Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Wright State University (33)
- Institute of Business Administration (10)
- Selected Works (10)
- San Jose State University (4)
- University of Nebraska - Lincoln (4)
-
- Air Force Institute of Technology (2)
- Bucknell University (2)
- California Polytechnic State University, San Luis Obispo (2)
- Marshall University (2)
- Singapore Management University (2)
- University of Dayton (2)
- Boise State University (1)
- Edith Cowan University (1)
- Munster Technological University (1)
- SelectedWorks (1)
- Tennessee State University (1)
- West Chester University (1)
- Western Kentucky University (1)
- Western University (1)
- Keyword
-
- Semantic Web (8)
- Semantic Sensor Web (4)
- Abstraction (3)
- Computer science (3)
- Privacy (3)
-
- Routing (3)
- Routing protocols (3)
- Wireless sensor networks (3)
- Algorithms (2)
- Batteries (2)
- Cloud Computing (2)
- Computer Security (2)
- Decidability (2)
- Description Logic (2)
- GSM (2)
- IP networks (2)
- Information Security (2)
- Information systems (2)
- Linux (2)
- Networking (2)
- Open source (2)
- Protocols (2)
- PubSubHubbub (2)
- SA-REST (2)
- Semantic social mashup (2)
- Semantic social web (2)
- Streaming Sensor Data (2)
- Virtual machines (2)
- Wireless LAN (2)
- 3G mobile communication (1)
- Publication
-
- Kno.e.sis Publications (28)
- International Conference on Information and Communication Technologies (10)
- Computer Science and Engineering Faculty Publications (5)
- Master's Projects (4)
- Computer Science Faculty Publications (3)
-
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (3)
- Maurice Dawson (3)
- Arcot Desai NARASIMHALU (2)
- Honors Theses (2)
- IT Research (2)
- John Christian Smith (2)
- Research Collection School Of Computing and Information Systems (2)
- Australian Security and Intelligence Conference (1)
- Boise State University Theses and Dissertations (1)
- CSE Technical Reports (1)
- Computer Engineering (1)
- Computer Science Faculty Research (1)
- Computer Science and Software Engineering (1)
- Electronic Thesis and Dissertation Repository (1)
- Faculty Publications (1)
- Foaad Khosmood (1)
- George K. Thiruvathukal (1)
- Masters Theses & Specialist Projects (1)
- Siti Salwah Salim Prof. Dr. (1)
- Theses (1)
- Theses and Dissertations (1)
- Umakant Mishra (1)
- Publication Type
Articles 1 - 30 of 81
Full-Text Articles in Physical Sciences and Mathematics
Networks - I: Pre-Coordination Mechanism For Self Configuration Of Neighborhood Cells In Mobile Wi-Max, Abdul Qadeer, Khalid Khan
Networks - I: Pre-Coordination Mechanism For Self Configuration Of Neighborhood Cells In Mobile Wi-Max, Abdul Qadeer, Khalid Khan
International Conference on Information and Communication Technologies
WiMax broadband services successfully providing triple play (Voice, Video and Data) support with combating the challenges of better quality and interoperability. Support for smooth mobility in real time with no wired infrastructure and being surrounded by GSM waves demanding a comprehensive and powerful network. Covering large areas through number of base stations which not only require time to configure but also need resources for implementation with a recurring cost of functionality. Automation is everywhere and to provide novel wireless services it is necessary to come up with some distinct features like intelligent base stations which have the capability of doing …
Effective Security By Obscurity, John Christian Smith
Effective Security By Obscurity, John Christian Smith
John Christian Smith
"Security by obscurity" is a bromide which is frequently applied to undermine the perceived value of a certain class of techniques in security. This usage initially stemmed from applications and experience in the areas of cryptographic theory, and the open vs. closed source debate. Through the perceived absence of true security, the field of security by obscurity has not coalesced into a viable or recognizable approach for security practitioners. Consequently, this has resulted in these techniques going under-used and under-appreciated by defenders, while they continue to provide value to attackers, which creates an unfortunate information asymmetry. Exploring effective methods for …
Overview Of Contrast Data Mining As A Field And Preview Of An Upcoming Book, Guozhu Dong, James Bailey
Overview Of Contrast Data Mining As A Field And Preview Of An Upcoming Book, Guozhu Dong, James Bailey
Kno.e.sis Publications
This report provides an overview of the field of contrast data mining and its applications, and offers a preview of an upcoming book on the topic. The importance of contrasting is discussed and a brief survey is given covering the following topics: general definitions and terminology for contrast patterns, representative contrast pattern mining algorithms, applications of contrast mining for fundamental data mining tasks such as classification and clustering, applications of contrast mining in bioinformatics, medicine, blog analysis, image analysis and subgroup mining, results on contrast based dataset similarity measure, and on analyzing item interaction in contrast patterns, and open research …
Dirty Tricks Played By The Domain Registrars, Umakant Mishra
Dirty Tricks Played By The Domain Registrars, Umakant Mishra
Umakant Mishra
With the popularity of Internet the number of websites are increasing in exponential rate. Everybody needs a website and every website needs a domain name and a hosting server. Domain names often represent a business organization or a commercial brand. Hence, changing domain names may affect business strategy and result in serious business loss. The domain registrars often take advantage of customers’ ignorance and weakness and trouble them to unduly extract more and more money.
