CINXE.COM
Search results for: access networks
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: access networks</title> <meta name="description" content="Search results for: access networks"> <meta name="keywords" content="access networks"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="access networks" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="access networks"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 5924</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: access networks</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5834</span> The Making of a Community: Perception versus Reality of Neighborhood Resources</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kirstie%20Smith">Kirstie Smith</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper elucidates the value of neighborhood perception as it contributes to the advancement of well-being for individuals and families within a neighborhood. Through in-depth interviews with city residents, this paper examines the degree to which key stakeholders’ (residents) evaluate their neighborhood and perception of resources and identify, access, and utilize local assets existing in the community. Additionally, the research objective included conducting a community inventory that qualified the community assets and resources of lower-income neighborhoods of a medium-sized industrial city. Analysis of the community’s assets was compared with the interview results to allow for a better understanding of the community’s condition. Community mapping revealed the key informants’ reflections of assets were somewhat validated. In each neighborhood, there were more assets mapped than reported in the interviews. Another chief supposition drawn from this study was the identification of key development partners and social networks that offer the potential to facilitate locally-driven community development. Overall, the participants provided invaluable local knowledge of the perception of neighborhood assets, the well-being of residents, the condition of the community, and suggestions for responding to the challenges of the entire community in order to mobilize the present assets and networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=community%20mapping" title="community mapping">community mapping</a>, <a href="https://publications.waset.org/abstracts/search?q=family" title=" family"> family</a>, <a href="https://publications.waset.org/abstracts/search?q=resource%20allocation" title=" resource allocation"> resource allocation</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks" title=" social networks"> social networks</a> </p> <a href="https://publications.waset.org/abstracts/54255/the-making-of-a-community-perception-versus-reality-of-neighborhood-resources" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/54255.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">353</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5833</span> The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Habib%20Gorine">Habib Gorine</a>, <a href="https://publications.waset.org/abstracts/search?q=Rabia%20Saleh"> Rabia Saleh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=MANET" title="MANET">MANET</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20networks" title=" wireless networks"> wireless networks</a>, <a href="https://publications.waset.org/abstracts/search?q=routing%20protocols" title=" routing protocols"> routing protocols</a>, <a href="https://publications.waset.org/abstracts/search?q=malicious%20attacks" title=" malicious attacks"> malicious attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20networks%20simulation" title=" wireless networks simulation"> wireless networks simulation</a> </p> <a href="https://publications.waset.org/abstracts/88341/the-impact-of-malicious-attacks-on-the-performance-of-routing-protocols-in-mobile-ad-hoc-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88341.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">320</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5832</span> Analyzing Keyword Networks for the Identification of Correlated Research Topics </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Thiago%20M.%20R.%20Dias">Thiago M. R. Dias</a>, <a href="https://publications.waset.org/abstracts/search?q=Patr%C3%ADcia%20M.%20Dias"> Patrícia M. Dias</a>, <a href="https://publications.waset.org/abstracts/search?q=Gray%20F.%20Moita"> Gray F. Moita</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The production and publication of scientific works have increased significantly in the last years, being the Internet the main factor of access and distribution of these works. Faced with this, there is a growing interest in understanding how scientific research has evolved, in order to explore this knowledge to encourage research groups to become more productive. Therefore, the objective of this work is to explore repositories containing data from scientific publications and to characterize keyword networks of these publications, in order to identify the most relevant keywords, and to highlight those that have the greatest impact on the network. To do this, each article in the study repository has its keywords extracted and in this way the network is characterized, after which several metrics for social network analysis are applied for the identification of the highlighted keywords. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bibliometrics" title="bibliometrics">bibliometrics</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20analysis" title=" data analysis"> data analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=extraction%20and%20data%20integration" title=" extraction and data integration"> extraction and data integration</a>, <a href="https://publications.waset.org/abstracts/search?q=scientometrics" title=" scientometrics"> scientometrics</a> </p> <a href="https://publications.waset.org/abstracts/67802/analyzing-keyword-networks-for-the-identification-of-correlated-research-topics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67802.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">257</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5831</span> Proposed Framework based on Classification of Vertical Handover Decision Strategies in Heterogeneous Wireless Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shidrokh%20Goudarzi">Shidrokh Goudarzi</a>, <a href="https://publications.waset.org/abstracts/search?q=Wan%20Haslina%20Hassan"> Wan Haslina Hassan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Heterogeneous wireless networks are converging towards an all-IP network as part of the so-called next-generation network. In this paradigm, different access technologies need to be interconnected; thus, vertical handovers or vertical handoffs are necessary for seamless mobility. In this paper, we conduct a review of existing vertical handover decision-making mechanisms that aim to provide ubiquitous connectivity to mobile users. To offer a systematic comparison, we categorize these vertical handover measurement and decision structures based on their respective methodology and parameters. Subsequently, we analyze several vertical handover approaches in the literature and compare them according to their advantages and weaknesses. The paper compares the algorithms based on the network selection methods, complexity of the technologies used and efficiency in order to introduce our vertical handover decision framework. We find that vertical handovers on heterogeneous wireless networks suffer from the lack of a standard and efficient method to satisfy both user and network quality of service requirements at different levels including architectural, decision-making and protocols. Also, the consolidation of network terminal, cross-layer information, multi packet casting and intelligent network selection algorithm appears to be an optimum solution for achieving seamless service continuity in order to facilitate seamless connectivity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=heterogeneous%20wireless%20networks" title="heterogeneous wireless networks">heterogeneous wireless networks</a>, <a href="https://publications.waset.org/abstracts/search?q=vertical%20handovers" title=" vertical handovers"> vertical handovers</a>, <a href="https://publications.waset.org/abstracts/search?q=vertical%20handover%20metric" title=" vertical handover metric"> vertical handover metric</a>, <a href="https://publications.waset.org/abstracts/search?q=decision-making%20algorithms" title=" decision-making algorithms"> decision-making algorithms</a> </p> <a href="https://publications.waset.org/abstracts/19433/proposed-framework-based-on-classification-of-vertical-handover-decision-strategies-in-heterogeneous-wireless-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19433.