100,037 research outputs found

    Constructing the cultural repertoire in a natural disaster: The role of social media in the Thailand flood of 2011

    Get PDF
    In 2011, Thailand witnessed its worst flooding catastrophe in half a century. In this study, we explored social media as a new and promising weapon to address the physical and morale challenges caused by the natural disaster. A case study was conducted in the context of crisis response, whichinvestigated the use of social media to contribute to the collective cultural repertoire during the natural disaster. By investigating two paths toward the cultural repertoire construction considering different social groups, this study also identified the roles of social media as an information market and an information threshold in the crisis response

    Separation Framework: An Enabler for Cooperative and D2D Communication for Future 5G Networks

    Get PDF
    Soaring capacity and coverage demands dictate that future cellular networks need to soon migrate towards ultra-dense networks. However, network densification comes with a host of challenges that include compromised energy efficiency, complex interference management, cumbersome mobility management, burdensome signaling overheads and higher backhaul costs. Interestingly, most of the problems, that beleaguer network densification, stem from legacy networks' one common feature i.e., tight coupling between the control and data planes regardless of their degree of heterogeneity and cell density. Consequently, in wake of 5G, control and data planes separation architecture (SARC) has recently been conceived as a promising paradigm that has potential to address most of aforementioned challenges. In this article, we review various proposals that have been presented in literature so far to enable SARC. More specifically, we analyze how and to what degree various SARC proposals address the four main challenges in network densification namely: energy efficiency, system level capacity maximization, interference management and mobility management. We then focus on two salient features of future cellular networks that have not yet been adapted in legacy networks at wide scale and thus remain a hallmark of 5G, i.e., coordinated multipoint (CoMP), and device-to-device (D2D) communications. After providing necessary background on CoMP and D2D, we analyze how SARC can particularly act as a major enabler for CoMP and D2D in context of 5G. This article thus serves as both a tutorial as well as an up to date survey on SARC, CoMP and D2D. Most importantly, the article provides an extensive outlook of challenges and opportunities that lie at the crossroads of these three mutually entangled emerging technologies.Comment: 28 pages, 11 figures, IEEE Communications Surveys & Tutorials 201

    Joint Head Selection and Airtime Allocation for Data Dissemination in Mobile Social Networks

    Full text link
    Mobile social networks (MSNs) enable people with similar interests to interact without Internet access. By forming a temporary group, users can disseminate their data to other interested users in proximity with short-range communication technologies. However, due to user mobility, airtime available for users in the same group to disseminate data is limited. In addition, for practical consideration, a star network topology among users in the group is expected. For the former, unfair airtime allocation among the users will undermine their willingness to participate in MSNs. For the latter, a group head is required to connect other users. These two problems have to be properly addressed to enable real implementation and adoption of MSNs. To this aim, we propose a Nash bargaining-based joint head selection and airtime allocation scheme for data dissemination within the group. Specifically, the bargaining game of joint head selection and airtime allocation is first formulated. Then, Nash bargaining solution (NBS) based optimization problems are proposed for a homogeneous case and a more general heterogeneous case. For both cases, the existence of solution to the optimization problem is proved, which guarantees Pareto optimality and proportional fairness. Next, an algorithm, allowing distributed implementation, for join head selection and airtime allocation is introduced. Finally, numerical results are presented to evaluate the performance, validate intuitions and derive insights of the proposed scheme

    Publishing solutions for contemporary scholars: The library as innovator and partner

