Filters








256,474 Hits in 6.2 sec

Cross-Checking Different Sources of Mobility Information

Maxime Lenormand, Miguel Picornell, Oliva G. Cantú-Ros, Antònia Tugores, Thomas Louail, Ricardo Herranz, Marc Barthelemy, Enrique Frías-Martínez, José J. Ramasco, Yamir Moreno
2014 PLoS ONE  
Here we perform instead a cross-check analysis by comparing results obtained with data collected from three different sources: Twitter, census and cell phones.  ...  Our results show that the three data sources are providing comparable information.  ...  This shows that the two networks are not only inferring the same mobility patterns, but that the information left outside in the cross-check corresponds to the weakest links in the system.  ... 
doi:10.1371/journal.pone.0105184 pmid:25133549 pmcid:PMC4136853 fatcat:xkeiu6jcujde5hpdwegprmeere

Contrasting social and non-social sources of predictability in human mobility [article]

Zexun Chen, Sean Kelty, Brooke Foucault Welles, James P. Bagrow, Ronaldo Menezes, Gourab Ghoshal
2021 arXiv   pre-print
We apply entropy and predictability measures to analyse and bound the predictive information of an individual's mobility pattern and the flow of that information from their top social ties and from their  ...  Further, latent information about an individual's mobility can be present in the mobility patterns of both social and non-social ties, a distinction that has not yet been addressed.  ...  sources of mobility information are in principle available.  ... 
arXiv:2104.13282v1 fatcat:v6s3mkq4lzdwjg4ui5pviaojoy

F-HMTC: Detecting Financial Events for Investment Decisions Based on Neural Hierarchical Multi-Label Text Classification

Xin Liang, Dawei Cheng, Fangzhou Yang, Yifeng Luo, Weining Qian, Aoying Zhou
2020 Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence  
We will release both the source codes and dataset on the first author's repository.  ...  The share prices of listed companies in the stock trading market are prone to be influenced by various events.  ...  Academy of Finland.  ... 
doi:10.24963/ijcai.2020/611 dblp:conf/ijcai/0004LLH20 fatcat:7sbncotu25a73lcvfa3o5lbgsq

Multi-Graph Fusion Networks for Urban Region Embedding [article]

Shangbin Wu, Xu Yan, Xiaoliang Fan, Shirui Pan, Shichao Zhu, Chuanpan Zheng, Ming Cheng, Cheng Wang
2022 arXiv   pre-print
Human mobility data contains rich but abundant information, which yields to the comprehensive region embeddings for cross domain tasks.  ...  Learning the embeddings for urban regions from human mobility data can reveal the functionality of regions, and then enables the correlated but distinct tasks such as crime prediction.  ...  Acknowledgments The research is supported by Natural Science Foundation of China (61872306), and Fundamental Research Funds for the Central Universities (20720200031).  ... 
arXiv:2201.09760v2 fatcat:iqzytcyk65hefixmr3cfw7iixe

E2XLRADR (Energy Efficient Cross Layer Routing Algorithm with Dynamic Retransmission for Wireless Sensor Networks

Kanojia Sindhuben Babulal, Rajiv Ranjan Tewari
2010 International Journal of Wireless & Mobile Networks  
Major percentage of energy in wireless sensor network is consumed during routing from source to destination, retransmission of data on packet loss.  ...  For improvement, cross layered algorithm is proposed for routing and retransmission scheme. Simulation and results shows that this approach can save the overall energy consumption  ...  Lifetime of two different schemes at mobile rate 6 packets/second Network Lifetime of two different schemes at mobile rate 12 packets/second Throughput is high when delay is less  ... 
doi:10.5121/ijwmn.2010.2312 fatcat:xaiyw6fabnge3hgvcsj5zphy7m

An approach to use FB-AODV with Android

Nicola Corriero, Emanuele Covino, Angelo Mottola
2011 Procedia Computer Science  
This work talks about an attempt to create a Mobile Ad-hoc NETwork with Android smartphones. We used FBaodv to manage the networks and some bash script to share informations within the networks.  ...  With cross compiling there are two different machines: • host is the machine on which there are the compiler and source; • target is the machine 2 where will run the cross-compiled source code.  ...  Have been downloaded for both devices two different toolchains to perform a cross compiling source code of Sourcery G++ Lite for HTC Polaris and arm-eabi-4.4.0 for Ideos Huawei.  ... 
doi:10.1016/j.procs.2011.07.044 fatcat:af2uo7adrfendgc7df5lzbimly

Technique for detection of cooperative black hole attack in MANET

Gayatri Wahane, Savita Lonare
2013 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)  
This work suggest two new concepts, first one is Maintenance of Data Routing Information Table and second is cross checking of a node.  ...  Section IV describes the proposed solution for detecting cooperative Black hole attacks in mobile ad hoc networks and shows the working of the algorithm with the help of an example.  ...  Maintenance of Data Routing Information Table (DRI). 2. Cross checking of a node.  ... 
doi:10.1109/icccnt.2013.6726621 fatcat:ftc7ayz5qba3bf5mfuodm2kt34

