A Continuous Model for States in CSMA/CA-Based Wireless Local Networks Derived from State Transition Diagrams

2021 ◽  
pp. 571-579
Author(s):  
Winfried Auzinger ◽  
Kvitoslava Obelovska ◽  
Ivanna Dronyuk ◽  
Khrystyna Pelekh ◽  
Roksolyana Stolyarchuk
2002 ◽  
Author(s):  
M. Vahedi Nikbakht ◽  
A. Visser ◽  
J. Pruyn ◽  
K. van der Rijt

2016 ◽  
Vol 4 (2) ◽  
pp. 110-125
Author(s):  
George Chatzinakos

This paper seeks to conceptualize the way Thessaloniki is promoting culinary tourism, whilst supporting and building upon local networks; engaging and co-creating an urban experience with its citizens and visitors. The aim of the paper is to suggest a potential framework that can be used as a strategic planning tool for the promotion of culinary tourism in Thessaloniki. In this direction, a food festival is being investigated. The last, is conceived by the organizers as the foundation of the idea of culinary tourism in the city. However, the findings indicate that there is a lack of active participation by the locals and not enough communication among various assets that are associated with the culinary identity of the city. In general, Thessaloniki seems to embody the ongoing struggle of a new destination, which is dealing with the complex process of branding and marketing without having the proper tools and the vital required collaboration between its structural networks. Accordingly, the research provides a lens through which the culinary culture of Thessaloniki can be used as a strategic pillar for stimulating a sustainable way of “consuming” and promoting the city’s identity; enhancing Thessaloniki’s appeal as a culinary destination.


2013 ◽  
Vol 14 (2) ◽  
Author(s):  
Noor Fachrizal

Biomass such as agriculture waste and urban waste are enormous potency as energy resources instead of enviromental problem. organic waste can be converted into energy in the form of liquid fuel, solid, and syngas by using of pyrolysis technique. Pyrolysis process can yield higher liquid form when the process can be drifted into fast and flash response. It can be solved by using microwave heating method. This research is started from developing an experimentation laboratory apparatus of microwave-assisted pyrolysis of biomass energy conversion system, and conducting preliminary experiments for gaining the proof that this method can be established for driving the process properly and safely. Modifying commercial oven into laboratory apparatus has been done, it works safely, and initial experiments have been carried out, process yields bio-oil and charcoal shortly, several parameters are achieved. Some further experiments are still needed for more detail parameters. Theresults may be used to design small-scale continuous model of productionsystem, which then can be developed into large-scale model that applicable for comercial use.


2020 ◽  
Author(s):  
Tam ngoc Nguyen

We proposes a new scientific model that enables the ability to collect evidence, and explain the motivations behind people's cyber malicious/ethical behaviors. Existing models mainly focus on detecting already-committed actions and associated response strategies, which is not proactive. That is the reason why little has been done in order to prevent malicious behaviors early, despite the fact that issues like insider threats cost corporations billions of dollars annually, and its time to detection often lasts for more than a year.We address those problems by our main contributions of:+ A better model for ethical/malicious behavioral analysis with a strong focus on understanding people's motivations. + Research results regarding ethical behaviors of more than 200 participants, during the historic Covid-19 pandemic. + Novel attack and defense strategies based on validated model and survey results. + Strategies for continuous model development and integration, utilizing latest technologies such as natural language processing, and machine learning. We employed mixed-mode research approach of: integrating and combining proven behavioral science models, case studying of hackers, survey research, quantitative analysis, and qualitative analysis. For practical deployments, corporations may utilize our model in: improving HR processes and research, prioritizing plans based on the model's informed human behavioral metrics, better analysis in existing or potential cyber insider threat cases, generating more defense tactics in information warfare and so on.


Sign in / Sign up

Export Citation Format

Share Document