WorldWideScience

Sample records for access records network

  1. Auditing Medical Records Accesses via Healthcare Interaction Networks

    Science.gov (United States)

    Chen, You; Nyemba, Steve; Malin, Bradley

    2012-01-01

    Healthcare organizations are deploying increasingly complex clinical information systems to support patient care. Traditional information security practices (e.g., role-based access control) are embedded in enterprise-level systems, but are insufficient to ensure patient privacy. This is due, in part, to the dynamic nature of healthcare, which makes it difficult to predict which care providers need access to what and when. In this paper, we show that modeling operations at a higher level of granularity (e.g., the departmental level) are stable in the context of a relational network, which may enable more effective auditing strategies. We study three months of access logs from a large academic medical center to illustrate that departmental interaction networks exhibit certain invariants, such as the number, strength, and reciprocity of relationships. We further show that the relations extracted from the network can be leveraged to assess the extent to which a patient’s care satisfies expected organizational behavior. PMID:23304277

  2. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  3. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 Background With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks

  4. 28 CFR 25.6 - Accessing records in the system.

    Science.gov (United States)

    2010-07-01

    ... National Instant Criminal Background Check System § 25.6 Accessing records in the system. (a) FFLs may... through the NCIC communication network. Upon receiving a request for a background check from an FFL, a POC...

  5. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  6. High-Capacity Hybrid Optical Fiber-Wireless Communications Links in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan

    of broadband services access. To realize the seamless convergence between the two network segments, the lower capacity of wireless systems need to be increased to match the continuously increasing bandwidth of fiber-optic systems. The research works included in this thesis are devoted to experimental...... investigations of photonic-wireless links with record high capacities to fulfill the requirements of next generation hybrid optical fiber-wireless access networks. The main contributions of this thesis have expanded the state-of-the-art in two main areas: high speed millimeter-wave (mm-wave) communication links......Integration between fiber-optic and wireless communications systems in the "last mile" access networks is currently considered as a promising solution for both service providers and users, in terms of minimizing deployment cost, shortening upgrading period and increasing mobility and flexibility...

  7. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  8. Next Generation Access Network Deployment in Croatia: Optical Access Networks and Current IoT/5G Status

    Science.gov (United States)

    Breskovic, Damir; Sikirica, Mladen; Begusic, Dinko

    2018-05-01

    This paper gives an overview and background of optical access network deployment in Croatia. Optical access network development in Croatia has been put into a global as well as in the European Union context. All the challenges and the driving factors for optical access networks deployment are considered. Optical access network architectures that have been deployed by most of the investors in Croatian telecommunication market are presented, as well as the architectures that are in early phase of deployment. Finally, an overview on current status of mobile networks of the fifth generation and Internet of Things is given.

  9. The entire network topology display system of terminal communication access network

    OpenAIRE

    An Yi

    2016-01-01

    Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...

  10. Wireless Multi Hop Access Networks and Protocols

    OpenAIRE

    Nilsson Plymoth, Anders

    2007-01-01

    As more and more applications and services in our society now depend on the Internet, it is important that dynamically deployed wireless multi hop networks are able to gain access to the Internet and other infrastructure networks and services. This thesis proposes and evaluates solutions for providing multi hop Internet Access. It investigates how ad hoc networks can be combined with wireless and mesh networks in order to create wireless multi hop access networks. When several access points t...

  11. Wi-Fi Networks Security and Accessing Control

    OpenAIRE

    Tarek S. Sobh

    2013-01-01

    As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP) problem has raised more attention and resulted in obtaining wireless access without subscriber permission.This work assumes Wi-Fi...

  12. Remote Network Access (RNA)

    National Research Council Canada - National Science Library

    2002-01-01

    .... Remote Network Access (RNA) includes or is associated with all communication devices/software, firewalls, intrusion detection systems and virus protection applications to ensure security of the OIG, DoD, Network from remote...

  13. Joint control algorithm in access network

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To deal with long probing delay and inaccurate probing results in the endpoint admission control method,a joint local and end-to-end admission control algorithm is proposed,which introduces local probing of access network besides end-to-end probing.Through local probing,the algorithm accurately estimated the resource status of the access network.Simulation shows that this algorithm can improve admission control performance and reduce users' average waiting time when the access network is heavily loaded.

  14. Editorial: Next Generation Access Networks

    Science.gov (United States)

    Ruffini, Marco; Cincotti, Gabriella; Pizzinat, Anna; Vetter, Peter

    2015-12-01

    Over the past decade we have seen an increasing number of operators deploying Fibre-to-the-home (FTTH) solutions in access networks, in order to provide home users with a much needed network access upgrade, to support higher peak rates, higher sustained rates and a better and more uniform broadband coverage of the territory.

  15. 31 CFR 103.61 - Access to records.

    Science.gov (United States)

    2010-07-01

    ... REPORTING OF CURRENCY AND FOREIGN TRANSACTIONS General Provisions § 103.61 Access to records. Except as... with the recordkeeping and reporting requirements of this part, this part does not authorize the... this part. Other inspection, review or access to such records is governed by other applicable law. [50...

  16. 22 CFR 1003.3 - Access to records.

    Science.gov (United States)

    2010-04-01

    ... Foundation will complete such review not later than 30 days (excluding Saturdays, Sundays, and legal public... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Access to records. 1003.3 Section 1003.3 Foreign Relations INTER-AMERICAN FOUNDATION RULES SAFEGUARDING PERSONAL INFORMATION IN IAF RECORDS § 1003.3 Access...

  17. 7 CFR 3015.183 - Access to contractor records.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Access to contractor records. 3015.183 Section 3015... contractor records. The Attachment 0 requires recipients to include in specified kinds of contracts a provision for access to the contractor's records by the recipient and the Federal government. The following...

  18. Optical Subsystems for Next Generation Access Networks

    DEFF Research Database (Denmark)

    Lazaro, J.A; Polo, V.; Schrenk, B.

    2011-01-01

    Recent optical technologies are providing higher flexibility to next generation access networks: on the one hand, providing progressive FTTx and specifically FTTH deployment, progressively shortening the copper access network; on the other hand, also opening fixed-mobile convergence solutions...... in next generation PON architectures. It is provided an overview of the optical subsystems developed for the implementation of the proposed NG-Access Networks....

  19. Scalable Lunar Surface Networks and Adaptive Orbit Access

    Science.gov (United States)

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  20. IP access networks with QoS support

    Science.gov (United States)

    Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique

    2001-07-01

    The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.

  1. Research of Ad Hoc Networks Access Algorithm

    Science.gov (United States)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  2. 22 CFR 214.37 - Public access to committee records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Public access to committee records. 214.37 Section 214.37 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT ADVISORY COMMITTEE MANAGEMENT Operation of Advisory Committees § 214.37 Public access to committee records. Records maintained in...

  3. 49 CFR 228.205 - Access to electronic records.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Access to electronic records. 228.205 Section 228... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION HOURS OF SERVICE OF RAILROAD EMPLOYEES Electronic Recordkeeping § 228.205 Access to electronic records. (a) FRA inspectors and State inspectors participating under 49...

  4. STAR-TYPE LOCAL AREA NETWORK ACCESS CONTROL

    Institute of Scientific and Technical Information of China (English)

    逯昭义; 齐藤忠夫

    1990-01-01

    The multiple access fashion is a new resolution for the star-type local area network (LAN) access control and star-type optical fibre LAN. Arguments about this network are discussed, and the results are introduced.

  5. 25 CFR 571.6 - Access to papers, books, and records.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Access to papers, books, and records. 571.6 Section 571.6... PROVISIONS MONITORING AND INVESTIGATIONS Inspection of Books and Records § 571.6 Access to papers, books, and... operation shall provide the authorized representative with access to all papers, books, and records...

  6. 12 CFR 914.3 - Access to books and records.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Access to books and records. 914.3 Section 914... BANKS DATA AVAILABILITY AND REPORTING § 914.3 Access to books and records. Each Bank shall make its books and records readily available for inspection and other supervisory purposes within a reasonable...

  7. Rural women and violence situation: access and accessibility limits to the healthcare network.

    Science.gov (United States)

    Costa, Marta Cocco da; Silva, Ethel Bastos da; Soares, Joannie Dos Santos Fachinelli; Borth, Luana Cristina; Honnef, Fernanda

    2017-07-13

    To analyze the access and accessibility to the healthcare network of women dwelling in rural contexts undergoing violence situation, as seen from the professionals' speeches. A qualitative, exploratory, descriptive study with professionals from the healthcare network services about coping with violence in four municipalities in the northern region of Rio Grande do Sul. The information derived from interviews, which have been analyzed by thematic modality. (Lack of) information of women, distance, restricted access to transportation, dependence on the partner and (lack of) attention by professionals to welcome women undergoing violence situation and (non)-articulation of the network are factors that limit the access and, as a consequence, they result in the lack of confrontation of this problem. To bring closer the services which integrate the confrontation network of violence against women and to qualify professionals to welcome these situations are factors that can facilitate the access and adhesion of rural women to the services.

  8. Effects of network node consolidation in optical access and aggregation networks on costs and power consumption

    Science.gov (United States)

    Lange, Christoph; Hülsermann, Ralf; Kosiankowski, Dirk; Geilhardt, Frank; Gladisch, Andreas

    2010-01-01

    The increasing demand for higher bit rates in access networks requires fiber deployment closer to the subscriber resulting in fiber-to-the-home (FTTH) access networks. Besides higher access bit rates optical access network infrastructure and related technologies enable the network operator to establish larger service areas resulting in a simplified network structure with a lower number of network nodes. By changing the network structure network operators want to benefit from a changed network cost structure by decreasing in short and mid term the upfront investments for network equipment due to concentration effects as well as by reducing the energy costs due to a higher energy efficiency of large network sites housing a high amount of network equipment. In long term also savings in operational expenditures (OpEx) due to the closing of central office (CO) sites are expected. In this paper different architectures for optical access networks basing on state-of-the-art technology are analyzed with respect to network installation costs and power consumption in the context of access node consolidation. Network planning and dimensioning results are calculated for a realistic network scenario of Germany. All node consolidation scenarios are compared against a gigabit capable passive optical network (GPON) based FTTH access network operated from the conventional CO sites. The results show that a moderate reduction of the number of access nodes may be beneficial since in that case the capital expenditures (CapEx) do not rise extraordinarily and savings in OpEx related to the access nodes are expected. The total power consumption does not change significantly with decreasing number of access nodes but clustering effects enable a more energyefficient network operation and optimized power purchase order quantities leading to benefits in energy costs.

  9. Research on optical access network remote management technology

    Science.gov (United States)

    Wang, Wayne; Zou, Chen; Luo, Wenyi

    2008-11-01

    This paper goal is to provide a framework for the remote configuration and management of services for PON (Passive Optical Network) access and fiber access. Also it defines how Auto-Configuration Servers (ACS) in the network can remotely configure, troubleshoot and manage a Passive Optical Network (PON) optical network termination (ONT) with layer 3 capabilities using the CPE WAN management protocol, TR-069.

  10. Location-aware network operation for cloud radio access network

    KAUST Repository

    Wang, Fanggang; Ruan, Liangzhong; Win, Moe Z.

    2017-01-01

    One of the major challenges in effectively operating a cloud radio access network (C-RAN) is the excessive overhead signaling and computation load that scale rapidly with the size of the network. In this paper, the exploitation of location

  11. Dual-mode ultraflow access networks: a hybrid solution for the access bottleneck

    Science.gov (United States)

    Kazovsky, Leonid G.; Shen, Thomas Shunrong; Dhaini, Ahmad R.; Yin, Shuang; De Leenheer, Marc; Detwiler, Benjamin A.

    2013-12-01

    Optical Flow Switching (OFS) is a promising solution for large Internet data transfers. In this paper, we introduce UltraFlow Access, a novel optical access network architecture that offers dual-mode service to its end-users: IP and OFS. With UltraFlow Access, we design and implement a new dual-mode control plane and a new dual-mode network stack to ensure efficient connection setup and reliable and optimal data transmission. We study the impact of the UltraFlow system's design on the network throughput. Our experimental results show that with an optimized system design, near optimal (around 10 Gb/s) OFS data throughput can be attained when the line rate is 10Gb/s.

  12. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... control. Highlights of my research include my proposal and experimental proof of principle of an optical coherent detection based optical access network architecture providing support for a large number of users over a single distribution fiber; a spectral amplitude encoded label detection technique...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...

  13. Radio Access Sharing Strategies for Multiple Operators in Cellular Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Iversen, Villy Bæk

    2015-01-01

    deployments (required for coverage enhancement), increased base station utilization, and reduced overall power consumption. Today, network sharing in the radio access part is passive and limited to cell sites. With the introduction of Cloud Radio Access Network and Software Defined Networking adoption...... to the radio access network, the possibility for sharing baseband processing and radio spectrum becomes an important aspect of network sharing. This paper investigates strategies for active sharing of radio access among multiple operators, and analyses the individual benefits depending on the sharing degree...

  14. Planning Multitechnology Access Networks with Performance Constraints

    Science.gov (United States)

    Chamberland, Steven

    Considering the number of access network technologies and the investment needed for the “last mile” of a solution, in today’s highly competitive markets, planning tools are crucial for the service providers to optimize the network costs and accelerate the planning process. In this paper, we propose to tackle the problem of planning access networks composed of four technologies/architectures: the digital subscriber line (xDSL) technologies deployed directly from the central office (CO), the fiber-to-the-node (FTTN), the fiber-to-the-micro-node (FTTn) and the fiber-to-the-premises (FTTP). A mathematical programming model is proposed for this planning problem that is solved using a commercial implementation of the branch-and-bound algorithm. Next, a detailed access network planning example is presented followed by a systematic set of experiments designed to assess the performance of the proposed approach.

  15. Fiber Access Networks: Reliability Analysis and Swedish Broadband Market

    Science.gov (United States)

    Wosinska, Lena; Chen, Jiajia; Larsen, Claus Popp

    Fiber access network architectures such as active optical networks (AONs) and passive optical networks (PONs) have been developed to support the growing bandwidth demand. Whereas particularly Swedish operators prefer AON, this may not be the case for operators in other countries. The choice depends on a combination of technical requirements, practical constraints, business models, and cost. Due to the increasing importance of reliable access to the network services, connection availability is becoming one of the most crucial issues for access networks, which should be reflected in the network owner's architecture decision. In many cases protection against failures is realized by adding backup resources. However, there is a trade off between the cost of protection and the level of service reliability since improving reliability performance by duplication of network resources (and capital expenditures CAPEX) may be too expensive. In this paper we present the evolution of fiber access networks and compare reliability performance in relation to investment and management cost for some representative cases. We consider both standard and novel architectures for deployment in both sparsely and densely populated areas. While some recent works focused on PON protection schemes with reduced CAPEX the current and future effort should be put on minimizing the operational expenditures (OPEX) during the access network lifetime.

  16. Multiple-Access Quantum-Classical Networks

    Science.gov (United States)

    Razavi, Mohsen

    2011-10-01

    A multi-user network that supports both classical and quantum communication is proposed. By relying on optical code-division multiple access techniques, this system offers simultaneous key exchange between multiple pairs of network users. A lower bound on the secure key generation rate will be derived for decoy-state quantum key distribution protocols.

  17. MPTCP Tunnel: An Architecture for Aggregating Bandwidth of Heterogeneous Access Networks

    Directory of Open Access Journals (Sweden)

    Xiaolan Liu

    2018-01-01

    Full Text Available Fixed and cellular networks are two typical access networks provided by operators. Fixed access network is widely employed; nevertheless, its bandwidth is sometimes not sufficient enough to meet user bandwidth requirements. Meanwhile, cellular access network owns unique advantages of wider coverage, faster increasing link speed, more flexible deployment, and so forth. Therefore, it is attractive for operators to mitigate the bandwidth shortage by bundling these two. Actually, there have been existing schemes proposed to aggregate the bandwidth of two access networks, whereas they all have their own problems, like packet reordering or extra latency overhead. To address this problem, we design new architecture, MPTCP Tunnel, to aggregate the bandwidth of multiple heterogeneous access networks from the perspective of operators. MPTCP Tunnel uses MPTCP, which solves the reordering problem essentially, to bundle multiple access networks. Besides, MPTCP Tunnel sets up only one MPTCP connection at play which adapts itself to multiple traffic types and TCP flows. Furthermore, MPTCP Tunnel forwards intact IP packets through access networks, maintaining the end-to-end TCP semantics. Experimental results manifest that MPTCP Tunnel can efficiently aggregate the bandwidth of multiple access networks and is more adaptable to the increasing heterogeneity of access networks than existing mechanisms.

  18. LTER network data access policy revision: report and recommendations.

    Science.gov (United States)

    James Brunt; Peter McCartney; Stuart Gage; Don. Henshaw

    2004-01-01

    This document is a report on work carried out to update the LTER Network Data Access Policy. The current LTER Network Data Access Policy, approved by the coordinating committee in 1997, has been in use since 1990. An analysis of the current policies related to the release, access, and use of LTER data has been undertaken by a sub-committee of the LTER Network...

  19. Government records management and access to information ...

    African Journals Online (AJOL)

    This article provides a brief report on the proceedings of the 9th Annual Integrity Action Summer School's policy lab on Government Records Management and Citizen Access to Information, held in July 2013 at the Central European University, Hungary and attended by international experts in records management and ...

  20. 10 CFR 1304.105 - Requests for access to records.

    Science.gov (United States)

    2010-01-01

    ... Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.105 Requests for access to records... request access to his or her own records in writing by addressing a letter to: Privacy Act Officer; U.S... via the internet. Internet requests should be transmitted through the Board's Web site at www.nwtrb...

  1. Performance analysis of quantum access network using code division multiple access model

    International Nuclear Information System (INIS)

    Hu Linxi; Yang Can; He Guangqiang

    2017-01-01

    A quantum access network has been implemented by frequency division multiple access and time division multiple access, while code division multiple access is limited for its difficulty to realize the orthogonality of the code. Recently, the chaotic phase shifters were proposed to guarantee the orthogonality by different chaotic signals and spread the spectral content of the quantum states. In this letter, we propose to implement the code division multiple access quantum network by using chaotic phase shifters and synchronization. Due to the orthogonality of the different chaotic phase shifter, every pair of users can faithfully transmit quantum information through a common channel and have little crosstalk between different users. Meanwhile, the broadband spectra of chaotic signals efficiently help the quantum states to defend against channel loss and noise. (paper)

  2. Detecting Inappropriate Access to Electronic Health Records Using Collaborative Filtering.

    Science.gov (United States)

    Menon, Aditya Krishna; Jiang, Xiaoqian; Kim, Jihoon; Vaidya, Jaideep; Ohno-Machado, Lucila

    2014-04-01

    Many healthcare facilities enforce security on their electronic health records (EHRs) through a corrective mechanism: some staff nominally have almost unrestricted access to the records, but there is a strict ex post facto audit process for inappropriate accesses, i.e., accesses that violate the facility's security and privacy policies. This process is inefficient, as each suspicious access has to be reviewed by a security expert, and is purely retrospective, as it occurs after damage may have been incurred. This motivates automated approaches based on machine learning using historical data. Previous attempts at such a system have successfully applied supervised learning models to this end, such as SVMs and logistic regression. While providing benefits over manual auditing, these approaches ignore the identity of the users and patients involved in a record access. Therefore, they cannot exploit the fact that a patient whose record was previously involved in a violation has an increased risk of being involved in a future violation. Motivated by this, in this paper, we propose a collaborative filtering inspired approach to predicting inappropriate accesses. Our solution integrates both explicit and latent features for staff and patients, the latter acting as a personalized "finger-print" based on historical access patterns. The proposed method, when applied to real EHR access data from two tertiary hospitals and a file-access dataset from Amazon, shows not only significantly improved performance compared to existing methods, but also provides insights as to what indicates an inappropriate access.

  3. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  4. 7 CFR 37.9 - Access to establishments or records; record retention.

    Science.gov (United States)

    2010-01-01

    ... STANDARD CONTAINER REGULATIONS PROGRAM TO ASSESS ORGANIC CERTIFYING AGENCIES § 37.9 Access to... processes associated with an approved certification program. Records and documents shall be retained for at...

  5. 19 CFR 201.30 - Commission review of requests for access to records, for correction or amendment to records, and...

    Science.gov (United States)

    2010-04-01

    ... records, for correction or amendment to records, and for accounting of record disclosures. 201.30 Section... General for access to a record, to amend a record, or to obtain an accounting of any record disclosure... grant access to a record, to amend a record, or to provide an accounting of a record disclosure, the...

  6. Accessibility and security of digital records in the Office of the ...

    African Journals Online (AJOL)

    Accessibility and security of digital records in the Office of the Premier in ... preservation and accessibility of digital records for effective e-governance. ... Questionnaires, interviews, observations and document analysis were used to collect data. ... be knowledgeable in the use of the technologies that generate digital records.

  7. Dynamic Resource Allocation in Hybrid Access Femtocell Network

    Directory of Open Access Journals (Sweden)

    Afaz Uddin Ahmed

    2014-01-01

    Full Text Available Intercell interference is one of the most challenging issues in femtocell deployment under the coverage of existing macrocell. Allocation of resources between femtocell and macrocell is essential to counter the effects of interference in dense femtocell networks. Advances in resource management strategies have improved the control mechanism for interference reduction at lower node density, but most of them are ineffective at higher node density. In this paper, a dynamic resource allocation management algorithm (DRAMA for spectrum shared hybrid access OFDMA femtocell network is proposed. To reduce the macro-femto-tier interference and to improve the quality of service, the proposed algorithm features a dynamic resource allocation scheme by controlling them both centrally and locally. The proposed scheme focuses on Femtocell Access Point (FAP owners’ satisfaction and allows maximum utilization of available resources based on congestion in the network. A simulation environment is developed to study the quantitative performance of DRAMA in hybrid access-control femtocell network and compare it to closed and open access mechanisms. The performance analysis shows that higher number of random users gets connected to the FAP without compromising FAP owners’ satisfaction allowing the macrocell to offload a large number of users in a dense heterogeneous network.

  8. 15 CFR 2005.3 - Access to the accounting of disclosures from records.

    Science.gov (United States)

    2010-01-01

    ....3 Access to the accounting of disclosures from records. Rules governing the granting of access to the accounting of disclosures are the same as those for granting access to the records (including... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Access to the accounting of...

  9. Protocol and networking design issues for local access WDM networks

    NARCIS (Netherlands)

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this

  10. A Systematic Scheme for Multiple Access in Ethernet Passive Optical Access Networks

    Science.gov (United States)

    Ma, Maode; Zhu, Yongqing; Hiang Cheng, Tee

    2005-11-01

    While backbone networks have experienced substantial changes in the last decade, access networks have not changed much. Recently, passive optical networks (PONs) seem to be ready for commercial deployment as access networks, due to the maturity of a number of enabling technologies. Among the PON technologies, Ethernet PON (EPON) standardized by the IEEE 802.3ah Ethernet in the First Mile (EFM) Task Force is the most attractive one because of its high speed, low cost, familiarity, interoperability, and low overhead. In this paper, we consider the issue of upstream channel sharing in the EPONs. We propose a novel multiple-access control scheme to provide bandwidth-guaranteed service for high-demand customers, while providing best effort service to low-demand customers according to the service level agreement (SLA). The analytical and simulation results prove that the proposed scheme performs best in what it is designed to do compared to another well-known scheme that has not considered providing differentiated services. With business customers preferring premium services with guaranteed bandwidth and residential users preferring low-cost best effort services, our scheme could benefit both groups of subscribers, as well as the operators.

  11. Knowledge Access in Rural Inter-connected Areas Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... the existing network to include two thematic networks on food security and rural ... Woman conquering male business in Yemen : Waleya's micro-enterprise.

  12. Protocol and networking design issues for local access WDM networks

    OpenAIRE

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    1999-01-01

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this report. A brief introduction to optical networks and WDM as well as a brief description of Flamingo are also included in this report.

  13. Extending AAA operational model for profile-based access control in ethernet-based Neutral Access Networks

    NARCIS (Netherlands)

    Matias, J.; Jacob, E.; Demchenko, Y.; de Laat, C.; Gommans, L.; Macías López, E.M.; Bogliolo, A.; Perry, M.; Ran, M

    2010-01-01

    Neutral Access Networks (NAN) have appeared as a new model to overcome some restrictions and lack of flexibility that are present currently in broadband access networks. NAN brings new business opportunities by opening this market to new stakeholders. Although the NAN model is accepted, there are

  14. Joint Hybrid Backhaul and Access Links Design in Cloud-Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    The cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio systems. In this paper, we consider the downlink of a CRAN formed of one central processor (the cloud) and several base station

  15. File access prediction using neural networks.

    Science.gov (United States)

    Patra, Prashanta Kumar; Sahu, Muktikanta; Mohapatra, Subasish; Samantray, Ronak Kumar

    2010-06-01

    One of the most vexing issues in design of a high-speed computer is the wide gap of access times between the memory and the disk. To solve this problem, static file access predictors have been used. In this paper, we propose dynamic file access predictors using neural networks to significantly improve upon the accuracy, success-per-reference, and effective-success-rate-per-reference by using neural-network-based file access predictor with proper tuning. In particular, we verified that the incorrect prediction has been reduced from 53.11% to 43.63% for the proposed neural network prediction method with a standard configuration than the recent popularity (RP) method. With manual tuning for each trace, we are able to improve upon the misprediction rate and effective-success-rate-per-reference using a standard configuration. Simulations on distributed file system (DFS) traces reveal that exact fit radial basis function (RBF) gives better prediction in high end system whereas multilayer perceptron (MLP) trained with Levenberg-Marquardt (LM) backpropagation outperforms in system having good computational capability. Probabilistic and competitive predictors are the most suitable for work stations having limited resources to deal with and the former predictor is more efficient than the latter for servers having maximum system calls. Finally, we conclude that MLP with LM backpropagation algorithm has better success rate of file prediction than those of simple perceptron, last successor, stable successor, and best k out of m predictors.

  16. A Method for Upper Bounding on Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Patel, A.; Pedersen, Jens Myrup

    2004-01-01

    This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management.......This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management....

  17. Hierarchical micro-mobility management in high-speed multihop access networks

    Institute of Scientific and Technical Information of China (English)

    TANG Bi-hua; MA Xiao-lei; LIU Yuan-an; GAO Jin-chun

    2006-01-01

    This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access routers. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access router (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility management scheme can achieve high packet delivery fraction and improve the lifetime of network.

  18. Achieving universal access to next generation networks

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders

    The paper examines investment dimensions of next generation networks in a universal service perspective in a European context. The question is how new network infrastructures for getting access to communication, information and entertainment services in the present and future information society...

  19. Fine-Grained Access Control for Electronic Health Record Systems

    Science.gov (United States)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  20. LNS users primer for accessing government sites on the ARPA network. [MIT. -->. ANL, BNL, LBL, and New York Univ. Courant Inst

    Energy Technology Data Exchange (ETDEWEB)

    Kannel, M.

    1979-06-01

    This primer was developed as part of the study conducted by the Laboratory for Nuclear Science (LNS) on the feasibility of networks for computer resource sharing. The primer is an instructinal guide for the LNS user who would like to access and use computers at other government sites on the ARPA network. The format is a series of scenarios of actual recorded on-line terminal sessions' showing the novice user how to access the foreign site, obtain help documentation, run a simple program, and transfer files to and from the foreign site. Access to the ARPA network in these scenarios is via Multics or the Massachusetts Institute of Technology Terminal Interface Processor. The foreign government sites accessed are the computing facilities at Argonne National Laboratory, Brookhaven National Laboratory, Lawrence Livermore Laboratory, and New York University Courant Institute. This technique of auditing actual terminal sessions as a teaching aid can be extended to include other computing facilities as well as other networks.

  1. Survey on Cloud Radio Access Network

    Directory of Open Access Journals (Sweden)

    Reeta Chhatani

    2016-01-01

    Full Text Available The existing wireless network will face the challenge of data tsunami in the near future. Densification of network will deal huge data traffic but will increase the interferences and network cost. At the same time, the existing wireless network is underutilized due to dynamic traffic. To deal with this adverse scenario, a change in the current network architecture is required. Based on virtualization, Cloud Radio Access Network (CRAN was proposed for wireless network. In CRAN the functionality of base station will be distributed into base band unit (BBU and remote radio heads (RRH which will achieve benefits of centralization. This paper presents a survey on CRAN centring on optimized resource allocation, energy efficiency and throughput maximization under fronthaul capacity. The existing solution and future opportunities in CRAN are also summarized.

  2. Integration of QoS provisioning in home and access networks

    DEFF Research Database (Denmark)

    Popov, Mikhail; Gavler, A.; Sköldström, P.

    2010-01-01

    Approaches for QoS provisioning using UPnP for home networks and GMPLS for access networks are described. A solution for interworking the UPnP and the GMPLS at the residential gateway is proposed.......Approaches for QoS provisioning using UPnP for home networks and GMPLS for access networks are described. A solution for interworking the UPnP and the GMPLS at the residential gateway is proposed....

  3. Energy challenges in optical access and aggregation networks.

    Science.gov (United States)

    Kilper, Daniel C; Rastegarfar, Houman

    2016-03-06

    Scalability is a critical issue for access and aggregation networks as they must support the growth in both the size of data capacity demands and the multiplicity of access points. The number of connected devices, the Internet of Things, is growing to the tens of billions. Prevailing communication paradigms are reaching physical limitations that make continued growth problematic. Challenges are emerging in electronic and optical systems and energy increasingly plays a central role. With the spectral efficiency of optical systems approaching the Shannon limit, increasing parallelism is required to support higher capacities. For electronic systems, as the density and speed increases, the total system energy, thermal density and energy per bit are moving into regimes that become impractical to support-for example requiring single-chip processor powers above the 100 W limit common today. We examine communication network scaling and energy use from the Internet core down to the computer processor core and consider implications for optical networks. Optical switching in data centres is identified as a potential model from which scalable access and aggregation networks for the future Internet, with the application of integrated photonic devices and intelligent hybrid networking, will emerge. © 2016 The Author(s).