Computing Inconsistency Measure Based On Paraconsistent Semantics, Pascal Hitzler, Yue Ma, Guilin Qi
Computing Inconsistency Measure Based On Paraconsistent Semantics, Pascal Hitzler, Yue Ma, Guilin Qi
Computer Science and Engineering Faculty Publications
Measuring inconsistency in knowledge bases has been recognized as an important problem in several research areas. Many methods have been proposed to solve this problem and a main class of them is based on some kind of paraconsistent semantics. However, existing methods suffer from two limitations: (i) they are mostly restricted to propositional knowledge bases; (ii) very few of them discuss computational aspects of computing inconsistency measures. In this article, we try to solve these two limitations by exploring algorithms for computing an inconsistency measure of first-order knowledge bases. After introducing a four-valued semantics for first-order logic, we define an …
Distributed Algorithms For Energy Savings In The Core Network, Lin Liu
Distributed Algorithms For Energy Savings In The Core Network, Lin Liu
Department of Computer Science and Engineering: Dissertations, Theses, and Student Research
Recently, many efforts have been undertaken to reduce the energy consumption of core networks. Bundle link is a commonly deployed technique in core networks to combine several high-speed physical sublinks into a virtual connection to achieve bandwidth upgrade flexibility and network reliability. The traffic passing through a bundle link can be carried fully over the first few sublinks (bin packing) or evenly distributed over all sublinks (load balancing). In the current network when a bundle link is on, all of its sublinks are on, thus, selectively shutting down a few sublinks during periods of low traffic could save a large …
Quantifying Computer Network Security, Ian Burchett
Quantifying Computer Network Security, Ian Burchett
Masters Theses & Specialist Projects
Simplifying network security data to the point that it is readily accessible and usable by a wider audience is increasingly becoming important, as networks become larger and security conditions and threats become more dynamic and complex, requiring a broader and more varied security staff makeup. With the need for a simple metric to quantify the security level on a network, this thesis proposes: simplify a network’s security risk level into a simple metric. Methods for this simplification of an entire network’s security level are conducted on several characteristic networks. Identification of computer network port vulnerabilities from NIST’s Network Vulnerability Database …
High-Performance Java Platform Computing, Thomas W. Christopher, George K. Thiruvathukal
High-Performance Java Platform Computing, Thomas W. Christopher, George K. Thiruvathukal
George K. Thiruvathukal
Threading and concurrency are crucial to building high-performance Java applications -- but they have a reputation for complexity. High Performance Java Computing thoroughly demystifies these advanced development techniques. It delivers practical programming solutions, proven design patterns, and a rigorously-tested code library -- everything developers need to build optimized Java software for technical, business, and E-commerce applications. Start by understanding how threading and concurrency can be used to solve a wide variety of performance problems, enabling the construction of more powerful networked applications. Master the Java 2 Threads classes, including daemon threads, thread control, scheduling, and more. Review the key problems …
Trust-Based Service Selection, Zainab Aljazzaf
Trust-Based Service Selection, Zainab Aljazzaf
Electronic Thesis and Dissertation Repository
Service Oriented Architecture (SOA) is an architectural style that builds enterprise solutions based on services. In SOA, the lack of trust between different parties affects the adoption of such architecture. Trust is as significant a factor for successful online interactions as it is in real life communities, and consequently, it is an important factor that is used as a criterion for service selection. In the context of online services and SOA, the literature shows that the field of trust is not mature. Trust definition and the consideration of the essentials of trust aspects do not reflect the true nature of …
Consistent Community Identification In Complex Networks, Haewoon Kwak, Young-Ho Eom, Yoonchan Choi, Hawoong Jeong
Consistent Community Identification In Complex Networks, Haewoon Kwak, Young-Ho Eom, Yoonchan Choi, Hawoong Jeong
Research Collection School Of Computing and Information Systems
We have found that known community identification algorithms produce inconsistent communities when the node ordering changes at input. We use the pairwise membership probability and consistency to quantify the level of consistency across multiple runs of an algorithm. Based on these two metrics, we address the consistency problem without compromising the modularity. The key insight of the algorithm is to use pairwise membership probabilities as link weights. It offers a new tool in the study of community structures and their evolutions.