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">393</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5830</span> Performance Improvement of Long-Reach Optical Access Systems Using Hybrid Optical Amplifiers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shreyas%20Srinivas%20Rangan">Shreyas Srinivas Rangan</a>, <a href="https://publications.waset.org/abstracts/search?q=Jurgis%20Porins"> Jurgis Porins</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The internet traffic has increased exponentially due to the high demand for data rates by the users, and the constantly increasing metro networks and access networks are focused on improving the maximum transmit distance of the long-reach optical networks. One of the common methods to improve the maximum transmit distance of the long-reach optical networks at the component level is to use broadband optical amplifiers. The Erbium Doped Fiber Amplifier (EDFA) provides high amplification with low noise figure but due to the characteristics of EDFA, its operation is limited to C-band and L-band. In contrast, the Raman amplifier exhibits a wide amplification spectrum, and negative noise figure values can be achieved. To obtain such results, high powered pumping sources are required. Operating Raman amplifiers with such high-powered optical sources may cause fire hazards and it may damage the optical system. In this paper, we implement a hybrid optical amplifier configuration. EDFA and Raman amplifiers are used in this hybrid setup to combine the advantages of both EDFA and Raman amplifiers to improve the reach of the system. Using this setup, we analyze the maximum transmit distance of the network by obtaining a correlation diagram between the length of the single-mode fiber (SMF) and the Bit Error Rate (BER). This hybrid amplifier configuration is implemented in a Wavelength Division Multiplexing (WDM) system with a BER of 10⁻⁹ by using NRZ modulation format, and the gain uniformity noise ratio (signal-to-noise ratio (SNR)), the efficiency of the pumping source, and the optical signal gain efficiency of the amplifier are studied experimentally in a mathematical modelling environment. Numerical simulations were implemented in RSoft OptSim simulation software based on the nonlinear Schrödinger equation using the Split-Step method, the Fourier transform, and the Monte Carlo method for estimating BER. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Raman%20amplifier" title="Raman amplifier">Raman amplifier</a>, <a href="https://publications.waset.org/abstracts/search?q=erbium%20doped%20fibre%20amplifier" title=" erbium doped fibre amplifier"> erbium doped fibre amplifier</a>, <a href="https://publications.waset.org/abstracts/search?q=bit%20error%20rate" title=" bit error rate"> bit error rate</a>, <a href="https://publications.waset.org/abstracts/search?q=hybrid%20optical%20amplifiers" title=" hybrid optical amplifiers"> hybrid optical amplifiers</a> </p> <a href="https://publications.waset.org/abstracts/181551/performance-improvement-of-long-reach-optical-access-systems-using-hybrid-optical-amplifiers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/181551.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">70</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5829</span> Interbank Networks and the Benefits of Using Multilayer Structures </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Danielle%20Sandler%20dos%20Passos">Danielle Sandler dos Passos</a>, <a href="https://publications.waset.org/abstracts/search?q=Helder%20Coelho"> Helder Coelho</a>, <a href="https://publications.waset.org/abstracts/search?q=Fl%C3%A1via%20Mori%20Sarti"> Flávia Mori Sarti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Complexity science seeks the understanding of systems adopting diverse theories from various areas. Network analysis has been gaining space and credibility, namely with the biological, social and economic systems. Significant part of the literature focuses only monolayer representations of connections among agents considering one level of their relationships, and excludes other levels of interactions, leading to simplistic results in network analysis. Therefore, this work aims to demonstrate the advantages of the use of multilayer networks for the representation and analysis of networks. For this, we analyzed an interbank network, composed of 42 banks, comparing the centrality measures of the agents (degree and PageRank) resulting from each method (monolayer <em>x</em> multilayer). This proved to be the most reliable and efficient the multilayer analysis for the study of the current networks and highlighted JP Morgan and Deutsche Bank as the most important banks of the analyzed network. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=complexity" title="complexity">complexity</a>, <a href="https://publications.waset.org/abstracts/search?q=interbank%20networks" title=" interbank networks"> interbank networks</a>, <a href="https://publications.waset.org/abstracts/search?q=multilayer%20networks" title=" multilayer networks"> multilayer networks</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20analysis" title=" network analysis"> network analysis</a> </p> <a href="https://publications.waset.org/abstracts/92811/interbank-networks-and-the-benefits-of-using-multilayer-structures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/92811.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">282</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5828</span> An Approach for Multilayered Ecological Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20F.%20F.%20Ebecken">N. F. F. Ebecken</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20C.%20Pereira"> G. C. Pereira</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Although networks provide a powerful approach to the study of a wide variety of ecological systems, their formulation usually does not include various types of interactions, interactions that vary in space and time, and interconnected systems such as networks. The emerging field of 'multilayer networks' provides a natural framework for extending ecological systems analysis to include these multiple layers of complexity as it specifically allows for differentiation and modeling of intralayer and interlayer connectivity. The structure provides a set of concepts and tools that can be adapted and applied to the ecology, facilitating research in high dimensionality, heterogeneous systems in nature. Here, ecological multilayer networks are formally defined based on a review of prior and related approaches, illustrates their application and potential with existing data analyzes, and discusses limitations, challenges, and future applications. The integration of multilayer network theory into ecology offers a largely untapped potential to further address ecological complexity, to finally provide new theoretical and empirical insights into the architecture and dynamics of ecological systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ecological%20networks" title="ecological networks">ecological networks</a>, <a href="https://publications.waset.org/abstracts/search?q=multilayered%20networks" title=" multilayered networks"> multilayered networks</a>, <a href="https://publications.waset.org/abstracts/search?q=sea%20ecology" title=" sea ecology"> sea ecology</a>, <a href="https://publications.waset.org/abstracts/search?q=Brazilian%20Coastal%20Area" title=" Brazilian Coastal Area"> Brazilian Coastal Area</a> </p> <a href="https://publications.waset.org/abstracts/104637/an-approach-for-multilayered-ecological-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/104637.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">155</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5827</span> Artificial Neural Networks in Environmental Psychology: Application in Architectural Projects</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Diego%20De%20Almeida%20Pereira">Diego De Almeida Pereira</a>, <a href="https://publications.waset.org/abstracts/search?q=Diana%20Borchenko"> Diana Borchenko</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Artificial neural networks are used for many applications as they are able to learn complex nonlinear relationships between input and output data. As the number of neurons and layers in a neural network increases, it is possible to represent more complex behaviors. The present study proposes that artificial neural networks are a valuable tool for architecture and engineering professionals concerned with understanding how buildings influence human and social well-being based on theories of environmental psychology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=environmental%20psychology" title="environmental psychology">environmental psychology</a>, <a href="https://publications.waset.org/abstracts/search?q=architecture" title=" architecture"> architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20networks" title=" neural networks"> neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20and%20social%20well-being" title=" human and social well-being"> human and social well-being</a> </p> <a href="https://publications.waset.org/abstracts/147521/artificial-neural-networks-in-environmental-psychology-application-in-architectural-projects" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147521.