  4. A Fuzzy Preprocessing Module for Optimizing the Access Network Selection in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Faisal Kaleem

    2013-01-01

    Full Text Available A heterogeneous wireless network is characterized by the presence of different wireless access technologies that coexist in an overlay fashion. These wireless access technologies usually differ in terms of their operating parameters. On the other hand, Mobile Stations (MSs in a heterogeneous wireless network are equipped with multiple interfaces to access different types of services from these wireless access technologies. The ultimate goal of these heterogeneous wireless networks is to provide global connectivity with efficient ubiquitous computing to these MSs based on the Always Best Connected (ABC principle. This is where the need for intelligent and efficient Vertical Handoffs (VHOs between wireless technologies in a heterogeneous environment becomes apparent. This paper presents the design and implementation of a fuzzy multicriteria based Vertical Handoff Necessity Estimation (VHONE scheme that determines the proper time for VHO, while considering the continuity and quality of the currently utilized service, and the end-users' satisfaction.

  5. 45 CFR 2106.3 - Access to the accounting of disclosures from records.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Access to the accounting of disclosures from... the accounting of disclosures from records. Rules governing the granting of access to the accounting of disclosures are the same as those for granting access to the records outlined in § 2106.2 of this...

  6. Optimizing the next generation optical access networks

    DEFF Research Database (Denmark)

    Amaya Fernández, Ferney Orlando; Soto, Ana Cardenas; Tafur Monroy, Idelfonso

    2009-01-01

    Several issues in the design and optimization of the next generation optical access network (NG-OAN) are presented. The noise, the distortion and the fiber optic nonlinearities are considered to optimize the video distribution link in a passive optical network (PON). A discussion of the effect...

  7. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  8. Network Analysis of Time-Lapse Microscopy Recordings

    Directory of Open Access Journals (Sweden)

    Erik eSmedler

    2014-09-01

    Full Text Available Multicellular organisms rely on intercellular communication to regulate important cellular processes critical to life. To further our understanding of those processes there is a need to scrutinize dynamical signaling events and their functions in both cells and organisms. Here, we report a method and provide MATLAB code that analyzes time-lapse microscopy recordings to identify and characterize network structures within large cell populations, such as interconnected neurons. The approach is demonstrated using intracellular calcium (Ca2+ recordings in neural progenitors and cardiac myocytes, but could be applied to a wide variety of biosensors employed in diverse cell types and organisms. In this method, network structures are analyzed by applying cross-correlation signal processing and graph theory to single-cell recordings. The goal of the analysis is to determine if the single cell activity constitutes a network of interconnected cells and to decipher the properties of this network. The method can be applied in many fields of biology in which biosensors are used to monitor signaling events in living cells. Analyzing intercellular communication in cell ensembles can reveal essential network structures that provide important biological insights.

  9. TCP Performance Enhancement for UMTS Access Network

    DEFF Research Database (Denmark)

    Hu, Liang

    2008-01-01

    is between UMTS access network and Internet. The split proxy divides the bandwidth delay product into two parts, resulting in two TCP connections with smaller bandwidth delay products. Simulation results show, the split TCP proxy can significantly improve the TCP performance under high bit rate DCH channel......We aim at optimize the TCP performance over UMTS access network challenged by the large delay bandwidth product that is mainly caused by the latency from the link layer ARQ retransmissions and diversity technique at physical layer. We propose to place a split TCP proxy at GGSN nodes which...

  10. Increasing Access to Archival Records in Library Online Public Access Catalogs.

    Science.gov (United States)

    Gilmore, Matthew B.

    1988-01-01

    Looks at the use of online public access catalogs, the utility of subject and call-number searching, and possible archival applications. The Wallace Archives at the Claremont Colleges is used as an example of the availability of bibliographic descriptions of multiformat archival materials through the library catalog. Sample records and searches…

  11. 78 FR 45454 - Patient Access to Records

    Science.gov (United States)

    2013-07-29

    ... regarding current and future health care. Removing barriers to a veteran's access to VA records will support... patient autonomy and shared decision making. Removing this regulation will directly benefit veterans by... property, Infants and children, Inventions and patents, Parking, Penalties, Privacy, Reporting and...

  12. Open Orchestration Cloud Radio Access Network (OOCRAN) Testbed

    OpenAIRE

    Floriach-Pigem, Marti; Xercavins-Torregrosa, Guillem; Marojevic, Vuk; Gelonch-Bosch, Antoni

    2017-01-01

    The Cloud radio access network (C-RAN) offers a revolutionary approach to cellular network deployment, management and evolution. Advances in software-defined radio (SDR) and networking technology, moreover, enable delivering software-defined everything through the Cloud. Resources will be pooled and dynamically allocated leveraging abstraction, virtualization, and consolidation techniques; processes will be automated using common application programming interfaces; and network functions and s...

  13. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  14. Knowledge Access in Rural Inter-connected Areas Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... poor by sharing innovations, best practices and indigenous knowledge using ... A third thematic network - on knowledge management strategies - will play an ...

  15. Accessing Your Health Information: How can I access my health information and medical records?

    Science.gov (United States)

    ... from the doctor’s office. Visit the Guide to Getting & Using Your Health Records for practical tips to help you access, review, and make the most of your health records. Open Survey Content last reviewed on April 4, 2018 Was this page helpful? Yes No Form Approved OMB# 0990-0379 Exp. Date ...

  16. Sierra Stars Observatory Network: An Accessible Global Network

    Science.gov (United States)

    Williams, Richard; Beshore, Edward

    2011-03-01

    The Sierra Stars Observatory Network (SSON) is a unique partnership among professional observatories that provides its users with affordable high-quality calibrated image data. SSON comprises observatories in the Northern and Southern Hemisphere and is in the process of expanding to a truly global network capable of covering the entire sky 24 hours a day in the near future. The goal of SSON is to serve the needs of science-based projects and programs. Colleges, universities, institutions, and individuals use SSON for their education and research projects. The mission of SSON is to promote and expand the use of its facilities among the thousands of colleges and schools worldwide that do not have access to professional-quality automated observatory systems to use for astronomy education and research. With appropriate leadership and guidance educators can use SSON to help teach astronomy and do meaningful scientific projects. The relatively small cost of using SSON for this type of work makes it affordable and accessible for educators to start using immediately. Remote observatory services like SSON need to evolve to better support education and research initiatives of colleges, institutions and individual investigators. To meet these needs, SSON is developing a sophisticated interactive scheduling system to integrate among the nodes of the observatory network. This will enable more dynamic observations, including immediate priority interrupts, acquiring moving objects using ephemeris data, and more.

  17. 42 CFR 51.41 - Access to records.

    Science.gov (United States)

    2010-10-01

    ... other than the facility or program as long as the system has obtained appropriate consent consistent... from service providers or other facilities on residents that they indicate in the release form the... access and authority to interview and examine all relevant records of any facility service recipient...

  18. Designing Broadband Access Networks with Triple Redundancy

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Riaz, Muhammad Tahir; Knudsen, Thomas Phillip

    2005-01-01

    An architecture is proposed for designing broadband access networks, which offer triple redundancy to the end users, resulting in networks providing connectivity even in case of any two independent node or line failures. Two physically independent connections are offered by fiber, and the last...... provided by some wireless solution. Based on experience with planning Fiber To The Home, the architecture is designed to meet a number of demands, making it practicable and useful in realworld network planning. The proposed wired topology is planar, and suitable for being fitted onto the road network...

  19. 42 CFR 420.304 - Procedures for obtaining access to books, documents, and records.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Procedures for obtaining access to books, documents... Books, Documents, and Records of Subcontractors § 420.304 Procedures for obtaining access to books... following elements: (1) Reasonable identification of the books, documents, and records to which access is...

  20. Documenting death: public access to government death records and attendant privacy concerns.

    Science.gov (United States)

    Boles, Jeffrey R

    2012-01-01

    This Article examines the contentious relationship between public rights to access government-held death records and privacy rights concerning the deceased, whose personal information is contained in those same records. This right of access dispute implicates core democratic principles and public policy interests. Open access to death records, such as death certificates and autopsy reports, serves the public interest by shedding light on government agency performance, uncovering potential government wrongdoing, providing data on public health trends, and aiding those investigating family history, for instance. Families of the deceased have challenged the release of these records on privacy grounds, as the records may contain sensitive and embarrassing information about the deceased. Legislatures and the courts addressing this dispute have collectively struggled to reconcile the competing open access and privacy principles. The Article demonstrates how a substantial portion of the resulting law in this area is haphazardly formed, significantly overbroad, and loaded with unintended consequences. The Article offers legal reforms to bring consistency and coherence to this currently disordered area of jurisprudence.

  1. 28 CFR 20.34 - Individual's right to access criminal history record information.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Individual's right to access criminal history record information. 20.34 Section 20.34 Judicial Administration DEPARTMENT OF JUSTICE CRIMINAL... Individual's right to access criminal history record information. The procedures by which an individual may...

  2. Unbundling in Current Broadband and Next-Generation Ultra-Broadband Access Networks

    Science.gov (United States)

    Gaudino, Roberto; Giuliano, Romeo; Mazzenga, Franco; Valcarenghi, Luca; Vatalaro, Francesco

    2014-05-01

    This article overviews the methods that are currently under investigation for implementing multi-operator open-access/shared-access techniques in next-generation access ultra-broadband architectures, starting from the traditional "unbundling-of-the-local-loop" techniques implemented in legacy twisted-pair digital subscriber line access networks. A straightforward replication of these copper-based unbundling-of-the-local-loop techniques is usually not feasible on next-generation access networks, including fiber-to-the-home point-to-multipoint passive optical networks. To investigate this issue, the article first gives a concise description of traditional copper-based unbundling-of-the-local-loop solutions, then focalizes on both next-generation access hybrid fiber-copper digital subscriber line fiber-to-the-cabinet scenarios and on fiber to the home by accounting for the mix of regulatory and technological reasons driving the next-generation access migration path, focusing mostly on the European situation.

  3. Scalable Lunar Surface Networks and Adaptive Orbit Access, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Innovative network architecture, protocols, and algorithms are proposed for both lunar surface networks and orbit access networks. Firstly, an overlaying...

  4. Accessing ANSA Objects from OSI Network Management

    OpenAIRE

    Berrah, Karrim; Gay, David; Genilloud, Guy

    1994-01-01

    OSI network management provides a general framework for the management of OSI systems, and by extension of any distributed system. However, it is not yet possible to tell to what extent the tools developed for network management will be applicable to distributed systems management. This paper assumes that network managers will want to have some control of the distributed infrastructure and applications. It examines how access to some of the ANSA management interfaces can be given to OSI netwo...

  5. Random access procedures and radio access network (RAN) overload control in standard and advanced long-term evolution (LTE and LTE-A) networks

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Popovski, Petar

    2015-01-01

    In this chapter, we describe and discuss the current LTE random access procedure and the Radio Access Network Load Control solution within LTE/LTE-A. We provide an overview of the several considered load control solutions and give a detailed description of the standardized Extended Access Class B...

  6. Access Control Model for Sharing Composite Electronic Health Records

    Science.gov (United States)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  7. 20 CFR 903.4 - Procedures for access to records and accountings of disclosures from records, regarding individuals.

    Science.gov (United States)

    2010-04-01

    ... accountings of disclosures from records, regarding individuals. 903.4 Section 903.4 Employees' Benefits JOINT... Procedures for access to records and accountings of disclosures from records, regarding individuals. (a... to an accounting of a disclosure from such record made pursuant to 5 U.S.C. 552a(c)(1), permit that...

  8. 76 FR 28010 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-05-13

    ... protected network. Automated and manual records are available only to authorized personnel having a need-to... notarized signature as a means of proving the identity of the individual requesting access to the records... proving the identity of the individual requesting access to the records.'' * * * * * Record source...

  9. SON for LTE-WLAN access network selection : design and performance

    NARCIS (Netherlands)

    Willemen, P.; Laselva, D.; Wang, Y.; Kovács, I.; Djapic, R.; Moerman, I.

    2016-01-01

    Mobile network operators (MNOs) are deploying carrier-grade Wireless Local Area Network (WLAN) as an important complementary system to cellular networks. Access network selection (ANS) between cellular and WLAN is an essential component to improve network performance and user quality-of-service

  10. 18 CFR 366.2 - Commission access to books and records.

    Science.gov (United States)

    2010-04-01

    ... books and records. 366.2 Section 366.2 Conservation of Power and Water Resources FEDERAL ENERGY..., FEDERAL POWER ACT AND NATURAL GAS ACT BOOKS AND RECORDS Definitions and Provisions Under PUHCA 2005, the Federal Power Act and the Natural Gas Act § 366.2 Commission access to books and records. (a) In general...

  11. Wavelength-converted long-reach reconfigurable optical access network

    NARCIS (Netherlands)

    Tran, N.C.; Tangdiongga, E.; Koonen, A.M.J.

    2012-01-01

    Next generation optical access networks should not only increase the capacity but also be able to redistribute the capacity on the fly in order to manage more fluctuated traffic patterns. Wavelength reconfigurability is the instrument to enable such capability of network-wide bandwidth

  12. Hierarchy Bayesian model based services awareness of high-speed optical access networks

    Science.gov (United States)

    Bai, Hui-feng

    2018-03-01

    As the speed of optical access networks soars with ever increasing multiple services, the service-supporting ability of optical access networks suffers greatly from the shortage of service awareness. Aiming to solve this problem, a hierarchy Bayesian model based services awareness mechanism is proposed for high-speed optical access networks. This approach builds a so-called hierarchy Bayesian model, according to the structure of typical optical access networks. Moreover, the proposed scheme is able to conduct simple services awareness operation in each optical network unit (ONU) and to perform complex services awareness from the whole view of system in optical line terminal (OLT). Simulation results show that the proposed scheme is able to achieve better quality of services (QoS), in terms of packet loss rate and time delay.

  13. Location-aware network operation for cloud radio access network

    KAUST Repository

    Wang, Fanggang

    2017-06-20

    One of the major challenges in effectively operating a cloud radio access network (C-RAN) is the excessive overhead signaling and computation load that scale rapidly with the size of the network. In this paper, the exploitation of location information of the mobile devices is proposed to address this challenge. We consider an approach in which location-assisted channel state information (CSI) acquisition methods are introduced to complement conventional pilot-based CSI acquisition methods and avoid excessive overhead signaling. A low-complexity algorithm is designed to maximize the sum rate. An adaptive algorithm is also proposed to address the uncertainty issue in CSI acquisition. Both theoretical and numerical analyses show that location information provides a new dimension to improve throughput for next-generation massive cooperative networks.

  14. Software Defined Networking for Next Generation Converged Metro-Access Networks

    Science.gov (United States)

    Ruffini, M.; Slyne, F.; Bluemm, C.; Kitsuwan, N.; McGettrick, S.

    2015-12-01

    While the concept of Software Defined Networking (SDN) has seen a rapid deployment within the data center community, its adoption in telecommunications network has progressed slowly, although the concept has been swiftly adopted by all major telecoms vendors. This paper presents a control plane architecture for SDN-driven converged metro-access networks, developed through the DISCUS European FP7 project. The SDN-based controller architecture was developed in a testbed implementation targeting two main scenarios: fast feeder fiber protection over dual-homed Passive Optical Networks (PONs) and dynamic service provisioning over a multi-wavelength PON. Implementation details and results of the experiment carried out over the second scenario are reported in the paper, showing the potential of SDN in providing assured on-demand services to end-users.

  15. Impacts on the Voltage Profile of DC Distribution Network with DG Access

    Science.gov (United States)

    Tu, J. J.; Yin, Z. D.

    2017-07-01

    With the development of electronic, more and more distributed generations (DGs) access into grid and cause the research fever of direct current (DC) distribution network. Considering distributed generation (DG) location and capacity have great impacts on voltage profile, so use IEEE9 and IEEE33 typical circuit as examples, with DGs access in centralized and decentralized mode, to compare voltage profile in alternating and direct current (AC/DC) distribution network. Introducing the voltage change ratio as an evaluation index, so gets the general results on voltage profile of DC distributed network with DG access. Simulation shows that, in the premise of reasonable location and capacity, DC distribution network is more suitable for DG access.

  16. Quantitative analysis of access strategies to remote information in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach in...

  17. Optical fiber cabling technologies for flexible access network

    Science.gov (United States)

    Tanji, Hisashi

    2008-07-01

    Fiber-to-the-home (FTTH) outside plant infrastructure should be so designed and constructed as to flexibly deal with increasing subscribers and system evolution to be expected in the future, taking minimization of total cost (CAPEX and OPEX) into consideration. With this in mind, fiber access architectures are reviewed and key technologies on optical fiber and cable for supporting flexible access network are presented. Low loss over wide wavelength (low water peak) and bend-insensitive single mode fiber is a future proof solution. Enhanced separable ribbon facilitates mid-span access to individual fibers in a cable installed, improving fiber utilizing efficiency and flexibility of distribution design. It also contributes to an excellent low PMD characteristic which could be required for video RF overlay system or high capacity long reach metro-access convergence network in the future. Bend-insensitive fiber based cabling technique including field installable connector greatly improves fiber/cable handling in installation and maintenance work.

  18. 25 CFR 47.6 - Who has access to local education financial records?

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Who has access to local education financial records? 47.6 Section 47.6 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR EDUCATION UNIFORM DIRECT FUNDING AND SUPPORT FOR BUREAU-OPERATED SCHOOLS § 47.6 Who has access to local education financial records...

  19. A Unified Access Model for Interconnecting Heterogeneous Wireless Networks

    Science.gov (United States)

    2015-05-01

    validation of the proposed network design for unified network access, and it lays the foundation for implementing a Software - Defined Networking ( SDN ...York (NY): Springer; 2014. Chapter 2, Software - defined networking ; p. 19–32. 5. Sharma S, Staessens D, Colle D, Pickavet M, Demeester P. A...demonstration of fast failure recovery in software defined networking . In: Korakis T, Zink M, Ott, M, editors. Testbeds and research infrastructure

  20. Ethernet access network based on free-space optic deployment technology

    Science.gov (United States)

    Gebhart, Michael; Leitgeb, Erich; Birnbacher, Ulla; Schrotter, Peter

    2004-06-01

    The satisfaction of all communication needs from single households and business companies over a single access infrastructure is probably the most challenging topic in communications technology today. But even though the so-called "Last Mile Access Bottleneck" is well known since more than ten years and many distribution technologies have been tried out, the optimal solution has not yet been found and paying commercial access networks offering all service classes are still rare today. Conventional services like telephone, radio and TV, as well as new and emerging services like email, web browsing, online-gaming, video conferences, business data transfer or external data storage can all be transmitted over the well known and cost effective Ethernet networking protocol standard. Key requirements for the deployment technology driven by the different services are high data rates to the single customer, security, moderate deployment costs and good scalability to number and density of users, quick and flexible deployment without legal impediments and high availability, referring to the properties of optical and wireless communication. We demonstrate all elements of an Ethernet Access Network based on Free Space Optic distribution technology. Main physical parts are Central Office, Distribution Network and Customer Equipment. Transmission of different services, as well as configuration, service upgrades and remote control of the network are handled by networking features over one FSO connection. All parts of the network are proven, the latest commercially available technology. The set up is flexible and can be adapted to any more specific need if required.

  1. High Dimensional Modulation and MIMO Techniques for Access Networks

    DEFF Research Database (Denmark)

    Binti Othman, Maisara

    Exploration of advanced modulation formats and multiplexing techniques for next generation optical access networks are of interest as promising solutions for delivering multiple services to end-users. This thesis addresses this from two different angles: high dimensionality carrierless...... the capacity per wavelength of the femto-cell network. Bit rate up to 1.59 Gbps with fiber-wireless transmission over 1 m air distance is demonstrated. The results presented in this thesis demonstrate the feasibility of high dimensionality CAP in increasing the number of dimensions and their potentially......) optical access network. 2 X 2 MIMO RoF employing orthogonal frequency division multiplexing (OFDM) with 5.6 GHz RoF signaling over all-vertical cavity surface emitting lasers (VCSEL) WDM passive optical networks (PONs). We have employed polarization division multiplexing (PDM) to further increase...

  2. Cloud Radio Access Network architecture. Towards 5G mobile networks

    DEFF Research Database (Denmark)

    Checko, Aleksandra

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges that mobile operators face while trying to support ever-growing end-users’ needs towards 5th generation of mobile networks (5G). The main idea behind C-RAN is to split the base...... stations into radio and baseband parts, and pool the Baseband Units (BBUs) from multiple base stations into a centralized and virtualized BBU Pool. This gives a number of benefits in terms of cost and capacity. However, the challenge is then to find an optimal functionality splitting point as well...... as to design the socalled fronthaul network, interconnecting those parts. This thesis focuses on quantifying those benefits and proposing a flexible and capacity-optimized fronthaul network. It is shown that a C-RAN with a functional split resulting in a variable bit rate on the fronthaul links brings cost...

  3. Electronic health records

    DEFF Research Database (Denmark)

    Kierkegaard, Patrick

    2011-01-01

    that a centralised European health record system will become a reality even before 2020. However, the concept of a centralised supranational central server raises concern about storing electronic medical records in a central location. The privacy threat posed by a supranational network is a key concern. Cross......-border and Interoperable electronic health record systems make confidential data more easily and rapidly accessible to a wider audience and increase the risk that personal data concerning health could be accidentally exposed or easily distributed to unauthorised parties by enabling greater access to a compilation...... of the personal data concerning health, from different sources, and throughout a lifetime....

  4. Network Layer Protocol Activation for Packet Data Access in UMTS WCDMA Laboratory Network

    OpenAIRE

    Lakkisto, Erkka

    2011-01-01

    The purpose of this Bachelor’s Thesis was to set up the UMTS WCDMA network in the laboratory environment of Helsinki Metropolia University of Applied Sciences and to study the network layer protocol activation for packet data access. The development of 3G technology has been very rapid and it can be considered as one of the main technologies in telecommunication. Implementing the laboratory network in Metropolia enables teaching and researching of the modern network technology. Labora...

  5. Spatial accessibility to specific sport facilities and corresponding sport practice: the RECORD Study.

    Science.gov (United States)

    Karusisi, Noëlla; Thomas, Frédérique; Méline, Julie; Chaix, Basile

    2013-04-20

    Physical activity is considered as a major component of a healthy lifestyle. However, few studies have examined the relationships between the spatial accessibility to sport facilities and sport practice with a sufficient degree of specificity. The aim of this study was to investigate the associations between the spatial accessibility to specific types of sports facilities and the practice of the corresponding sports after carefully controlling for various individual socio-demographic characteristics and neighborhood socioeconomic variables. Data from the RECORD Study involving 7290 participants recruited in 2007-2008, aged 30-79 years, and residing in the Paris metropolitan area were analyzed. Four categories of sports were studied: team sports, racket sports, swimming and related activities, and fitness. Spatial accessibility to sport facilities was measured with two complementary approaches that both take into account the street network (distance to the nearest facility and count of facilities around the dwelling). Associations between the spatial accessibility to sport facilities and the practice of the corresponding sports were assessed using multilevel logistic regression after adjusting for individual and contextual characteristics. High individual education and high household income were associated with the practice of racket sports, swimming or related activities, and fitness over the previous 7 days. The spatial accessibility to swimming pools was associated with swimming and related sports, even after adjustment for individual/contextual factors. The spatial accessibility to facilities was not related to the practice of other sports. High neighborhood income was associated with the practice of a racket sport and fitness. Accessibility is a multi-dimensional concept that integrates educational, financial, and geographical aspects. Our work supports the evidence that strategies to increase participation in sport activities should improve the spatial and

  6. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  7. Accessibility assessment of Houston's roadway network during Harvey through integration of observed flood impacts and hydrologic modeling

    Science.gov (United States)

    Gidaris, I.; Gori, A.; Panakkal, P.; Padgett, J.; Bedient, P. B.

    2017-12-01

    The record-breaking rainfall produced over the Houston region by Hurricane Harvey resulted in catastrophic and unprecedented impacts on the region's infrastructure. Notably, Houston's transportation network was crippled, with almost every major highway flooded during the five-day event. Entire neighborhoods and subdivisions were inundated, rendering them completely inaccessible to rescue crews and emergency services. Harvey has tragically highlighted the vulnerability of major thoroughfares, as well as neighborhood roads, to severe inundation during extreme precipitation events. Furthermore, it has emphasized the need for detailed accessibility characterization of road networks under extreme event scenarios in order to determine which areas of the city are most vulnerable. This analysis assesses and tracks the accessibility of Houston's major highways during Harvey's evolution by utilizing road flood/closure data from the Texas DOT. In the absence of flooded/closure data for local roads, a hybrid approach is adopted that utilizes a physics-based hydrologic model to produce high-resolution inundation estimates for selected urban watersheds in the Houston area. In particular, hydrologic output in the form of inundation depths is used to estimate the operability of local roads. Ultimately, integration of hydrologic-based estimation of road conditions with observed data from DOT supports a network accessibility analysis of selected urban neighborhoods. This accessibility analysis can identify operable routes for emergency response (rescue crews, medical services, etc.) during the storm event.

  8. Approximate Networking for Universal Internet Access

    Directory of Open Access Journals (Sweden)

    Junaid Qadir

    2017-12-01

    Full Text Available Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost-efficient ways of provisioning high-performance, global Internet. In this paper, we argue that instead of an exclusive focus on a utopian goal of universally accessible “ideal networking” (in which we have a high throughput and quality of service as well as low latency and congestion, we should consider providing “approximate networking” through the adoption of context-appropriate trade-offs. In this regard, we propose to leverage the advances in the emerging trend of “approximate computing” that rely on relaxing the bounds of precise/exact computing to provide new opportunities for improving the area, power, and performance efficiency of systems by orders of magnitude by embracing output errors in resilient applications. Furthermore, we propose to extend the dimensions of approximate computing towards various knobs available at network layers. Approximate networking can be used to provision “Global Access to the Internet for All” (GAIA in a pragmatically tiered fashion, in which different users around the world are provided a different context-appropriate (but still contextually functional Internet experience.

  9. 5 CFR 2504.11 - Access to the accounting of disclosures from records.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Access to the accounting of disclosures... OFFICE OF THE PRESIDENT PRIVACY ACT REGULATIONS § 2504.11 Access to the accounting of disclosures from records. Rules governing access to the accounting of disclosures are the same as those granting access to...

  10. Distributed cloud association in downlink multicloud radio access networks

    KAUST Repository

    Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    This paper considers a multicloud radio access network (M-CRAN), wherein each cloud serves a cluster of base-stations (BS's) which are connected to the clouds through high capacity digital links. The network comprises several remote users, where

  11. Multirate IP traffic transmission in flexible access networks based on optical FFH-CDMA

    DEFF Research Database (Denmark)

    Raddo, Thiago R.; Sanches, Anderson L.; Tafur Monroy, Idelfonso

    2016-01-01

    In this paper, we propose a new IP transmission architecture over optical fast frequency hopping code-division multiple-access (OFFH-CDMA) network capable of supporting multirate transmissions for applications in flexible optical access networks. The proposed network architecture is independent...

  12. Adaptation of AMO-FBMC-OQAM in optical access network for accommodating asynchronous multiple access in OFDM-based uplink transmission

    Science.gov (United States)

    Jung, Sun-Young; Jung, Sang-Min; Han, Sang-Kook

    2015-01-01

    Exponentially expanding various applications in company with proliferation of mobile devices make mobile traffic exploded annually. For future access network, bandwidth efficient and asynchronous signals converged transmission technique is required in optical network to meet a huge bandwidth demand, while integrating various services and satisfying multiple access in perceived network resource. Orthogonal frequency division multiplexing (OFDM) is highly bandwidth efficient parallel transmission technique based on orthogonal subcarriers. OFDM has been widely studied in wired-/wireless communication and became a Long term evolution (LTE) standard. Consequently, OFDM also has been actively researched in optical network. However, OFDM is vulnerable frequency and phase offset essentially because of its sinc-shaped side lobes, therefore tight synchronism is necessary to maintain orthogonality. Moreover, redundant cyclic prefix (CP) is required in dispersive channel. Additionally, side lobes act as interference among users in multiple access. Thus, it practically hinders from supporting integration of various services and multiple access based on OFDM optical transmission In this paper, adaptively modulated optical filter bank multicarrier system with offset QAM (AMO-FBMC-OQAM) is introduced and experimentally investigated in uplink optical transmission to relax multiple access interference (MAI), while improving bandwidth efficiency. Side lobes are effectively suppressed by using FBMC, therefore the system becomes robust to path difference and imbalance among optical network units (ONUs), which increase bandwidth efficiency by reducing redundancy. In comparison with OFDM, a signal performance and an efficiency of frequency utilization are improved in the same experimental condition. It enables optical network to effectively support heterogeneous services and multiple access.

  13. Joint Hybrid Backhaul and Access Links Design in Cloud-Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb

    2015-09-06

    The cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio systems. In this paper, we consider the downlink of a CRAN formed of one central processor (the cloud) and several base station (BS), where each BS is connected to the cloud via either a wireless or capacity-limited wireline backhaul link. The paper addresses the joint design of the hybrid backhaul links (i.e., designing the wireline and wireless backhaul connections from the cloud to the BSs) and the access links (i.e., determining the sparse beamforming solution from the BSs to the users). The paper formulates the hybrid backhaul and access link design problem by minimizing the total network power consumption. The paper solves the problem using a two-stage heuristic algorithm. At one stage, the sparse beamforming solution is found using a weighted mixed 11/12 norm minimization approach; the correlation matrix of the quantization noise of the wireline backhaul links is computed using the classical rate-distortion theory. At the second stage, the transmit powers of the wireless backhaul links are found by solving a power minimization problem subject to quality-of-service constraints, based on the principle of conservation of rate by utilizing the rates found in the first stage. Simulation results suggest that the performance of the proposed algorithm approaches the global optimum solution, especially at high signal-to-interference-plus-noise ratio (SINR).

  14. 32 CFR 1665.3 - Access to the accounting of disclosures from records.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Access to the accounting of disclosures from... SERVICE SYSTEM PRIVACY ACT PROCEDURES § 1665.3 Access to the accounting of disclosures from records. Rules governing the granting of access to the accounting of disclosure are the same as those for granting accesses...

  15. Stochastic geometry model for multi-channel fog radio access networks

    KAUST Repository

    Emara, Mostafa; Elsawy, Hesham; Sorour, Sameh; Al-Ghadhban, Samir; Alouini, Mohamed-Slim; Al-Naffouri, Tareq Y.