The Knowledge-Driven Exploration Of Integrated Biomedical Knowledge Sources Facilitates The Generation Of New Hypotheses, Vinh Nguyen, Olivier Bodenreider, Todd Minning, Amit P. Sheth
The Knowledge-Driven Exploration Of Integrated Biomedical Knowledge Sources Facilitates The Generation Of New Hypotheses, Vinh Nguyen, Olivier Bodenreider, Todd Minning, Amit P. Sheth
Kno.e.sis Publications
Knowledge gained from the scientific literature can complement newly obtained experimental data in helping researchers understand the pathological processes underlying diseases. However, unless the scientific literature and experimental data are semantically integrated, it is generally difficult for scientists to exploit the two sources effectively. We argue that, in addition to the semantic integration of heterogeneous knowledge sources, the usability of the integrated resource by scientists is dependent upon the availability of knowledge visualization and exploration tools. Moreover, the integration techniques must be scalable and the exploration interfaces must be easy to use by bench scientists. The end goal of such …
Demonstration: Real-Time Semantic Analysis Of Sensor Streams, Harshal Patni, Cory Andrew Henson, Michael Cooney, Amit P. Sheth, Krishnaprasad Thirunarayan
Demonstration: Real-Time Semantic Analysis Of Sensor Streams, Harshal Patni, Cory Andrew Henson, Michael Cooney, Amit P. Sheth, Krishnaprasad Thirunarayan
Kno.e.sis Publications
The emergence of dynamic information sources – including sensor networks – has led to large streams of real-time data on the Web. Research studies suggest, these dynamic networks have created more data in the last three years than in the entire history of civilization, and this trend will only increase in the coming years [1]. With this coming data explosion, real-time analytics software must either adapt or die [2]. This paper focuses on the task of integrating and analyzing multiple heterogeneous streams of sensor data with the goal of creating meaningful abstractions, or features. These features are then temporally aggregated …
Demonstration: Secure - Semantics Empowered Rescue Environment, Pratikkumar Desai, Cory Andrew Henson, Pramod Anantharam, Amit P. Sheth
Demonstration: Secure - Semantics Empowered Rescue Environment, Pratikkumar Desai, Cory Andrew Henson, Pramod Anantharam, Amit P. Sheth
Kno.e.sis Publications
This paper demonstrates a Semantic Web enabled system for collecting and processing sensor data within a rescue environment. The real-time system collects heterogeneous raw sensor data from rescue robots through a wireless sensor network. The raw sensor data is converted to RDF using the Semantic Sensor Network (SSN) ontology and further processed to generate abstractions used for event detection in emergency scenarios.
Sempush: Privacy-Aware And Scalable Broadcasting For Semantic Microblogging, Pavan Kapanipathi, Julia Anaya, Alexandre Passant
Sempush: Privacy-Aware And Scalable Broadcasting For Semantic Microblogging, Pavan Kapanipathi, Julia Anaya, Alexandre Passant
Kno.e.sis Publications
Users of traditional microblogging platforms such as Twitter face drawbacks in terms of (1) Privacy of status updates as a followee - reaching undesired people (2) Information overload as a follower - receiving uninteresting microposts from followees. In this paper we demonstrate distributed and user-controlled dissemination of microposts using SMOB (semantic microblogging framework) and Semantic Hub (privacy-aware implementation of PuSH3 protocol) . The approach leverages users' Social Graph to dynamically create group of followers who are eligible to receive micropost. The restrictions to create the groups are provided by the followee based on the hastags in the micropost. Both SMOB …
A Domain Specific Language For Enterprise Grade Cloud-Mobile Hybrid Applications, Ajith H. Ranabahu, E. Michael Maximilien, Amit P. Sheth, Krishnaprasad Thirunarayan
A Domain Specific Language For Enterprise Grade Cloud-Mobile Hybrid Applications, Ajith H. Ranabahu, E. Michael Maximilien, Amit P. Sheth, Krishnaprasad Thirunarayan
Kno.e.sis Publications
Cloud computing has changed the technology landscape by offering flexible and economical computing resources to the masses. However, vendor lock-in makes the migration of applications and data across clouds an expensive proposition. The lock-in is especially serious when considering the new technology trend of combining cloud with mobile devices.