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">496</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5826</span> A Lifetime-Enhancing Monitoring Node Distribution Using Minimum Spanning Tree in Mobile Ad Hoc Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sungchul%20Ha">Sungchul Ha</a>, <a href="https://publications.waset.org/abstracts/search?q=Hyunwoo%20Kim"> Hyunwoo Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In mobile ad hoc networks, all nodes in a network only have limited resources and calculation ability. Therefore communication topology which have long lifetime is good for all nodes in mobile ad hoc networks. There are a variety of researches on security problems in wireless ad hoc networks. The existing many researches try to make efficient security schemes to reduce network power consumption and enhance network lifetime. Because a new node can join the network at any time, the wireless ad hoc networks are exposed to various threats and can be destroyed by attacks. Resource consumption is absolutely necessary to secure networks, but more resource consumption can be a critical problem to network lifetime. This paper focuses on efficient monitoring node distribution to enhance network lifetime in wireless ad hoc networks. Since the wireless ad hoc networks cannot use centralized infrastructure and security systems of wired networks, a new special IDS scheme is necessary. The scheme should not only cover all nodes in a network but also enhance the network lifetime. In this paper, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method. The simulation results show that the proposed algorithm has superior performance in comparison with existing algorithms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=MANETs" title="MANETs">MANETs</a>, <a href="https://publications.waset.org/abstracts/search?q=IDS" title=" IDS"> IDS</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20control" title=" power control"> power control</a>, <a href="https://publications.waset.org/abstracts/search?q=minimum%20spanning%20tree" title=" minimum spanning tree "> minimum spanning tree </a> </p> <a href="https://publications.waset.org/abstracts/3530/a-lifetime-enhancing-monitoring-node-distribution-using-minimum-spanning-tree-in-mobile-ad-hoc-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3530.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">372</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5825</span> Building Care Networks for Patients with Life-Limiting Illnesses: Perspectives from Health Care and Social Service Providers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lindy%20Van%20Vliet">Lindy Van Vliet</a>, <a href="https://publications.waset.org/abstracts/search?q=Saloni%20Phadke"> Saloni Phadke</a>, <a href="https://publications.waset.org/abstracts/search?q=Anthea%20Nelson"> Anthea Nelson</a>, <a href="https://publications.waset.org/abstracts/search?q=Ann%20Gallant"> Ann Gallant</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Comprehensive and compassionate palliative care and support requires an integrated system of care that draws on formal health and social service providers working together with community and informal networks to ensure that patients and families have access to the care they need. The objective of this study is to further explore and understand the community supports, services, and informal networks that health care professionals and social service providers rely on to allow their patients to die in their homes and communities. Drawing on an interpretivist, exploratory, qualitative design, our multidisciplinary research team (medicine, nursing and social work) conducted interviews with 15 health care and social service providers in the Ottawa region. Interview data was audio-recorded, transcribed and analyzed using a reflexive thematic analysis approach. The data deepens our understandings of the facilitators and barriers that arise as health care and social service providers attempt to build networks of care for patients with life limiting illnesses and families. Three main findings emerged: First, the variability that arises due to systemic barriers in accessing and providing care; second, the exceptionally challenging workload that providers are facing as they work to address complex social care needs (housing, disability, food security), along with escalating palliative care needs; and, finally, the lack of structural support that providers and informal care networks receive. Conclusion: These findings will facilitate and build stronger person-centred/relationship-centred principles and practices between providers, patients, community, and informal care networks by highlighting the systemic barriers to accessing and providing person-centred care. Further, they will have important implications for future partnerships in integrated care delivery programs and initiatives, community policies, education programs, and provincial and national palliative care strategies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=public%20health%20palliative%20care" title="public health palliative care">public health palliative care</a>, <a href="https://publications.waset.org/abstracts/search?q=palliative%20care%20nursing" title=" palliative care nursing"> palliative care nursing</a>, <a href="https://publications.waset.org/abstracts/search?q=care%20networks" title=" care networks"> care networks</a>, <a href="https://publications.waset.org/abstracts/search?q=informal%20care" title=" informal care"> informal care</a>, <a href="https://publications.waset.org/abstracts/search?q=integrated%20health%20care" title=" integrated health care"> integrated health care</a> </p> <a href="https://publications.waset.org/abstracts/157559/building-care-networks-for-patients-with-life-limiting-illnesses-perspectives-from-health-care-and-social-service-providers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157559.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">96</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5824</span> Functional Variants Detection by RNAseq</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Raffaele%20A.%20Calogero">Raffaele A. Calogero</a> </p> <p class="card-text"><strong>Abstract:</strong></p> RNAseq represents an attractive methodology for the detection of functional genomic variants. RNAseq results obtained from polyA+ RNA selection protocol (POLYA) and from exonic regions capturing protocol (ACCESS) indicate that ACCESS detects 10% more coding SNV/INDELs with respect to POLYA. ACCESS requires less reads for coding SNV detection with respect to POLYA. However, if the analysis aims at identifying SNV/INDELs also in the 5’ and 3’ UTRs, POLYA is definitively the preferred method. No particular advantage comes from ACCESS or POLYA in the detection of fusion transcripts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fusion%20transcripts" title="fusion transcripts">fusion transcripts</a>, <a href="https://publications.waset.org/abstracts/search?q=INDEL" title=" INDEL"> INDEL</a>, <a href="https://publications.waset.org/abstracts/search?q=RNA-seq" title=" RNA-seq"> RNA-seq</a>, <a href="https://publications.waset.org/abstracts/search?q=WES" title=" WES"> WES</a>, <a href="https://publications.waset.org/abstracts/search?q=SNV" title=" SNV"> SNV</a> </p> <a href="https://publications.waset.org/abstracts/57993/functional-variants-detection-by-rnaseq" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57993.