    2017-01-01

    Cache-enabled base station (BS) densification, denoted as a fog radio access network (F-RAN), is foreseen as a key component of 5G cellular networks. F-RAN enables storing popular files at the network edge (i.e., BS caches), which empowers local

  16. Learning Automata Based Caching for Efficient Data Access in Delay Tolerant Networks

    Directory of Open Access Journals (Sweden)

    Zhenjie Ma

    2018-01-01

    Full Text Available Effective data access is one of the major challenges in Delay Tolerant Networks (DTNs that are characterized by intermittent network connectivity and unpredictable node mobility. Currently, different data caching schemes have been proposed to improve the performance of data access in DTNs. However, most existing data caching schemes perform poorly due to the lack of global network state information and the changing network topology in DTNs. In this paper, we propose a novel data caching scheme based on cooperative caching in DTNs, aiming at improving the successful rate of data access and reducing the data access delay. In the proposed scheme, learning automata are utilized to select a set of caching nodes as Caching Node Set (CNS in DTNs. Unlike the existing caching schemes failing to address the challenging characteristics of DTNs, our scheme is designed to automatically self-adjust to the changing network topology through the well-designed voting and updating processes. The proposed scheme improves the overall performance of data access in DTNs compared with the former caching schemes. The simulations verify the feasibility of our scheme and the improvements in performance.

  17. Long-Term Surveillance and Maintenance Records: Maintaining Access to the Knowledge - 13122

    International Nuclear Information System (INIS)

    Montgomery, John; Gueretta, Jeanie; McKinney, Ruth; Anglim, Cliff

    2013-01-01

    The U.S. Department of Energy (DOE) Office of Legacy Management (LM) is an integral part of DOE's strategy to ensure that legacy liabilities of former nuclear weapons production sites are properly managed following the completion of environmental cleanup activities. In the area of environmental legacy management, records management is crucial to the protection of health, environmental, and legal interests of the Department and the public. LM is responsible for maintaining long-term surveillance and maintenance (LTS and M) records in performance of its mission. Maintaining access to the knowledge contained in these record collections is one of LM's primary responsibilities. To fulfill this responsibility, LM established a consolidated records management facility, the LM Business Center (LMBC), to house physical media records and electronic records. A new electronic record keeping system (ERKS) was needed to replace an obsolete system while helping to ensure LM is able to meet ongoing responsibilities to maintain access to knowledge and control the life cycle management of records. (authors)

  18. Cell Deployment Optimization for Cloud Radio Access Networks using Teletraffic Theory

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Christiansen, Henrik Lehrmann; Iversen, Villy Bæk

    2015-01-01

    Cloud Radio Access Network (C-RAN) is a new mobile radio access network design based on centralized and pooled processing. It offers potential cost savings by utilizing the so-called tidal effect due to user mobility in cellular networks. This paper provides a quantitative analysis...... to dynamically re-assign cells to a pool of baseband units. The re-assignment is based on the cell load and traffic characteristics such that effective utilization of the baseband resources is assured....

  19. Passive Optical Access Networks: State of the Art and Future Evolution

    Directory of Open Access Journals (Sweden)

    Tommaso Muciaccia

    2014-10-01

    Full Text Available In the very last years, optical access networks are growing very rapidly, from both the network operators and the research interests points of view. Fiber To The Home (FTTH is already a reality in plenty of real contexts and there has been a further stimulus to the proposal of new solutions and the investigation of new possibilities, in order to optimize network performance and reduce capital and operational expenditure. A complete and systematic overview of passive optical access networks is presented in this paper, concerning both the hot research topics and the main operative issues about the design guidelines and the deployment of Passive Optical Networks (PON architectures, nowadays the most commonly implemented approach to realize optical fiber links in the access networks. A comparison of advantages and disadvantages of different multiplexing techniques is discussed, with specific reference to WDM-based networks, almost universally considered as the enabling technology for future proof bandwidth requirements. An exhaustive summary is also given about the-state-of-the-art of modulation and encoding techniques recently proposed by the scientific community, as well as the open challenges (such as colorless and coolerless ONUs for telecom companies and international standardization compliance.

  20. Algorithmic PON/P2P FTTH Access Network Design for CAPEX Minimization

    DEFF Research Database (Denmark)

    Papaefthimiou, Kostantinos; Tefera, Yonas; Mihylov, Dimitar

    2013-01-01

    one. It provides an obvious advantage for the end users in terms of high achievable data rates. On the other hand, the high initial deployment cost required exists as the heaviest impediment. The main goal of this paper is to study different approaches when designing a fiber access network. More......Due to the emergence of high bandwidth-requiring services, telecommunication operators (telcos) are called to upgrade their fixed access network. In order to keep up with the competition, they must consider different optical access network solutions with Fiber To The Home (FTTH) as the prevailing...

  1. On the Design of Energy Efficient Optical Networks with Software Defined Networking Control Across Core and Access Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Yan, Ying; Dittmann, Lars

    2013-01-01

    This paper presents a Software Defined Networking (SDN) control plane based on an overlay GMPLS control model. The SDN control platform manages optical core networks (WDM/DWDM networks) and the associated access networks (GPON networks), which makes it possible to gather global information...... and enable wider areas' energy efficiency networking. The energy related information of the networks and the types of the traffic flows are collected and utilized for the end-to-end QoS provision. Dynamic network simulation results show that by applying different routing algorithms according to the type...... of traffic in the core networks, the energy efficiency of the network is improved without compromising the quality of service....

  2. 45 CFR 613.2 - Requesting access to records.

    Science.gov (United States)

    2010-10-01

    ... and/or date and place of birth of the individual; (2) Your own identity, as required in paragraph (c...) Verification of identity. When requesting access to records about yourself, NSF requires that you verify your identity in an appropriate fashion. Individuals appearing in person should be prepared to show reasonable...

  3. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  4. Multiple access protocol for supporting multimedia services in wireless ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo

    1999-01-01

    The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications....... In this paper, we propose a multiple access protocol using centralized and distributed channel access control techniques to provide QoS guarantees for multimedia services by taking advantage of the characteristics of different kinds of ATM traffics. Multimedia traffic, including constant bit rate (CBR...

  5. Accessibility in networks: A useful measure for understanding social insect nest architecture

    International Nuclear Information System (INIS)

    Viana, Matheus P.; Fourcassié, Vincent; Perna, Andrea; Costa, Luciano da F.; Jost, Christian

    2013-01-01

    Networks and the associated tools from graph theory have now become well-established approaches to study natural as well as human-made systems. While early studies focused on topology and connectivity, the recent literature has acknowledged the importance of the dynamical properties of these networks. Here we focus on such a dynamic measure: accessibility. It characterizes for any given movement dynamics (such as random walks) the average number of nodes that can be reached in exactly h steps (out-accessibility), or the average number of nodes from which a given node can be reached (in-accessibility). This focus on dynamics makes accessibility particularly appropriate to study movement on networks and to detect complementary properties with respect to topology-based measurements such as betweenness centrality. We apply this measure to six nests of Cubitermes termites. Their mushroom-like 3D architectures consist of chambers and connecting tunnels that can be associated to nodes and edges in a communication network. Accessibilities turn out to be particularly low in the bottom part of the nests that link them to their underground tunneling network. We interpret this result in the context of anti-predator (ants) behavior and/or as a side effect of the global nest shape.

  6. Advance reservation access control using software-defined networking and tokens

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar; Rao, Nageswara S. V.; Foster, Ian T.; Clark, Russ; Owen, Henry

    2018-02-01

    Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present here a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization. We use SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. We conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network. (C) 2017 Elsevier B.V. All rights reserved.

  7. A Method for Automated Planning of FTTH Access Network Infrastructures

    DEFF Research Database (Denmark)

    Riaz, Muhammad Tahir; Pedersen, Jens Myrup; Madsen, Ole Brun

    2005-01-01

    In this paper a method for automated planning of Fiber to the Home (FTTH) access networks is proposed. We introduced a systematic approach for planning access network infrastructure. The GIS data and a set of algorithms were employed to make the planning process more automatic. The method explains...... method. The method, however, does not fully automate the planning but make the planning process significantly fast. The results and discussion are presented and conclusion is given in the end....

  8. 76 FR 40454 - Proposed Information Collection (VSO Access to VHA Electronic Health Records) Activity; Comment...

    Science.gov (United States)

    2011-07-08

    ... Access to VHA Electronic Health Records) Activity; Comment Request AGENCY: Veterans Health Administration... Access to VHA Electronic Health Records, VA Form 10- 0400. OMB Control Number: 2900-0710. Type of Review... were granted power of attorney by veterans who have medical information recorded in VHA electronic...

  9. Access regulation in the next generation access network environment: A comparative study of Hong Kong and Singapore from the transaction cost economics perspectives

    OpenAIRE

    Ho, Au Man

    2012-01-01

    Hong Kong and Singapore have adopted two different models in the regulation of the next generation access (NGA) networks. In Hong Kong, the government has decided that access regulation will not be applied to fibre-based access networks and its strategy will be to rely on facilities-based competition to promote investment in the NGA networks. Singapore, on the other hand, has promoted access/services-based competition over a next generation broadband infrastructure subsidised by public fundin...

  10. 5 CFR 1302.3 - Access to the accounting of disclosures from records.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Access to the accounting of disclosures... ADMINISTRATIVE PROCEDURES PRIVACY ACT PROCEDURES § 1302.3 Access to the accounting of disclosures from records. Rules governing the granting of access to the accounting of disclosures are the same as those for...

  11. Spectrum access games for cognitive radio networks

    CSIR Research Space (South Africa)

    Masonta, MT

    2010-09-01

    Full Text Available received a wide acceptance in next generation and intelligent wireless communication systems. In this paper the authors make use of game theory approach to model and analyze cognitive radio networks in order to allow dynamic spectrum access in broadband...

  12. Long-Term Surveillance and Maintenance Records: Maintaining Access to the Knowledge - 13122

    Energy Technology Data Exchange (ETDEWEB)

    Montgomery, John; Gueretta, Jeanie [U.S. Department of Energy Office of Legacy Management, 99 Research Park Road Morgantown, WV 26505 (United States); McKinney, Ruth; Anglim, Cliff [Source One Management, Inc. (United States)

    2013-07-01

    The U.S. Department of Energy (DOE) Office of Legacy Management (LM) is an integral part of DOE's strategy to ensure that legacy liabilities of former nuclear weapons production sites are properly managed following the completion of environmental cleanup activities. In the area of environmental legacy management, records management is crucial to the protection of health, environmental, and legal interests of the Department and the public. LM is responsible for maintaining long-term surveillance and maintenance (LTS and M) records in performance of its mission. Maintaining access to the knowledge contained in these record collections is one of LM's primary responsibilities. To fulfill this responsibility, LM established a consolidated records management facility, the LM Business Center (LMBC), to house physical media records and electronic records. A new electronic record keeping system (ERKS) was needed to replace an obsolete system while helping to ensure LM is able to meet ongoing responsibilities to maintain access to knowledge and control the life cycle management of records. (authors)

  13. Optical solutions for unbundled access network

    Science.gov (United States)

    Bacîş Vasile, Irina Bristena

    2015-02-01

    The unbundling technique requires finding solutions to guarantee the economic and technical performances imposed by the nature of the services that can be offered. One of the possible solutions is the optic one; choosing this solution is justified for the following reasons: it optimizes the use of the access network, which is the most expensive part of a network (about 50% of the total investment in telecommunications networks) while also being the least used (telephone traffic on the lines has a low cost); it increases the distance between the master station/central and the terminal of the subscriber; the development of the services offered to the subscribers is conditioned by the subscriber network. For broadband services there is a need for support for the introduction of high-speed transport. A proper identification of the factors that must be satisfied and a comprehensive financial evaluation of all resources involved, both the resources that are in the process of being bought as well as extensions are the main conditions that would lead to a correct choice. As there is no single optimal technology for all development scenarios, which can take into account all access systems, a successful implementation is always done by individual/particularized scenarios. The method used today for the selection of an optimal solution is based on statistics and analysis of the various, already implemented, solutions, and on the experience that was already gained; the main evaluation criterion and the most unbiased one is the ratio between the cost of the investment and the quality of service, while serving an as large as possible number of customers.

  14. 75 FR 63253 - State-56, Network User Account Records

    Science.gov (United States)

    2010-10-14

    ... to the records covered by this system of records receive cyber security awareness training which... access or inappropriate usage is suspected or detected; and to identify the need for training programs... suspected or detected; and to identify the need for training programs. ROUTINE USES OF RECORDS MAINTAINED IN...

  15. A slotted access control protocol for metropolitan WDM ring networks

    Science.gov (United States)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  16. 20 CFR 401.70 - Appeals of refusals to correct records or refusals to allow access to records.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Appeals of refusals to correct records or refusals to allow access to records. 401.70 Section 401.70 Employees' Benefits SOCIAL SECURITY... also inform you that you have a right to file a statement of disagreement with the decision. Your...

  17. Spectrum access and management for cognitive radio networks

    CERN Document Server

    2017-01-01

    This book presents cutting-edge research contributions that address various aspects of network design, optimization, implementation, and application of cognitive radio technologies. It demonstrates how to make better utilization of the available spectrum, cognitive radios and spectrum access to achieve effective spectrum sharing between licensed and unlicensed users. The book provides academics and researchers essential information on current developments and future trends in cognitive radios for possible integration with the upcoming 5G networks. In addition, it includes a brief introduction to cognitive radio networks for newcomers to the field.

  18. 5 CFR 1630.9 - Access to the history (accounting) of disclosures from records.

    Science.gov (United States)

    2010-01-01

    ... BOARD PRIVACY ACT REGULATIONS § 1630.9 Access to the history (accounting) of disclosures from records. Rules governing access to the accounting of disclosures are the same as those for granting access to the... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Access to the history (accounting) of...

  19. Access control and privilege management in electronic health record: a systematic literature review.

    Science.gov (United States)

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  20. Coordinated scheduling for the downlink of cloud radio-access networks

    KAUST Repository

    Douik, Ahmed S.; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    This paper addresses the coordinated scheduling problem in cloud-enabled networks. Consider the downlink of a cloud-radio access network (CRAN), where the cloud is only responsible for the scheduling policy and the synchronization of the transmit

  1. Building a multimodal network and determining individual accessibility by public transportation

    DEFF Research Database (Denmark)

    Djurhuus, Sune; Hansen, Henning Sten; Aadahl, Mette

    2016-01-01

    The increased availability of transit schedules from web sites or travel planners as well as more disaggregate data has led to a growing interest in creating individual public transportation accessibility measures. However, used extensively, standard GIS software does not have direct capabilities...... from a travel planner into a multimodal network model using simple SQL (structured query language) programming and standard GIS. The method presented here integrates all parts of travelling by public transportation from individual home addresses to all reachable transit stops within different travel....... The accessibility areas are created at morning rush hour for a study population of 29 447 individuals and a few examples of accessibility areas are presented. The results show a big difference in individual public transportation accessibility in the region. In addition, how the transit network is accessed, whether...

  2. Wireless ad hoc networks access for aeronautical communications

    OpenAIRE

    Besse , Frédéric; Garcia , Fabien; Pirovano , Alain; Radzik , José

    2010-01-01

    International audience; There is an increasing interest in the current aeronautical context to offer new services for civil aircraft passengers. For example, airlines want to offer their customers the opportunity to access the Internet, to manage their mails, to watch video on demand, to access corporate VPNs.... All these services represent a new type of air-ground communications called APC (Aeronautical Passenger Communications) in the ATN (Aeronautical Telecommunication Network) context. I...

  3. Distributed Robust Power Minimization for the Downlink of Multi-Cloud Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    Conventional cloud radio access networks assume single cloud processing and treat inter-cloud interference as background noise. This paper considers the downlink of a multi-cloud radio access network (CRAN) where each cloud is connected to several

  4. Performance of WLAN RSS-based SON for LTE/WLAN access network selection

    NARCIS (Netherlands)

    Wang, Y.; Djapic, R.; Bergström, A.; Kovács, I.Z.; Laselva, D.; Spaey, K.; Sas, B.

    2014-01-01

    Mobile Network Operators (MNOs) are integrating carrier-grade Wireless Local Area Network (WLAN) to cellular networks to improve network performance and user experience. Access network selection (ANS) between cellular and WLAN plays a key role in the integration. Given the complexity of

  5. Models for QoS-Aware Capacity Management in Cable Access Networks

    NARCIS (Netherlands)

    Attema, T.; van den Berg, Hans Leo; Kempker, P.C.; Worm, D.; van der Vliet-Hameeteman, C.

    In this article, mathematical models are presented that “map‿ measured or predicted network utilisations to user throughputs for given network configurations (segment capacity, subscription speeds etc.). They provide valuable insights into the user experience in cable access networks. The models,

  6. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani

    2013-01-01

    that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over...

  7. Highball: A high speed, reserved-access, wide area network

    Science.gov (United States)

    Mills, David L.; Boncelet, Charles G.; Elias, John G.; Schragger, Paul A.; Jackson, Alden W.

    1990-01-01

    A network architecture called Highball and a preliminary design for a prototype, wide-area data network designed to operate at speeds of 1 Gbps and beyond are described. It is intended for applications requiring high speed burst transmissions where some latency between requesting a transmission and granting the request can be anticipated and tolerated. Examples include real-time video and disk-disk transfers, national filestore access, remote sensing, and similar applications. The network nodes include an intelligent crossbar switch, but have no buffering capabilities; thus, data must be queued at the end nodes. There are no restrictions on the network topology, link speeds, or end-end protocols. The end system, nodes, and links can operate at any speed up to the limits imposed by the physical facilities. An overview of an initial design approach is presented and is intended as a benchmark upon which a detailed design can be developed. It describes the network architecture and proposed access protocols, as well as functional descriptions of the hardware and software components that could be used in a prototype implementation. It concludes with a discussion of additional issues to be resolved in continuing stages of this project.

  8. Modified network simulation model with token method of bus access

    Directory of Open Access Journals (Sweden)

    L.V. Stribulevich

    2013-08-01

    Full Text Available Purpose. To study the characteristics of the local network with the marker method of access to the bus its modified simulation model was developed. Methodology. Defining characteristics of the network is carried out on the developed simulation model, which is based on the state diagram-layer network station with the mechanism of processing priorities, both in steady state and in the performance of control procedures: the initiation of a logical ring, the entrance and exit of the station network with a logical ring. Findings. A simulation model, on the basis of which can be obtained the dependencies of the application the maximum waiting time in the queue for different classes of access, and the reaction time usable bandwidth on the data rate, the number of network stations, the generation rate applications, the number of frames transmitted per token holding time, frame length was developed. Originality. The technique of network simulation reflecting its work in the steady condition and during the control procedures, the mechanism of priority ranking and handling was proposed. Practical value. Defining network characteristics in the real-time systems on railway transport based on the developed simulation model.

  9. Partial Interference and Its Performance Impact on Wireless Multiple Access Networks

    Directory of Open Access Journals (Sweden)

    Lau WingCheong

    2010-01-01

    Full Text Available To determine the capacity of wireless multiple access networks, the interference among the wireless links must be accurately modeled. In this paper, we formalize the notion of the partial interference phenomenon observed in many recent wireless measurement studies and establish analytical models with tractable solutions for various types of wireless multiple access networks. In particular, we characterize the stability region of IEEE 802.11 networks under partial interference with two potentially unsaturated links numerically. We also provide a closed-form solution for the stability region of slotted ALOHA networks under partial interference with two potentially unsaturated links and obtain a partial characterization of the boundary of the stability region for the general M-link case. Finally, we derive a closed-form approximated solution for the stability region for general M-link slotted ALOHA system under partial interference effects. Based on our results, we demonstrate that it is important to model the partial interference effects while analyzing wireless multiple access networks. This is because such considerations can result in not only significant quantitative differences in the predicted system capacity but also fundamental qualitative changes in the shape of the stability region of the systems.

  10. Open Access Metadata, Catalogers, and Vendors: The Future of Cataloging Records

    Science.gov (United States)

    Flynn, Emily Alinder

    2013-01-01

    The open access (OA) movement is working to transform scholarly communication around the world, but this philosophy can also apply to metadata and cataloging records. While some notable, large academic libraries, such as Harvard University, the University of Michigan, and the University of Cambridge, released their cataloging records under OA…

  11. 12 CFR 1806.304 - Books of account, records and government access.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Books of account, records and government access..., DEPARTMENT OF THE TREASURY BANK ENTERPRISE AWARD PROGRAM Terms and Conditions of Assistance § 1806.304 Books... to the Awardee's offices and facilities, and all books, documents, records, and financial statements...

  12. Design mobile satellite system architecture as an integral part of the cellular access digital network

    Science.gov (United States)

    Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.

    1988-01-01

    The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.

  13. Service Class Resource Management For Green Wireless-Optical Broadband Access NetworksWOBAN

    Directory of Open Access Journals (Sweden)

    SRUTHY.S

    2015-08-01

    Full Text Available Abstract-Broadband access networks have become an essential part of worldwide communication systems because of the exponential growth of broadband services such as video on demand high definition TV internet protocol TV and video conferencing. Exponential growth in the volume of wireless data boosted by the growing popularity of mobile devices such as smartphone and tablets has forced the telecommunication industries to rethink the way networks are currently designed and to focus on the development of high-capacity mobile broadband networks. In response to this challenge researchers have been working toward the development of an integrated wireless optical broadband access network. Two major candidate technologies which are currently known for their high capacity as well as quality of service QoS for multimedia traffic are passive optical networks PON and fourth generation 4G wireless networks. PON is a wired access technology well known for its cost efficiency and high capacity whereas 4G is a wireless broadband access technology which has achieved broad market acceptance because of its ease of deployment ability to offer mobility and its cost efficiency. Integration of PON and 4G technologies in the form of wireless-optical broadband access networks offers advantages such as extension of networks in rural areas support for mobile broadband services and quick deployment of broadband networks. These two technologies however have different design architectures for handling broadband services that require quality of service. For example 4G networks use traffic classification for supporting different QoS demands whereas the PON architecture has no such mechanism to differentiate between types of traffic. These two technologies also differ in their power saving mechanisms. Propose a service class mapping for the integrated PON-4G network which is based on the MG1 queuing model and class-based power saving mechanism which significantly improves the

  14. Hopping control channel MAC protocol for opportunistic spectrum access networks

    Institute of Scientific and Technical Information of China (English)

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  15. Research and Design of Dynamic Migration Access Control Technology Based on Heterogeneous Network

    Directory of Open Access Journals (Sweden)

    Wang Feng

    2017-01-01

    Full Text Available With the continuous development of wireless networks, the amount of privacy services in heterogeneous mobile networks is increasing, such as information storage, user access, and so on. Access control security issues for heterogeneous mobile radio network, this paper proposes a dynamic migration access control technology based on heterogeneous network. Through the system architecture of the mutual trust system, we can understand the real-time mobile node failure or abnormal state. To make the service can be terminated for the node. And adopt the 802.1X authentication way to improve the security of the system. Finally, it by combining the actual running test data, the trust update algorithm of the system is optimized to reduce the actual security threats in the environment. Experiments show that the system’s anti-attack, the success rate of access, bit error rate is in line with the expected results. This system can effectively reduce the system authentication information is illegally obtained after the network security protection mechanism failure and reduce the risk of user data leakage.

  16. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP

    Directory of Open Access Journals (Sweden)

    Dan Garcia-Carrillo

    2017-11-01

    Full Text Available The Internet-of-Things (IoT landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN, the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP, which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA infrastructures and the Extensible Authentication Protocol (EAP protocol. For this integration, we use the Constrained Application Protocol (CoAP to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  17. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.

    Science.gov (United States)

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-11-17

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  18. 22 CFR 203.11 - Access to records and communications.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Access to records and communications. 203.11 Section 203.11 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT REGISTRATION OF PRIVATE VOLUNTARY... documents that are made available to USAID pursuant to this regulation must be made available for public...

  19. Computer network access to scientific information systems for minority universities

    Science.gov (United States)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  20. Upgrade of hybrid fibre coax networks towards bi-directional access

    NARCIS (Netherlands)

    Khoe, G.D.; Wolters, R.P.C.; Boom, van den H.P.A.; Prati, G.

    1997-01-01

    In this paper we describe an upgrade scenario for Hybrid Fibre Coax (HFC) CATV Networks towards hi-directional access. The communication system described has been newly designed, and is based on the use of Direct Sequence- Code Division Multiple-Access (DS-CDMA). Due to its spread-spectrum

  1. DiffServ resource management in IP-based radio access networks

    NARCIS (Netherlands)

    Heijenk, Geert; Karagiannis, Georgios; Rexhepi, Vlora; Westberg, Lars; prof.dr. Prasad, R.; prof.dr. Bach Andersen, J.

    2001-01-01

    The increasing popularity of the Internet, the flexibility of IP, and the wide deployment of IP technologies, as well as the growth of mobile communications have driven the development of IP-based solutions for wireless networking. The introduction of IP-based transport in Radio Access Networks

  2. Knowledge Access in Rural Inter-connected Areas Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... and indigenous knowledge using information and communication technologies (ICTs) ... for research proposals on the aforementioned topics, action-research projects, ... Evaluating knowledge-sharing methods to improve land utilization and ...

  3. Optical code-division multiple-access networks

    Science.gov (United States)

    Andonovic, Ivan; Huang, Wei

    1999-04-01

    This review details the approaches adopted to implement classical code division multiple access (CDMA) principles directly in the optical domain, resulting in all optical derivatives of electronic systems. There are a number of ways of realizing all-optical CDMA systems, classified as incoherent and coherent based on spreading in the time and frequency dimensions. The review covers the basic principles of optical CDMA (OCDMA), the nature of the codes used in these approaches and the resultant limitations on system performance with respect to the number of stations (code cardinality), the number of simultaneous users (correlation characteristics of the families of codes), concluding with consideration of network implementation issues. The latest developments will be presented with respect to the integration of conventional time spread codes, used in the bulk of the demonstrations of these networks to date, with wavelength division concepts, commonplace in optical networking. Similarly, implementations based on coherent correlation with the aid of a local oscillator will be detailed and comparisons between approaches will be drawn. Conclusions regarding the viability of these approaches allowing the goal of a large, asynchronous high capacity optical network to be realized will be made.

  4. Virus spreading in wireless sensor networks with a medium access control mechanism

    International Nuclear Information System (INIS)

    Wang Ya-Qi; Yang Xiao-Yuan

    2013-01-01

    In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. (general)

  5. Switched-based interference reduction scheme for open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh; Alouini, Mohamed-Slim

    2012-01-01

    coordination between access points is infeasible. This paper targets interference management in such overlaid networks. It is assumed that the femtocells employ the open-access strategy to reduce cross-tier interference, and can share resources concurrently

  6. 36 CFR 1600.22 - Requests for access to records.

    Science.gov (United States)

    2010-07-01

    ... place of birth, and, at your option, the social security number of the individual; (2) Your own identity... a greater or lesser amount. (d) Verification of identity. When you make a request for access to records about yourself, you must verify your identity. You must state your full name, current address, and...

  7. Energy efficiency for cloud-radio access networks with imperfect channel state information

    KAUST Repository

    Al-Oquibi, Bayan; Amin, Osama; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2016-01-01

    metric in next generation wireless systems (5G). Cloud radio access network (C-RAN), a promising 5G network architecture, provides an efficient framework for improving the EE performance, by means of coordinating the transmission across the network

  8. Energy Saving Scheme Based On Traffic Forwarding For Optical Fiber Access Networks

    DEFF Research Database (Denmark)

    Lopez, G. Arturo Rodes; Estaran Tolosa, Jose Manuel; Vegas Olmos, Juan José

    2013-01-01

    We report on an energy saving block that regroups and powers off OLTs during low traffic periods, resulting in energy savings up to 87,5% in the central office of optical access networks.......We report on an energy saving block that regroups and powers off OLTs during low traffic periods, resulting in energy savings up to 87,5% in the central office of optical access networks....

  9. Highly Reliable PON Optical Splitters for Optical Access Networks in Outside Environments

    Science.gov (United States)

    Watanabe, Hiroshi; Araki, Noriyuki; Fujimoto, Hisashi

    Broadband optical access services are spreading throughout the world, and the number of fiber to the home (FTTH) subscribers is increasing rapidly. Telecom operators are constructing passive optical networks (PONs) to provide optical access services. Externally installed optical splitters for PONs are very important passive devices in optical access networks, and they must provide satisfactory performance as outdoor plant over long periods. Therefore, we calculate the failure rate of optical access networks and assign a failure rate to the optical splitters in optical access networks. The maximum cumulative failure rate of 1 × 8 optical splitters was calculated as 0.025 for an optical access fiber length of 2.1km and a 20-year operating lifetime. We examined planar lightwave circuit (PLC) type optical splitters for use as outside plant in terms of their optical characteristics and environmental reliability. We confirmed that PLC type optical splitters have sufficient optical performance for a PON splitter and sufficient reliability as outside plant in accordance with ITU-T standard values. We estimated the lifetimes of three kinds of PLC type optical splitters by using accelerated aging tests. The estimated failure rate of these splitters installed in optical access networks was below the target value for the cumulative failure rate, and we confirmed that they have sufficient reliability to maintain the quality of the network service. We developed 1 × 8 optical splitter modules with plug and socket type optical connectors and optical fiber cords for optical aerial closures designed for use as outside plant. These technologies make it easy to install optical splitters in an aerial optical closure. The optical splitter modules have sufficient optical performance levels for PONs because the insertion loss at the commercially used wavelengths of 1.31 and 1.55µm is less than the criterion established by ITU-T Recommendation G.671 for optical splitters. We performed a

  10. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  11. Future Scenarios for Software-Defined Metro and Access Networks and Software-Defined Photonics

    Directory of Open Access Journals (Sweden)

    Tommaso Muciaccia

    2017-01-01

    Full Text Available In recent years, architectures, devices, and components in telecommunication networks have been challenged by evolutionary and revolutionary factors which are drastically changing the traffic features. Most of these changes imply the need for major re-configurability and programmability not only in data-centers and core networks, but also in the metro-access segment. In a wide variety of contexts, this necessity has been addressed by the proposed introduction of the innovative paradigm of software-defined networks (SDNs. Several solutions inspired by the SDN model have been recently proposed also for metro and access networks, where the adoption of a new generation of software-defined reconfigurable integrated photonic devices is highly desirable. In this paper, we review the possible future application scenarios for software-defined metro and access networks and software-defined photonics (SDP, on the base of analytics, statistics, and surveys. This work describes the reasons underpinning the presented radical change of paradigm and summarizes the most significant solutions proposed in literature, with a specific emphasis to physical-layer reconfigurable networks and a focus on both architectures and devices.

