environment intended to make learning more effective by promoting student opportunities for interaction. The empirical experiment eScape, which encourages learners to solve problems collaboratively, is also presented. eScape is a design experiment, comprising both the process of designing a collaborative game environment and an empirical study where data is collected using a variety of methods and analysed, after which the findings and conclusions serve as a basis for further design work. By …
Creating a semantically-enhanced cloud services environment through ontology evolution
2014
Currently, the availability of Web resources has grown enormously to the point that whatever a user needs at a given moment can potentially be found on the Internet. These resources are not limited to data items anymore, functionality delivered through some sort of service architectural model is also offered on the Internet. In the last few years, cloud computing has emerged as one of the most popular computing models to provide services over the Internet. However, as the number of available cloud services increases, the problem of service discovery and selection arises. Experience indicates that semantic technologies can provide the basis for enhanced and more precise search processes. In …
Exploring Lightweight Deep Learning Solution for Malware Detection in IoT Constraint Environment
2022
The present era is facing the industrial revolution. Machine-to-Machine (M2M) communication paradigm is becoming prevalent. Resultantly, the computational capabilities are being embedded in everyday objects called things. When connected to the internet, these things create an Internet of Things (IoT). However, the things are resource-constrained devices that have limited computational power. The connectivity of the things with the internet raises the challenges of the security. The user sensitive information processed by the things is also susceptible to the trusability issues. Therefore, the proliferation of cybersecurity risks and malware threat increases the need for enhanced security in…
On the first- and second-order statistics of the capacity of N*Nakagami-m channels for applications in cooperative networks
2012
This article deals with the derivation and analysis of the statistical properties of the instantaneous channel capacitya of N*Nakagami-m channels, which has been recently introduced as a suitable stochastic model for multihop fading channels. We have derived exact analytical expressions for the probability density function (PDF), cumulative distribution function (CDF), level-crossing rate (LCR), and average duration of fades (ADF) of the instantaneous channel capacity of N*Nakagami-m channels. For large number of hops, we have studied the first-order statistics of the instantaneous channel capacity by assuming that the fading amplitude of the channel can approximately be modeled as a lognor…
Segmenting the audience of a cause-related marketing viral campaign
2021
Abstract This paper analyses the attitudinal effect of a cause-related marketing campaign which becomes viral through social networks. This attitudinal response is observed in three Internet user segments with different affinity levels: i) strong (familiar with the sponsoring brand and the promoted cause); ii) intermediate (familiar with the brand or the cause); and iii) weak (without previous experiences of either the brand or the social cause). To develop our experiment, 360 Internet surfers agree to participate. Their attitudes were measured before and after the showing of a viral spot in which a pet food brand encourages pet adoption. Our results show that a viral campaign works perfect…
Default effects in app selection: German adolescents’ tendency to adhere to privacy or social relatedness features in smartphone apps
2019
Cognitive biases such as default effects impact on user preferences for a broad range of different choices. This paper investigates these default effects among adolescents configuring apps that either satisfy relatedness or enhance autonomy by protecting privacy. Relatedness and privacy are two innate needs that adolescents can satisfy with the use of smartphone apps. This study argues that adolescents’ choice of features supporting either privacy protection or social relatedness is a consequence of default effects, so that adolescents adhere to preselected defaults. We test this assumption in an experimental survey design including four app configuration tasks with N = 280 German adolesce…
Comparison of WSN and IoT approaches for a real-time monitoring system of meal distribution trolleys: A case study
2018
Abstract International regulations determine that food in hospitals and elderly homes must be served at given temperature ranges. However, the real-time surveillance of the meal distribution trolleys along all the institutions facilities, guaranteeing conformity to rules from the instant when all the meals are put in the distribution trolley until they are delivered to the patients, is still a challenge. In this paper, we present a comparison of two approaches based on Wireless Sensor Networks (WSN) and Internet of Things (IoT) technologies for implementing a Real-Time Monitoring System of Meal Distribution Trolleys in a hospital. The performance evaluation results show that the IoT impleme…
Mobile Ontologies
2008
The number of mobile subscribers in the world is soon reaching the three billion mark. According to the newest estimates, majority of the subscribers are already in the developing countries, whereas the number of subscribers in the industrialized countries is about to stagnate around one billion. Because especially in the developing countries the only access to Internet are mobile devices, developing high quality services based on them grows in importance. Ontologies are an important ingredient towards more complicated mobile services and wider usage of mobile terminals. In this article, we first discuss ontology and epistemology concepts in general. After that, we review ontologies in the …
A holistic modeling for QoE estimation in live video streaming applications over LTE Advanced technologies with Full and Non Reference approaches
2018
Abstract Current mobile networks are providing high speed access to Internet at a rate of Gigabits per second. In this scenario, traditional services over wired networks are an alternative, in particular those based on live video streaming. But in the transition, different issues should be considered due to the rapid changing network conditions and the limited resources of the mobile devices. These issues should be taken into account to keep a good Quality of Experience (QoE) of the video in terms of a high Mean Opinion Score (MOS), a subjective video quality. Our goal is to estimate and predict this subjective metric in a holistic manner. Thus, we have analyzed and measured different varia…