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">288</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5823</span> Social Media Mining with R. Twitter Analyses</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Diana%20Codat">Diana Codat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Tweets' analysis is part of text mining. Each document is a written text. It's possible to apply the usual text search techniques, in particular by switching to the bag-of-words representation. But the tweets induce peculiarities. Some may enrich the analysis. Thus, their length is calibrated (at least as far as public messages are concerned), special characters make it possible to identify authors (@) and themes (#), the tweet and retweet mechanisms make it possible to follow the diffusion of the information. Conversely, other characteristics may disrupt the analyzes. Because space is limited, authors often use abbreviations, emoticons to express feelings, and they do not pay much attention to spelling. All this creates noise that can complicate the task. The tweets carry a lot of potentially interesting information. Their exploitation is one of the main axes of the analysis of the social networks. We show how to access Twitter-related messages. We will initiate a study of the properties of the tweets, and we will follow up on the exploitation of the content of the messages. We will work under R with the package 'twitteR'. The study of tweets is a strong focus of analysis of social networks because Twitter has become an important vector of communication. This example shows that it is easy to initiate an analysis from data extracted directly online. The data preparation phase is of great importance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title="data mining">data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20R" title=" language R"> language R</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks" title=" social networks"> social networks</a>, <a href="https://publications.waset.org/abstracts/search?q=Twitter" title=" Twitter "> Twitter </a> </p> <a href="https://publications.waset.org/abstracts/81942/social-media-mining-with-r-twitter-analyses" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/81942.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">184</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5822</span> Synchronization of Semiconductor Laser Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20M.%20L%C3%B3pez-Guti%C3%A9rrez">R. M. López-Gutiérrez</a>, <a href="https://publications.waset.org/abstracts/search?q=L.%20Cardoza-Avenda%C3%B1o"> L. Cardoza-Avendaño</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Cervantes-de%20%C3%81vila"> H. Cervantes-de Ávila</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20A.%20Michel-Macarty"> J. A. Michel-Macarty</a>, <a href="https://publications.waset.org/abstracts/search?q=C.%20Cruz-Hern%C3%A1ndez"> C. Cruz-Hernández</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Arellano-Delgado"> A. Arellano-Delgado</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Carmona-Rodr%C3%ADguez"> R. Carmona-Rodríguez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, synchronization of multiple chaotic semiconductor lasers is achieved by appealing to complex system theory. In particular, we consider dynamical networks composed by semiconductor laser, as interconnected nodes, where the interaction in the networks are defined by coupling the first state of each node. An interesting case is synchronized with master-slave configuration in star topology. Nodes of these networks are modeled for the laser and simulated by Matlab. These results are applicable to private communication. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=chaotic%20laser" title="chaotic laser">chaotic laser</a>, <a href="https://publications.waset.org/abstracts/search?q=network" title=" network"> network</a>, <a href="https://publications.waset.org/abstracts/search?q=star%20topology" title=" star topology"> star topology</a>, <a href="https://publications.waset.org/abstracts/search?q=synchronization" title=" synchronization"> synchronization</a> </p> <a href="https://publications.waset.org/abstracts/34528/synchronization-of-semiconductor-laser-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34528.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">566</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5821</span> The Effect of Visual Fluency and Cognitive Fluency on Access Rates of Web Pages</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xiaoying%20Guo">Xiaoying Guo</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiangyun%20Wang"> Xiangyun Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Access rates is a key indicator of reflecting the popularity of web pages. Having high access rates are very important for web pages, especially for news web pages, online shopping sites and searching engines. In this paper, we analyzed the influences of visual fluency and cognitive fluency on access rates of Chinese web pages. Firstly, we conducted an experiment of scoring the web pages. Twenty-five subjects were invited to view top 50 web pages of China, and they were asked to give a score in a 5-point Likert-scale from four aspects, including complexity, comfortability, familiarity and usability. Secondly, the obtained results was analyzed by correlation analysis and factor analysis in R. By factor analysis; we analyzed the contributions of visual fluency and cognitive fluency to the access rates. The results showed that both visual fluency and cognitive fluency affect the access rate of web pages. Compared to cognitive fluency, visual fluency play a more important role in user’s accessing of web pages. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=visual%20fluency" title="visual fluency">visual fluency</a>, <a href="https://publications.waset.org/abstracts/search?q=cognitive%20fluency" title=" cognitive fluency"> cognitive fluency</a>, <a href="https://publications.waset.org/abstracts/search?q=visual%20complexity" title=" visual complexity"> visual complexity</a>, <a href="https://publications.waset.org/abstracts/search?q=usability" title=" usability"> usability</a> </p> <a href="https://publications.waset.org/abstracts/74117/the-effect-of-visual-fluency-and-cognitive-fluency-on-access-rates-of-web-pages" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74117.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">379</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5820</span> Game Structure and Spatio-Temporal Action Detection in Soccer Using Graphs and 3D Convolutional Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=J%C3%A9r%C3%A9mie%20Ochin">Jérémie Ochin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Soccer analytics are built on two data sources: the frame-by-frame position of each player on the terrain and the sequences of events, such as ball drive, pass, cross, shot, throw-in... With more than 2000 ball-events per soccer game, their precise and exhaustive annotation, based on a monocular video stream such as a TV broadcast, remains a tedious and costly manual task. State-of-the-art methods for spatio-temporal action detection from a monocular video stream, often based on 3D convolutional neural networks, are close to reach levels of performances in mean Average Precision (mAP) compatibles with the automation of such task. Nevertheless, to meet their expectation of exhaustiveness in the context of data analytics, such methods must be applied in a regime of high recall – low precision, using low confidence score thresholds. This setting unavoidably leads to the detection of false positives that are the product of the well documented overconfidence behaviour of neural networks and, in this case, their limited access to contextual information and understanding of the game: their predictions are highly unstructured. Based on the assumption that professional soccer players’ behaviour, pose, positions and velocity are highly interrelated and locally driven by the player performing a ball-action, it is hypothesized that the addition of information regarding surrounding player’s appearance, positions and velocity in the prediction methods can improve their metrics. Several methods are compared to build a proper representation of the game surrounding a player, from handcrafted features of the local graph, based on domain knowledge, to the use of Graph Neural Networks trained in an end-to-end fashion with existing state-of-the-art 3D convolutional neural networks. It is shown that the inclusion of information regarding surrounding players helps reaching higher metrics. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fine-grained%20action%20recognition" title="fine-grained action recognition">fine-grained action recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20action%20recognition" title=" human action recognition"> human action recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=convolutional%20neural%20networks" title=" convolutional neural networks"> convolutional neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=graph%20neural%20networks" title=" graph neural networks"> graph neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=spatio-temporal%20action%20recognition" title=" spatio-temporal action recognition"> spatio-temporal action recognition</a> </p> <a href="https://publications.waset.org/abstracts/192167/game-structure-and-spatio-temporal-action-detection-in-soccer-using-graphs-and-3d-convolutional-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/192167.