  12. Artificial earthquake record generation using cascade neural network

    Directory of Open Access Journals (Sweden)

    Bani-Hani Khaldoon A.

    2017-01-01

    Full Text Available This paper presents the results of using artificial neural networks (ANN in an inverse mapping problem for earthquake accelerograms generation. This study comprises of two parts: 1-D site response analysis; performed for Dubai Emirate at UAE, where eight earthquakes records are selected and spectral matching are performed to match Dubai response spectrum using SeismoMatch software. Site classification of Dubai soil is being considered for two classes C and D based on shear wave velocity of soil profiles. Amplifications factors are estimated to quantify Dubai soil effect. Dubai’s design response spectra are developed for site classes C & D according to International Buildings Code (IBC -2012. In the second part, ANN is employed to solve inverse mapping problem to generate time history earthquake record. Thirty earthquakes records and their design response spectrum with 5% damping are used to train two cascade forward backward neural networks (ANN1, ANN2. ANN1 is trained to map the design response spectrum to time history and ANN2 is trained to map time history records to the design response spectrum. Generalized time history earthquake records are generated using ANN1 for Dubai’s site classes C and D, and ANN2 is used to evaluate the performance of ANN1.

  13. Surrogate-assisted identification of influences of network construction on evolving weighted functional networks

    Science.gov (United States)

    Stahn, Kirsten; Lehnertz, Klaus

    2017-12-01

    We aim at identifying factors that may affect the characteristics of evolving weighted networks derived from empirical observations. To this end, we employ various chains of analysis that are often used in field studies for a data-driven derivation and characterization of such networks. As an example, we consider fully connected, weighted functional brain networks before, during, and after epileptic seizures that we derive from multichannel electroencephalographic data recorded from epilepsy patients. For these evolving networks, we estimate clustering coefficient and average shortest path length in a time-resolved manner. Lastly, we make use of surrogate concepts that we apply at various levels of the chain of analysis to assess to what extent network characteristics are dominated by properties of the electroencephalographic recordings and/or the evolving weighted networks, which may be accessible more easily. We observe that characteristics are differently affected by the unavoidable referencing of the electroencephalographic recording, by the time-series-analysis technique used to derive the properties of network links, and whether or not networks were normalized. Importantly, for the majority of analysis settings, we observe temporal evolutions of network characteristics to merely reflect the temporal evolutions of mean interaction strengths. Such a property of the data may be accessible more easily, which would render the weighted network approach—as used here—as an overly complicated description of simple aspects of the data.

  14. The Design of Passive Optical Networking+Ethernet over Coaxial Cable Access Networking and Video-on-Demand Services Carrying

    Science.gov (United States)

    Ji, Wei

    2013-07-01

    Video on demand is a very attractive service used for entertainment, education, and other purposes. The design of passive optical networking+Ethernet over coaxial cable accessing and a home gateway system is proposed. The network integrates the passive optical networking and Ethernet over coaxial cable to provide high dedicated bandwidth for the metropolitan video-on-demand services. Using digital video broadcasting, IP television protocol, unicasting, and broadcasting mechanisms maximizes the system throughput. The home gateway finishes radio frequency signal receiving and provides three kinds of interfaces for high-definition video, voice, and data, which achieves triple-play and wire/wireless access synchronously.

  15. 6 CFR 5.21 - Requests for access to records.

    Science.gov (United States)

    2010-01-01

    ...) Verification of identity. When you make a request for access to records about yourself, you must verify your identity. You must state your full name, current address, and date and place of birth. You must sign your... this part. In most cases, a component's central Privacy Act office is the place to send a Privacy Act...

  16. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  17. An access alternative for mobile satellite networks

    Science.gov (United States)

    Wu, W. W.

    1988-01-01

    Conceptually, this paper discusses strategies of digital satellite communication networks for a very large number of low density traffic stations. These stations can be either aeronautical, land mobile, or maritime. The techniques can be applied to international, domestic, regional, and special purpose satellite networks. The applications can be commercial, scientific, military, emergency, navigational or educational. The key strategy is the use of a non-orthogonal access method, which tolerates overlapping signals. With n being either time or frequency partitions, and with a single overlapping signal allowed, a low cost mobile satellite system can be designed with n squared (n squared + n + 1) number of terminals.

  18. Power Allocation and Outage Probability Analysis for SDN-based Radio Access Networks

    Science.gov (United States)

    Zhao, Yongxu; Chen, Yueyun; Mai, Zhiyuan

    2018-01-01

    In this paper, performance of Access network Architecture based SDN (Software Defined Network) is analyzed with respect to the power allocation issue. A power allocation scheme PSO-PA (Particle Swarm Optimization-power allocation) algorithm is proposed, the proposed scheme is subjected to constant total power with the objective of minimizing system outage probability. The entire access network resource configuration is controlled by the SDN controller, then it sends the optimized power distribution factor to the base station source node (SN) and the relay node (RN). Simulation results show that the proposed scheme reduces the system outage probability at a low complexity.

  19. Understanding the tariff. Access to the public power transportation network

    International Nuclear Information System (INIS)

    2002-01-01

    Since the European directive of December 19, 1996 about the common rules of the European power market, the eligible companies can chose their power supplier anywhere in Europe. The manager of the French power transportation network (RTE) supplies a network access to these companies according to a tariff fixed by the decree no. 2002-1014 from July 19, 2002. The aim of this document is to explain this tariff: tariffing principles ('mail-stamp' principle, voltage domain, subscribed output power tariffs, input power tariffs), tariffing elements (access to the grid, elements of output tariffs (subscribed power, overload, emergency tariffs, modifications etc..)), invoicing modalities, output tariffs, definitions. (J.S.)

  20. 29 CFR 1913.10 - Rules of agency practice and procedure concerning OSHA access to employee medical records.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Rules of agency practice and procedure concerning OSHA... PRACTICE AND PROCEDURE CONCERNING OSHA ACCESS TO EMPLOYEE MEDICAL RECORDS § 1913.10 Rules of agency practice and procedure concerning OSHA access to employee medical records. (a) General policy. OSHA access...

  1. Data quality of seismic records from the Tohoku, Japan earthquake as recorded across the Albuquerque Seismological Laboratory networks

    Science.gov (United States)

    Ringler, A.T.; Gee, L.S.; Marshall, B.; Hutt, C.R.; Storm, T.

    2012-01-01

    Great earthquakes recorded across modern digital seismographic networks, such as the recent Tohoku, Japan, earthquake on 11 March 2011 (Mw = 9.0), provide unique datasets that ultimately lead to a better understanding of the Earth's structure (e.g., Pesicek et al. 2008) and earthquake sources (e.g., Ammon et al. 2011). For network operators, such events provide the opportunity to look at the performance across their entire network using a single event, as the ground motion records from the event will be well above every station's noise floor.

  2. Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    Science.gov (United States)

    Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  3. Network Asymmetries and Access Pricing in Cellular Telecommunications

    NARCIS (Netherlands)

    V. Kocsis

    2005-01-01

    textabstractNetwork shares and retail prices are not symmetric in the telecommunications market with multiple bottlenecks which give rise to new questions of access fee regulation. In this paper we consider a model with two types of asymmetry arising from different entry timing, i.e. a larger

  4. Accessing Wireless Sensor Networks Via Dynamically Reconfigurable Interaction Models

    Directory of Open Access Journals (Sweden)

    Maria Cecília Gomes

    2012-12-01

    Full Text Available The Wireless Sensor Networks (WSNs technology is already perceived as fundamental for science across many domains, since it provides a low cost solution for environment monitoring. WSNs representation via the service concept and its inclusion in Web environments, e.g. through Web services, supports particularly their open/standard access and integration. Although such Web enabled WSNs simplify data access, network parameterization and aggregation, the existing interaction models and run-time adaptation mechanisms available to clients are still scarce. Nevertheless, applications increasingly demand richer and more flexible accesses besides the traditional client/server. For instance, applications may require a streaming model in order to avoid sequential data requests, or the asynchronous notification of subscribed data through the publish/subscriber. Moreover, the possibility to automatically switch between such models at runtime allows applications to define flexible context-based data acquisition. To this extent, this paper discusses the relevance of the session and pattern abstractions on the design of a middleware prototype providing richer and dynamically reconfigurable interaction models to Web enabled WSNs.

  5. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed.......We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  6. Formal Specification and Validation of Secure Connection Establishment in a Generic Access Network Scenario

    DEFF Research Database (Denmark)

    Fleischer, Paul; Kristensen, Lars Michael

    2008-01-01

    The Generic Access Network (GAN) architecture is defined by the 3rd Generation Partnership Project (3GPP), and allows telephone services, such as SMS and voice-calls, to be accessed via generic IP networks. The main usage of this is to allow mobile phones to use WiFi in addition to the usual GSM...... network. The GAN specification relies on the Internet Protocol Security layer (IPSec) and the Internet Key Exchange protocol (IKEv2) to provide encryption across IP networks, and thus avoid compromising the security of the telephone networks. The detailed usage of these two Internet protocols (IPSec...

  7. Greening radio access networks using distributed base station architectures

    DEFF Research Database (Denmark)

    Kardaras, Georgios; Soler, José; Dittmann, Lars

    2010-01-01

    Several actions for developing environmentally friendly technologies have been taken in most industrial fields. Significant resources have also been devoted in mobile communications industry. Moving towards eco-friendly alternatives is primarily a social responsibility for network operators....... However besides this, increasing energy efficiency represents a key factor for reducing operating expenses and deploying cost effective mobile networks. This paper presents how distributed base station architectures can contribute in greening radio access networks. More specifically, the advantages...... energy saving. Different subsystems have to be coordinated real-time and intelligent network nodes supporting complicated functionalities are necessary. Distributed base station architectures are ideal for this purpose mainly because of their high degree of configurability and self...

  8. Community access networks: how to connect the next billion to the ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Community access networks: how to connect the next billion to the Internet. Despite recent progress with mobile technology diffusion, more than four billion people worldwide are unconnected and have limited access to global communication infrastructure. The cost of implementing connectivity infrastructure in underserved ...

  9. Coherent ambient infrasound recorded by the global IMS network

    Science.gov (United States)

    Matoza, R. S.; Landes, M.; Le Pichon, A.; Ceranna, L.; Brown, D.

    2011-12-01

    The International Monitoring System (IMS) includes a global network of infrasound arrays, which is designed to detect atmospheric nuclear explosions anywhere on the planet. The infrasound network also has potential application in detection of natural hazards such as large volcanic explosions and severe weather. Ambient noise recorded by the network includes incoherent wind noise and coherent infrasound. We present a statistical analysis of coherent infrasound recorded by the IMS network. We have applied broadband (0.01 to 5 Hz) array processing systematically to the multi-year IMS historical dataset (2005-present) using an implementation of the Progressive Multi-Channel Correlation (PMCC) algorithm in log-frequency space. We show that IMS arrays consistently record coherent ambient infrasound across the broad frequency range from 0.01 to 5 Hz when wind-noise levels permit. Multi-year averaging of PMCC detection bulletins emphasizes continuous signals such as oceanic microbaroms, as well as persistent transient signals such as repetitive volcanic, surf, or anthropogenic activity (e.g., mining or industrial activity). While many of these continuous or repetitive signals are of interest in their own right, they may dominate IMS array detection bulletins and obscure or complicate detection of specific signals of interest. The new PMCC detection bulletins have numerous further applications, including in volcano and microbarom studies, and in IMS data quality assessment.

  10. “Nothing About Me Without Me”: An Interpretative Review of Patient Accessible Electronic Health Records

    Science.gov (United States)

    Callahan, Ryan; Sevdalis, Nick; Mayer, Erik K; Darzi, Ara

    2015-01-01

    Background Patient accessible electronic health records (PAEHRs) enable patients to access and manage personal clinical information that is made available to them by their health care providers (HCPs). It is thought that the shared management nature of medical record access improves patient outcomes and improves patient satisfaction. However, recent reviews have found that this is not the case. Furthermore, little research has focused on PAEHRs from the HCP viewpoint. HCPs include physicians, nurses, and service providers. Objective We provide a systematic review of reviews of the impact of giving patients record access from both a patient and HCP point of view. The review covers a broad range of outcome measures, including patient safety, patient satisfaction, privacy and security, self-efficacy, and health outcome. Methods A systematic search was conducted using Web of Science to identify review articles on the impact of PAEHRs. Our search was limited to English-language reviews published between January 2002 and November 2014. A total of 73 citations were retrieved from a series of Boolean search terms including “review*” with “patient access to records”. These reviews went through a novel scoring system analysis whereby we calculated how many positive outcomes were reported per every outcome measure investigated. This provided a way to quantify the impact of PAEHRs. Results Ten reviews covering chronic patients (eg, diabetes and hypertension) and primary care patients, as well as HCPs were found but eight were included for the analysis of outcome measures. We found mixed outcomes across both patient and HCP groups, with approximately half of the reviews showing positive changes with record access. Patients believe that record access increases their perception of control; however, outcome measures thought to create psychological concerns (such as patient anxiety as a result of seeing their medical record) are still unanswered. Nurses are more likely than

  11. 22 CFR 226.53 - Retention and access requirements for records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Retention and access requirements for records. 226.53 Section 226.53 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT ADMINISTRATION OF... date of submission of the final expenditure report or, for awards that are renewed quarterly or...

  12. 37 CFR 204.5 - Procedures for requesting access to records.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Procedures for requesting access to records. 204.5 Section 204.5 Patents, Trademarks, and Copyrights COPYRIGHT OFFICE, LIBRARY OF CONGRESS COPYRIGHT OFFICE AND PROCEDURES PRIVACY ACT: POLICIES AND PROCEDURES § 204.5 Procedures for...

  13. Resource Allocation for Cloud Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama

    2016-04-01

    Cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio system. In CRANs, joint signal processing is performed at multiple cloud computing centers (clouds) that are connected to several base stations (BSs) via high capacity backhaul links. As a result, large-scale interference management and network power consumption reduction can be effectively achieved. Unlike recent works on CRANs which consider a single cloud processing and treat inter-cloud interference as background noise, the first part of this thesis focuses on the more practical scenario of the downlink of a multi-cloud radio access network where BSs are connected to each cloud through wireline backhaul links. Assume that each cloud serves a set of pre-known single-antenna mobile users (MUs). This part focuses on minimizing the network total power consumption subject to practical constraints. The problems are solved using sophisticated techniques from optimization theory (e.g. Dual Decomposition-based algorithm and the alternating direction method of multipliers (ADMM)-based algorithm). One highlight of this part is that the proposed solutions can be implemented in a distributed fashion by allowing a reasonable information exchange between the coupled clouds. Additionally, feasible solutions of the considered optimization problems can be estimated locally at each iteration. Simulation results show that the proposed distributed algorithms converge to the centralized algorithms in a reasonable number of iterations. To further account of the backhaul congestion due to densification in CRANs, the second part of this thesis considers the downlink of a cache-enabled CRAN where each BS is equipped with a local-cache with limited size used to store the popular files without the need for backhauling. Further, each cache-enabled BS is connected to the cloud via limited capacity backhaul link and can serve a set of pre-known single antenna MUs. This part

  14. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  15. Efficient traffic grooming with dynamic ONU grouping for multiple-OLT-based access network

    Science.gov (United States)

    Zhang, Shizong; Gu, Rentao; Ji, Yuefeng; Wang, Hongxiang

    2015-12-01

    Fast bandwidth growth urges large-scale high-density access scenarios, where the multiple Passive Optical Networking (PON) system clustered deployment can be adopted as an appropriate solution to fulfill the huge bandwidth demands, especially for a future 5G mobile network. However, the lack of interaction between different optical line terminals (OLTs) results in part of the bandwidth resources waste. To increase the bandwidth efficiency, as well as reduce bandwidth pressure at the edge of a network, we propose a centralized flexible PON architecture based on Time- and Wavelength-Division Multiplexing PON (TWDM PON). It can provide flexible affiliation for optical network units (ONUs) and different OLTs to support access network traffic localization. Specifically, a dynamic ONU grouping algorithm (DGA) is provided to obtain the minimal OLT outbound traffic. Simulation results show that DGA obtains an average 25.23% traffic gain increment under different OLT numbers within a small ONU number situation, and the traffic gain will increase dramatically with the increment of the ONU number. As the DGA can be deployed easily as an application running above the centralized control plane, the proposed architecture can be helpful to improve the network efficiency for future traffic-intensive access scenarios.

  16. Free Books: Loading Brief MARC Records for Open-Access Books in an Academic Library Online Catalog

    OpenAIRE

    Beall, Jeffrey

    2009-01-01

    Mbooks are open-access, digitized books freely available on the Internet. This article describes the Auraria Library's experience of loading brief MARC records for Mbooks into its online public access catalog and looks at some of the issues that arose from the record-loading project. Despite the low quality of the records, librarians in Auraria Library thought that loading them into the catalog was advantageous because of the rich content in the collection, and because many of the records cou...

  17. Metro-access integrated network based on optical OFDMA with dynamic sub-carrier allocation and power distribution.

    Science.gov (United States)

    Zhang, Chongfu; Zhang, Qiongli; Chen, Chen; Jiang, Ning; Liu, Deming; Qiu, Kun; Liu, Shuang; Wu, Baojian

    2013-01-28

    We propose and demonstrate a novel optical orthogonal frequency-division multiple access (OFDMA)-based metro-access integrated network with dynamic resource allocation. It consists of a single fiber OFDMA ring and many single fiber OFDMA trees, which transparently integrates metropolitan area networks with optical access networks. The single fiber OFDMA ring connects the core network and the central nodes (CNs), the CNs are on demand reconfigurable and use multiple orthogonal sub-carriers to realize parallel data transmission and dynamic resource allocation, meanwhile, they can also implement flexible power distribution. The remote nodes (RNs) distributed in the user side are connected by the single fiber OFDMA trees with the corresponding CN. The obtained results indicate that our proposed metro-access integrated network is feasible and the power distribution is agile.

  18. Social Networks and Health: Understanding the Nuances of Healthcare Access between Urban and Rural Populations.

    Science.gov (United States)

    Amoah, Padmore Adusei; Edusei, Joseph; Amuzu, David

    2018-05-13

    Communities and individuals in many sub-Saharan African countries often face limited access to healthcare. Hence, many rely on social networks to enhance their chances for adequate health care. While this knowledge is well-established, little is known about the nuances of how different population groups activate these networks to improve access to healthcare. This paper examines how rural and urban dwellers in the Ashanti Region in Ghana distinctively and systematically activate their social networks to enhance access to healthcare. It uses a qualitative cross-sectional design, with in-depth interviews of 79 primary participants (28 urban and 51 rural residents) in addition to the views of eight community leaders and eight health personnel. It was discovered that both intimate and distanced social networks for healthcare are activated at different periods by rural and urban residents. Four main stages of social networks activation, comprising different individuals and groups were observed among rural and urban dwellers. Among both groups, physical proximity, privacy, trust and sense of fairness, socio-cultural meaning attached to health problems, and perceived knowledge and other resources (mainly money) held in specific networks inherently influenced social network activation. The paper posits that a critical analysis of social networks may help to tailor policy contents to individuals and groups with limited access to healthcare.

  19. 77 FR 10753 - Draft Guidance for Industry: Food and Drug Administration Records Access Authority Under the...

    Science.gov (United States)

    2012-02-23

    ...] Draft Guidance for Industry: Food and Drug Administration Records Access Authority Under the Federal... industry entitled ``FDA Records Access Authority Under Sections 414 and 704 of the Federal Food, Drug...). This updated draft guidance is intended to provide individuals in the human and animal food industries...

  20. On Planning of FTTH Access Networks with and without Redundancy

    DEFF Research Database (Denmark)

    Riaz, M. Tahir; Haraldsson, Gustav; Gutierrez Lopez, Jose Manuel

    2010-01-01

    This paper presents a planning analysis of FTTH access network with and without redundancy. Traditionally, access networks are planned only without redundancy, which is mainly due to lowering the cost of deployment. As fiber optics provide a huge amount of capacity, more and more services are being...... offered on a single fiber connection. As a single point of failure in fiber connection can cause multiple service deprivation therefore redundancy is very crucial. In this work, an automated planning model was used to test different scenarios of implementation. A cost estimation is presented in terms...... of digging and amount of fiber used. Three topologies, including the traditional one “tree topology”, were test with combination of various passive optical technologies....

  1. 22 CFR 214.51 - Administrative review of denial for public access to records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Administrative review of denial for public access to records. 214.51 Section 214.51 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT ADVISORY COMMITTEE MANAGEMENT Administrative Remedies § 214.51 Administrative review of denial for public access to...

  2. Simulation and measurement of optical access network with different types of optical-fiber amplifiers

    Science.gov (United States)

    Latal, Jan; Vogl, Jan; Koudelka, Petr; Vitasek, Jan; Siska, Petr; Liner, Andrej; Papes, Martin; Vasinek, Vladimir

    2012-01-01

    The optical access networks are nowadays swiftly developing in the telecommunications field. These networks can provide higher data transfer rates, and have great potential to the future in terms of transmission possibilities. Many local internet providers responded to these facts and began gradually installing optical access networks into their originally built networks, mostly based on wireless communication. This allowed enlargement of possibilities for end-users in terms of high data rates and also new services such as Triple play, IPTV (Internet Protocol television) etc. However, with this expansion and building-up is also related the potential of reach in case of these networks. Big cities, such as Prague, Brno, Ostrava or Olomouc cannot be simply covered, because of their sizes and also because of their internal regulations given by various organizations in each city. Standard logical and also physical reach of EPON (IEEE 802.3ah - Ethernet Passive Optical Network) optical access network is about 20 km. However, for networks based on Wavelength Division Multiplex the reach can be up to 80 km, if the optical-fiber amplifier is inserted into the network. This article deals with simulation of different types of amplifiers for WDM-PON (Wavelength Division Multiplexing-Passive Optical Network) network in software application Optiwave OptiSystem and than are the values from the application and from real measurement compared.

  3. Optimal Caching in Multicast 5G Networks with Opportunistic Spectrum Access

    KAUST Repository

    Emara, Mostafa

    2018-01-15

    Cache-enabled small base station (SBS) densification is foreseen as a key component of 5G cellular networks. This architecture enables storing popular files at the network edge (i.e., SBS caches), which empowers local communication and alleviates traffic congestions at the core/backhaul network. This paper develops a mathematical framework, based on stochastic geometry, to characterize the hit probability of a cache-enabled multicast 5G network with SBS multi-channel capabilities and opportunistic spectrum access. To this end, we first derive the hit probability by characterizing opportunistic spectrum access success probabilities, service distance distributions, and coverage probabilities. The optimal caching distribution to maximize the hit probability is then computed. The performance and trade-offs of the derived optimal caching distributions are then assessed and compared with two widely employed caching distribution schemes, namely uniform and Zipf caching, through numerical results and extensive simulations. It is shown that the Zipf caching almost optimal only in scenarios with large number of available channels and large cache sizes.

  4. Physicists set new record for network data transfer

    CERN Multimedia

    2007-01-01

    "An international team of physicists, computer scientists, and network engineers joined forces to set new records for sustained data transfer between storage systems durint the SuperComputing 2006 (SC06) Bandwidth Challenge (BWC). (3 pages)

  5. Cross-Layer Framework for Fine-Grained Channel Access in Next Generation High-Density WiFi Networks

    Institute of Scientific and Technical Information of China (English)

    ZHAO Haitao; ZHANG Shaojie; Emiliano Garcia-Palacios

    2016-01-01

    Densely deployed WiFi networks will play a crucial role in providing the capacity for next generation mobile internet.However,due to increasing interference,overlapped channels in WiFi networks and throughput efficiency degradation,densely deployed WiFi networks is not a guarantee to obtain higher throughput.An emergent challenge is how to efficiently utilize scarce spectrum resources,by matching physical layer resources to traffic demand.In this aspect,access control allocation strategies play a pivotal role but remain too coarse-grained.As a solution,this research proposes a flexible framework for fine-grained channel width adaptation and multi-channel access in WiFi networks.This approach,named SFCA (Subcarrier Fine-grained Channel Access),adopts DOFDM (Discontinuous Orthogonal Frequency Division Multiplexing) at the PHY layer.It allocates the frequency resource with a subcarrier granularity,which facilitates the channel width adaptation for multi-channel access and thus brings more flexibility and higher frequency efficiency.The MAC layer uses a frequencytime domain backoff scheme,which combines the popular time-domain BEB scheme with a frequency-domain backoff to decrease access collision,resulting in higher access probability for the contending nodes.SFCA is compared with FICA (an established access scheme) showing significant outperformance.Finally we present results for next generation 802.11 ac WiFi networks.

  6. Failure Analysis of Network Based Accessible Pedestrian Signals in Closed-Loop Operation

    Science.gov (United States)

    2011-03-01

    The potential failure modes of a network based accessible pedestrian system were analyzed to determine the limitations and benefits of closed-loop operation. The vulnerabilities of the system are accessed using the industry standard process known as ...

  7. Cancer patients' attitudes and experiences of online access to their electronic medical records: A qualitative study.

    Science.gov (United States)

    Rexhepi, Hanife; Åhlfeldt, Rose-Mharie; Cajander, Åsa; Huvila, Isto

    2018-06-01

    Patients' access to their online medical records serves as one of the cornerstones in the efforts to increase patient engagement and improve healthcare outcomes. The aim of this article is to provide in-depth understanding of cancer patients' attitudes and experiences of online medical records, as well as an increased understanding of the complexities of developing and launching e-Health services. The study result confirms that online access can help patients prepare for doctor visits and to understand their medical issues. In contrast to the fears of many physicians, the study shows that online access to medical records did not generate substantial anxiety, concerns or increased phone calls to the hospital.

  8. French network and acquired experience on record strong ground motion

    International Nuclear Information System (INIS)

    Ferrieux, H.; Mohammadioun, G.

    1988-03-01

    The network intended to record strong ground motion in continental France is composed for the most part of instrument packages incorporated into nuclear installations, which are supplemented by a certain number of accelerometers placed in the most highly seismic areas. In a country where the level of seismicity is relatively modest, such a network is not conductive to the acquisition of new data, which, instead, is obtained through spot studies of limited duration using more sensitive instruments or through the recording of strong ground motion in neighbouring countries [fr

  9. Delay-aware adaptive sleep mechanism for green wireless-optical broadband access networks

    Science.gov (United States)

    Wang, Ruyan; Liang, Alei; Wu, Dapeng; Wu, Dalei

    2017-07-01

    Wireless-Optical Broadband Access Network (WOBAN) is capacity-high, reliable, flexible, and ubiquitous, as it takes full advantage of the merits from both optical communication and wireless communication technologies. Similar to other access networks, the high energy consumption poses a great challenge for building up WOBANs. To shot this problem, we can make some load-light Optical Network Units (ONUs) sleep to reduce the energy consumption. Such operation, however, causes the increased packet delay. Jointly considering the energy consumption and transmission delay, we propose a delay-aware adaptive sleep mechanism. Specifically, we develop a new analytical method to evaluate the transmission delay and queuing delay over the optical part, instead of adopting M/M/1 queuing model. Meanwhile, we also analyze the access delay and queuing delay of the wireless part. Based on such developed delay models, we mathematically derive ONU's optimal sleep time. In addition, we provide numerous simulation results to show the effectiveness of the proposed mechanism.

  10. The accessibility of Poland’s Space to the Trans-European Transport Network

    Directory of Open Access Journals (Sweden)

    Wiśniewski Szymon

    2017-09-01

    Full Text Available The aim of the article is to analyse the land transport accessibility of two trans-European corridors within the boundaries of Poland. The adjustment of the course of transport routes to the distribution of the population and the country’s land development (including economic potential and logistic infrastructure was outlined using measurements of cumulative accessibility. The results were presented in both cartographic form (isochrone approach and tabular form (cumulative approach. Research was conducted adopting different forms of transport used for relocation (including foot traffic, car, rail and multimodal transport and both the current and target layout of the transport network. This made it possible to determine the changes that will effectively run the process of investment in transport infrastructure on Polish territory. This allowed the identification of the areas of Poland which are particularly conveniently located in relation to domestic connections (in terms of the international network and those for which the European transport network remains difficult to access.

  11. A Comparative Study of Multiplexing Schemes for Next Generation Optical Access Networks

    Science.gov (United States)

    Imtiaz, Waqas A.; Khan, Yousaf; Shah, Pir Mehar Ali; Zeeshan, M.

    2014-09-01

    Passive optical network (PON) is a high bandwidth, economical solution which can provide the necessary bandwidth to end-users. Wavelength division multiplexed passive optical networks (WDM PONs) and time division multiplexed passive optical networks (TDM PONs) are considered as an evolutionary step for next-generation optical access (NGOA) networks. However they fail to provide highest transmission capacity, efficient bandwidth access, and robust dispersion tolerance. Thus future PONs are considered on simpler, efficient and potentially scalable, optical code division multiplexed (OCDM) PONs. This paper compares the performance of existing PONs with OCDM PON to determine a suitable scheme for NGOA networks. Two system parameter are used in this paper: fiber length, and bit rate. Performance analysis using Optisystem shows that; for a sufficient system performance parameters i.e. bit error rate (BER) ≤ 10-9, and maximum quality factor (Q) ≥ 6, OCDMA PON efficiently performs upto 50 km with 10 Gbit/s per ONU.

  12. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks.

    Science.gov (United States)

    Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Zhang, Xuekun

    2015-12-03

    Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT), Machine-to-Machine (M2M) communications, Vehicular-to-Vehicular (V2V) communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  13. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunyang Lei

    2015-12-01

    Full Text Available Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT, Machine-to-Machine (M2M communications, Vehicular-to-Vehicular (V2V communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  14. Medium Access Control in Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon

    Focusing on Wireless Sensor Networks (WSN) that are powered by energy harvesting, this dissertation focuses on energy-efficient communication links between senders and receivers that are alternating between active and sleeping states of operation. In particular, the focus lies on Medium Access...