    Get PDF
    Purpose: To review the trend in academic libraries toward including scholarly communication, and by extension, electronic publishing, as part of their core mission, using the Cornell University Library as an example. Design/methodology/approach: The paper describes several manifestations of publishing activity organized under the Library’s Center for Innovative Publishing, including the arXiv (http://arxiv.org/), Project Euclid (http://projecteuclid.org), and DPubS (http://DPubS.org). Findings: Libraries bring many competencies to the scholarly communications process, including expertise in digital initiatives, close connections with authors and readers, and a commitment to preservation. To add publishing to their responsibilities, they need to develop expertise in content acquisition, editorial management, contract negotiation, marketing, and subscription management. Originality/value: Academic libraries are making formal and informal publishing a part of their core activity. A variety of models exist. The Cornell University Library has created a framework for supporting publishing called the Center for Innovative Publishing, and through it supports a successful open access repository (arXiv), a sustainable webhosting service for journals in math and statistics (Project Euclid) and a content management tool (DPubS) to enable other institutions (libraries,scholarly societies, presses) to engage in similar ventures to increase the dissemination of scholarship and to lower the barriers to its access

    Publishing solutions for contemporary scholars: The library as innovator and partner

    Get PDF
    Purpose: To review the trend in academic libraries toward including scholarly communication, and by extension, electronic publishing, as part of their core mission, using the Cornell University Library as an example. Design/methodology/approach: The paper describes several manifestations of publishing activity organized under the Library’s Center for Innovative Publishing, including the arXiv (http://arxiv.org/), Project Euclid (http://projecteuclid.org), and DPubS (http://DPubS.org). Findings: Libraries bring many competencies to the scholarly communications process, including expertise in digital initiatives, close connections with authors and readers, and a commitment to preservation. To add publishing to their responsibilities, they need to develop expertise in content acquisition, editorial management, contract negotiation, marketing, and subscription management. Originality/value: Academic libraries are making formal and informal publishing a part of their core activity. A variety of models exist. The Cornell University Library has created a framework for supporting publishing called the Center for Innovative Publishing, and through it supports a successful open access repository (arXiv), a sustainable webhosting service for journals in math and statistics (Project Euclid) and a content management tool (DPubS) to enable other institutions (libraries,scholarly societies, presses) to engage in similar ventures to increase the dissemination of scholarship and to lower the barriers to its access

    A secure over-the-air programming scheme in wireless sensor networks

    Get PDF
    Over-The-Air dissemination of code updates in Wireless Sensor Networks (WSNs) have been researchers’ point of interest in past a few years and more importantly security challenges toward remote propagation of code update have taken the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strengthen with having their concentration on constraint nature of WSN nodes. For authentication purposes most of them have used Merkle-Hash-Tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be in a standard level and therefore they have not investigated the tree structure for mission-critical situations in which security has to be in maximum possible extent (e.g. military zones). Two major problems have been identified in Merkle Tree structure which is used in Seluge scheme, including: 1) an exponential growth in number of overhead packets when block size of hash algorithm used in design is increased. 2) Limitation of using hash algorithms with larger block size of 11 bytes when payload size is set to 72 bytes. Then several existing security models are investigated for possible vulnerabilities and a set of countermeasures correspondingly named Security Model Requirements (SMR) is provided. After concentrating on Seluge’s design, a new secure Over-The-Air Programming (OTAP) scheme named Seluge++ is proposed that complies with SMR and replaces the use of inefficient Merkle Tree with a novel method

    A Novel Framework for Software Defined Wireless Body Area Network

    Full text link
    Software Defined Networking (SDN) has gained huge popularity in replacing traditional network by offering flexible and dynamic network management. It has drawn significant attention of the researchers from both academia and industries. Particularly, incorporating SDN in Wireless Body Area Network (WBAN) applications indicates promising benefits in terms of dealing with challenges like traffic management, authentication, energy efficiency etc. while enhancing administrative control. This paper presents a novel framework for Software Defined WBAN (SDWBAN), which brings the concept of SDN technology into WBAN applications. By decoupling the control plane from data plane and having more programmatic control would assist to overcome the current lacking and challenges of WBAN. Therefore, we provide a conceptual framework for SDWBAN with packet flow model and a future direction of research pertaining to SDWBAN.Comment: Presented on 8th International Conference on Intelligent Systems, Modelling and Simulatio
    • …
    corecore