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">24</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5819</span> A Secure Routing Algorithm for Underwater Wireless Sensor Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Seyed%20Mahdi%20Jameii">Seyed Mahdi Jameii</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Underwater wireless sensor networks have been attracting the interest of many researchers lately, and the past three decades have beheld the rapid progress of underwater acoustic communication. One of the major problems in underwater wireless sensor networks is how to transfer data from the moving node to the base stations and choose the optimized route for data transmission. Secure routing in underwater wireless sensor network (UWCNs) is necessary for packet delivery. Some routing protocols are proposed for underwater wireless sensor networks. However, a few researches have been done on secure routing in underwater sensor networks. In this article, a secure routing protocol is provided to resist against wormhole and sybil attacks. The results indicated acceptable performance in terms of increasing the packet delivery ratio with regards to the attacks, increasing network lifetime by creating balance in the network energy consumption, high detection rates against the attacks, and low-end to end delay. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=attacks" title="attacks">attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=routing" title=" routing"> routing</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=underwater%20wireless%20sensor%20networks" title=" underwater wireless sensor networks"> underwater wireless sensor networks</a> </p> <a href="https://publications.waset.org/abstracts/70929/a-secure-routing-algorithm-for-underwater-wireless-sensor-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70929.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">418</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5818</span> Ontology-Based Approach for Temporal Semantic Modeling of Social Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sou%C3%A2ad%20Boudebza">Souâad Boudebza</a>, <a href="https://publications.waset.org/abstracts/search?q=Omar%20Nouali"> Omar Nouali</a>, <a href="https://publications.waset.org/abstracts/search?q=Fai%C3%A7al%20Azouaou"> Faiçal Azouaou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social networks have recently gained a growing interest on the web. Traditional formalisms for representing social networks are static and suffer from the lack of semantics. In this paper, we will show how semantic web technologies can be used to model social data. The SemTemp ontology aligns and extends existing ontologies such as FOAF, SIOC, SKOS and OWL-Time to provide a temporal and semantically rich description of social data. We also present a modeling scenario to illustrate how our ontology can be used to model social networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ontology" title="ontology">ontology</a>, <a href="https://publications.waset.org/abstracts/search?q=semantic%20web" title=" semantic web"> semantic web</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20network" title=" social network"> social network</a>, <a href="https://publications.waset.org/abstracts/search?q=temporal%20modeling" title=" temporal modeling"> temporal modeling</a> </p> <a href="https://publications.waset.org/abstracts/42125/ontology-based-approach-for-temporal-semantic-modeling-of-social-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42125.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">387</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5817</span> The Third Level Digital Divide: Millennials and Post-Millennials Online Activities in South Africa</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ayanda%20Magida">Ayanda Magida</a>, <a href="https://publications.waset.org/abstracts/search?q=Brian%20Armstrong"> Brian Armstrong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study aimed to assess the third level of the digital divide among the millennials and post-millennials in South Africa. The millennials are people born from 1981-to 1996, that is, people between the ages of 25-40 years old and post-millennials are people born from 1997 to date. For the study, only post-millennials born between 1997-2003 were included as they were old enough to consent to participation in the study. Data was collected as part of the Ph.D. project that focuses on the relationship between income inequality, the digital divide, and social cohesion in South Africa. The digital divide has three main levels, namely the first, second and third. The first and second focus on access and usage, respectively. The third-level digital divide can be defined as the differences in the benefits associated with being online. The current paper focuses on the third level: the benefits derived by being online using four domains: economic, educational, social, and personal benefits. The economic benefits include income, employment and finance-related activities; the social benefits include socializing belonging, identity, and informal networks. The personal benefits include personal wellbeing and self-actualization. A total of 763 participants completed the survey, and 61.3% were post-millennials between the ages of 18-24 and s 38.6 % were millennials between 25 and 40. The majority of the respondents were female (62%), male (34%) and nonbinary (1%), respectively. Most of the respondents were black, followed by whites, Indians and colored, respectively. Thus, they represented the status of the demographics of the country. Most of the respondents had access to the internet and smartphone. Most expressed that they use laptops (68%) or mobile (71%) to access the internet and 54 % access the internet using wireless/Wi-Fi. There were no differences between the millennial and post-millennial economic and educational benefits of being online. However, the post-millennials were more inclined to use the internet for social and personal benefits than the millennials. This could be attributed to many factors, such as age. The post-millennials are still discovering themselves and therefore would derive social and personal benefits associated with being online. The findings confirm studies that argue that younger generations derive more benefits from being online than the older generation. Based on the findings, it is evident that the post-millennials are not using the internet or online activities for social networks and socializing but can derive economic benefits such as job looking and education benefits from being online. It can be inferred that there are no significant differences between the two groups, and it seems like the third-level digital divide is not evident among the two groups as they both have been able to derive meaningful benefits from being online. Further studies should focus on the third-level divide between the baby boomers and Generation X. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=third-level%20digital%20divide" title="third-level digital divide">third-level digital divide</a>, <a href="https://publications.waset.org/abstracts/search?q=millennials" title=" millennials"> millennials</a>, <a href="https://publications.waset.org/abstracts/search?q=post-millennials" title=" post-millennials"> post-millennials</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20activities" title=" online activities"> online activities</a> </p> <a href="https://publications.waset.org/abstracts/151061/the-third-level-digital-divide-millennials-and-post-millennials-online-activities-in-south-africa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/151061.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">104</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5816</span> Design and Implementation of Medium Access Control Based Routing on Real Wireless Sensor Networks Testbed </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Smriti%20Agarwal">Smriti Agarwal</a>, <a href="https://publications.waset.org/abstracts/search?q=Ashish%20Payal"> Ashish Payal</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20V.%20R.