  15. Patients’ Online Access to Their Primary Care Electronic Health Records and Linked Online Services: Implications for Research and Practice

    Directory of Open Access Journals (Sweden)

    Freda Mold

    2015-12-01

    Full Text Available Online access to medical records and linked services, including requesting repeat prescriptions and booking appointments, enables patients to personalize their access to care. However, online access creates opportunities and challenges for both health professionals and their patients, in practices and in research. The challenges for practice are the impact of online services on workload and the quality and safety of health care. Health professionals are concerned about the impact on workload, especially from email or other online enquiry systems, as well as risks to privacy. Patients report how online access provides a convenient means through which to access their health provider and may offer greater satisfaction if they get a timely response from a clinician. Online access and services may also result in unforeseen consequences and may change the nature of the patient-clinician interaction. Research challenges include: (1 Ensuring privacy, including how to control inappropriate carer and guardian access to medical records; (2 Whether online access to records improves patient safety and health outcomes; (3 Whether record access increases disparities across social classes and between genders; and (4 Improving efficiency. The challenges for practice are: (1 How to incorporate online access into clinical workflow; (2 The need for a business model to fund the additional time taken. Creating a sustainable business model for a safe, private, informative, more equitable online service is needed if online access to records is to be provided outside of pay-for-service systems.

  16. A New Hybrid Channel Access Scheme for Ad Hoc Networks

    National Research Council Canada - National Science Library

    Wang, Yu; Garcia-Luna-Aceves, J. J

    2002-01-01

    Many contention-based channel access schemes have been proposed for multi-hop ad hoc networks in the recent past, and they can be divided into two categories, sender-initiated and receiver-initiated...

  17. 34 CFR 364.37 - What access to records must be provided?

    Science.gov (United States)

    2010-07-01

    ... SPECIAL EDUCATION AND REHABILITATIVE SERVICES, DEPARTMENT OF EDUCATION STATE INDEPENDENT LIVING SERVICES... Requirements? § 364.37 What access to records must be provided? For the purpose of conducting audits, examinations, and compliance reviews, the State plan must include satisfactory assurances that all recipients...

  18. SERS investigations and electrical recording of neuronal networks with three-dimensional plasmonic nanoantennas (Conference Presentation)

    Science.gov (United States)

    De Angelis, Francesco

    2017-06-01

    SERS investigations and electrical recording of neuronal networks with three-dimensional plasmonic nanoantennas Michele Dipalo, Valeria Caprettini, Anbrea Barbaglia, Laura Lovato, Francesco De Angelis e-mail: francesco.deangelis@iit.it Istituto Italiano di Tecnologia, Via Morego 30, 16163, Genova Biological systems are analysed mainly by optical, chemical or electrical methods. Normally each of these techniques provides only partial information about the environment, while combined investigations could reveal new phenomena occurring in complex systems such as in-vitro neuronal networks. Aiming at the merging of optical and electrical investigations of biological samples, we introduced three-dimensional plasmonic nanoantennas on CMOS-based electrical sensors [1]. The overall device is then capable of enhanced Raman Analysis of cultured cells combined with electrical recording of neuronal activity. The Raman measurements show a much higher sensitivity when performed on the tip of the nanoantenna in respect to the flat substrate [2]; this effect is a combination of the high plasmonic field enhancement and of the tight adhesion of cells on the nanoantenna tip. Furthermore, when plasmonic opto-poration is exploited [3] the 3D nanoelectrodes are able to penetrate through the cell membrane thus accessing the intracellular environment. Our latest results (unpublished) show that the technique is completely non-invasive and solves many problems related to state-of-the-art intracellular recording approaches on large neuronal networks. This research received funding from ERC-IDEAS Program: "Neuro-Plasmonics" [Grant n. 616213]. References: [1] M. Dipalo, G. C. Messina, H. Amin, R. La Rocca, V. Shalabaeva, A. Simi, A. Maccione, P. Zilio, L. Berdondini, F. De Angelis, Nanoscale 2015, 7, 3703. [2] R. La Rocca, G. C. Messina, M. Dipalo, V. Shalabaeva, F. De Angelis, Small 2015, 11, 4632. [3] G. C. Messina et al., Spatially, Temporally, and Quantitatively Controlled Delivery of

  19. FttC-Based Fronthaul for 5G Dense/Ultra-Dense Access Network: Performance and Costs in Realistic Scenarios

    Directory of Open Access Journals (Sweden)

    Franco Mazzenga

    2017-10-01

    Full Text Available One distinctive feature of the next 5G systems is the presence of a dense/ultra-dense wireless access network with a large number of access points (or nodes at short distances from each other. Dense/ultra-dense access networks allow for providing very high transmission capacity to terminals. However, the deployment of dense/ultra-dense networks is slowed down by the cost of the fiber-based infrastructure required to connect radio nodes to the central processing units and then to the core network. In this paper, we investigate the possibility for existing FttC access networks to provide fronthaul capabilities for dense/ultra-dense 5G wireless networks. The analysis is realistic in that it is carried out considering an actual access network scenario, i.e., the Italian FttC deployment. It is assumed that access nodes are connected to the Cabinets and to the corresponding distributors by a number of copper pairs. Different types of cities grouped in terms of population have been considered. Results focus on fronthaul transport capacity provided by the FttC network and have been expressed in terms of the available fronthaul bit rate per node and of the achievable coverage.

  20. A Method for Upper Bounding Long Term Growth of Network Access Speed

    Directory of Open Access Journals (Sweden)

    Thomas Phillip Knudsen

    2006-06-01

    Full Text Available The development in home Internet access speed has shown an exponential development with growth rates averaging 25% per year. For resource management in network provisioning it becomes an urgent question how long such growth can continue. This paper presents a method for calculating an upper bound to visual content driven growth, proceeding from datarate requirements for a full virtual environment. Scenarios and approaches for reducing datarate requirements are considered and discussed. The presented figures for an upper bound on network access speed are discussed and perspectives on further research presented.

  1. A Method for Upper Bounding Long Term Growth of Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Pedersen, Jens Myrup; Madsen, Ole Brun

    2004-01-01

    The development in home Internet access speed has shown an exponential development with growth rates averaging 25% per year. For resource management in network provisioning it becomes an urgent question how long such growth can continue. This paper presents a method for calculating an upper bound...... to visual content driven growth, proceeding from datarate requirements for a full virtual environment. Scenarios and approaches for reducing datarate requirements are considered and discussed. The presented figures for an upper bound on network access speed are discussed and perspectives on further research...

  2. Modeling the video distribution link in the Next Generation Optical Access Networks

    International Nuclear Information System (INIS)

    Amaya, F; Cardenas, A; Tafur, I

    2011-01-01

    In this work we present a model for the design and optimization of the video distribution link in the next generation optical access network. We analyze the video distribution performance in a SCM-WDM link, including the noise, the distortion and the fiber optic nonlinearities. Additionally, we consider in the model the effect of distributed Raman amplification, used to extent the capacity and the reach of the optical link. In the model, we use the nonlinear Schroedinger equation with the purpose to obtain capacity limitations and design constrains of the next generation optical access networks.

  3. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  4. Variable disparity estimation based intermediate view reconstruction in dynamic flow allocation over EPON-based access networks

    Science.gov (United States)

    Bae, Kyung-Hoon; Lee, Jungjoon; Kim, Eun-Soo

    2008-06-01

    In this paper, a variable disparity estimation (VDE)-based intermediate view reconstruction (IVR) in dynamic flow allocation (DFA) over an Ethernet passive optical network (EPON)-based access network is proposed. In the proposed system, the stereoscopic images are estimated by a variable block-matching algorithm (VBMA), and they are transmitted to the receiver through DFA over EPON. This scheme improves a priority-based access network by converting it to a flow-based access network with a new access mechanism and scheduling algorithm, and then 16-view images are synthesized by the IVR using VDE. Some experimental results indicate that the proposed system improves the peak-signal-to-noise ratio (PSNR) to as high as 4.86 dB and reduces the processing time to 3.52 s. Additionally, the network service provider can provide upper limits of transmission delays by the flow. The modeling and simulation results, including mathematical analyses, from this scheme are also provided.

  5. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    Science.gov (United States)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  6. Auction pricing of network access for North American railways

    DEFF Research Database (Denmark)

    Harrod, Steven

    2013-01-01

    The question of pricing train paths for "open access" railway networks in North America is discussed. An auction process is suggested as necessary to maintain transparency in the contracting process. Multiple random samples of auction pricing for a single track railway line demonstrate...... that the infrastructure entity will receive approximately 15.6% less than the true value of the contracted train paths. This loss of revenue threatens the objective of reducing government subsidy for the railway network. (C) 2012 Elsevier Ltd. All rights reserved....

  7. Network Performance and Quality of Experience of Remote Access Laboratories

    Directory of Open Access Journals (Sweden)

    Alexander A. Kist

    2012-11-01

    Full Text Available Remote Access Laboratories (RAL have become important learning and teaching tools. This paper presents a performance study that targets a specific remote access architecture implemented within a universities operational environment. This particular RAL system provides globally authenticated and arbitrated remote access to virtualized computers as well as computer controlled hardware experiments. This paper presents system performance results that have been obtained utilizing both a set of automated and human subject tests. Principle objectives of the study were: To gain a better understanding of the nature of network traffic caused by experimental activity usage; to obtain an indication of user expectations of activity performance; and to develop a measure to predict Quality of Experience, based on easily measurable Quality of Service parameters. The study emulates network layer variation of access-bandwidth and round-trip-time of typical usage scenarios and contrasts against user perception results that allow classifying expected user performance. It demonstrates that failure rate is excellent measure of usability, and that round-trip-time predominantly affects user experience. Thin-client and remote desktop architectures are popular to separate the location of users and the actual data processing and use similar structures, hence results of this study to be applied in these application areas as well.

  8. Tectonic implications of seismic activity recorded by the northern Ontario seismograph network

    International Nuclear Information System (INIS)

    Wetmiller, R.J.; Cajka, M.G.

    1989-01-01

    The northern Ontario seismograph network, which has operated under the Canadian Nuclear Fuel Waste Management Program since 1982, has provided valuable data to supplement those recorded by the Canadian national networks on earthquake activity, rockburst activity, the distribution of regional seismic velocities, and the contemporary stress field in northern Ontario. The combined networks recorded the largest earthquake known in northwestern Ontario, M 3.9 near Sioux Lookout on February 11, 1984, and many smaller earthquakes in northeastern Ontario. Focal mechanism solutions of these and older events showed high horizontal stress and thrust faulting to be dominant features of the contemporary tectonics of northern Ontario. The zone of more intense earthquake activity in western Quebec appeared to extend northwestward into the Kapuskasing area of northeastern Ontario, where an area of persistent microearthquake activity had been identified by a seismograph station near Kapuskasing. Controlled explosions of the 1984 Kapuskasing Uplift seismic profile experiment recorded on the northern Ontario seismograph network showed the presence of anomalously high LG velocities in northeastern Ontario (3.65 km/s) that when properly taken into account reduced the mislocation errors of well-recorded seismic events by 50% on average

  9. Access to In-Network Emergency Physicians and Emergency Departments Within Federally Qualified Health Plans in 2015

    Directory of Open Access Journals (Sweden)

    Stephen C. Dorner, MSc

    2016-01-01

    Full Text Available Introduction: Under regulations established by the Affordable Care Act, insurance plans must meet minimum standards in order to be sold through the federal Marketplace. These standards to become a qualified health plan (QHP include maintaining a provider network sufficient to assure access to services. However, the complexity of emergency physician (EP employment practices – in which the EPs frequently serve as independent contractors of emergency departments, independently establish insurance contracts, etc... – and regulations governing insurance repayment may hinder the application of network adequacy standards to emergency medicine. As such, we hypothesized the existence of QHPs without in-network access to EPs. The objective is to identify whether there are QHPs without in-network access to EPs using information available through the federal Marketplace and publicly available provider directories. Results: In a national sample of Marketplace plans, we found that one in five provider networks lacks identifiable in-network EPs. QHPs lacking EPs spanned nearly half (44% of the 34 states using the federal Marketplace. Conclusion: Our data suggest that the present regulatory framework governing network adequacy is not generalizable to emergency care, representing a missed opportunity to protect patient access to in-network physicians. These findings and the current regulations governing insurance payment to EPs dis-incentivize the creation of adequate physician networks, incentivize the practice of balance billing, and shift the cost burden to patients.

  10. Quantitative analysis of access strategies to remoteinformation in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    of analytic models to compute different performance metrics for these approaches, with special focus on the so-called mismatch probability. The results of the analytic models allow for design decisions on which strategy to implement for specific input parameters (change rate of the information element......Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach...... initiated by the requesting entity, and two versions of proactive approaches in which the entity that contains the information element actively propagates its changes to potential requesters, either (2) periodically or triggered by changes of the information element (3). This paper first develops a set...

  11. Resource Sharing in Heterogeneous and Cloud Radio Access Networks

    DEFF Research Database (Denmark)

    Zakrzewska, Anna; Iversen, Villy Bæk

    2012-01-01

    be improved. However, we identify the benefit of individual operators and show that it’s not equal but highly depends on the initial network dimensioning. Furthermore, we demonstrate that under specific conditions the blocking probability in an area is lower than for fully accessible system and therefore...

  12. Optically transparent multiple access networks employing incoherent spectral codes

    NARCIS (Netherlands)

    Huiszoon, B.

    2008-01-01

    This Ph.D. thesis is divided into 7 chapters to provide the reader an overview of the main results achieved in di®erent sub-topics of the study towards optically transparent multiple access networks employing incoherent spectral codes taking into account wireless transmission aspects. The work

  13. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yun Lin

    2016-10-01

    Full Text Available Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel.

  14. 75 FR 61865 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-10-06

    ..., Director Compensation and Pension Service, Veterans Benefits Administration (VBA), Department of Veterans... Service Network (VISN) offices. Remote on-line access is also made available to authorized remote sites... consent or a power of attorney authorizing access to his or her claims records before VA will allow the...

  15. Converged wireline and wireless signal distribution in optical fiber access networks

    DEFF Research Database (Denmark)

    Prince, Kamau

    This thesis presents results obtained during the course of my doctoral studies into the transport of fixed and wireless signaling over a converged otpical access infrastructure. In the formulation, development and assessment of a converged paradigma for multiple-services delivery via optical access...... networking infrastructure, I have demonstrated increased functionalities with existing optical technologies and commercially available optoelectronic devices. I have developed novel systems for extending the range of optical access systems, and have demonstrated the repurposing of standard digital devices...

  16. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad; Elsawy, Hesham; Bader, Ahmed; Alouini, Mohamed-Slim

    2017-01-01

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  17. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad

    2017-02-07

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  18. Secret Shoppers Find Access To Providers And Network Accuracy Lacking For Those In Marketplace And Commercial Plans.

    Science.gov (United States)

    Haeder, Simon F; Weimer, David L; Mukamel, Dana B

    2016-07-01

    The adequacy of provider networks for plans sold through insurance Marketplaces established under the Affordable Care Act has received much scrutiny recently. Various studies have established that networks are generally narrow. To learn more about network adequacy and access to care, we investigated two questions. First, no matter the nominal size of a network, can patients gain access to primary care services from providers of their choice in a timely manner? Second, how does access compare to plans sold outside insurance Marketplaces? We conducted a "secret shopper" survey of 743 primary care providers from five of California's nineteen insurance Marketplace pricing regions in the summer of 2015. Our findings indicate that obtaining access to primary care providers was generally equally challenging both inside and outside insurance Marketplaces. In less than 30 percent of cases were consumers able to schedule an appointment with an initially selected physician provider. Information about provider networks was often inaccurate. Problems accessing services for patients with acute conditions were particularly troubling. Effectively addressing issues of network adequacy requires more accurate provider information. Project HOPE—The People-to-People Health Foundation, Inc.

  19. A diary after dinner: How the time of event recording influences later accessibility of diary events.

    Science.gov (United States)

    Szőllősi, Ágnes; Keresztes, Attila; Conway, Martin A; Racsmány, Mihály

    2015-01-01

    Recording the events of a day in a diary may help improve their later accessibility. An interesting question is whether improvements in long-term accessibility will be greater if the diary is completed at the end of the day, or after a period of sleep, the following morning. We investigated this question using an internet-based diary method. On each of five days, participants (n = 109) recorded autobiographical memories for that day or for the previous day. Recording took place either in the morning or in the evening. Following a 30-day retention interval, the diary events were free recalled. We found that participants who recorded their memories in the evening before sleep had best memory performance. These results suggest that the time of reactivation and recording of recent autobiographical events has a significant effect on the later accessibility of those diary events. We discuss our results in the light of related findings that show a beneficial effect of reduced interference during sleep on memory consolidation and reconsolidation.

  20. Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks.

    Science.gov (United States)

    Anwar, Asim; Seet, Boon-Chong; Ding, Zhiguo

    2018-02-08

    Ubiquitous wireless sensor networks (UWSNs) have become a critical technology for enabling smart cities and other ubiquitous monitoring applications. Their deployment, however, can be seriously hampered by the spectrum available to the sheer number of sensors for communication. To support the communication needs of UWSNs without requiring more spectrum resources, the power-domain non-orthogonal multiple access (NOMA) technique originally proposed for 5th Generation (5G) cellular networks is investigated for UWSNs for the first time in this paper. However, unlike 5G networks that operate in the licensed spectrum, UWSNs mostly operate in unlicensed spectrum where sensors also experience cross-technology interferences from other devices sharing the same spectrum. In this paper, we model the interferences from various sources at the sensors using stochastic geometry framework. To evaluate the performance, we derive a theorem and present new closed form expression for the outage probability of the sensors in a downlink scenario under interference limited environment. In addition, diversity analysis for the ordered NOMA users is performed. Based on the derived outage probability, we evaluate the average link throughput and energy consumption efficiency of NOMA against conventional orthogonal multiple access (OMA) technique in UWSNs. Further, the required computational complexity for the NOMA users is presented.

  1. ALPHA: Proposal of Mapping QoS Parameters between UPnP Home Network and GMPLS Access

    DEFF Research Database (Denmark)

    Brewka, Lukasz Jerzy; Sköldström, Pontus; Gavler, Anders

    2011-01-01

    This paper is treating the interdomain QoS signaling between the home and access domains with a focus on applying it for providing QoS between a UPnP-QoS based home network and GMPLS based access network. The work presented here is defining a possible approach for an interface between UPn...

  2. Extraction of network topology from multi-electrode recordings: Is there a small-world effect?

    Directory of Open Access Journals (Sweden)

    Felipe eGerhard

    2011-02-01

    Full Text Available The simultaneous recording of the activity of many neurons poses challenges for multivariate data analysis. Here, we propose a general scheme of reconstruction of the functional network from spike train recordings. Effective, causal interactions are estimated by fitting Generalized Linear Models (GLMs on the neural responses, incorporating effects of the neurons' self-history, of input from other neurons in the recorded network and of modulation by an external stimulus. The coupling terms arising from synaptic input can be transformed by thresholding into a binary connectivity matrix which is directed. Each link between two neurons represents a causal influence from one neuron to the other, given the observation of all other neurons from the population. The resulting graph is analyzed with respect to small-world and scale-free properties using quantitative measures for directed networks. Such graph-theoretic analyses have been performed on many complex dynamic networks, including the connectivity structure between different brain areas. Only few studies have attempted to look at the structure of cortical neural networks on the level of individual neurons. Here, using multi-electrode recordings from the visual system of the awake monkey, we find that cortical networks lack scale-free behavior, but show a small, but significant small-world structure. Assuming a simple distance-dependent probabilistic wiring between neurons, we find that this connectivity structure can account for all of the networks' observed small-world-ness. Moreover, for multi-electrode recordings the sampling of neurons is not uniform across the population. We show that the small-world-ness obtained by such a localized sub-sampling overestimates the strength of the true small-world-structure of the network. This bias is likely to be present in all previous experiments based on multi-electrode recordings.

  3. Modeling the video distribution link in the Next Generation Optical Access Networks

    DEFF Research Database (Denmark)

    Amaya, F.; Cárdenas, A.; Tafur Monroy, Idelfonso

    2011-01-01

    In this work we present a model for the design and optimization of the video distribution link in the next generation optical access network. We analyze the video distribution performance in a SCM-WDM link, including the noise, the distortion and the fiber optic nonlinearities. Additionally, we...... consider in the model the effect of distributed Raman amplification, used to extent the capacity and the reach of the optical link. In the model, we use the nonlinear Schrödinger equation with the purpose to obtain capacity limitations and design constrains of the next generation optical access networks....

  4. 76 FR 56503 - Agency Information Collection Activity (VSO Access to VHA Electronic Health Records) Under OMB...

    Science.gov (United States)

    2011-09-13

    ... (VSO Access to VHA Electronic Health Records) Under OMB Review AGENCY: Veterans Health Administration... Electronic Health Records, VA Form 10- 0400. OMB Control Number: 2900-0710. Type of Review: Extension of a... power of attorney by veterans who have medical information recorded in VHA electronic health records...

  5. Embedding online patient record access in UK primary care: a survey of stakeholder experiences.

    Science.gov (United States)

    Pagliari, Claudia; Shand, Tim; Fisher, Brian

    2012-05-01

    To explore the integration of online patient Record Access within UK Primary Care, its perceived impacts on workload and service quality, and barriers to implementation. Mixed format survey of clinicians, administrators and patients. Telephone interviews with non-users. Primary care centres within NHS England that had offered online record access for the preceding year. Of the 57 practices initially agreeing to pilot the system, 32 had adopted it and 16 of these returned questionnaires. The 42 individual respondents included 14 practice managers, 15 clinicians and 13 patients. Follow-up interviews were conducted with one participant from 15 of the 25 non-adopter practices. Most professionals believed that the system is easy to integrate within primary care; while most patients found it easy to integrate within their daily lives. Professionals perceived no increase in the volume of patient queries or clinical consultations as a result of Record Access; indeed some believed that these had decreased. Most clinicians and patients believed that the service had improved mutual trust, communication, patients' health knowledge and health behaviour. Inhibiting factors included concerns about security, liability and resource requirements. Non-adoption was most frequently attributed to competing priorities, rather than negative beliefs about the service. Record access has an important role to play in supporting patient-focused healthcare policies in the UK and may be easily accommodated within existing services. Additional materials to facilitate patient recruitment, inform system set-up processes, and assure clinicians of their legal position are likely to encourage more widespread adoption.

  6. Open-Access-Kooperationen in Österreich: Open Access Network Austria und E-Infrastructures Austria – aktuelle Entwicklungen seit 2012

    Directory of Open Access Journals (Sweden)

    Bauer, Bruno

    2014-12-01

    Full Text Available [english] The Berlin Declaration on Open Access to scientific knowledge was published in October 2003. All over the world initiatives and projects were started. However, in Austria Open Access got little attention over many years. This was confirmed by a study among Austrian universities on behalf of the Council of Austrian University Libraries. Finally at the turn of the year 2012/2013 the Open Access Network Austria and the university infrastructure project E-Infrastructure Austria were started to push Open Access in Austria on a national level. So 10 years after the Berlin Declaration Austria set up the preconditions to establish sustainable Open Access.

  7. mCRAN: A radio access network architecture for 5G indoor ccommunications

    NARCIS (Netherlands)

    Chandra, Kishor; Cao, Zizheng; Bruintjes, Tom; Prasad, R.V.; Karagiannis, Georgios; Tangdiongga, E.; van den Boom, H.P.A.; Kokkeler, Andre B.J.

    2015-01-01

    Millimeter wave (mmWave) communication is being seen as a disruptive technology for 5G era. In particular, 60GHz frequency band has emerged as a promising candidate for multi-Gbps connectivity in indoor and hotspot areas. In terms of network architecture, cloud radio access network (CRAN) has

  8. mCRAN : a radio access network architecture for 5G indoor communications

    NARCIS (Netherlands)

    Chandra, Kishor; Cao, Zizheng; Bruintjes, T. M.; Prasad, R. Venkatesha; Karagiannis, G.; Tangdiongga, Eduward; van den Boom, H.P.A.; Kokkeler, A. B J

    2015-01-01

    Millimeter wave (mmWave) communication is being seen as a disruptive technology for 5G era. In particular, 60GHz frequency band has emerged as a promising candidate for multi-Gbps connectivity in indoor and hotspot areas. In terms of network architecture, cloud radio access network (CRAN) has

  9. Network access charges, vertical integration, and property rights structure - experiences from the German electricity markets

    International Nuclear Information System (INIS)

    Growitsch, C.; Wein, T.

    2005-01-01

    After the deregulation of the German electricity markets in 1998, the German government opted for a regulatory regime called negotiated third party access, which would be subject to ex-post control by the federal cartel office. Network access charges for new competitors are based on contractual arrangements between energy producers and industrial consumers. As the electricity networks are incontestable natural monopolies, the local and regional network operators are able to set (monopolistic) charges at their own discretion, restricted only by the possible interference of the federal cartel office (Bundeskartellamt). In this paper we analyze if there is evidence for varying charging behaviour depending on the supplier's economic independence (structure of property rights) or its level of vertical integration. For this purpose, we hypothesise that incorporated and vertically integrated suppliers set different charges than independent utility companies. Multivariate estimations show a relation between network access charges and the network operator's economic independence as well as level of vertical integration: on the low voltage level for an estimated annual consumption of 1700 kW/h, vertically integrated firms set-in accordance with our hypothesis-significantly lower access charges than vertically separated suppliers, whereas incorporated network operators charge significantly higher charges compared to independent suppliers. These results could not have been confirmed for other consumptions or voltage levels. (author)

  10. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  11. Resource allocation in heterogeneous cloud radio access networks: advances and challenges

    KAUST Repository

    Dahrouj, Hayssam

    2015-06-01

    Base station densification is increasingly used by network operators to provide better throughput and coverage performance to mobile subscribers in dense data traffic areas. Such densification is progressively diffusing the move from traditional macrocell base stations toward heterogeneous networks with diverse cell sizes (e.g., microcell, picocell, femotcell) and diverse radio access technologies (e.g., GSM, CDMA), and LTE). The coexistence of the different network entities brings an additional set of challenges, particularly in terms of the provisioning of high-speed communications and the management of wireless interference. Resource sharing between different entities, largely incompatible in conventional systems due to the lack of interconnections, becomes a necessity. By connecting all the base stations from different tiers to a central processor (referred to as the cloud) through wire/wireline backhaul links, the heterogeneous cloud radio access network, H-CRAN, provides an open, simple, controllable, and flexible paradigm for resource allocation. This article discusses challenges and recent developments in H-CRAN design. It proposes promising resource allocation schemes in H-CRAN: coordinated scheduling, hybrid backhauling, and multicloud association. Simulations results show how the proposed strategies provide appreciable performance improvement compared to methods from recent literature. © 2015 IEEE.

  12. Challenges on network care considering the perceptions of preceptors of a Pet-Network regarding people with disabilities and at-risk infants: access, comprehensiveness and communication

    Directory of Open Access Journals (Sweden)

    Marta Aoki

    2017-09-01

    Full Text Available Introduction: Health Care Networks (HCN are seen as a possibility for articulating and coordinating actions, health services and is a priority in the health system. One strategy to assure their improvement is the Tutorial Education Program (PET-Redes in the health area. Within this context, it is important to understand the challenges and strengths for the effectiveness of HCN to the network care. Objective: To identify and analyze the perceptions of professionals who are preceptors of PET-Networks (Stork/at-risk infants Network and Disabled People Network about the configuration of the network care and the challenges of professional actions related to it. Method: Qualitative study conducted through two focus groups with professionals that are preceptors of the PET-Networks. Thematic analysis was used for data analysis. Results: Both networks presented the following categories related to the network care configuration: access, comprehensive health care and communication. For this care network configuration, some challenges mentioned include geographical and architectural barriers, lack of social support, lack of transportation, failure on care flow and discontinuities in the communicative process. To deal with these challenges, the following strategies were mentioned: implementation of electronic medical records and formulation of specific forums for debate and articulation of actions, among others. It is important to notice that these categories are intertwined and that more challenges than strategies to overcome them were pointed out by the participants. Conclusion: There are several challenges for effective HCN from different levels and the construction of strategies needs to be convened among all persons involved in the HCN

  13. Adaptive spectrum decision framework for heterogeneous dynamic spectrum access networks

    CSIR Research Space (South Africa)

    Masonta, M

    2015-09-01

    Full Text Available Spectrum decision is the ability of a cognitive radio (CR) system to select the best available spectrum band to satisfy dynamic spectrum access network (DSAN) users¿ quality of service (QoS) requirements without causing harmful interference...

  14. Measuring sustainable accessibility potential using the mobility infrastructure's network configuration

    NARCIS (Netherlands)

    Gil, J.; Read, S.

    2012-01-01

    This paper is an exploration into the analysis of public transport networks using space syntax approaches combined with concepts of sustainable accessibility. Present urban development policy aims to achieve sustainable mobility patterns, shifting mobility to soft transportation modes such as

  15. Switched-based interference reduction scheme for open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh

    2012-06-01

    Femtocells have been proposed to enhance the spatial coverage and system capacity of existing cellular networks. However, this technology may result in significant performance loss due to the increase in co-channel interference, particularly when coordination between access points is infeasible. This paper targets interference management in such overlaid networks. It is assumed that the femtocells employ the open-access strategy to reduce cross-tier interference, and can share resources concurrently. It is also assumed that each end user (EU) can access one channel at a time, and transfer limited feedback. To reduce the effect of co-tier interference in the absence of the desired EU channel state information (CSI) at the serving access point as well as coordination between active access points, a switched scheme based on the interference levels associated with available channels is proposed. Through the analysis, the scheme modes of operation in under-loaded and over-loaded channels are studied, from which the statistics of the resulting interference power are quantified. The impact of the proposed scheme on the received desired power is thoroughly discussed. In addition, the effect of the switching threshold on the achieved performance of the desired EU is investigated. The results clarify that the proposed scheme can improve the performance while reducing the number of examined channels and feedback load. © 2012 IEEE.