How to Work with Android within a (FB-)Aodv Network

N. Corriero, A. Mottola, E. Zhupa
2011 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing  
Android is a complete and innovative Open Source platform for mobile devices. FB-aodv is an extension of the existing AODV protocol.  ...  This work propose creation of a Mobile Ad-hoc NETwork with Android smartphones. We used FB-aodv to manage the networks and some bash script to share informations within the networks.  ...  Obtained from the sources of that tool, and after suitably modified the Makefile set the name of cross compiler used to compile the source of the HTC Polaris, has passed the stage of cross compilation  ... 
doi:10.1109/3pgcic.2011.16 dblp:conf/3pgcic/CorrieroMZ11 fatcat:gcnbqvqovjcdbkd5enllreexzm

Black Hole Attack in Mobile Ad Hoc Network and its Avoidance

Ali Ayid Ahmad, Ahmed Chalak Shakir
2017 Journal of Al-Qadisiyah for Computer Science and Mathematics  
The sequence number and On demand Distance Vector Routing protocol are integrated with a mechanism to find the Request Reply of message containing routing information from source to destination node in  ...  The routing of the packets from source node to destination node, the routing protocol is used.  ...  In case of second method such as cross validation each node cross checks the transmission overhead of its neighbor nodes.  ... 
doi:10.29304/jqcm.2017.9.2.317 fatcat:nylcg3bowzhtldxq3gohu6ip7y

Examining the impact of cross-domain learning on crime prediction

Fateha Khanam Bappee, Amilcar Soares, Lucas May Petry, Stan Matwin
2021 Journal of Big Data  
Our findings exhibit the satisfactory performance of our proposed data-driven approach by integrating multiple sources of data.  ...  We create a uniform outline for Halifax, Nova Scotia, one of Canada's geographic regions, by adapting and learning knowledge from two different domains, Toronto and Vancouver, which belong to different  ...  Acknowledgements The authors would like to thank the Natural Sciences and Engineering Research Council of Canada (NSERC) for financial support, Halifax Regional Municipality (HRM) and Halifax Regional  ... 
doi:10.1186/s40537-021-00489-9 pmid:34760434 pmcid:PMC8570338 fatcat:xbvu6he2ubh7vgjft3fuwejqam

Cross-Layer Support for Energy Efficient Routing in Wireless Sensor Networks

N. Chilamkurti, S. Zeadally, A. Vasilakos, V. Sharma
2009 Journal of Sensors  
We conducted extensive simulations to evaluate the performance of our proposed cross-layer DSR routing protocol.  ...  The Dynamic Source Routing (DSR) algorithm computes a new route when packet loss occurs.  ...  However, in this configuration, the difference between the use of cross-layer and without the use of cross-layer is not as high as we have seen for the static configuration.  ... 
doi:10.1155/2009/134165 fatcat:hwvkphbufrc5dkoeia2oxaxr34

PREVENTION MECHANISM OF BLACK HOLE AND JAMMING ATTACK IN MOBILE AD HOC NETWORK

Harsh Pratap Singh, Rashmi Singh
2020 Journal of Harmonized Research in Engineering  
The proposed work suggests two new concepts, Maintenance of Data Routing Information Table and cross checking of a node.  ...  In the scheme of cross checking, the source node sends the request message in order to find a secure route for transfer of data packets to the destination node.  ... 
doi:10.30876/johr.8.1.2020.01-07 fatcat:wuvwtl6kwbgevcjgm2cdiveig4

Real Time Trans Bus Tracking and Passenger Information System using Hybrid Application Technology

Putu Wira Buana, I Made Sukarsa, Ida Bagus Gede Purwania, I Gusti Bagus Yoga Prasetya
2016 International Journal of Software Engineering and Its Applications  
This application developed using Hybrid Application Technology (Cross Platform), based on the web and mobile application.  ...  A Real Time Trans Bus Tracking System can help solve the problem, by providing service to monitor the movement of Bus Trans Sarbagita and provide information to passengers about the estimated arrival time  ...  Acknowledgments This work was supported by The Department of Information Technology, Faculty of Engineering, Udayana University and The Transportation Department of Information and Communication of Bali  ... 
doi:10.14257/ijseia.2016.10.9.05 fatcat:4h3abwwurvbwvayqmeaeknpzwi

"My Environment" – A Dashboard for Environmental Information on Mobile Devices [chapter]

Thorsten Schlachter, Clemens Düpmeier, Rainer Weidemann, Wolfgang Schillinger, Nina Bayer
2013 IFIP Advances in Information and Communication Technology  
This paper describes a universal approach to the development of a cross-platform and multi-functional environmental mobile application.  ...  These use cases include information about the environment ("my environment"), reporting of environmental data ("crowd sourcing"), and environmental experience ("electronic nature guide").  ...  The used PhoneGap/Cordova framework for cross development supports the particular use of components of different operating systems (including iOS, Android, Windows Mobile and BlackBerry) in a portable  ... 
doi:10.1007/978-3-642-41151-9_19 fatcat:tdfkyqhkhzdu3mq5nwdkc7qeja

Cyber–Physical–Social Frameworks for Urban Big Data Systems: A Survey

Suparna De, Yuchao Zhou, Iker Larizgoitia Abad, Klaus Moessner
2017 Applied Sciences  
The nature of CPSS data brings new requirements and challenges to different stages of data manipulation, including identification of data sources, processing and fusion of different types and scales of  ...  Alongside this, the growing use of social networks offers near real-time citizen sensing capabilities as a complementary information source.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app7101017 fatcat:xzuyyu6ainbijnv54h3ryt3nqi
« Previous Showing results 1 — 15 out of 256,474 results