In this paper, we present a domain specific language (DSL) that is purposely created for generating hybrid applications spanning across mobile devices as well as computing clouds. We propose a model-driven development process that makes use of a DSL to provide sufficient programming abstractions over both cloud and mobile features. We …
Semantic Annotation And Search For Resources In The Next Generation Web With Sa-Rest, Ajith H. Ranabahu, Amit P. Sheth, Maryam Panahiazar, Sanjaya Wijeratne
Semantic Annotation And Search For Resources In The Next Generation Web With Sa-Rest, Ajith H. Ranabahu, Amit P. Sheth, Maryam Panahiazar, Sanjaya Wijeratne
Kno.e.sis Publications
SA-REST, the W3C member submission, can be used for supporting a wide variety of Plain Old Semantic HTML (POSH) annotation capabilities on any type of Web resource. Kino framework and tools provide support of capabilities to realize SA-RESTs promised value. These tools include (a) a browser-plugin to support annotation of a Web resource (including services) with respect to an ontology, domain model or vocabulary, (b) an annotation aware indexing engine and (c) faceted search and selection of the Web resources. At one end of the spectrum, we present KinoE (aka Kino for Enterprise) which uses NCBO formal ontologies and …
Personalized Filtering Of The Twitter Stream, Pavan Kapanipathi, Fabrizio Orlandi, Amit P. Sheth, Alexandre Passant
Personalized Filtering Of The Twitter Stream, Pavan Kapanipathi, Fabrizio Orlandi, Amit P. Sheth, Alexandre Passant
Kno.e.sis Publications
With the rapid growth in users on social networks, there is a corresponding increase in user-generated content, in turn resulting in information overload. On Twitter, for example, users tend to receive uninterested information due to their non-overlapping interests from the people whom they follow. In this paper we present a Semantic Web approach to filter public tweets matching interests from personalized user profiles. Our approach includes automatic generation of multi-domain and personalized user profiles, filtering Twitter stream based on the generated profiles and delivering them in real-time. Given that users interests and personalization needs change with time, we also discuss …
Semantic Computing In Real-World: Vertical And Horizontal Application Within Enterprise And On The Web, Amit P. Sheth
Semantic Computing In Real-World: Vertical And Horizontal Application Within Enterprise And On The Web, Amit P. Sheth
Kno.e.sis Publications
No abstract provided.
Kino: A Generic Document Management System For Biologists Using Sa-Rest And Faceted Search, Ajith Harshana Ranabahu, Priti Parikh, Maryam Panahiazar, Amit P. Sheth
Kino: A Generic Document Management System For Biologists Using Sa-Rest And Faceted Search, Ajith Harshana Ranabahu, Priti Parikh, Maryam Panahiazar, Amit P. Sheth
Kno.e.sis Publications
Document management has become an important consideration for the scientific community over the last decade. Human knowledge is central to many scientific domains, thus it is not possible to completely automate the document management process. Managing scientific documents require a semi-automatic approach to overcome issues of large volume, yet support the human participation in the process. In this paper we present Kino, a set of tools that streamline the document management process in life science domains. Kino is integrated with National Center for Biomedical Ontology (NCBO), providing scientists access to quality domain models. Annotated documents are indexed using a faceted …
A Hubel Wiesel Model Of Early Concept Generalization Based On Local Correlation Of Input Features, Sepideh Sadeghi, Kiruthika Ramanathan
A Hubel Wiesel Model Of Early Concept Generalization Based On Local Correlation Of Input Features, Sepideh Sadeghi, Kiruthika Ramanathan
Research Collection School Of Computing and Information Systems