  16. Access, fronthaul and backhaul networks for 5G and beyond

    CERN Document Server

    Imran, Muhammad Ali; Shakir, Muhammad Zeeshan

    2017-01-01

    This book provides an overview from both academic and industrial stakeholders of innovative backhaul/fronthaul solutions, covering a wide spectrum of underlying themes ranging from the recent thrust in edge caching for backhaul relaxation to mmWave based fronthauling for radio access networks.

  17. Downlink Non-Orthogonal Multiple Access (NOMA) in Poisson Networks

    KAUST Repository

    Ali, Konpal S.

    2018-03-21

    A network model is considered where Poisson distributed base stations transmit to $N$ power-domain non-orthogonal multiple access (NOMA) users (UEs) each that employ successive interference cancellation (SIC) for decoding. We propose three models for the clustering of NOMA UEs and consider two different ordering techniques for the NOMA UEs: mean signal power-based and instantaneous signal-to-intercell-interference-and-noise-ratio-based. For each technique, we present a signal-to-interference-and-noise ratio analysis for the coverage of the typical UE. We plot the rate region for the two-user case and show that neither ordering technique is consistently superior to the other. We propose two efficient algorithms for finding a feasible resource allocation that maximize the cell sum rate $\\\\mathcal{R}_{\\ m tot}$, for general $N$, constrained to: 1) a minimum rate $\\\\mathcal{T}$ for each UE, 2) identical rates for all UEs. We show the existence of: 1) an optimum $N$ that maximizes the constrained $\\\\mathcal{R}_{\\ m tot}$ given a set of network parameters, 2) a critical SIC level necessary for NOMA to outperform orthogonal multiple access. The results highlight the importance in choosing the network parameters $N$, the constraints, and the ordering technique to balance the $\\\\mathcal{R}_{\\ m tot}$ and fairness requirements. We also show that interference-aware UE clustering can significantly improve performance.

  18. Downlink Non-Orthogonal Multiple Access (NOMA) in Poisson Networks

    KAUST Repository

    Ali, Konpal S.; Haenggi, Martin; Elsawy, Hesham; Chaaban, Anas; Alouini, Mohamed-Slim

    2018-01-01

    A network model is considered where Poisson distributed base stations transmit to $N$ power-domain non-orthogonal multiple access (NOMA) users (UEs) each that employ successive interference cancellation (SIC) for decoding. We propose three models for the clustering of NOMA UEs and consider two different ordering techniques for the NOMA UEs: mean signal power-based and instantaneous signal-to-intercell-interference-and-noise-ratio-based. For each technique, we present a signal-to-interference-and-noise ratio analysis for the coverage of the typical UE. We plot the rate region for the two-user case and show that neither ordering technique is consistently superior to the other. We propose two efficient algorithms for finding a feasible resource allocation that maximize the cell sum rate $\\mathcal{R}_{\\rm tot}$, for general $N$, constrained to: 1) a minimum rate $\\mathcal{T}$ for each UE, 2) identical rates for all UEs. We show the existence of: 1) an optimum $N$ that maximizes the constrained $\\mathcal{R}_{\\rm tot}$ given a set of network parameters, 2) a critical SIC level necessary for NOMA to outperform orthogonal multiple access. The results highlight the importance in choosing the network parameters $N$, the constraints, and the ordering technique to balance the $\\mathcal{R}_{\\rm tot}$ and fairness requirements. We also show that interference-aware UE clustering can significantly improve performance.

  19. Scalable Active Optical Access Network Using Variable High-Speed PLZT Optical Switch/Splitter

    Science.gov (United States)

    Ashizawa, Kunitaka; Sato, Takehiro; Tokuhashi, Kazumasa; Ishii, Daisuke; Okamoto, Satoru; Yamanaka, Naoaki; Oki, Eiji

    This paper proposes a scalable active optical access network using high-speed Plumbum Lanthanum Zirconate Titanate (PLZT) optical switch/splitter. The Active Optical Network, called ActiON, using PLZT switching technology has been presented to increase the number of subscribers and the maximum transmission distance, compared to the Passive Optical Network (PON). ActiON supports the multicast slot allocation realized by running the PLZT switch elements in the splitter mode, which forces the switch to behave as an optical splitter. However, the previous ActiON creates a tradeoff between the network scalability and the power loss experienced by the optical signal to each user. It does not use the optical power efficiently because the optical power is simply divided into 0.5 to 0.5 without considering transmission distance from OLT to each ONU. The proposed network adopts PLZT switch elements in the variable splitter mode, which controls the split ratio of the optical power considering the transmission distance from OLT to each ONU, in addition to PLZT switch elements in existing two modes, the switching mode and the splitter mode. The proposed network introduces the flexible multicast slot allocation according to the transmission distance from OLT to each user and the number of required users using three modes, while keeping the advantages of ActiON, which are to support scalable and secure access services. Numerical results show that the proposed network dramatically reduces the required number of slots and supports high bandwidth efficiency services and extends the coverage of access network, compared to the previous ActiON, and the required computation time for selecting multicast users is less than 30msec, which is acceptable for on-demand broadcast services.

  20. Distributed cloud association in downlink multicloud radio access networks

    KAUST Repository

    Dahrouj, Hayssam

    2015-03-01

    This paper considers a multicloud radio access network (M-CRAN), wherein each cloud serves a cluster of base-stations (BS\\'s) which are connected to the clouds through high capacity digital links. The network comprises several remote users, where each user can be connected to one (and only one) cloud. This paper studies the user-to-cloud-assignment problem by maximizing a network-wide utility subject to practical cloud connectivity constraints. The paper solves the problem by using an auction-based iterative algorithm, which can be implemented in a distributed fashion through a reasonable exchange of information between the clouds. The paper further proposes a centralized heuristic algorithm, with low computational complexity. Simulations results show that the proposed algorithms provide appreciable performance improvements as compared to the conventional cloud-less assignment solutions. © 2015 IEEE.

  1. An Adaptive Time-Spread Multiple-Access Policy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Konstantinos Oikonomou

    2007-05-01

    Full Text Available Sensor networks require a simple and efficient medium access control policy achieving high system throughput with no or limited control overhead in order to increase the network lifetime by minimizing the energy consumed during transmission attempts. Time-spread multiple-access (TSMA policies that have been proposed for ad hoc network environments, can also be employed in sensor networks, since no control overhead is introduced. However, they do not take advantage of any cross-layer information in order to exploit the idiosyncrasies of the particular sensor network environment such as the presence of typically static nodes and a common destination for the forwarded data. An adaptive probabilistic TSMA-based policy, that is proposed and analyzed in this paper, exploits these idiosyncrasies and achieves higher system throughput than the existing TSMA-based policies without any need for extra control overhead. As it is analytically shown in this paper, the proposed policy always outperforms the existing TSMA-based policies, if certain parameter values are properly set; the analysis also provides for these proper values. It is also shown that the proposed policy is characterized by a certain convergence period and that high system throughput is achieved for long convergence periods. The claims and expectations of the provided analysis are supported by simulation results presented in this paper.

  2. Access to surgical assistance: challenges and perspectives

    Directory of Open Access Journals (Sweden)

    Maria Fernanda do Prado Tostes

    2016-01-01

    Full Text Available Objective to characterize the access to surgical assistance in Brazil. Method documentary study, with a quantitative approach, developed from information of the Caixa Preta da Saúde [Health Black Box] database, of the Brazilian Medical Association. Results in the one-year period 3773 cases related to health care in Brazil were recorded. There were 458 (12.3% records on surgical assistance. Of these, most, 339 (74.1%, involved the lack of access in all regions of Brazil. The main access constraint was the prolonged waiting time for surgery. Other constraints were the excessive waiting for medical appointment with experts, doing examinations and cancellation of surgeries. Conclusion the access to surgical assistance, by users of the Brazilian health system, is not widely guaranteed, reinforcing the need for integrated governmental actions, organization of the health care network, management of health care and human resources to overcome the challenges imposed to achieve the Universal Access to Health and Universal Health Coverage.

  3. Convergence of broadband optical and wireless access networks

    Science.gov (United States)

    Chang, Gee-Kung; Jia, Zhensheng; Chien, Hung-Chang; Chowdhury, Arshad; Hsueh, Yu-Ting; Yu, Jianjun

    2009-01-01

    This paper describes convergence of optical and wireless access networks for delivering high-bandwidth integrated services over optical fiber and air links. Several key system technologies are proposed and experimentally demonstrated. We report here, for the first ever, a campus-wide field trial demonstration of radio-over-fiber (RoF) system transmitting uncompressed standard-definition (SD) high-definition (HD) real-time video contents, carried by 2.4-GHz radio and 60- GHz millimeter-wave signals, respectively, over 2.5-km standard single mode fiber (SMF-28) through the campus fiber network at Georgia Institute of Technology (GT). In addition, subsystem technologies of Base Station and wireless tranceivers operated at 60 GHz for real-time video distribution have been developed and tested.

  4. Image transmission in multicore-fiber code-division multiple access network

    Science.gov (United States)

    Yang, Guu-Chang; Kwong, Wing C.

    1997-01-01

    Recently, two-dimensional (2-D) signature patterns were proposed to encode binary digitized image pixels in optical code-division multiple-access (CDMA) networks with 'multicore' fiber. The new technology enables parallel transmission and simultaneous access of 2-D images in multiple-access environment, where these signature patterns are defined as optical orthogonal signature pattern codes (OOSPCs). However, previous work on OOSPCs assumed that the weight of each signature pattern was the same. In this paper, we construct a new family of OOSPCs with the removal of this assumption. Since varying the weight of a user's signature pattern affects that user's performance, this approach is useful for CDMA optical systems with multiple performance requirements.

  5. Receiver-initiated medium access control protocols for wireless sensor networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.

    2015-01-01

    One of the fundamental building blocks of a Wireless Sensor Network (WSN) is the Medium Access Control (MAC) protocol, that part of the system governing when and how two independent neighboring nodes activate their respective transceivers to directly interact. Historically, data exchange has always...

  6. Access and control of information and intellectual property

    Science.gov (United States)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  7. Channel Access and Power Control for Mobile Crowdsourcing in Device-to-Device Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yue Ma

    2018-01-01

    Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.

  8. Enhancing Sensing and Channel Access in Cognitive Radio Networks

    KAUST Repository

    Hamza, Doha R.

    2014-06-18

    Cognitive radio technology is a promising technology to solve the wireless spectrum scarcity problem by intelligently allowing secondary, or unlicensed, users access to the primary, licensed, users\\' frequency bands. Cognitive technology involves two main tasks: 1) sensing the wireless medium to assess the presence of the primary users and 2) designing secondary spectrum access techniques that maximize the secondary users\\' benefits while maintaining the primary users\\' privileged status. On the spectrum sensing side, we make two contributions. First, we maximize a utility function representing the secondary throughput while constraining the collision probability with the primary below a certain value. We optimize therein the channel sensing time, the sensing decision threshold, the channel probing time, together with the channel sensing order for wideband primary channels. Second, we design a cooperative spectrum sensing technique termed sensing with equal gain combining whereby cognitive radios simultaneously transmit their sensing results to the fusion center over multipath fading reporting channels. The proposed scheme is shown to outperform orthogonal reporting systems in terms of achievable secondary throughput and to be robust against phase and synchronization errors. On the spectrum access side, we make four contributions. First, we design a secondary scheduling scheme with the goal of minimizing the secondary queueing delay under constraints on the average secondary transmit power and the maximum tolerable primary outage probability. Second, we design another secondary scheduling scheme based on the spectrum sensing results and the primary automatic repeat request feedback. The optimal medium access probabilities are obtained via maximizing the secondary throughput subject to constraints that guarantee quality of service parameters for the primary. Third, we propose a three-message superposition coding scheme to maximize the secondary throughput without

  9. Modeling Accessibility of Screening and Treatment Facilities for Older Adults using Transportation Networks.

    Science.gov (United States)

    Zhang, Qiuyi; Northridge, Mary E; Jin, Zhu; Metcalf, Sara S

    2018-04-01

    Increased lifespans and population growth have resulted in an older U.S. society that must reckon with the complex oral health needs that arise as adults age. Understanding accessibility to screening and treatment facilities for older adults is necessary in order to provide them with preventive and restorative services. This study uses an agent-based model to examine the accessibility of screening and treatment facilities via transportation networks for older adults living in the neighborhoods of northern Manhattan, New York City. Older adults are simulated as socioeconomically distinct agents who move along a GIS-based transportation network using transportation modes that mediate their access to screening and treatment facilities. This simulation model includes four types of mobile agents as a simplifying assumption: walk, by car, by bus, or by van (i.e., a form of transportation assistance for older adults). These mobile agents follow particular routes: older adults who travel by car, bus, and van follow street roads, whereas pedestrians follow walkways. The model enables the user to focus on one neighborhood at a time for analysis. The spatial dimension of an older adult's accessibility to screening and treatment facilities is simulated through the travel costs (indicated by travel time or distance) incurred in the GIS-based model environment, where lower travel costs to screening and treatment facilities imply better access. This model provides a framework for representing health-seeking behavior that is contextualized by a transportation network in a GIS environment.

  10. Acoustic Metadata Management and Transparent Access to Networked Oceanographic Data Sets

    Science.gov (United States)

    2015-09-30

    Transparent Access to Networked Oceanographic Data Sets Marie A. Roch Dept. of Computer Science San Diego State University 5500 Campanile Drive San...specific technologies for processing Excel spreadsheets and Access databases. The architecture (Figure 4) is based on a client-server model...Keesey, M. S., Lieske, J. H., Ostro, S. J., Standish, E. M., and Wimberly, R. N. (1996). "JPL’s On-Line Solar System Data Service," B. Am. Astron

  11. Simple measurement-based admission control for DiffServ access networks

    Science.gov (United States)

    Lakkakorpi, Jani

    2002-07-01

    In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.

  12. Gain transient control for wavelength division multiplexed access networks using semiconductor optical amplifiers

    DEFF Research Database (Denmark)

    Gibbon, Timothy Braidwood; Osadchiy, Alexey Vladimirovich; Kjær, Rasmus

    2009-01-01

    Gain transients can severely hamper the upstream network performance in wavelength division multiplexed (WDM) access networks featuring erbium doped fiber amplifiers (EDFAs) or Raman amplification. We experimentally demonstrate for the first time using 10 Gb/s fiber transmission bit error rate...... measurements how a near-saturated semiconductor optical amplifier (SOA) can be used to control these gain transients. An SOA is shown to reduce the penalty of transients originating in an EDFA from 2.3 dB to 0.2 dB for 10 Gb/s transmission over standard single mode fiber using a 231-1 PRBS pattern. The results...... suggest that a single SOA integrated within a WDM receiver at the metro node could offer a convenient all-optical solution for upstream transient controlin WDM access networks....

  13. 13 CFR 108.1640 - SBA access to records of the CRA, Brokers, Dealers and Pool or Trust assemblers.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false SBA access to records of the CRA, Brokers, Dealers and Pool or Trust assemblers. 108.1640 Section 108.1640 Business Credit and Assistance....1640 SBA access to records of the CRA, Brokers, Dealers and Pool or Trust assemblers. The CRA and any...

  14. Design Aspects of An Energy-Efficient, Lightweight Medium Access Control Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2006-01-01

    This document gives an overview of the most relevant design aspects of the lightweight medium access control (LMAC) protocol [16] for wireless sensor networks (WSNs). These aspects include selfconfiguring and localized operation of the protocol, time synchronization in multi-hop networks, network

  15. Monday 9 January 2006: RESTRICTED ACCESS to the Technical Network

    CERN Multimedia

    CNIC Users Exchange and IT/CS

    2005-01-01

    As of Monday 9 January 2006, Ethernet access from the general CERN network to the Technical Network (TN) will be restricted in order to improve security on the TN. As a result, all Ethernet communication between the General Purpose Network (GPN) and the TN will be filtered. Only communication lines to the general IT services such as DNS, TP, NICE, DFS, AFS, Antivirus, Linux installation servers, License servers, OracleDB, TSM backup servers and dedicated AB and TS servers on the GPN will remain open. Please make sure that all your devices are registered properly in the network database (LANDB): http://network.cern.ch/. You are encouraged to make proper use of the 'Tag' and 'Description' fields in order to identify your system later on. If your system depends on special services on the GPN or is split between the GPN and the TN, e.g. consists of devices (PCs, PLCs, VME crates, webcams, etc.) connected to both the TN and the GPN, please contact the Technical-Network.Administrator@cern.ch . They will include...

  16. Accounting for Energy Cost When Designing Energy-Efficient Wireless Access Networks

    Directory of Open Access Journals (Sweden)

    Greta Vallero

    2018-03-01

    Full Text Available Because of the increase of the data traffic demand, wireless access networks, through which users access telecommunication services, have expanded, in terms of size and of capability and, consequently, in terms of power consumption. Therefore, costs to buy the necessary power for the supply of base stations of those networks is becoming very high, impacting the communication cost. In this study, strategies to reduce the amount of money spent for the purchase of the energy consumed by the base stations are proposed for a network powered by solar panels, energy batteries and the power grid. First, the variability of the energy prices is exploited. It provides a cost reduction of up to 30%, when energy is bought in advance. If a part of the base stations is deactivated when the energy price is higher than a given threshold, a compromise between the energy cost and the user coverage drop is needed. In the simulated scenario, the necessary energy cost can be reduced by more than 40%, preserving the user coverage by greater than 94%. Second, the network is introduced to the energy market: it buys and sells energy from/to the traditional power grid. Finally, costs are reduced by the reduction of power consumption of the network, achieved by using microcell base stations. In the considered scenario, up to a 31% cost reduction is obtained, without the deterioration of the quality of service, but a huge Capex expenditure is required.

  17. Benefit-risk of Patients' Online Access to their Medical Records: Consensus Exercise of an International Expert Group.

    Science.gov (United States)

    Liyanage, Harshana; Liaw, Siaw-Teng; Konstantara, Emmanouela; Mold, Freda; Schreiber, Richard; Kuziemsky, Craig; Terry, Amanda L; de Lusignan, Simon

    2018-04-22

     Patients' access to their computerised medical records (CMRs) is a legal right in many countries. However, little is reported about the benefit-risk associated with patients' online access to their CMRs.  To conduct a consensus exercise to assess the impact of patients' online access to their CMRs on the quality of care as defined in six domains by the Institute of Medicine (IoM), now the National Academy of Medicine (NAM).  A five-round Delphi study was conducted. Round One explored experts' (n = 37) viewpoints on providing patients with access to their CMRs. Round Two rated the appropriateness of statements arising from Round One (n = 16). The third round was an online panel discussion of findings (n = 13) with the members of both the International Medical Informatics Association and the European Federation of Medical Informatics Primary Health Care Informatics Working Groups. Two additional rounds, a survey of the revised consensus statements and an online workshop, were carried out to further refine consensus statements.  Thirty-seven responses from Round One were used as a basis to initially develop 15 statements which were categorised using IoM's domains of care quality. The experts agreed that providing patients online access to their CMRs for bookings, results, and prescriptions increased efficiency and improved the quality of medical records. Experts also anticipated that patients would proactively use their online access to share data with different health care providers, including emergencies. However, experts differed on whether access to limited or summary data was more useful to patients than accessing their complete records. They thought online access would change recording practice, but they were unclear about the benefit-risk of high and onerous levels of security. The 5-round process, finally, produced 16 consensus statements.  Patients' online access to their CMRs should be part of all CMR systems. It improves the process

  18. The ENSDF radioactivity data base for IBM-PC and computer network access

    International Nuclear Information System (INIS)

    Ekstroem, P.; Spanier, L.

    1989-08-01

    A data base system for radioactivity gamma rays is described. A base with approximately 15000 gamma rays from 2777 decays is available for installation on the hard disk of a PC, and a complete system with approximately 73000 gamma rays is available for on-line access via the NORDic University computer NETwork (NORDUNET) and the Swedish University computer NETwork (SUNET)

  19. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever-ch...

  20. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    Directory of Open Access Journals (Sweden)

    Antonio F. Gomez Skarmeta

    2013-11-01

    Full Text Available Internet of Things (IoT networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA has been standardized by the Internet engineering task force (IETF to carry the Extensible Authentication Protocol (EAP, which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1 to demonstrate the feasibility of EAP/PANA in IoT devices; (2 to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS, called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  1. PANATIKI: a network access control implementation based on PANA for IoT devices.

    Science.gov (United States)

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  2. Allocation of spectral and spatial modes in multidimensional metro-access optical networks

    Science.gov (United States)

    Gao, Wenbo; Cvijetic, Milorad

    2018-04-01

    Introduction of spatial division multiplexing (SDM) has added a new dimension in an effort to increase optical fiber channel capacity. At the same time, it can also be explored as an advanced optical networking tool. In this paper, we have investigated the resource allocation to end-users in multidimensional networking structure with plurality of spectral and spatial modes actively deployed in different networking segments. This presents a more comprehensive method as compared to the common practice where the segments of optical network are analyzed independently since the interaction between network hierarchies is included into consideration. We explored the possible transparency from the metro/core network to the optical access network, analyzed the potential bottlenecks from the network architecture perspective, and identified an optimized network structure. In our considerations, the viability of optical grooming through the entire hierarchical all-optical network is investigated by evaluating the effective utilization and spectral efficiency of the network architecture.

  3. 32 CFR 37.915 - What requirement for access to a for-profit participant's records do I include in a TIA?

    Science.gov (United States)

    2010-07-01

    ... participant's records do I include in a TIA? 37.915 Section 37.915 National Defense Department of Defense... What requirement for access to a for-profit participant's records do I include in a TIA? (a) If a for... auditors, your TIA must include for that participant the standard access-to-records requirements at 32 CFR...

  4. Resource allocation in heterogeneous cloud radio access networks: advances and challenges

    KAUST Repository

    Dahrouj, Hayssam; Douik, Ahmed S.; Dhifallah, Oussama Najeeb; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    , becomes a necessity. By connecting all the base stations from different tiers to a central processor (referred to as the cloud) through wire/wireline backhaul links, the heterogeneous cloud radio access network, H-CRAN, provides an open, simple

  5. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Meng Yi

    2016-11-01

    Full Text Available This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  6. Applying 4-regular grid structures in large-scale access networks

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Knudsen, Thomas P.; Patel, Ahmed

    2006-01-01

    4-Regular grid structures have been used in multiprocessor systems for decades due to a number of nice properties with regard to routing, protection, and restoration, together with a straightforward planar layout. These qualities are to an increasing extent demanded also in largescale access...... networks, but concerning protection and restoration these demands have been met only to a limited extent by the commonly used ring and tree structures. To deal with the fact that classical 4-regular grid structures are not directly applicable in such networks, this paper proposes a number of extensions...... concerning restoration, protection, scalability, embeddability, flexibility, and cost. The extensions are presented as a tool case, which can be used for implementing semi-automatic and in the longer term full automatic network planning tools....

  7. A two-stage flow-based intrusion detection model for next-generation networks.

    Science.gov (United States)

    Umer, Muhammad Fahad; Sher, Muhammad; Bi, Yaxin

    2018-01-01

    The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results.

  8. EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks

    Science.gov (United States)

    Zrelli, Saber; Okabe, Nobuo; Shinoda, Yoichi

    The wireless medium is a key technology for enabling ubiquitous and continuous network connectivity. It is becoming more and more important in our daily life especially with the increasing adoption of networking technologies in many fields such as medical care and transportation systems. Although most wireless technologies nowadays provide satisfying bandwidth and higher speeds, several of these technologies still lack improvements with regard to handoff performance. In this paper, we focus on wireless network technologies that rely on the Extensible Authentication Protocol for mutual authentication between the station and the access network. Such technologies include local area wireless networks (IEEE 802.11) as well as broadband wireless networks (IEEE 802.16). We present a new EAP authentication method based on a three party authentication scheme, namely Kerberos, that considerably shortens handoff delays. Compared to other methods, the proposed method has the advantage of not requiring any changes on the access points, making it readily deployable at reasonable costs.

  9. A Socio-Technical Analysis of Patient Accessible Electronic Health Records.

    Science.gov (United States)

    Hägglund, Maria; Scandurra, Isabella

    2017-01-01

    In Sweden, and internationally, there is a movement towards increased transparency in healthcare including giving patients online access to their electronic health records (EHR). The purpose of this paper is to analyze the Swedish patient accessible EHR (PAEHR) service using a socio-technical framework, to increase the understanding of factors that influence the design, implementation, adoption and use of the service. Using the Sitting and Singh socio-technical framework as a basis for analyzing the Swedish PAEHR system and its context indicated that there are many stakeholders engaged in these types of services, with different driving forces and incentives that may influence the adoption and usefulness of PAEHR services. The analysis was useful in highlighting important areas that need to be further explored in evaluations of PAEHR services, and can act as a guide when planning evaluations of any PAEHR service.

  10. Underserved Pregnant and Postpartum Women's Access and Use of Their Health Records.

    Science.gov (United States)

    Guo, Yuqing; Hildebrand, Janet; Rousseau, Julie; Brown, Brandon; Pimentel, Pamela; Olshansky, Ellen

    The purpose of this study was to examine knowledge of and experiences with use of their electronic health record (EHR) among mostly Hispanic women during pregnancy and postpartum. Women who were in the MOMS Orange County prenatal or postpartum home visitation program completed surveys and participated in focus groups. Descriptive and content analyses were used. Twenty-six women participated. Nearly all women (24, 92.3%) knew what health records were and most (80.8%) felt that keeping their records would increase or greatly increase their confidence in caring for themselves and their families. Approximately one third reported already keeping a copy of their health records. Common barriers to accessing and understanding health records included healthcare providers' noncompliance with the Health Information Technology for Economic and Clinical Health Act, limited EHR adoption, unfriendly patient portals, complicated medical terminology, rushed appointments with healthcare providers, lack of Spanish interpreters, and lack of Spanish-speaking healthcare providers. Programs are needed to educate and support women and providers in using health records to promote health literacy, pregnancy management, and patient-provider relationships in underserved populations.

  11. Impact of immediate access to the electronic medical record on anatomic pathology performance.

    Science.gov (United States)

    Renshaw, Andrew A; Gould, Edwin W

    2013-07-01

    To assess the overall impact of access to the electronic medical record (EMR) on anatomic pathology performance. We reviewed the results of all use of the EMR by 1 pathologist over an 18-month period. Of the 10,107 cases (913 cytology and 9,194 surgical pathology) reviewed, the EMR (excluding anatomic pathology records) was accessed in 222 (2.2% of all cases, 6.5% of all cytology cases, and 1.8% of all surgical pathology cases). The EMR was used to evaluate a critical value in 20 (9.0%) cases and make a more specific diagnosis in 77 (34.7%) cases, a less specific diagnosis in 4 (1.8%) cases, and a systemic rather than localized diagnosis in 4 (1.8%) cases. The percentage of cases in which the physician was contacted decreased from 7.3% for the prior 18 months to 6.7%, but this change was not significant (P = .13). Twelve cases were subsequently sent for interinstitutional consultation, and no disagreements were identified. The EMR was accessed in 2.2% of all surgical pathology and cytology cases and affected the diagnosis in 48% of these cases.

  12. Enabling Broadband as Commodity within Access Networks: A QoS Recipe

    Science.gov (United States)

    Areizaga, Enrique; Foglar, Andreas; Elizondo, Antonio J.; Geilhardt, Frank

    This paper describes the QoS features that will transform the access networks landscape in order to bring “Broadband” as a commodity while setting up the pillars of the “Future Media Internet”. Quality of Experience is obviously key for emerging and future services. Broadcasting services will first need to equal the QoE of their counterparts in the Open-air market (for IP-TV examples would be artifact-free, no picture freezing, fast zapping times) and offer new features often using interactivity (Time-shifted TV, access to more content, 3DTV with feeling of presence). The huge variety of communications alternatives will lead to different requirements per customer, whose needs will also be dependent on parameters like where the connection is made, the time of the day/day of the week/period of the year or even his/her mood. Today’s networks, designed for providing just Broadband connectivity, will not be enough to satisfy customer’s needs and will necessarily support the introduction of new and innovative services. The Networks of the future should learn from the way the users are communicating, what services they are using, where, when, and how, and adapt accordingly.

  13. Honoring Dental Patients' Privacy Rule Right of Access in the Context of Electronic Health Records.

    Science.gov (United States)

    Ramoni, Rachel B; Asher, Sheetal R; White, Joel M; Vaderhobli, Ram; Ogunbodede, Eyitope O; Walji, Muhammad F; Riedy, Christine; Kalenderian, Elsbeth

    2016-06-01

    A person's right to access his or her protected health information is a core feature of the U.S. Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule. If the information is stored electronically, covered entities must be able to provide patients with some type of machine-readable, electronic copy of their data. The aim of this study was to understand how academic dental institutions execute the Privacy Rule's right of access in the context of electronic health records (EHRs). A validated electronic survey was distributed to the clinical deans of 62 U.S. dental schools during a two-month period in 2014. The response rate to the survey was 53.2% (N=33). However, three surveys were partially completed, and of the 30 completed surveys, the 24 respondents who reported using axiUm as the EHR at their dental school clinic were the ones on which the results were based (38.7% of total schools at the time). Of the responses analyzed, 86% agreed that clinical modules should be considered part of a patient's dental record, and all agreed that student teaching-related modules should not. Great variability existed among these clinical deans as to whether administrative and financial modules should be considered part of a patient record. When patients request their records, close to 50% of responding schools provide the information exclusively on paper. This study found variation among dental schools in their implementation of the Privacy Rule right of access, and although all the respondents had adopted EHRs, a large number return records in paper format.

