Academia.eduAcademia.edu

Computer Networks and Communications

3,250 papers
956 followers
AI Powered
Computer Networks and Communications is the study of interconnected computing devices that share resources and data through communication protocols. This field encompasses the design, implementation, management, and security of network systems, enabling efficient data transmission and connectivity across various platforms and technologies.
A time domain (TD) optimal sampling interpolation (OSI) scheme to efficiently reconstruct the transient field radiated by an ultra-wide band (UWB) antenna over a plane in the near-field (NF) region from a minimum number of its NF TD... more
The recently introduced 5G New Radio is the first wireless standard natively designed to support critical and massive machine type communications (MTC). However, it is already becoming evident that some of the more demanding requirements... more
The project aims to develop a personal-assistant for Linux-based systems. Jarvis draws its inspiration from virtual assistants like Cortana for Windows, and Siri for iOS. ​It has been designed to provide a ​user-friendly interface for... more
Accurate seismic signal analysis is vital for earthquake detection, subsurface imaging, and geotechnical assessments. However, field-acquired seismic data is often contaminated by various noise sources. Traditional low-pass filters, like... more
This research reports on a study of the interplay between multi-tasking and collaborative work. We conducted an ethnographic study in two different companies where we observed the experiences and practices of thirty-six information... more
This paper presents a performance evaluation study of dual stack, 6to4 tunnelling, and Network Address Translation transition schemes on simulative method in IPv4/IPv6 networks. This research aims to find out what IPv4/IPv6 transition... more
Reliable image and video communications over noisy channels has been a great challenge especially for the transmission of large volume of data over unreliable and bandwidth limited channels. One technique to deal with this problem... more
The circle travelling delay between OLT (Optical Line Terminal) and ONU (Optical Network Unit) is one of most important items in dynamic bandwidth allocation (DBA) algorithms in PON, called RTT (Round Trip Time). The RTT is taken into... more
Nowadays, companies to be competitive must develop capabilities that enable them to respond quickly to market needs. According to some managers, the strategy is the development of dynamic logistics networks based on a collaborative... more
Nowadays, companies to be competitive must develop capabilities that enable them to respond quickly to market needs. According to some managers, the strategy is the development of dynamic logistics networks based on a collaborative... more
Low cost networked consumer electronics (CE) are widely used. Various applications are offered, including IPTV, VoIP, VoD, PVR and games. At the same time the requirements of computer games by means of CPU and graphics performance are... more
This report is available at no cost from the National Renewable Energy Laboratory (NREL) at www.nrel.gov/publications. U.S. Department of Energy (DOE) reports produced after 1991 and a growing number of pre-1991 documents are available... more
Multi-terminal switching lattices are typically exploited for modeling switching nano-crossbar arrays that lead to the design and construction of emerging nanocomputers. Typically, the circuit is represented on a single lattice composed... more
Electromagnetic articulography (EMA) is one of the instrumental phonetic research methods used for recording and assessing articulatory movements. Usually, articulographic data are analysed together with standard audio recordings. This... more
A educação para os media tem sido uma área incentivada pelas instituições internacionais, como parte de uma educação cívica, e em Portugal tem registado progressos, embora subsista alguma fragmentação. O RadioActive, financiado pela... more
Datasets are most important for performing all the type of data mining tasks. Every dataset has many numbers of attributes and instances. Dimensionality reduction (DR) is one of the preprocessing steps which is used to reduce the... more
It is impossible to print glass directly from a melt, layer by layer. Glass is not only very sensitive to temperature gradients between different layers but also to the cooling process. To achieve a glass state the melt, has to be cooled... more
Two main concerns for designing a wireless system are more network capacity and less energy consumption. Recently, distributed antenna system (DAS) has received considerable attention due to its potential to provide higher spectral... more
Energy efficiency in cellular networks has received significant attention from both academia and industry because of the importance of reducing the operational expenditures and maintaining the profitability of cellular networks, in... more
This paper describes our preliminary steps towards the deployment of a brand-new original feature for a telemedicine portal aimed at helping people suffering from diabetes. In fact, people with diabetes necessitate careful handling of... more
Gamification refers to the use of gaming elements to enhance user experience and engagement in non-gaming systems. In this paper we report the design and implementation of two higher education courses in which ludic elements were used to... more
Smart industrial processes are impossible without the use of machinery. Majority of these machines comprise rotating machines. As supporting tools for developing maintenance strategies, a Data-driven approach for multifault diagnosis of... more