Hubel Wiesel models, successful in visual processing algorithms, have only recently been used in conceptual representation. Despite the biological plausibility of a Hubel-Wiesel like architecture for conceptual memory and encouraging preliminary results, there is no implementation of how inputs at each layer of the hierarchy should be integrated for processing by a given module, based on the correlation of the features. In our paper, we propose the input integration framework - a set of operations performed on the inputs to the learning modules of the Hubel Wiesel model of conceptual memory. These operations weight the modules as being general or …
Networks - Ii: Error Estimation In Angle Of Arrival In Smart Antenna, Sangita Lalchand, Muhammad Mazhar Manzoor, Amir Ijaz, Imran Ahmed Awan, Asad Ali Siddique
Networks - Ii: Error Estimation In Angle Of Arrival In Smart Antenna, Sangita Lalchand, Muhammad Mazhar Manzoor, Amir Ijaz, Imran Ahmed Awan, Asad Ali Siddique
International Conference on Information and Communication Technologies
Rapidly growing demand in mobile communication system required technology which will provide minimum errors and maximize SNR in a particular angle/direction. Smart antenna has a system for directed a beam towards desired angle/direction and suppress/cancel interference from undesired angle/direction. MUSIC (Multiple Signal Classification) has capability to estimate number of signals in an array and angle/direction of arrival of desired signal. ESPRIT (Estimation of Signal Parameters via Rotational Invariance Techniques) is used for the estimation of direction of arrival of multiple sets of identical doublets, provides parallel processing. This Paper provides comparative analysis and simulation of angle of arrival (AOA) estimation, …
Networks - Ii: A Survey Of Data Management Issues & Frameworks For Mobile Ad Hoc Networks, Noman Islam, Zubair A. Shaikh
Networks - Ii: A Survey Of Data Management Issues & Frameworks For Mobile Ad Hoc Networks, Noman Islam, Zubair A. Shaikh
International Conference on Information and Communication Technologies
Data Management is the execution of a pool of activities on a set of data to conform to the end user data requisitions. MANET is an emerging discipline of computer networks in which a group of roaming hosts spontaneously establishes the network among themselves. The employment of data management in MANET can engender a number of useful applications. However, data management in MANET is a taxing job as it requires deliberation on a number of research issues (e.g. knowledge representation, knowledge discovery, caching, and security etc.). This paper provides a detailed account of the data management problem and its issues, …
Network Security: A Review Of Salient Security Aspects Of The Universal Mobile Telecommunication System (Umts), F. Imran, M. Hussain
Network Security: A Review Of Salient Security Aspects Of The Universal Mobile Telecommunication System (Umts), F. Imran, M. Hussain
International Conference on Information and Communication Technologies
Wireless communication is known as key to global development. Wireless and mobile communication is gaining more importance in our life. Protecting information is one the aspects which we need to focus on the wireless networks. Universal mobile telecommunication system (UMTS) is evolution of the third generation mobile communication system. It was built on the success of global system for mobile communication (GSM). Universal mobile telecommunication system's security is also built on global system for mobile communication (GSM). The paper reviews the literature of the security aspects of the Universal mobile telecommunication system. A critical evaluation of the proposed solutions is …
Networks - Ii: Modified On Demand Transmission Power Control For Wireless Sensor Networks, Mirza M Yasir Masood, Ghufran Ahmed, Noor M. Khan
Networks - Ii: Modified On Demand Transmission Power Control For Wireless Sensor Networks, Mirza M Yasir Masood, Ghufran Ahmed, Noor M. Khan
International Conference on Information and Communication Technologies
On Demand Transmission Power Control (ODTPC) is a well known transmission power control strategy that is used to reduce high power consumption in wireless sensor networks (WSNs). In this paper, we propose an extension to ODTPC and thus, a modified version of ODTPC is proposed named MODTPC. Simulation results show that performance of MODTPC is better than ODTPC in terms of efficiency and energy saving.