  14. Low-Complexity Scheduling and Power Adaptation for Coordinated Cloud-Radio Access Networks

    KAUST Repository

    Douik, Ahmed; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    In practical wireless systems, the successful implementation of resource allocation techniques strongly depends on the algorithmic complexity. Consider a cloud-radio access network (CRAN), where the central cloud is responsible for scheduling

  15. 3. Informationsveranstaltung des Open Access Network Austria (OANA (Wien, 1. Juni 2016

    Directory of Open Access Journals (Sweden)

    Katharina Rieck

    2016-09-01

    Full Text Available Dieser Beitrag fasst die Ergebnisse der 3. OANA-Veranstaltung, die am 01.06.2016 im Palais Harrach in Wien stattfand, zusammen. Das „Open Access Network Austria“ (OANA ist eine „joint activity“ unter dem organisatorischen Dach des Fonds zur Förderung der wissenschaftlichen Forschung (FWF und der Österreichischen Universitätenkonferenz (UNIKO mit dem Ziel Open Access Aktivitäten in der österreichischen Forschungslandschaft zu koordinieren. Die fünf Arbeitsgruppen, die im Jänner 2015 gebildet wurden, präsentierten bei der Informationsveranstaltung die Ergebnisse und Fortschritte aus eineinhalb Jahren Arbeit. Ab Herbst 2016 werden sich vier neue Arbeitsgruppen mit den Themenschwerpunkten „Strategische Positionierung & Administration der Open-Access-Transition“, „Open Access & die Zukunft von Scholarly Communication“, „Open Access & Open Research Data“ und „Open Access & Open Educational Resources“ beschäftigen.

  16. Stochastic geometry model for multi-channel fog radio access networks

    KAUST Repository

    Emara, Mostafa

    2017-06-29

    Cache-enabled base station (BS) densification, denoted as a fog radio access network (F-RAN), is foreseen as a key component of 5G cellular networks. F-RAN enables storing popular files at the network edge (i.e., BS caches), which empowers local communication and alleviates traffic congestions at the core/backhaul network. The hitting probability, which is the probability of successfully transmitting popular files request from the network edge, is a fundamental key performance indicator (KPI) for F-RAN. This paper develops a scheduling aware mathematical framework, based on stochastic geometry, to characterize the hitting probability of F-RAN in a multi-channel environment. To this end, we assess and compare the performance of two caching distribution schemes, namely, uniform caching and Zipf caching. The numerical results show that the commonly used single channel environment leads to pessimistic assessment for the hitting probability of F-RAN. Furthermore, the numerical results manifest the superiority of the Zipf caching scheme and quantify the hitting probability gains in terms of the number of channels and cache size.

  17. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  18. Access Selection Algorithm of Heterogeneous Wireless Networks for Smart Distribution Grid Based on Entropy-Weight and Rough Set

    Science.gov (United States)

    Xiang, Min; Qu, Qinqin; Chen, Cheng; Tian, Li; Zeng, Lingkang

    2017-11-01

    To improve the reliability of communication service in smart distribution grid (SDG), an access selection algorithm based on dynamic network status and different service types for heterogeneous wireless networks was proposed. The network performance index values were obtained in real time by multimode terminal and the variation trend of index values was analyzed by the growth matrix. The index weights were calculated by entropy-weight and then modified by rough set to get the final weights. Combining the grey relational analysis to sort the candidate networks, and the optimum communication network is selected. Simulation results show that the proposed algorithm can implement dynamically access selection in heterogeneous wireless networks of SDG effectively and reduce the network blocking probability.

  19. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    OpenAIRE

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols,...

  20. Clinical Assistant Diagnosis for Electronic Medical Record Based on Convolutional Neural Network.

    Science.gov (United States)

    Yang, Zhongliang; Huang, Yongfeng; Jiang, Yiran; Sun, Yuxi; Zhang, Yu-Jin; Luo, Pengcheng

    2018-04-20

    Automatically extracting useful information from electronic medical records along with conducting disease diagnoses is a promising task for both clinical decision support(CDS) and neural language processing(NLP). Most of the existing systems are based on artificially constructed knowledge bases, and then auxiliary diagnosis is done by rule matching. In this study, we present a clinical intelligent decision approach based on Convolutional Neural Networks(CNN), which can automatically extract high-level semantic information of electronic medical records and then perform automatic diagnosis without artificial construction of rules or knowledge bases. We use collected 18,590 copies of the real-world clinical electronic medical records to train and test the proposed model. Experimental results show that the proposed model can achieve 98.67% accuracy and 96.02% recall, which strongly supports that using convolutional neural network to automatically learn high-level semantic features of electronic medical records and then conduct assist diagnosis is feasible and effective.

  1. 32 CFR 37.920 - What requirement for access to a nonprofit participant's records do I include in a TIA?

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false What requirement for access to a nonprofit participant's records do I include in a TIA? 37.920 Section 37.920 National Defense Department of Defense... What requirement for access to a nonprofit participant's records do I include in a TIA? Your TIA must...

  2. Parental access to minors' health records in the South African health care context: concerns and recommendations

    Directory of Open Access Journals (Sweden)

    MN Slabbert

    2004-10-01

    Full Text Available Privacy and confidentiality have long been recognized as essential elements of the doctor-patient relationship. Patients should feel free to disclose the most intimate and private medical facts about themselves to their physicians in order to facilitate optimal patient care. Medical records, whether hand-written or electronic, also play an important role in other contexts, such as medical research, health care management and financial audit. In South Africa there is little consistency in approaches to patient confidentiality. There are also no national standards or policies on patient confidentiality, apart from specific ethical rules, some ad hoc statutory provisions and general constitutional provisions not directly related to the intricacies of the doctor-patient relationship. A closer look at the relevant statutory provisions reveal the existence of conflicting standards, most notably in respect of parental access to a minors' health records. The purpose of this paper is to examine the discrepancies and contradictory provisions relating to the access to and disclosure of health information, in particular parental access to health records of minors. In the final instance, some recommendations will be suggested.

  3. Heterogeneous wireless/wireline optical access networks with the R-EAT as backend component

    Science.gov (United States)

    Hagedorn, Klaus; Gindera, Ralf; Stohr, Andreas; Jager, Dieter

    2004-09-01

    A heterogeneous wireless/wireline optical transmission link using a reflection type electroabsorption transceiver (R-EAT) is presented. Simultaneous transmission of full-duplex broadband wireless LAN (WLAN) channels and 1Gb/s base band data is experimentally demonstrated. The system link employs sub-carrier multiplexing (SCM) and two optical channels for full duplex transmission of various analog WLAN channels and downlink digital base band data. The developed link architecture is suitable for simultaneous transmission of broadband wireline and wireless signals, it enables the coexistence and interoperability between wireline and wireless access technologies. The developed R-EAT component employed in this wireline/wireless access system, features "single-chip-component" base stations in access networks with star type topology where only a single optical fiber is used for bidirectional optical transmission. The R-EAT can be used within the optical C-band (1530- 1560nm) and is suitable for (D)WDM networks. Bit error rate measurements demonstrate the capabilities of the R-EAT for 1Gb/s base band transmission. The analog performance for WLAN transmission is characterised by a spurious free dynamic range (SFDR) of more than 75dB and 90dB for uplink and downlink transmission, respectively. The link gain for uplink and downlink transmission is -42dB and -37dB, respectively. The demonstrates the analog performances of the R-EAT for being used in wireless access networks such as W-LAN.

  4. Wide area network access to CMS data using the LustreTM filesystem

    Science.gov (United States)

    Rodriguez, J. L.; Avery, P.; Brody, T.; Bourilkov, D.; Fu, Y.; Kim, B.; Prescott, C.; Wu, Y.

    2010-04-01

    In this paper, we explore the use of the LustreTM cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed LustreTM filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with IOzone for sequential access to data.

  5. Wide area network access to CMS data using the LustreTM filesystem

    International Nuclear Information System (INIS)

    Rodriguez, J L; Brody, T; Avery, P; Bourilkov, D; Fu, Y; Kim, B; Wu, Y; Prescott, C

    2010-01-01

    In this paper, we explore the use of the Lustre TM cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed Lustre TM filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with IOzone for sequential access to data.

  6. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Mahdi Zareei

    2017-09-01

    Full Text Available New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN. First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.

  7. On-demand virtual optical network access using 100 Gb/s Ethernet.

    Science.gov (United States)

    Ishida, Osamu; Takamichi, Toru; Arai, Sachine; Kawate, Ryusuke; Toyoda, Hidehiro; Morita, Itsuro; Araki, Soichiro; Ichikawa, Toshiyuki; Hoshida, Takeshi; Murai, Hitoshi

    2011-12-12

    Our Terabit LAN initiatives attempt to enhance the scalability and utilization of lambda resources. This paper describes bandwidth-on-demand virtualized 100GE access to WDM networks on a field fiber test-bed using multi-domain optical-path provisioning. © 2011 Optical Society of America

  8. Patients' online access to their electronic health records and linked online services: a systematic review in primary care.

    Science.gov (United States)

    Mold, Freda; de Lusignan, Simon; Sheikh, Aziz; Majeed, Azeem; Wyatt, Jeremy C; Quinn, Tom; Cavill, Mary; Franco, Christina; Chauhan, Umesh; Blakey, Hannah; Kataria, Neha; Arvanitis, Theodoros N; Ellis, Beverley

    2015-03-01

    Online access to medical records by patients can potentially enhance provision of patient-centred care and improve satisfaction. However, online access and services may also prove to be an additional burden for the healthcare provider. To assess the impact of providing patients with access to their general practice electronic health records (EHR) and other EHR-linked online services on the provision, quality, and safety of health care. A systematic review was conducted that focused on all studies about online record access and transactional services in primary care. Data sources included MEDLINE, Embase, CINAHL, Cochrane Library, EPOC, DARE, King's Fund, Nuffield Health, PsycINFO, OpenGrey (1999-2012). The literature was independently screened against detailed inclusion and exclusion criteria; independent dual data extraction was conducted, the risk of bias (RoB) assessed, and a narrative synthesis of the evidence conducted. A total of 176 studies were identified, 17 of which were randomised controlled trials, cohort, or cluster studies. Patients reported improved satisfaction with online access and services compared with standard provision, improved self-care, and better communication and engagement with clinicians. Safety improvements were patient-led through identifying medication errors and facilitating more use of preventive services. Provision of online record access and services resulted in a moderate increase of e-mail, no change on telephone contact, but there were variable effects on face-to-face contact. However, other tasks were necessary to sustain these services, which impacted on clinician time. There were no reports of harm or breaches in privacy. While the RoB scores suggest many of the studies were of low quality, patients using online services reported increased convenience and satisfaction. These services positively impacted on patient safety, although there were variations of record access and use by specific ethnic and socioeconomic groups

  9. Patients’ online access to their electronic health records and linked online services: a systematic review in primary care

    Science.gov (United States)

    Mold, Freda; de Lusignan, Simon; Sheikh, Aziz; Majeed, Azeem; Wyatt, Jeremy C; Quinn, Tom; Cavill, Mary; Franco, Christina; Chauhan, Umesh; Blakey, Hannah; Kataria, Neha; Arvanitis, Theodoros N; Ellis, Beverley

    2015-01-01

    Background Online access to medical records by patients can potentially enhance provision of patient-centred care and improve satisfaction. However, online access and services may also prove to be an additional burden for the healthcare provider. Aim To assess the impact of providing patients with access to their general practice electronic health records (EHR) and other EHR-linked online services on the provision, quality, and safety of health care. Design and setting A systematic review was conducted that focused on all studies about online record access and transactional services in primary care. Method Data sources included MEDLINE, Embase, CINAHL, Cochrane Library, EPOC, DARE, King’s Fund, Nuffield Health, PsycINFO, OpenGrey (1999–2012). The literature was independently screened against detailed inclusion and exclusion criteria; independent dual data extraction was conducted, the risk of bias (RoB) assessed, and a narrative synthesis of the evidence conducted. Results A total of 176 studies were identified, 17 of which were randomised controlled trials, cohort, or cluster studies. Patients reported improved satisfaction with online access and services compared with standard provision, improved self-care, and better communication and engagement with clinicians. Safety improvements were patient-led through identifying medication errors and facilitating more use of preventive services. Provision of online record access and services resulted in a moderate increase of e-mail, no change on telephone contact, but there were variable effects on face-to-face contact. However, other tasks were necessary to sustain these services, which impacted on clinician time. There were no reports of harm or breaches in privacy. Conclusion While the RoB scores suggest many of the studies were of low quality, patients using online services reported increased convenience and satisfaction. These services positively impacted on patient safety, although there were variations of

  10. Performance Evaluation of TDMA Medium Access Control Protocol in Cognitive Wireless Networks

    Directory of Open Access Journals (Sweden)

    Muhammed Enes Bayrakdar

    2017-02-01

    Full Text Available Cognitive radio paradigm has been revealed as a new communication technology that shares channels in wireless networks. Channel assignment is a crucial issue in the field of cognitive wireless networks because of the spectrum scarcity. In this work, we have evaluated the performance of TDMA medium access control protocol. In our simulation scenarios, primary users and secondary users utilize TDMA as a medium access control protocol. We have designed a network environment in Riverbed simulation software that consists of primary users, secondary users, and base stations. In our system model, secondary users sense the spectrum and inform the base station about empty channels. Then, the base station decides accordingly which secondary user may utilize the empty channel. Energy detection technique is employed as a spectrum sensing technique because it is the best when information about signal of primary user is acquired. Besides, different number of users is selected in simulation scenarios in order to obtain accurate delay and throughput results. Comparing analytical model with simulation results, we have shown that performance analysis of our system model is consistent and accurate.

  11. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  12. Bandwidth Impacts of Localizing Peer-to-Peer IP Video Traffic in Access and Aggregation Networks

    Directory of Open Access Journals (Sweden)

    Kenneth Kerpez

    2008-10-01

    Full Text Available This paper examines the burgeoning impact of peer-to-peer (P2P traffic IP video traffic. High-quality IPTV or Internet TV has high-bandwidth requirements, and P2P IP video could severely strain broadband networks. A model for the popularity of video titles is given, showing that some titles are very popular and will often be available locally; making localized P2P attractive for video titles. The bandwidth impacts of localizing P2P video to try and keep traffic within a broadband access network area or within a broadband access aggregation network area are examined. Results indicate that such highly localized P2P video can greatly lower core bandwidth usage.

  13. A Spontaneous Ad Hoc Network to Share WWW Access

    Directory of Open Access Journals (Sweden)

    Lloret Jaime

    2010-01-01

    Full Text Available In this paper, we propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction, to grant a quick, easy, and secure access to the users to surf the Web. The paper shows the description of our proposal, the procedure of the nodes involved in the system, the security algorithms implemented, and the designed messages. We have taken into account the security and its performance. Although some people have defined and described the main features of spontaneous ad-hoc networks, nobody has published any design and simulation until today. Spontaneous networking will enable a more natural form of wireless computing when people physically meet in the real world. We also validate the success of our proposal through several simulations and comparisons with a regular architecture, taking into account the optimization of the resources of the devices. Finally, we compare our proposal with other caching techniques published in the related literature. The proposal has been developed with the main objective of improving the communication and integration between different study centers of low-resource communities. That is, it lets communicate spontaneous networks, which are working collaboratively and which have been created on different physical places.

  14. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  15. The Effect of Information Access Strategy on Power Consumption and Reliability in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    This paper examines the effect of different information access strategies on power consumption and information reliability, considering the wireless sensor network as the source of information. Basically, the paper explores three different access strategies, namely; reactive, periodic and hybrid...

  16. Voice over LTE via Generic access (Volga) as a possible solution of mobile networks transformation

    OpenAIRE

    Stepaniuk, Oleg

    2010-01-01

    This paper is focused on Voice over LTE via Generic Access Network, which concept is to connect the already existing Mobile Switching Centers to the LTE network via a gateway supporting 2G or 3G voice environment.

  17. Performance Analysis of DPSK-OCDMA System for Optical Access Network

    Science.gov (United States)

    Islam, Monirul; Ahmed, N.; Aljunid, S. A.; Ali, Sharafat; Sayeed, S.; Sabri, Naseer

    2016-03-01

    In this research, the performance of optical code division multiple access (OCDMA) using differential phase shift keying (DPSK) has been compared with OCDMA On-Off Keying (OOK). This comparison took place in terms of bit error rate (BER) and receiver power where two bit rates (155 Mbps and 622 Mbps) have been used for this analysis. Using of OptiSystem 7.0 simulation, comparing eye diagram and optical spectrum alongside with BER and Rx power. It is found that OCDMA-DPSK performs better in comparison to OCDMA-OOK. The performance analysis also provides parameter for designing and development of an OCDMA system for optical access network using DPSK.

  18. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    OpenAIRE

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X aut...

  19. Community access networks: how to connect the next billion to the ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Community access networks: how to connect the next billion to the Internet ... services is a prerequisite to sustainable socio-economic development. ... It will provide case studies and formulate recommendations with respect to ... An IDRC delegation will join international delegates and city representatives at the ICLEI World ...

  20. Topology-selective jamming of fully-connected, code-division random-access networks

    Science.gov (United States)

    Polydoros, Andreas; Cheng, Unjeng

    1990-01-01

    The purpose is to introduce certain models of topology selective stochastic jamming and examine its impact on a class of fully-connected, spread-spectrum, slotted ALOHA-type random access networks. The theory covers dedicated as well as half-duplex units. The dominant role of the spatial duty factor is established, and connections with the dual concept of time selective jamming are discussed. The optimal choices of coding rate and link access parameters (from the users' side) and the jamming spatial fraction are numerically established for DS and FH spreading.

  1. Wide Area Network Access to CMS Data Using the Lustre Filesystem

    CERN Document Server

    Rodríguez, J L; Prescott, C; Wu, Y; Kim, B; Fu, Y; Bourilkov, D; Avery, P

    2009-01-01

    In this paper, we explore the use of the Lustre cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed Lustre filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with ...

  2. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.

    Science.gov (United States)

    Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen

    2018-04-28

    Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.

  3. A network collaboration implementing technology to improve medication dispensing and administration in critical access hospitals.

    Science.gov (United States)

    Wakefield, Douglas S; Ward, Marcia M; Loes, Jean L; O'Brien, John

    2010-01-01

    We report how seven independent critical access hospitals collaborated with a rural referral hospital to standardize workflow policies and procedures while jointly implementing the same health information technologies (HITs) to enhance medication care processes. The study hospitals implemented the same electronic health record, computerized provider order entry, pharmacy information systems, automated dispensing cabinets (ADC), and barcode medication administration systems. We conducted interviews and examined project documents to explore factors underlying the successful implementation of ADC and barcode medication administration across the network hospitals. These included a shared culture of collaboration; strategic sequencing of HIT component implementation; interface among HIT components; strategic placement of ADCs; disciplined use and sharing of workflow analyses linked with HIT applications; planning for workflow efficiencies; acquisition of adequate supply of HIT-related devices; and establishing metrics to monitor HIT use and outcomes.

  4. An Optimal Medium Access Control with Partial Observations for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Servetto Sergio D

    2005-01-01

    Full Text Available We consider medium access control (MAC in multihop sensor networks, where only partial information about the shared medium is available to the transmitter. We model our setting as a queuing problem in which the service rate of a queue is a function of a partially observed Markov chain representing the available bandwidth, and in which the arrivals are controlled based on the partial observations so as to keep the system in a desirable mildly unstable regime. The optimal controller for this problem satisfies a separation property: we first compute a probability measure on the state space of the chain, namely the information state, then use this measure as the new state on which the control decisions are based. We give a formal description of the system considered and of its dynamics, we formalize and solve an optimal control problem, and we show numerical simulations to illustrate with concrete examples properties of the optimal control law. We show how the ergodic behavior of our queuing model is characterized by an invariant measure over all possible information states, and we construct that measure. Our results can be specifically applied for designing efficient and stable algorithms for medium access control in multiple-accessed systems, in particular for sensor networks.

  5. Comparison of a Ring On-Chip Network and a Code-Division Multiple-Access On-Chip Network

    Directory of Open Access Journals (Sweden)

    Xin Wang

    2007-01-01

    Full Text Available Two network-on-chip (NoC designs are examined and compared in this paper. One design applies a bidirectional ring connection scheme, while the other design applies a code-division multiple-access (CDMA connection scheme. Both of the designs apply globally asynchronous locally synchronous (GALS scheme in order to deal with the issue of transferring data in a multiple-clock-domain environment of an on-chip system. The two NoC designs are compared with each other by their network structures, data transfer principles, network node structures, and their asynchronous designs. Both the synchronous and the asynchronous designs of the two on-chip networks are realized using a hardware-description language (HDL in order to make the entire designs suit the commonly used synchronous design tools and flow. The performance estimation and comparison of the two NoC designs which are based on the HDL realizations are addressed. By comparing the two NoC designs, the advantages and disadvantages of applying direct connection and CDMA connection schemes in an on-chip communication network are discussed.

  6. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    Science.gov (United States)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  7. Internet Information-Seeking and Its Relation to Support for Access to Government Records

    Science.gov (United States)

    Cuillier, David; Piotrowski, Suzanne J.

    2009-01-01

    Public access to government records is essential for democratic self-governance, and attitudes toward that right can facilitate or hinder public policy regarding transparency. As more people use the internet for gathering information about their governments and communities, it is unknown whether such online information-seeking is related to…

  8. Patients’ online access to their electronic health records and linked online services: a systematic interpretative review

    Science.gov (United States)

    de Lusignan, Simon; Mold, Freda; Sheikh, Aziz; Majeed, Azeem; Wyatt, Jeremy C; Quinn, Tom; Cavill, Mary; Gronlund, Toto Anne; Franco, Christina; Chauhan, Umesh; Blakey, Hannah; Kataria, Neha; Barker, Fiona; Ellis, Beverley; Koczan, Phil; Arvanitis, Theodoros N; McCarthy, Mary; Jones, Simon; Rafi, Imran

    2014-01-01

    Objectives To investigate the effect of providing patients online access to their electronic health record (EHR) and linked transactional services on the provision, quality and safety of healthcare. The objectives are also to identify and understand: barriers and facilitators for providing online access to their records and services for primary care workers; and their association with organisational/IT system issues. Setting Primary care. Participants A total of 143 studies were included. 17 were experimental in design and subject to risk of bias assessment, which is reported in a separate paper. Detailed inclusion and exclusion criteria have also been published elsewhere in the protocol. Primary and secondary outcome measures Our primary outcome measure was change in quality or safety as a result of implementation or utilisation of online records/transactional services. Results No studies reported changes in health outcomes; though eight detected medication errors and seven reported improved uptake of preventative care. Professional concerns over privacy were reported in 14 studies. 18 studies reported concern over potential increased workload; with some showing an increase workload in email or online messaging; telephone contact remaining unchanged, and face-to face contact staying the same or falling. Owing to heterogeneity in reporting overall workload change was hard to predict. 10 studies reported how online access offered convenience, primarily for more advantaged patients, who were largely highly satisfied with the process when clinician responses were prompt. Conclusions Patient online access and services offer increased convenience and satisfaction. However, professionals were concerned about impact on workload and risk to privacy. Studies correcting medication errors may improve patient safety. There may need to be a redesign of the business process to engage health professionals in online access and of the EHR to make it friendlier and provide equity of

  9. Bandwidth Impacts of Localizing Peer-to-Peer IP Video Traffic in Access and Aggregation Networks

    Directory of Open Access Journals (Sweden)

    Kerpez Kenneth

    2008-01-01

    Full Text Available Abstract This paper examines the burgeoning impact of peer-to-peer (P2P traffic IP video traffic. High-quality IPTV or Internet TV has high-bandwidth requirements, and P2P IP video could severely strain broadband networks. A model for the popularity of video titles is given, showing that some titles are very popular and will often be available locally; making localized P2P attractive for video titles. The bandwidth impacts of localizing P2P video to try and keep traffic within a broadband access network area or within a broadband access aggregation network area are examined. Results indicate that such highly localized P2P video can greatly lower core bandwidth usage.

  10. Protein Solvent-Accessibility Prediction by a Stacked Deep Bidirectional Recurrent Neural Network

    Directory of Open Access Journals (Sweden)

    Buzhong Zhang

    2018-05-01

    Full Text Available Residue solvent accessibility is closely related to the spatial arrangement and packing of residues. Predicting the solvent accessibility of a protein is an important step to understand its structure and function. In this work, we present a deep learning method to predict residue solvent accessibility, which is based on a stacked deep bidirectional recurrent neural network applied to sequence profiles. To capture more long-range sequence information, a merging operator was proposed when bidirectional information from hidden nodes was merged for outputs. Three types of merging operators were used in our improved model, with a long short-term memory network performing as a hidden computing node. The trained database was constructed from 7361 proteins extracted from the PISCES server using a cut-off of 25% sequence identity. Sequence-derived features including position-specific scoring matrix, physical properties, physicochemical characteristics, conservation score and protein coding were used to represent a residue. Using this method, predictive values of continuous relative solvent-accessible area were obtained, and then, these values were transformed into binary states with predefined thresholds. Our experimental results showed that our deep learning method improved prediction quality relative to current methods, with mean absolute error and Pearson’s correlation coefficient values of 8.8% and 74.8%, respectively, on the CB502 dataset and 8.2% and 78%, respectively, on the Manesh215 dataset.

  11. Protein Solvent-Accessibility Prediction by a Stacked Deep Bidirectional Recurrent Neural Network.

    Science.gov (United States)

    Zhang, Buzhong; Li, Linqing; Lü, Qiang

    2018-05-25

    Residue solvent accessibility is closely related to the spatial arrangement and packing of residues. Predicting the solvent accessibility of a protein is an important step to understand its structure and function. In this work, we present a deep learning method to predict residue solvent accessibility, which is based on a stacked deep bidirectional recurrent neural network applied to sequence profiles. To capture more long-range sequence information, a merging operator was proposed when bidirectional information from hidden nodes was merged for outputs. Three types of merging operators were used in our improved model, with a long short-term memory network performing as a hidden computing node. The trained database was constructed from 7361 proteins extracted from the PISCES server using a cut-off of 25% sequence identity. Sequence-derived features including position-specific scoring matrix, physical properties, physicochemical characteristics, conservation score and protein coding were used to represent a residue. Using this method, predictive values of continuous relative solvent-accessible area were obtained, and then, these values were transformed into binary states with predefined thresholds. Our experimental results showed that our deep learning method improved prediction quality relative to current methods, with mean absolute error and Pearson's correlation coefficient values of 8.8% and 74.8%, respectively, on the CB502 dataset and 8.2% and 78%, respectively, on the Manesh215 dataset.

  12. Experimental demonstration of large capacity WSDM optical access network with multicore fibers and advanced modulation formats.

    Science.gov (United States)

    Li, Borui; Feng, Zhenhua; Tang, Ming; Xu, Zhilin; Fu, Songnian; Wu, Qiong; Deng, Lei; Tong, Weijun; Liu, Shuang; Shum, Perry Ping

    2015-05-04

    Towards the next generation optical access network supporting large capacity data transmission to enormous number of users covering a wider area, we proposed a hybrid wavelength-space division multiplexing (WSDM) optical access network architecture utilizing multicore fibers with advanced modulation formats. As a proof of concept, we experimentally demonstrated a WSDM optical access network with duplex transmission using our developed and fabricated multicore (7-core) fibers with 58.7km distance. As a cost-effective modulation scheme for access network, the optical OFDM-QPSK signal has been intensity modulated on the downstream transmission in the optical line terminal (OLT) and it was directly detected in the optical network unit (ONU) after MCF transmission. 10 wavelengths with 25GHz channel spacing from an optical comb generator are employed and each wavelength is loaded with 5Gb/s OFDM-QPSK signal. After amplification, power splitting, and fan-in multiplexer, 10-wavelength downstream signal was injected into six outer layer cores simultaneously and the aggregation downstream capacity reaches 300 Gb/s. -16 dBm sensitivity has been achieved for 3.8 × 10-3 bit error ratio (BER) with 7% Forward Error Correction (FEC) limit for all wavelengths in every core. Upstream signal from ONU side has also been generated and the bidirectional transmission in the same core causes negligible performance degradation to the downstream signal. As a universal platform for wired/wireless data access, our proposed architecture provides additional dimension for high speed mobile signal transmission and we hence demonstrated an upstream delivery of 20Gb/s per wavelength with QPSK modulation formats using the inner core of MCF emulating a mobile backhaul service. The IQ modulated data was coherently detected in the OLT side. -19 dBm sensitivity has been achieved under the FEC limit and more than 18 dB power budget is guaranteed.

  13. QoS Provisioning Techniques for Future Fiber-Wireless (FiWi Access Networks

    Directory of Open Access Journals (Sweden)

    Martin Maier

    2010-04-01

    Full Text Available A plethora of enabling optical and wireless access-metro network technologies have been emerging that can be used to build future-proof bimodal fiber-wireless (FiWi networks. Hybrid FiWi networks aim at providing wired and wireless quad-play services over the same infrastructure simultaneously and hold great promise to mitigate the digital divide and change the way we live and work by replacing commuting with teleworking. After overviewing enabling optical and wireless network technologies and their QoS provisioning techniques, we elaborate on enabling radio-over-fiber (RoF and radio-and-fiber (R&F technologies. We describe and investigate new QoS provisioning techniques for future FiWi networks, ranging from traffic class mapping, scheduling, and resource management to advanced aggregation techniques, congestion control, and layer-2 path selection algorithms.

  14. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  15. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  16. A novel root-index based prioritized random access scheme for 5G cellular networks

    Directory of Open Access Journals (Sweden)

    Taehoon Kim

    2015-12-01

    Full Text Available Cellular networks will play an important role in realizing the newly emerging Internet-of-Everything (IoE. One of the challenging issues is to support the quality of service (QoS during the access phase, while accommodating a massive number of machine nodes. In this paper, we show a new paradigm of multiple access priorities in random access (RA procedure and propose a novel root-index based prioritized random access (RIPRA scheme that implicitly embeds the access priority in the root index of the RA preambles. The performance evaluation shows that the proposed RIPRA scheme can successfully support differentiated performance for different access priority levels, even though there exist a massive number of machine nodes.

  17. Open Access Forever -- Or Five Years, Whichever Comes First: Progress on Preserving the Digital Scholarly Record

    CERN Multimedia

    CERN. Geneva

    2007-01-01

    As the migration of scholarly communication from print to digital continues to progress rapidly, and as Open Access to that research literature and related data becomes more common, the challenges of insuring that the scholarly record remain available over time becomes more urgent. There has been good progress on those challenges in recent years, but many problems remain. The current state of the curation and preservation of digital scholarship over its entire lifecycle will be reviewed, and progress on problems of specific interest to scholarly communication will be examined. The difficulty of curating the digital scholarly record and preserving it for future generations has important implications for the movement to make that record more open and accessible to the world, so this a timely topic for those who are interested in the future of scholarly communication. View Mackensie Smith's biography

  18. Open Access Forever - Or Five Years, Whichever Comes First Progress on Preserving the Digital Scholarly Record

    CERN Document Server

    CERN. Geneva; Bjørnshauge, Lars

    2007-01-01

    As the migration of scholarly communication from print to digital continues to progress rapidly, and as Open Access to that research literature and related data becomes more common, the challenges of insuring that the scholarly record remain available over time becomes more urgent. There has been good progress on those challenges in recent years, but many problems remain. The current state of the curation and preservation of digital scholarship over its entire lifecycle will be reviewed, and progress on problems of specific interest to scholarly communication will be examined. The difficulty of curating the digital scholarly record and preserving it for future generations has important implications for the movement to make that record more open and accessible to the world, so this a timely topic for those who are interested in the future of scholarly communication.