Internet is widely depends on the IP over Ethernet networks architecture. IP and Ethernet protocols uses in each Local Area Network LAN, wire and wireless. Due to the rapid expansion of the technology field this architecture reveals many... more
How to process the big data generated in large IoT networks is still challenging current techniques. To date, a lot of network clustering approaches have been proposed to improve the performance of data aggregation in IoT. However, most... more
PurposeCollaborative-based national cybersecurity incident management benefits from the huge size of incident information, large-scale information security devices and aggregation of security skills. However, no existing collaborative... more
WorkWays is a science gateway that supports human-in-the-loop scientific workflows. Human-workflow interactions are enabled by a dynamic Input Output (IO) model, which allows users to insert data into, or export data out of, a... more
We present a new detection method for color-based object detection, which can improve the performance of learning procedures in terms of speed, accuracy, and efficiency, using spatial inference, and algorithm. We applied the model to... more
In the last decade Peer to Peer technology has been thoroughly explored, becauseit overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous... more
The control of communication networks is an important aspect from both the service provider and user points of view. There are several approaches to communication network control including game theory, genetic algorithms and Markov... more
Mobile Ad hoc Networks (MANETs) are very considered attractive for many applications. Routing protocol is considered as the most important element of MANET. However, media streaming over MANET is a quite demanding task. In this paper the... more
Online recruitment fraud (ORF) is a new challenge in the cyber security area. In ORF, scammers give job seekers lucrative job offers and in-return steal their money and personal information. In India, scammers have stolen millions of... more
Spectrum congestion is a major concern in both military and commercial wireless networks. To support growing demand for ubiquitous spectrum usage, Cognitive Radio is a new paradigm in wireless communication that can be used to exploit... more
This paper proposes through a case study for a college, described as Faculty Barddal, evaluation of wireless network characteristics between the real and nominal. Since the growing need in pursuit of excellence in the operation of... more
Analytic tools are beginning to be largely employed, given their ability to rank, e.g., the visibility of social media users. Visibility that, in turns, can have a monetary value, since social media popular people usually either... more
This paper proposes strategies for distributed Wiener-based reconstruction of graph signals from subsampled measurements. Given a stationary signal on a graph, we fit a distributed autoregressive moving average graph filter to a Wiener... more
With the rapid growth of location-based social networks (LBSNs), Point-Of-Interest (POI) recommendation has been broadly studied in this decade. Recently, the next POI recommendation, a natural extension of POI recommendation, has... more
With the rapid growth of location-based social networks (LBSNs), Point-Of-Interest (POI) recommendation has been broadly studied in this decade. Recently, the next POI recommendation, a natural extension of POI recommendation, has... more
We present a chronological evolution for naval telecommunication networks. We distinguish periods: with or without multiplexers, with switch systems, with federative systems, with medium switching, and with medium switching with wireless... more
A distributed control algorithm is proposed to manage the electrical power demand for the purpose of charging electric vehicles so that (a) the overall power demand remains within the limitations of the distribution network and (b) each... more
Aesthetic accounts of interaction design (Löwgren 2008, Wright et al 2008) acknowledge the importance of the descriptive and dialogic roles that design artefacts play. Yet, much of the focus in this aesthetic turn (Udsen 2005) concerns... more
Mobile Ad hoc Networks (MANETs) are very considered attractive for many applications. Routing protocol is considered as the most important element of MANET. However, media streaming over MANET is a quite demanding task. In this paper the... more
Queueing models with batch service have been studied frequently, for instance in the domain of telecommunications or manufacturing. Although the batch server's capacity may be variable in practice, only a few authors have included... more
WSNs (Wireless Sensor Networks) introduces significant challenges which do not arise in static WSNs. Reliable data transport is an important aspect of attaining consistency and QoS (Quality of Service) in several applications of MWSNs... more
Playfulness, with non-intrusive elements, can be considered a useful resource for enhancing social awareness and community building within work organizations. Taking inspirations from the cultural probes approach, we developed... more
With the explosive growth of multitudinous wireless services and high-data-rate required applications, relay aided Device-to-Device (D2D) communications have attracted increasing attentions. In this paper, we investigate the performance... more
Recent analysis by manufacturers and network operators has shown that current wireless networks are not very energy efficient, particularly the base stations by which terminals access services from the network. In response to this... more