Network Security: A Secure Architecture For Open Source Voip Solutions, Fahad Sattar, M. Hussain, Kashif Nisar
Network Security: A Secure Architecture For Open Source Voip Solutions, Fahad Sattar, M. Hussain, Kashif Nisar
International Conference on Information and Communication Technologies
Voice over IP “VoIP” is a form of voice speech that uses data networks, for transmission of voice traffic over IP-based networks to transmit voice signals. The signal is correctly encoded at one end of the communication channel, sent as packets through the data network, then decoded at the receiving end and transformed back into a voice signal. It has a potential and offering a choice to the traditional telephony systems due to its high resource utilization and cost efficiency. Meanwhile, Wireless Local Area Networks (WLANs) have become an ever present networking technology that has been deployed around the world. …
Networks - I: Computational Intelligence Based Optimization In Wireless Sensor Network, Rabia Iram, Muhammad Irfan Sheikh, Sohail Jabbar, Abid Ali Minhas
Networks - I: Computational Intelligence Based Optimization In Wireless Sensor Network, Rabia Iram, Muhammad Irfan Sheikh, Sohail Jabbar, Abid Ali Minhas
International Conference on Information and Communication Technologies
There are only two ways to live your life. One is as though nothing is a miracle. The other is as though everything is a miracle and so the technology advancement which proved to be a miracle of the miracles. Wireless Sensor Network (WSN) is one such miracle of the wireless technology which opens up the new dimensions for the researchers to write the technology of the future i.e. ubiquitous computing and intelligence. Nevertheless nature has played its ultimate role as well to give an idea of perfection in optimizing the teething issues in any field and so in WSN. …
Networks - I: A Dynamic Transmission Power Control Routing Protocol To Avoid Network Partitioning In Wireless Sensor Networks, Ghufran Ahmed, Noor M. Khan, Mirza M Yasir Masood
Networks - I: A Dynamic Transmission Power Control Routing Protocol To Avoid Network Partitioning In Wireless Sensor Networks, Ghufran Ahmed, Noor M. Khan, Mirza M Yasir Masood
International Conference on Information and Communication Technologies
Power utilization in an efficient manner is a hot research issue in wireless sensor networks (WSNs). WSNs consist of energy hungry sensor nodes. Researchers have been trying to increase the lifetime of WSN since the development of WSN technology. Dynamic Transmission Power Control (DTPC) is a method for an efficient utilization of the energy resource and thus leads to an increase in lifetime. It has been used for the determination of minimum transmission power. A valuable study about the impact of variable transmission power on link quality has already been present in literature. In contrast to DTPC, transmitting data at …
Networks - I: A Comparative Analysis Of Energy-Aware Routing Protocols In Wireless Sensor Networks, Mohsin Raza, Ghufran Ahmed, Noor M. Khan, M Awais, Qasim Badar
Networks - I: A Comparative Analysis Of Energy-Aware Routing Protocols In Wireless Sensor Networks, Mohsin Raza, Ghufran Ahmed, Noor M. Khan, M Awais, Qasim Badar
International Conference on Information and Communication Technologies
This paper presents the implementation of two routing protocols for Wireless Sensor Networks (WSNs): GRACE (GRAdient Cost Establishment for Energy Aware routing) and GRAB (GRAdient Broadcasting) along with their comparative analysis using Sun SPOT sensor nodes, developed by Sun Microsystems. The performance of both the routing protocols is evaluated on the basis of various performance metrics including network lifetime, throughput and network energy etc. However in papers where these routing protocols presented, practical limitations of wireless sensor nodes were ignored. The communication of sensor nodes is established using multiple communication channels for proper implementation of both the routing protocols, GRACE …
Networks - I: Interference Mitigation In 4g System Using Smart Antenna, Asad Ali Siddiqui, Muhammad Mazhar Manzoor, Aamir Ijaz, Adnan Umar Khan, Imran Ahmed Awan, Sangita Lal Chand
Networks - I: Interference Mitigation In 4g System Using Smart Antenna, Asad Ali Siddiqui, Muhammad Mazhar Manzoor, Aamir Ijaz, Adnan Umar Khan, Imran Ahmed Awan, Sangita Lal Chand
International Conference on Information and Communication Technologies
Emerging trends of mobile communication and ever growing demand of mobile users with high speed data requirements and migrating towards 4G, Co-Channel interference and multipath in urban/dense urban environment will limit the capacity of the network. Smart antenna is now recognized by its higher user capacity in 4G wireless networks by efficiently reducing multipath and co-channel interference. Smart Antenna use adaptive beam forming algorithms in a dynamic environment continuously adjusting the weight of antenna arrays for creating a beam to track desired users automatically, and minimize interference from other users by placing nulls in their directions. This research work provides …
Citizen Sensing: Opportunities And Challenges In Mining Social Signals And Perceptions, Amit P. Sheth
Citizen Sensing: Opportunities And Challenges In Mining Social Signals And Perceptions, Amit P. Sheth
Kno.e.sis Publications
Millions of persons have become 'citizens' of an Internet- or Web-enabled social community. Web 2.0 fostered the open environment and applications for tagging, blogging, wikis, and social networking sites that have made information consumption, production, and sharing so incredibly easy. An interconnected network of people who actively observe, report, collect, analyze, and disseminate information via text, audio, or video messages, increasingly through pervasively connected mobile devices, has led to what we term citizen sensing. In this talk, we review recent progress in supporting collective intelligence through intelligent processing of citizen sensing. Key issues we cover in this talk are: - …