%20Reddy"> B. V. R. Reddy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> IEEE 802.15.4 is a Low Rate Wireless Personal Area Networks (LR-WPAN) standard combined with ZigBee, which is going to enable new applications in Wireless Sensor Networks (WSNs) and Internet of Things (IoT) domain. In recent years, it has become a popular standard for WSNs. Wireless communication among sensor motes, enabled by IEEE 802.15.4 standard, is extensively replacing the existing wired technology in a wide range of monitoring and control applications. Researchers have proposed a routing framework and mechanism that interacts with the IEEE 802.15.4 standard using software platform. In this paper, we have designed and implemented MAC based routing (MBR) based on IEEE 802.15.4 standard using a hardware platform “SENSEnuts”. The experimental results include data through light and temperature sensors obtained from communication between PAN coordinator and source node through coordinator, MAC address of some modules used in the experimental setup, topology of the network created for simulation and the remaining battery power of the source node. Our experimental effort on a WSN Testbed has helped us in bridging the gap between theoretical and practical aspect of implementing IEEE 802.15.4 for WSNs applications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=IEEE%20802.15.4" title="IEEE 802.15.4">IEEE 802.15.4</a>, <a href="https://publications.waset.org/abstracts/search?q=routing" title=" routing"> routing</a>, <a href="https://publications.waset.org/abstracts/search?q=WSN" title=" WSN"> WSN</a>, <a href="https://publications.waset.org/abstracts/search?q=ZigBee" title=" ZigBee"> ZigBee</a> </p> <a href="https://publications.waset.org/abstracts/62244/design-and-implementation-of-medium-access-control-based-routing-on-real-wireless-sensor-networks-testbed" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/62244.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">406</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5815</span> A Review: Artificial Intelligence (AI) Driven User Access Management and Identity Governance</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rupan%20Preet%20Kaur">Rupan Preet Kaur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article reviewed the potential of artificial intelligence in the field of identity and access management (IAM) and identity governance and administration (IGA), the most critical pillars of any organization. The power of leveraging AI in the most complex and huge user base environment was outlined by simplifying and streamlining the user access approvals and re-certifications without any impact on the user productivity and at the same time strengthening the overall compliance of IAM landscape. Certain challenges encountered in the current state were detailed where majority of organizations are still lacking maturity in the data integrity aspect. Finally, this paper concluded that within the realm of possibility, users and application owners can reap the benefits of unified approach provided by AI to improve the user experience, improve overall efficiency, and strengthen the risk posture. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20access%20review" title=" user access review"> user access review</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20approval" title=" access approval"> access approval</a> </p> <a href="https://publications.waset.org/abstracts/174501/a-review-artificial-intelligence-ai-driven-user-access-management-and-identity-governance" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/174501.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">93</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5814</span> Ecological Networks: From Structural Analysis to Synchronization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20F.%20F.%20Ebecken">N. F. F. Ebecken</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20C.%20Pereira"> G. C. Pereira</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ecological systems are exposed and are influenced by various natural and anthropogenic disturbances. They produce various effects and states seeking response symmetry to a state of global phase coherence or stability and balance of their food webs. This research project addresses the development of a computational methodology for modeling plankton food webs. The use of algorithms to establish connections, the generation of representative fuzzy multigraphs and application of technical analysis of complex networks provide a set of tools for defining, analyzing and evaluating community structure of coastal aquatic ecosystems, beyond the estimate of possible external impacts to the networks. Thus, this study aims to develop computational systems and data models to assess how these ecological networks are structurally and functionally organized, to analyze the types and degree of compartmentalization and synchronization between oscillatory and interconnected elements network and the influence of disturbances on the overall pattern of rhythmicity of the system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ecological%20networks" title="ecological networks">ecological networks</a>, <a href="https://publications.waset.org/abstracts/search?q=plankton%20food%20webs" title=" plankton food webs"> plankton food webs</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20multigraphs" title=" fuzzy multigraphs"> fuzzy multigraphs</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20of%20networks" title=" dynamic of networks"> dynamic of networks</a> </p> <a href="https://publications.waset.org/abstracts/33146/ecological-networks-from-structural-analysis-to-synchronization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33146.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5813</span> Critical Evaluation of Groundwater Monitoring Networks for Machine Learning Applications</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pedro%20Martinez-Santos">Pedro Martinez-Santos</a>, <a href="https://publications.waset.org/abstracts/search?q=V%C3%ADctor%20G%C3%B3mez-Escalonilla"> Víctor Gómez-Escalonilla</a>, <a href="https://publications.waset.org/abstracts/search?q=Silvia%20D%C3%ADaz-Alcaide"> Silvia Díaz-Alcaide</a>, <a href="https://publications.waset.org/abstracts/search?q=Esperanza%20Montero"> Esperanza Montero</a>, <a href="https://publications.waset.org/abstracts/search?q=Miguel%20Mart%C3%ADn-Loeches"> Miguel Martín-Loeches</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Groundwater monitoring networks are critical in evaluating the vulnerability of groundwater resources to depletion and contamination, both in space and time. Groundwater monitoring networks typically grow over decades, often in organic fashion, with relatively little overall planning. The groundwater monitoring networks in the Madrid area, Spain, were reviewed for the purpose of identifying gaps and opportunities for improvement. Spatial analysis reveals the presence of various monitoring networks belonging to different institutions, with several hundred observation wells in an area of approximately 4000 km2. This represents several thousand individual data entries, some going back to the early 1970s. Major issues included overlap between the networks, unknown screen depth/vertical distribution for many observation boreholes, uneven time series, uneven monitored species, and potentially suboptimal locations. Results also reveal there is sufficient information to carry out a spatial and temporal analysis of groundwater vulnerability based on machine learning applications. These can contribute to improve the overall planning of monitoring networks’ expansion into the future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=groundwater%20monitoring" title="groundwater monitoring">groundwater monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=observation%20networks" title=" observation networks"> observation networks</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=madrid" title=" madrid"> madrid</a> </p> <a href="https://publications.waset.org/abstracts/173455/critical-evaluation-of-groundwater-monitoring-networks-for-machine-learning-applications" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/173455.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5812</span> Ensuring Uniform Energy Consumption in Non-Deterministic Wireless Sensor Network to Protract Networks Lifetime</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vrince%20Vimal">Vrince Vimal</a>, <a href="https://publications.waset.org/abstracts/search?q=Madhav%20J.%20Nigam"> Madhav J. Nigam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wireless sensor networks have enticed much of the spotlight from researchers all around the world, owing to its extensive applicability in agricultural, industrial and military fields. Energy conservation node deployment stratagems play a notable role for active implementation of Wireless Sensor Networks. Clustering is the approach in wireless sensor networks which improves energy efficiency in the network. The clustering algorithm needs to have an optimum size and number of clusters, as clustering, if not implemented properly, cannot effectively increase the life of the network. In this paper, an algorithm has been proposed to address connectivity issues with the aim of ensuring the uniform energy consumption of nodes in every part of the network. The results obtained after simulation showed that the proposed algorithm has an edge over existing algorithms in terms of throughput and networks lifetime. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wireless%20Sensor%20network%20%28WSN%29" title="Wireless Sensor network (WSN)">Wireless Sensor network (WSN)</a>, <a href="https://publications.waset.org/abstracts/search?q=Random%20Deployment" title=" Random Deployment"> Random Deployment</a>, <a href="https://publications.waset.org/abstracts/search?q=Clustering" title=" Clustering"> Clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=Isolated%20Nodes" title=" Isolated Nodes"> Isolated Nodes</a>, <a href="https://publications.waset.org/abstracts/search?q=Networks%20Lifetime" title=" Networks Lifetime"> Networks Lifetime</a> </p> <a href="https://publications.waset.org/abstracts/71975/ensuring-uniform-energy-consumption-in-non-deterministic-wireless-sensor-network-to-protract-networks-lifetime" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71975.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">336</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5811</span> Towards Security in Virtualization of SDN</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wanqing%20You">Wanqing You</a>, <a href="https://publications.waset.org/abstracts/search?q=Kai%20Qian"> Kai Qian</a>, <a href="https://publications.waset.org/abstracts/search?q=Xi%20He"> Xi He</a>, <a href="https://publications.waset.org/abstracts/search?q=Ying%20Qian"> Ying Qian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SDN" title="SDN">SDN</a>, <a href="https://publications.waset.org/abstracts/search?q=network" title=" network"> network</a>, <a href="https://publications.waset.org/abstracts/search?q=virtualization" title=" virtualization"> virtualization</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/7241/towards-security-in-virtualization-of-sdn" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7241.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">428</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5810</span> Comparative Analysis of Sigmoidal Feedforward Artificial Neural Networks and Radial Basis Function Networks Approach for Localization in Wireless Sensor Networks </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ashish%20Payal">Ashish Payal</a>, <a href="https://publications.waset.org/abstracts/search?q=C.%20S.%20Rai"> C. S. Rai</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20V.%20R.%20Reddy"> B. V. R. Reddy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increasing use and application of Wireless Sensor Networks (WSN), need has arisen to explore them in more effective and efficient manner. An important area which can bring efficiency to WSNs is the localization process, which refers to the estimation of the position of wireless sensor nodes in an ad hoc network setting, in reference to a coordinate system that may be internal or external to the network. In this paper, we have done comparison and analysed Sigmoidal Feedforward Artificial Neural Networks (SFFANNs) and Radial Basis Function (RBF) networks for developing localization framework in WSNs. The presented work utilizes the Received Signal Strength Indicator (RSSI), measured by static node on 100 x 100 m<sup>2</sup> grid from three anchor nodes. The comprehensive evaluation of these approaches is done using MATLAB software. The simulation results effectively demonstrate that FFANNs based sensor motes will show better localization accuracy as compared to RBF. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=localization" title="localization">localization</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20networks" title=" wireless sensor networks"> wireless sensor networks</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20neural%20network" title=" artificial neural network"> artificial neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=radial%20basis%20function" title=" radial basis function"> radial basis function</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-layer%20perceptron" title=" multi-layer perceptron"> multi-layer perceptron</a>, <a href="https://publications.waset.org/abstracts/search?q=backpropagation" title=" backpropagation"> backpropagation</a>, <a href="https://publications.waset.org/abstracts/search?q=RSSI" title=" RSSI"> RSSI</a>, <a href="https://publications.waset.org/abstracts/search?q=GPS" title=" GPS"> GPS</a> </p> <a href="https://publications.waset.org/abstracts/49637/comparative-analysis-of-sigmoidal-feedforward-artificial-neural-networks-and-radial-basis-function-networks-approach-for-localization-in-wireless-sensor-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49637.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">339</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5809</span> Use of Smartphones in 6th and 7th Grade (Elementary Schools) in Istria: Pilot Study </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maja%20Ruzic-Baf">Maja Ruzic-Baf</a>, <a href="https://publications.waset.org/abstracts/search?q=Vedrana%20Keteles"> Vedrana Keteles</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrea%20Debeljuh"> Andrea Debeljuh </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Younger and younger children are now using a smartphone, a device which has become ‘a must have’ and the life of children would be almost ‘unthinkable’ without one. Devices are becoming lighter and lighter but offering an array of options and applications as well as the unavoidable access to the Internet, without which it would be almost unusable. Numerous features such as taking of photographs, listening to music, information search on the Internet, access to social networks, usage of some of the chatting and messaging services, are only some of the numerous features offered by ‘smart’ devices. They have replaced the alarm clock, home phone, camera, tablet and other devices. Their use and possession have become a part of the everyday image of young people. Apart from the positive aspects, the use of smartphones has also some downsides. For instance, free time was usually spent in nature, playing, doing sports or other activities enabling children an adequate psychophysiological growth and development. The greater usage of smartphones during classes to check statuses on social networks, message your friends, play online games, are just some of the possible negative aspects of their application. Considering that the age of the population using smartphones is decreasing and that smartphones are no longer ‘foreign’ to children of pre-school age (smartphones are used at home or in coffee shops or shopping centers while waiting for their parents, playing video games often inappropriate to their age), particular attention must be paid to a very sensitive group, the teenagers who almost never separate from their ‘pets’. This paper is divided into two sections, theoretical and empirical ones. The theoretical section gives an overview of the pros and cons of the usage of smartphones, while the empirical section presents the results of a research conducted in three elementary schools regarding the usage of smartphones and, specifically, their usage during classes, during breaks and to search information on the Internet, check status updates and 'likes’ on the Facebook social network. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=education" title="education">education</a>, <a href="https://publications.waset.org/abstracts/search?q=smartphone" title=" smartphone"> smartphone</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networks" title=" social networks"> social networks</a>, <a href="https://publications.waset.org/abstracts/search?q=teenagers" title=" teenagers"> teenagers</a> </p> <a href="https://publications.waset.org/abstracts/39266/use-of-smartphones-in-6th-and-7th-grade-elementary-schools-in-istria-pilot-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39266.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">453</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5808</span> Leveraging Deep Q Networks in Portfolio Optimization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Peng%20Liu">Peng Liu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Deep Q networks (DQNs) represent a significant advancement in reinforcement learning, utilizing neural networks to approximate the optimal Q-value for guiding sequential decision processes. This paper presents a comprehensive introduction to reinforcement learning principles, delves into the mechanics of DQNs, and explores its application in portfolio optimization. By evaluating the performance of DQNs against traditional benchmark portfolios, we demonstrate its potential to enhance investment strategies. Our results underscore the advantages of DQNs in dynamically adjusting asset allocations, offering a robust portfolio management framework. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deep%20reinforcement%20learning" title="deep reinforcement learning">deep reinforcement learning</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20Q%20networks" title=" deep Q networks"> deep Q networks</a>, <a href="https://publications.waset.org/abstracts/search?q=portfolio%20optimization" title=" portfolio optimization"> portfolio optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-period%20optimization" title=" multi-period optimization"> multi-period optimization</a> </p> <a href="https://publications.waset.org/abstracts/189031/leveraging-deep-q-networks-in-portfolio-optimization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/189031.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">32</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5807</span> Community Structure Detection in Networks Based on Bee Colony</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bilal%20Saoud">Bilal Saoud</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we propose a new method to find the community structure in networks. Our method is based on bee colony and the maximization of modularity to find the community structure. We use a bee colony algorithm to find the first community structure that has a good value of modularity. To improve the community structure, that was found, we merge communities until we get a community structure that has a high value of modularity. We provide a general framework for implementing our approach. We tested our method on computer-generated and real-world networks with a comparison to very known community detection methods. The obtained results show the effectiveness of our proposition. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bee%20colony" title="bee colony">bee colony</a>, <a href="https://publications.waset.org/abstracts/search?q=networks" title=" networks"> networks</a>, <a href="https://publications.waset.org/abstracts/search?q=modularity" title=" modularity"> modularity</a>, <a href="https://publications.waset.org/abstracts/search?q=normalized%20mutual%20information" title=" normalized mutual information"> normalized mutual information</a> </p> <a href="https://publications.waset.org/abstracts/93455/community-structure-detection-in-networks-based-on-bee-colony" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93455.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">406</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5806</span> Modeling and Prediction of Zinc Extraction Efficiency from Concentrate by Operating Condition and Using Artificial Neural Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Mousavian">S. Mousavian</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20Ashouri"> D. Ashouri</a>, <a href="https://publications.waset.org/abstracts/search?q=F.%20Mousavian"> F. Mousavian</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20Nikkhah%20Rashidabad"> V. Nikkhah Rashidabad</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20Ghazinia"> N. Ghazinia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> PH, temperature, and time of extraction of each stage, agitation speed, and delay time between stages effect on efficiency of zinc extraction from concentrate. In this research, efficiency of zinc extraction was predicted as a function of mentioned variable by artificial neural networks (ANN). ANN with different layer was employed and the result show that the networks with 8 neurons in hidden layer has good agreement with experimental data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=zinc%20extraction" title="zinc extraction">zinc extraction</a>, <a href="https://publications.waset.org/abstracts/search?q=efficiency" title=" efficiency"> efficiency</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20networks" title=" neural networks"> neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=operating%20condition" title=" operating condition"> operating condition</a> </p> <a href="https://publications.waset.org/abstracts/2475/modeling-and-prediction-of-zinc-extraction-efficiency-from-concentrate-by-operating-condition-and-using-artificial-neural-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2475.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">545</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5805</span> Remittances and Water Access: A Cross-Sectional Study of Sub Saharan Africa Countries</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Narges%20Ebadi">Narges Ebadi</a>, <a href="https://publications.waset.org/abstracts/search?q=Davod%20Ahmadi"> Davod Ahmadi</a>, <a href="https://publications.waset.org/abstracts/search?q=Hiliary%20Monteith"> Hiliary Monteith</a>, <a href="https://publications.waset.org/abstracts/search?q=Hugo%20Melgar-Quinonez"> Hugo Melgar-Quinonez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Migration cannot necessarily relieve pressure on water resources in origin communities, and male out-migration can increase the water management burden of women. However, inflows of financial remittances seem to offer possibilities of investing in improving drinking-water access. Therefore, remittances may be an important pathway for migrants to support water security. This paper explores the association between water access and the receipt of remittances in households in sub-Saharan Africa. Data from round 6 of the 'Afrobarometer' surveys in 2016 were used (n= 49,137). Descriptive, bivariate and multivariate statistical analyses were carried out in this study. Regardless of country, findings from descriptive analyses showed that approximately 80% of the respondents never received remittance, and 52% had enough clean water. Only one-fifth of the respondents had piped water supply inside the house (19.9%), and approximately 25% had access to a toilet inside the house. Bivariate analyses revealed that even though receiving remittances was significantly associated with water supply, the strength of association was very weak. However, other factors such as the area of residence (rural vs. urban), cash income frequencies, electricity access, and asset ownership were strongly associated with water access. Results from unadjusted multinomial logistic regression revealed that the probability of having no access to piped water increased among remittance recipients who received financial support at least once a month (OR=1.324) (p < 0.001). In contrast, those not receiving remittances were more likely to regularly have a water access concern (OR=1.294) (p < 0.001), and not have access to a latrine (OR=1.665) (p < 0.001). In conclusion, receiving remittances is significantly related to water access as the strength of odds ratios for socio-demographic factors was stronger. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=remittances" title="remittances">remittances</a>, <a href="https://publications.waset.org/abstracts/search?q=water%20access" title=" water access"> water access</a>, <a href="https://publications.waset.org/abstracts/search?q=SSA" title=" SSA"> SSA</a>, <a href="https://publications.waset.org/abstracts/search?q=migration" title=" migration"> migration</a> </p> <a href="https://publications.waset.org/abstracts/107121/remittances-and-water-access-a-cross-sectional-study-of-sub-saharan-africa-countries" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/107121.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">179</span> </span> </div> </div> <ul class="pagination"> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20networks&page=3" rel="prev">‹</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20networks&page=1">1</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20networks&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20networks&page=3">3</a></li> <li class="page-item active"><span class="page-link">4</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20networks&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20networks&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20networks&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20networks&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20networks&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20networks&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20networks&page=197">197</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20networks&page=198">198</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=access%20networks&page=5" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>