1,314 Hits in 8.4 sec

Sentiment processing of social media information from both wireless and wired network

Xinzhi Wang, Hui Zhang, Shengcheng Yuan, Jiayue Wang, Yang Zhou
2016 EURASIP Journal on Wireless Communications and Networking  
Microblog platform on mobile terminals, as one product of wireless communication, facilitate information spreading and evolution by conveying message from peer to peer.  ...  Recent years, information spreading under the environment of wireless communication has attracted increasing interest.  ...  Acknowledgements This work is partially supported by the National Natural Science Foundation of China (Grant No. 91224008) and by the National Basic Research Program of China (973 Program No. 2012CB719705  ... 
doi:10.1186/s13638-016-0661-x fatcat:mu2wjxmo6jg7rmzvnrwktdu63a

Real-Time Analysis of Youth Emotion Based on Python Language and Smart Sensor Network

Qilin Yan, Chia-Huei Wu
2022 Mobile Information Systems  
In the hardware part, it mainly gives a brief overview of information collection, data transmission, and data processing.  ...  In the introduction, it mainly explains the design of the intelligent sensor network system and introduces the system architecture and software and hardware design of the wireless sensor network in detail  ...  It combines both wired and wireless monitoring technologies and is a heterogeneous sensor network with multiple forms of communication.  ... 
doi:10.1155/2022/8635787 fatcat:a5o5grjamzapfkb5p2ol56347m

The Internet of People: A Survey and Tutorial [article]

Feifei Shi, Wenxi Wang, Hang Wang, Huansheng Ning
2021 arXiv   pre-print
For example, the prosperity of social media enables us to build and maintain new relationships without considering physical boundaries.  ...  In this paper, we give a comprehensive overview of IoP by comparing it with IoT, introduce its enabling techniques from aspects of sensing, communication and application.  ...  Network Analysis (SNA): As mentioned above, SNA could be regarded as an interdisciplinary analysis from aspects of both sociology and information science.  ... 
arXiv:2104.04079v1 fatcat:ylp2zxen2zg2jennhgijnfotiu

Editorial for June 2020 Issue

S. V. Raghavan, Navakanta Bhat, Krishna Sivalingam, Sanjiva Prasad
2020 CSI Transactions on ICT  
The research reported here are from three major areas; they are Electronics System Design and Manufacturing, Information Technology, and Information Technology enabled services.  ...  We constitute the National Academic Advisory Committee for the largest program of Government of India focused on Electronic Systems Design and Manufacturing, Information Technology, and Information Technology  ...  The research reported here are from three major areas; they are Electronics System Design and Manufacturing, Information Technology, and Information Technology enabled services.  ... 
doi:10.1007/s40012-020-00310-7 fatcat:h7u3aejaa5gsfk44uqthuc2s6q

Convergence of functional areas in information operations

Brett Van Niekerk
2015 South African Journal of Information Management  
information technology.Objective: The aim of the article is to illustrate the convergence of the functional areas of information operations through the use of reported examples and descriptive models.  ...  This holds implications for military information operations and information warfare concepts as the previously separate functional areas are increasingly overlapping due to the increased convergence of  ...  The overlaps are becoming larger due to the rapid uptake of wireless technology and social media.  ... 
doi:10.4102/sajim.v17i1.605 fatcat:ve7jwnildjceva4minyzrio2hy

"Network Sentiment" Framework to Improve Security and Privacy for Smart Home

Tommaso Pecorella, Laura Pierucci, Francesca Nizzi
2018 Future Internet  
In this scenario, an attacker can undermine both the network security and the user's security/privacy.  ...  Moreover, the level of network sentiment detected can be propagate to nearby home networks (e.g., the smart home networks of the apartments inside a building) to increase/decrease their level of security  ...  Summarizing, the exchange of the Network Sentiment informs both the SH and the SCN about the ongoing attacks in the network.  ... 
doi:10.3390/fi10120125 fatcat:iakkkuu5gzehhj6aowwjfuap5m


David Mitchell
2005 Canadian Journal of Communication  
public service access points [PSAPs] ) the provision of E9-1-1 services at the first two levels: physical transport (i.e., wired and wireless forms of transmission) and network services (i.e., switching  ...  However, the options for using media to mobilize sentiment and organize political protest have become fairly restrictive with the emergence of mass media of communications-first newspapers, then radio  ... 
doi:10.22230/cjc.2005v30n1a1514 fatcat:joogk34fqne4rbkoafl6zi24li

Network Hopes

Andrea H. Tapia, Julio Angel Ortiz
2010 Social science computer review  
In this work, the authors examine four cases of municipalities that have attempted to create municipal-sponsored wireless broadband networks.  ...  In this article, we argue against a simplistic, deterministic, utopian view of information and communication technologies.  ...  Today, a piece of wire from a wire-cutting ceremony has become detached and is falling off the famous display.  ... 
doi:10.1177/0894439309335169 fatcat:bm5rioccqrc7fd5dhydyk3scy4

A Survey on Data Perception in Cognitive Internet of Things

Lokesh B. Bhajantri, Prashant Balugari
2019 Journal of Telecommunications and Information Technology  
CIoT can perceive present system's conditions, analyze the apparent information, make smart choices, and increase the network performance.  ...  This paper also compares the data perception works against energy consumption, network life-time, resource allocation, and throughput, as well as quality of data and delay.  ...  [17] has proposed a profound slant sentiment model inside the space of CIoT. Data recovery in social media is an overwhelming task which requires a great deal of specialized bits of knowledge.  ... 
doi:10.26636/jtit.2019.13141919 fatcat:zmpreous2jdbjflgws7qcd4c5a

Device ensembles [ubiquitous computing

B.N. Schilit, U. Sengupta
2004 Computer  
For example, you probably have asked yourself one or more of the following questions: USAGE MODELS Early usage models for ensemble computing cen-The ubiquity of wireless local and personal area networks  ...  Looking across four system layers-link, network, data, and application-the authors survey the technologies, standards, and leading-edge research making device ensembles a reality.  ...  Acknowledgments We thank Brian Belmont, Ram Chary, Tanzeem Choudhury, Ken Fishkin, Vittal Kini, James Landay, Hans Mulder, Prasanna Mulgaonkar, Matthai Philipose, Justin Rattner, David Tennenhouse, Ticky Thakkar, and  ... 
doi:10.1109/mc.2004.241 fatcat:7i76zrqkljbxxiyhlidv6kfgyq

Telecommunication [1935]

S. H. Witt
2010 Telecommunications Journal of Australia  
Noble: We think social networking or social computing is huge. People spend a lot of their time already on social networking sites.  ...  From a business perspective, the strength and innovation of Web 2.0 lies in the networks of friends and social contacts that have evolved in social network sites.  ...  of both IP1 and Nextgen Networks during 2003  ... 
doi:10.2104/tja10034 fatcat:ioc6onbktnawpbhktw67iebquq

City bug report

Henrik Korsgaard, Martin Brynskov
2014 Proceedings of the 2nd Media Architecture Biennale Conference on World Cities - MAB '14  
We synthesise our findings and ask if and how media architects as a community of practice can encourage the 'opensourcing' of information and tools allowing laypeople to not only participate but become  ...  In this paper, we examine how to bring about and foster more open and participatory approaches to engage communities through media architecture by identifying novel ways to put some of the creative process  ...  Acknowledging the importance of the amateurs or lovers, in the evolution of technology, Paulos supports DIY cultures and calls on technologists and engineers to shift their thinking towards more participatory  ... 
doi:10.1145/2682884.2682896 dblp:conf/mab/KorsgaardB14 fatcat:mdpnfowtuzgs3fcjdxrzc5lepm

Reasonable Expectations of Privacy Settings: Contemplating the Stored Communications Act Through the Prism of Social Media

Christopher J. Borchert, Fernando M. Pinguelo, David Thaw
2013 Social Science Research Network  
should afford protection to new technologies such as social media communications consistent with that intent based on individuals' expressed privacy preferences.  ...  Acting out of direct concern for the implications of the Third-Party Records Doctrine-a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third  ...  Social Media and the SCA Application of the SCA in the context of social media poses numerous practical and legal challenges.  ... 
doi:10.2139/ssrn.2306839 fatcat:pxmcyzny2faibfmr4db557sfee

The Rising Role of Big Data Analytics and IoT in Disaster Management: Recent Advances, Taxonomy and Prospects

Syed Attique Shah, Dursun Zafer Seker, Sufian Hameed, Dirk Draheim
2019 IEEE Access  
The recent development of big data analytics (BDA) and the Internet of Things (IoT) technologies create a huge opportunity for both disaster management systems and disaster-related authorities (emergency  ...  The reference model with its proposed integrated parameters can provide guidelines to harvest, transmit, manage, and analyze disaster data from various data sources to deliver updated and valuable information  ...  Disaster information networks should be assembled by combining various wired, wireless and satellite network so that a ''never-die-network'' can be ensured for both normal and disaster occurrence cases  ... 
doi:10.1109/access.2019.2913340 fatcat:ndylscl3dfb3renpzpkg2g2bme

A Proposed Ideal Network Design for Collaborative Workspace Businesses

2021 International Journal of Advanced Trends in Computer Science and Engineering  
Computer networking can contribute to the improvement of sales and customer retention and service of coworking space businesses.  ...  Analysis of ideal network management was proposed in administration, operation, security, and maintenance.  ...  As a recommendation also, it would be best if sentiments analysis will be done from social media posts similar to the study of Buadaco et al where they scrape a micro blog social media platform to analyze  ... 
doi:10.30534/ijatcse/2021/011022021 fatcat:gmwk2gjcw5dcxguhgaj2eqla3m
« Previous Showing results 1 — 15 out of 1,314 results