  19. Gift-giving and network structure in rural China: utilizing long-term spontaneous gift records.

    Science.gov (United States)

    Chen, Xi

    2014-01-01

    The tradition of keeping written records of gift received during household ceremonies in many countries offers researchers an underutilized means of data collection for social network analysis. This paper first summarizes unique features of the gift record data that circumvent five prevailing sampling and measurement issues in the literature, and we discuss their advantages over existing studies at both the individual level and the dyadic link level using previous data sources. We then document our research project in rural China that implements a multiple wave census-type household survey and a long-term gift record collection. The pattern of gift-giving in major household social events and its recent escalation is analyzed. There are significantly positive correlations between gift network centrality and various forms of informal insurance. Finally, economic inequality and competitive marriage market are among the main demographic and socioeconomic determinants of the observed gift network structure.

  20. Support networks and people with physical disabilities: social inclusion and access to health services.

    Science.gov (United States)

    Holanda, Cristina Marques de Almeida; De Andrade, Fabienne Louise Juvêncio Paes; Bezerra, Maria Aparecida; Nascimento, João Paulo da Silva; Neves, Robson da Fonseca; Alves, Simone Bezerra; Ribeiro, Kátia Suely Queiroz Silva

    2015-01-01

    This study seeks to identify the formation of social support networks of people with physical disabilities, and how these networks can help facilitate access to health services and promote social inclusion. It is a cross-sectional study, with data collected via a form applied to physically disabled persons over eighteen years of age registered with the Family Health Teams of the municipal district of João Pessoa in the state of Paraíba. It was observed that the support networks of these individuals predominantly consist of family members (parents, siblings, children, spouses) and people outside the family (friends and neighbors). However, 50% of the interviewees declared that they could not count on any support from outside the family. It was observed that the support network contributes to access to the services and participation in social groups. However, reduced social inclusion was detected, due to locomotion difficulties, this being the main barrier to social interaction. Among those individuals who began to interact in society, the part played by social support was fundamental.

  1. Understanding the patient perspective on research access to national health records databases for conduct of randomized registry trials.

    Science.gov (United States)

    Avram, Robert; Marquis-Gravel, Guillaume; Simard, François; Pacheco, Christine; Couture, Étienne; Tremblay-Gravel, Maxime; Desplantie, Olivier; Malhamé, Isabelle; Bibas, Lior; Mansour, Samer; Parent, Marie-Claude; Farand, Paul; Harvey, Luc; Lessard, Marie-Gabrielle; Ly, Hung; Liu, Geoffrey; Hay, Annette E; Marc Jolicoeur, E

    2018-07-01

    Use of health administrative databases is proposed for screening and monitoring of participants in randomized registry trials. However, access to these databases raises privacy concerns. We assessed patient's preferences regarding use of personal information to link their research records with national health databases, as part of a hypothetical randomized registry trial. Cardiology patients were invited to complete an anonymous self-reported survey that ascertained preferences related to the concept of accessing government health databases for research, the type of personal identifiers to be shared and the type of follow-up preferred as participants in a hypothetical trial. A total of 590 responders completed the survey (90% response rate), the majority of which were Caucasians (90.4%), male (70.0%) with a median age of 65years (interquartile range, 8). The majority responders (80.3%) would grant researchers access to health administrative databases for screening and follow-up. To this end, responders endorsed the recording of their personal identifiers by researchers for future record linkage, including their name (90%), and health insurance number (83.9%), but fewer responders agreed with the recording of their social security number (61.4%, pgranting researchers access to the administrative databases (OR: 1.69, 95% confidence interval: 1.03-2.90; p=0.04). The majority of Cardiology patients surveyed were supportive of use of their personal identifiers to access administrative health databases and conduct long-term monitoring in the context of a randomized registry trial. Copyright © 2018 Elsevier Ireland Ltd. All rights reserved.

  2. Constructing a two bands optical code-division multiple-access network of bipolar optical access codecs using Walsh-coded liquid crystal modulators

    Science.gov (United States)

    Yen, Chih-Ta; Huang, Jen-Fa; Chih, Ping-En

    2014-08-01

    We propose and experimentally demonstrated the two bands optical code-division multiple-access (OCDMA) network over bipolar Walsh-coded liquid-crystal modulators (LCMs) and driven by green light and red light lasers. Achieving system performance depends on the construction of a decoder that implements a true bipolar correlation using only unipolar signals and intensity detection for each band. We took advantage of the phase delay characteristics of LCMs to construct a prototype optical coder/decoder (codec). Matched and unmatched Walsh signature codes were evaluated to detect correlations among multiuser data in the access network. By using LCMs, a red and green laser light source was spectrally encoded and the summed light dots were complementary decoded. Favorable contrast on auto- and cross-correlations indicates that binary information symbols can be properly recovered using a balanced photodetector.

  3. New resource allocation scheme for cognitive relay networks with opportunistic access

    KAUST Repository

    Zafar, Ammar

    2012-06-01

    In this paper, a new resource allocation scheme to minimize Symbol Error rate (SER) for relay assisted cognitive radio networks is studied. A cognitive relay network with amplify-and-forward (AF) fixed gain relays and opportunistic access to the licensed spectrum is considered. The SER objective function and the optimization constraints are derived first. The resource allocation algorithm is then derived using the Langrangian multiplier method. Closed form expressions are derived for the source and relay powers and, symbol time. Analytical results show that the optimal power allocation follows an extended water-filling solution. © 2012 IEEE.

  4. De-optical-line-terminal hybrid access-aggregation optical network for time-sensitive services based on software-defined networking orchestration

    Science.gov (United States)

    Bai, Wei; Yang, Hui; Xiao, Hongyun; Yu, Ao; He, Linkuan; Zhang, Jie; Li, Zhen; Du, Yi

    2017-11-01

    With the increase in varieties of services in network, time-sensitive services (TSSs) appear and bring forward an impending need for delay performance. Ultralow-latency communication has become one of the important development goals for many scenarios in the coming 5G era (e.g., robotics and driverless cars). However, the conventional methods, which decrease delay by promoting the available resources and the network transmission speed, have limited effect; a new breakthrough for ultralow-latency communication is necessary. We propose a de-optical-line-terminal (De-OLT) hybrid access-aggregation optical network (DAON) for TSS based on software-defined networking (SDN) orchestration. In this network, low-latency all-optical communication based on optical burst switching can be achieved by removing OLT. For supporting this network and guaranteeing the quality of service for TSSs, we design SDN-driven control method and service provision method. Numerical results demonstrate the proposed DAON promotes network service efficiency and avoids traffic congestion.

  5. The role and benefits of accessing primary care patient records during unscheduled care: a systematic review.

    Science.gov (United States)

    Bowden, Tom; Coiera, Enrico

    2017-09-22

    The purpose of this study was to assess the impact of accessing primary care records on unscheduled care. Unscheduled care is typically delivered in hospital Emergency Departments. Studies published to December 2014 reporting on primary care record access during unscheduled care were retrieved. Twenty-two articles met inclusion criteria from a pool of 192. Many shared electronic health records (SEHRs) were large in scale, servicing many millions of patients. Reported utilization rates by clinicians was variable, with rates >20% amongst health management organizations but much lower in nation-scale systems. No study reported on clinical outcomes or patient safety, and no economic studies of SEHR access during unscheduled care were available. Design factors that may affect utilization included consent and access models, SEHR content, and system usability and reliability. Despite their size and expense, SEHRs designed to support unscheduled care have been poorly evaluated, and it is not possible to draw conclusions about any likely benefits associated with their use. Heterogeneity across the systems and the populations they serve make generalization about system design or performance difficult. None of the reviewed studies used a theoretical model to guide evaluation. Value of Information models may be a useful theoretical approach to design evaluation metrics, facilitating comparison across systems in future studies. Well-designed SEHRs should in principle be capable of improving the efficiency, quality and safety of unscheduled care, but at present the evidence for such benefits is weak, largely because it has not been sought.

  6. Evaluating the Impact of China’s Rail Network Expansions on Local Accessibility: A Market Potential Approach

    Directory of Open Access Journals (Sweden)

    Wenjie Wu

    2016-05-01

    Full Text Available This paper uses a market potential approach to examine the evolution of the rail transport network of China and its spatial distributional impacts on local accessibility, with a particular focus on high-speed rail improvements. Accessibility is measured by using a “market potential” function that was derived from the general equilibrium model of the economic geography literature, and is empirically calculated based on Geographical Information System (GIS techniques. A key finding, albeit from a highly stylized model, is that rail improvements may help raise territorial polarizing patterns across counties. The results point to the profound implications of railroad network expansion on the accessibility dynamics in periphery regions relative to core regions.

  7. Patient experiences with full electronic access to health records and clinical notes through the My HealtheVet Personal Health Record Pilot: qualitative study.

    Science.gov (United States)

    Woods, Susan S; Schwartz, Erin; Tuepker, Anais; Press, Nancy A; Nazi, Kim M; Turvey, Carolyn L; Nichol, W Paul

    2013-03-27

    Full sharing of the electronic health record with patients has been identified as an important opportunity to engage patients in their health and health care. The My HealtheVet Pilot, the initial personal health record of the US Department of Veterans Affairs, allowed patients and their delegates to view and download content in their electronic health record, including clinical notes, laboratory tests, and imaging reports. A qualitative study with purposeful sampling sought to examine patients' views and experiences with reading their health records, including their clinical notes, online. Five focus group sessions were conducted with patients and family members who enrolled in the My HealtheVet Pilot at the Portland Veterans Administration Medical Center, Oregon. A total of 30 patients enrolled in the My HealtheVet Pilot, and 6 family members who had accessed and viewed their electronic health records participated in the sessions. Four themes characterized patient experiences with reading the full complement of their health information. Patients felt that seeing their records positively affected communication with providers and the health system, enhanced knowledge of their health and improved self-care, and allowed for greater participation in the quality of their care such as follow-up of abnormal test results or decision-making on when to seek care. While some patients felt that seeing previously undisclosed information, derogatory language, or inconsistencies in their notes caused challenges, they overwhelmingly felt that having more, rather than less, of their health record information provided benefits. Patients and their delegates had predominantly positive experiences with health record transparency and the open sharing of notes and test results. Viewing their records appears to empower patients and enhance their contributions to care, calling into question common provider concerns about the effect of full record access on patient well-being. While shared

  8. Hybrid Scheduling/Signal-Level Coordination in the Downlink of Multi-Cloud Radio-Access Networks

    KAUST Repository

    Douik, Ahmed

    2016-03-28

    In the context of resource allocation in cloud- radio access networks, recent studies assume either signal-level or scheduling-level coordination. This paper, instead, considers a hybrid level of coordination for the scheduling problem in the downlink of a multi-cloud radio- access network, so as to benefit from both scheduling policies. Consider a multi-cloud radio access network, where each cloud is connected to several base-stations (BSs) via high capacity links, and therefore allows joint signal processing between them. Across the multiple clouds, however, only scheduling-level coordination is permitted, as it requires a lower level of backhaul communication. The frame structure of every BS is composed of various time/frequency blocks, called power- zones (PZs), and kept at fixed power level. The paper addresses the problem of maximizing a network-wide utility by associating users to clouds and scheduling them to the PZs, under the practical constraints that each user is scheduled, at most, to a single cloud, but possibly to many BSs within the cloud, and can be served by one or more distinct PZs within the BSs\\' frame. The paper solves the problem using graph theory techniques by constructing the conflict graph. The scheduling problem is, then, shown to be equivalent to a maximum- weight independent set problem in the constructed graph, in which each vertex symbolizes an association of cloud, user, BS and PZ, with a weight representing the utility of that association. Simulation results suggest that the proposed hybrid scheduling strategy provides appreciable gain as compared to the scheduling-level coordinated networks, with a negligible degradation to signal-level coordination.

  9. Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

    Directory of Open Access Journals (Sweden)

    Ming Luo

    2018-01-01

    Full Text Available Nowadays wireless sensor network (WSN is increasingly being used in the Internet of Things (IoT for data collection, and design of an access control scheme that allows an Internet user as part of IoT to access the WSN becomes a hot topic. A lot of access control schemes have been proposed for the WSNs in the context of the IoT. Nevertheless, almost all of these schemes assume that communication nodes in different network domains share common system parameters, which is not suitable for cross-domain IoT environment in practical situations. To solve this shortcoming, we propose a more secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the Internet of Things, which allows an Internet user in a certificateless cryptography (CLC environment to communicate with a sensor node in an identity-based cryptography (IBC environment with different system parameters. Moreover, our proposed scheme achieves known session-specific temporary information security (KSSTIS that most of access control schemes cannot satisfy. Performance analysis is given to show that our scheme is well suited for wireless sensor networks in the cross-domain context of the IoT.

  10. Client perceptions of the mental health engagement network: a qualitative analysis of an electronic personal health record.

    Science.gov (United States)

    Forchuk, Cheryl; Reiss, Jeffrey P; O'Regan, Tony; Ethridge, Paige; Donelle, Lorie; Rudnick, Abraham

    2015-10-14

    Information technologies such as websites, mobile phone applications, and virtual reality programs have been shown to deliver innovative and effective treatments for mental illness. Much of the research studying electronic mental health interventions focuses on symptom reduction; however, to facilitate the implementation of electronic interventions in usual mental health care, it is also important to investigate the perceptions of clients who will be using the technologies. To this end, a qualitative analysis of focus group discussions regarding the Mental Health Engagement Network, a web-based personal health record and smartphone intervention, is presented here. Individuals living in the community with a mood or psychotic disorder (n = 394) were provided with a smartphone and access to an electronic personal health record, the Lawson SMART Record, for 12 to 18 months to manage their mental health. This study employed a delayed-implementation design and obtained both quantitative and qualitative data through individual interviews and focus group sessions. Participants had the opportunity to participate in voluntary focus group sessions at three points throughout the study to discuss their perceptions of the technologies. Qualitative data from 95 focus group participants were analysed using a thematic analysis. Four overarching themes emerged from focus group discussions: 1) Versatile functionality of the Lawson SMART Record and smartphone facilitated use; 2) Aspects of the technologies as barriers to use; 3) Use of the Mental health Engagement Network technologies resulted in perceived positive outcomes; 4) Future enhancement of the Lawson SMART Record and intervention is recommended. These qualitative data provide a valuable contribution to the understanding of how smarttechnologies can be integrated into usual mental health care. Smartphones are extremely portable andcommonplace in society. Therefore, clients can use these devices to manage and track mental

  11. Widening access to un dergraduate physiotherapy education in South Africa - pointers from students’ records

    Directory of Open Access Journals (Sweden)

    S.L. Amosun

    2012-12-01

    Full Text Available In response to the state mandate to improve access and equityin higher education, the admission policy of universities in South Africa (SAcurrently employs measures for the redress of past inequalities and racialinjustices. As there is no information on the processes to widen access toundergraduate physiotherapy education program in SA, the aim of this reportedstudy was to search for pointers from students’ records in one local university,situated in the Western Province of SA, that would inform the development ofstrategies that will widen the access for previously disadvantaged populationgroups and ensure successful academic outcomes. The records of six cohorts of students who earlier applied for andlater enrolled in the undergraduate physiotherapy program between the years 2000 and 2005 were retrospectivelyreviewed. Information pertaining to access, student characteristics, and academic persistence was extracted, reviewedand analysed descriptively. During the period reviewed, approximately equal numbers of Black and non-Black studentsapplied for admission to the program. The proportion of Black applicants meeting minimum admission requirementswas less than half of the White/Asian applicants. Less than 50% (105/212 of the offers made to Black applicantswere accepted. Forty one percent (43/105 of the enrolled Black students successfully completed the program withinthe minimum 4 years compared to 75.5% (145/192 of the White/Asian students. Strategies should be implementedto increase awareness and recruitment, improve enrolment rates, and improve retention and throughput for Blackstudents in the undergraduate physiotherapy program of a historically “white” SA university.

  12. Records working in libraries of federal universities: ethics, politics and access to information

    Directory of Open Access Journals (Sweden)

    Ana Carolina de Souza Caetano

    2015-09-01

    Full Text Available Introduction: The librarian work also relates to the registrations of their working procedures. In addition to the efficiency in the management and consistency of work, they give transparency to the guidelines and choices made, and allow periodic reassessment of the shares. Classical authors, who conceptualize the document, emphasize the importance of the act of documenting. Objectives: Maps the existence of records of employment policies, and actions, in Brazilian federal universities libraries and inquire about the ethical problems, and of the lack of access to information in his absence. Methodology: Mapping the sites of fifty-seven federal universities libraries searching the provision of official records containing policies, plans, manuals, user guides, regulations, among others. Results: 57% of libraries do not offer any kind of record. The greater supply of different working documents is found in the libraries of the Southeast and South. But still, 41% of them does not provide any kind of document. The lack of transparency can create opportunities of injustices and even unethical actions. Conclusions: Among the reasons for not document we find the lack of clear guidelines on official documents to drive the profession and the university librarians. It contradicts the principle of the law of access to information and shown inconsistent with professionals and institutions that would theoretically primary obligation to do it.

  13. Using Call Detail Records for Modeling Coastal Recreation Behavior

    Science.gov (United States)

    Call data records (CDR) are data from cellular phone networks that can be used to understand human mobility or where people go spatially. They can be used to estimate visitation to an area such as a coastal access point for a given time window, as well as provide information on t...

  14. Access, engagement, networks, and norms: Dimensions of social capital at work in a first grade classroom

    Science.gov (United States)

    Wexler-Robock, Stephanie

    Social capital refers to access and use of resources available through one's networks to solve problems, and the norms that reflect inclusive or exclusive access to those networks and resources. Research has found positive relationships between social capital, academic achievement, and attainment. Studies, however, have generally examined social capital through factors that occur outside the classroom; students who have social capital, acquired through their family and community relationships, seem to be more successful academically. Limited research has explored what if any factors within the classroom might impact the production, and nature of social capital, or its workings in a classroom. The purpose of this study was to explore the workings and nature of classroom social capital, including its possible relationships to engagement and cognition among 5 student participants. Using methods of qualitative data collection, mixed methods were used to analyze information resources, participants' networking, student work, and classroom discourse. Eight interdependent networking factors and 3 overarching patterns of norms were discovered. The networking factors reflected the structure, content, processes, purposes, and acceptability of participants' networking. The norms, also working interdependently, appeared to promote or inhibit among other things, engagement in networking, help seeking, access, sharing, and intertextual use of diverse, often complex sources of information. Through interaction of the 8 factors and 3 overarching norms, ongoing outcomes of networking appeared to include the creation of bridging (inclusive) and bonding (exclusive) forms of social capital, and depth of scientific conceptual understanding, in this case, about birds. Bridging social capital appeared related to willingness to engage in strong and weak tie networking, help seeking, intertextuality, and possibly to mastery goal orientation for all participants, regardless of reading level

  15. The obligation of double record of the plea agreement and the access by technical defense

    Directory of Open Access Journals (Sweden)

    Luiz Antonio Borri

    2017-03-01

    Full Text Available This article aims to discuss the relevant subject of double record of plea agreement, as well as the possibility of withholding access to one of the registration forms from the investigated/accused person. The matter is highlighted notably in face of the article writing 4, §13, of Law 12.850 / 13, which provides that, whenever possible, should promote the registration record by audiovisual means, indicating expressly of registration of the statements collected in collaboration. In addition, current data indicate the existence of a significant number of new technologies, endowed with skillful mechanisms to promote the registration of declarations by the means provided by law, indicating that the legal authorities have the onus to justify the reasons that lead to the unavailability of audiovisual record of the award-winning collaborator testimony. Finally, it is salutary to make available to defense all forms of registration of the declarations obtained in the case of delation, mainly because the Public Prosecutor's Office has knowledge of such elements, so that the restriction of access implies violation of parity of arms.

  16. Large-scale, high-resolution multielectrode-array recording depicts functional network differences of cortical and hippocampal cultures.

    Directory of Open Access Journals (Sweden)

    Shinya Ito

    Full Text Available Understanding the detailed circuitry of functioning neuronal networks is one of the major goals of neuroscience. Recent improvements in neuronal recording techniques have made it possible to record the spiking activity from hundreds of neurons simultaneously with sub-millisecond temporal resolution. Here we used a 512-channel multielectrode array system to record the activity from hundreds of neurons in organotypic cultures of cortico-hippocampal brain slices from mice. To probe the network structure, we employed a wavelet transform of the cross-correlogram to categorize the functional connectivity in different frequency ranges. With this method we directly compare, for the first time, in any preparation, the neuronal network structures of cortex and hippocampus, on the scale of hundreds of neurons, with sub-millisecond time resolution. Among the three frequency ranges that we investigated, the lower two frequency ranges (gamma (30-80 Hz and beta (12-30 Hz range showed similar network structure between cortex and hippocampus, but there were many significant differences between these structures in the high frequency range (100-1000 Hz. The high frequency networks in cortex showed short tailed degree-distributions, shorter decay length of connectivity density, smaller clustering coefficients, and positive assortativity. Our results suggest that our method can characterize frequency dependent differences of network architecture from different brain regions. Crucially, because these differences between brain regions require millisecond temporal scales to be observed and characterized, these results underscore the importance of high temporal resolution recordings for the understanding of functional networks in neuronal systems.

  17. Nonadditivity of quantum capacities of quantum multiple-access channels and the butterfly network

    International Nuclear Information System (INIS)

    Huang Peng; He Guangqiang; Zhu Jun; Zeng Guihua

    2011-01-01

    Multipartite quantum information transmission without additional classical resources is investigated. We show purely quantum superadditivity of quantum capacity regions of quantum memoryless multiple-access (MA) channels, which are not entanglement breaking. Also, we find that the superadditivity holds when the MA channel extends to the quantum butterfly network, which can achieve quantum network coding. The present widespread effects for the channels which enable entanglement distribution have not been revealed for multipartite scenarios.

  18. Cost- and reliability-oriented aggregation point association in long-term evolution and passive optical network hybrid access infrastructure for smart grid neighborhood area network

    Science.gov (United States)

    Cheng, Xiao; Feng, Lei; Zhou, Fanqin; Wei, Lei; Yu, Peng; Li, Wenjing

    2018-02-01

    With the rapid development of the smart grid, the data aggregation point (AP) in the neighborhood area network (NAN) is becoming increasingly important for forwarding the information between the home area network and wide area network. Due to limited budget, it is unable to use one-single access technology to meet the ongoing requirements on AP coverage. This paper first introduces the wired and wireless hybrid access network with the integration of long-term evolution (LTE) and passive optical network (PON) system for NAN, which allows a good trade-off among cost, flexibility, and reliability. Then, based on the already existing wireless LTE network, an AP association optimization model is proposed to make the PON serve as many APs as possible, considering both the economic efficiency and network reliability. Moreover, since the features of the constraints and variables of this NP-hard problem, a hybrid intelligent optimization algorithm is proposed, which is achieved by the mixture of the genetic, ant colony and dynamic greedy algorithm. By comparing with other published methods, simulation results verify the performance of the proposed method in improving the AP coverage and the performance of the proposed algorithm in terms of convergence.

  19. Computer application for database management and networking of service radio physics

    International Nuclear Information System (INIS)

    Ferrando Sanchez, A.; Cabello Murillo, E.; Diaz Fuentes, R.; Castro Novais, J.; Clemente Gutierrez, F.; Casa de Juan, M. A. de la; Adaimi Hernandez, P.

    2011-01-01

    The databases in the quality control prove to be a powerful tool for recording, management and statistical process control. Developed in a Windows environment and under Access (Micros of Office) our service implements this philosophy on the canter's computer network. A computer that acts as the server provides the database to the treatment units to record quality control measures daily and incidents. To remove shortcuts stop working with data migration, possible use of duplicate and erroneous data loss because of errors in network connections, which are common problems, we proceeded to manage connections and access to databases ease of maintenance and use horn to all service personnel.

  20. Patients' online access to their electronic health records and linked online services: a systematic interpretative review.

    Science.gov (United States)

    de Lusignan, Simon; Mold, Freda; Sheikh, Aziz; Majeed, Azeem; Wyatt, Jeremy C; Quinn, Tom; Cavill, Mary; Gronlund, Toto Anne; Franco, Christina; Chauhan, Umesh; Blakey, Hannah; Kataria, Neha; Barker, Fiona; Ellis, Beverley; Koczan, Phil; Arvanitis, Theodoros N; McCarthy, Mary; Jones, Simon; Rafi, Imran

    2014-09-08

    To investigate the effect of providing patients online access to their electronic health record (EHR) and linked transactional services on the provision, quality and safety of healthcare. The objectives are also to identify and understand: barriers and facilitators for providing online access to their records and services for primary care workers; and their association with organisational/IT system issues. Primary care. A total of 143 studies were included. 17 were experimental in design and subject to risk of bias assessment, which is reported in a separate paper. Detailed inclusion and exclusion criteria have also been published elsewhere in the protocol. Our primary outcome measure was change in quality or safety as a result of implementation or utilisation of online records/transactional services. No studies reported changes in health outcomes; though eight detected medication errors and seven reported improved uptake of preventative care. Professional concerns over privacy were reported in 14 studies. 18 studies reported concern over potential increased workload; with some showing an increase workload in email or online messaging; telephone contact remaining unchanged, and face-to face contact staying the same or falling. Owing to heterogeneity in reporting overall workload change was hard to predict. 10 studies reported how online access offered convenience, primarily for more advantaged patients, who were largely highly satisfied with the process when clinician responses were prompt. Patient online access and services offer increased convenience and satisfaction. However, professionals were concerned about impact on workload and risk to privacy. Studies correcting medication errors may improve patient safety. There may need to be a redesign of the business process to engage health professionals in online access and of the EHR to make it friendlier and provide equity of access to a wider group of patients. A1 SYSTEMATIC REVIEW REGISTRATION NUMBER: PROSPERO

  1. The Effects of a Dynamic Spectrum Access Overlay in LTE-Advanced Networks

    Energy Technology Data Exchange (ETDEWEB)

    Juan D. Deaton; Ryan E. lrwin; Luiz A. DaSilva

    2011-05-01

    As early as 2014, wireless network operators spectral capacity will be overwhelmed by a data tsunami brought on by new devices and applications. To augment spectral capacity, operators could deploy a Dynamic Spectrum Access (DSA) overlay. In the light of the many planned Long Term Evolution (LTE) network deployments, the affects of a DSA overlay have not been fully considered into the existing LTE standards. Coalescing many different aspects of DSA, this paper develops the Spectrum Accountability (SA) framework. The SA framework defines specific network element functionality, protocol interfaces, and signaling flow diagrams for LTE to support service requests and enforce rights of responsibilities of primary and secondary users, respectively. We also include a network simulation to quantify the benefits of using DSA channels to augment capacity. Based on our simulation we show that, network operators can benefit up to %40 increase in operating capacity when sharing DSA bands to augment spectral capacity. With our framework, this paper could serve as an guide in developing future LTE network standards that include DSA.

  2. Improving collaboration between primary care research networks using Access Grid technology

    Directory of Open Access Journals (Sweden)

    Zsolt Nagykaldi

    2008-05-01

    Full Text Available Access Grid (AG is an Internet2-driven, high performance audio_visual conferencing technology used worldwide by academic and government organisations to enhance communication, human interaction and group collaboration. AG technology is particularly promising for improving academic multi-centre research collaborations. This manuscript describes how the AG technology was utilised by the electronic Primary Care Research Network (ePCRN that is part of the National Institutes of Health (NIH Roadmap initiative to improve primary care research and collaboration among practice- based research networks (PBRNs in the USA. It discusses the design, installation and use of AG implementations, potential future applications, barriers to adoption, and suggested solutions.

  3. Physicists set new record for network data transfer

    CERN Multimedia

    2006-01-01

    "An internatinal team of physicists, computer scientists, and network engineers led by the California Institute of Technology, CERN and the University of Michigan and partners at the University of Florida and Vanderbilt, as well as participants from Brazil (Rio de Janeiro State University, UERJ, and the State Universities of Sao Paulo, USP and UNESP) and Korea (Kyungpook National University, KISTI) joined forces to set new records for sustained data transfer between storage systems during the SuperComputing 2006 (SC06) Bandwidth Challenge (BWC)." (2 pages)

  4. Centralized light-source optical access network based on polarization multiplexing.

    Science.gov (United States)

    Grassi, Fulvio; Mora, José; Ortega, Beatriz; Capmany, José

    2010-03-01

    This paper presents and demonstrates a centralized light source optical access network based on optical polarization multiplexing technique. By using two optical sources emitting light orthogonally polarized in the Central Node for downstream and upstream operations, the Remote Node is kept source-free. EVM values below telecommunication standard requirements have been measured experimentally when bidirectional digital signals have been transmitted over 10 km of SMF employing subcarrier multiplexing technique in the electrical domain.

  5. Convergent optical wired and wireless long-reach access network using high spectral-efficient modulation.

    Science.gov (United States)

    Chow, C W; Lin, Y H

    2012-04-09

    To provide broadband services in a single and low cost perform, the convergent optical wired and wireless access network is promising. Here, we propose and demonstrate a convergent optical wired and wireless long-reach access networks based on orthogonal wavelength division multiplexing (WDM). Both the baseband signal and the radio-over-fiber (ROF) signal are multiplexed and de-multiplexed in optical domain, hence it is simple and the operation speed is not limited by the electronic bottleneck caused by the digital signal processing (DSP). Error-free de-multiplexing and down-conversion can be achieved for all the signals after 60 km (long-reach) fiber transmission. The scalability of the system for higher bit-rate (60 GHz) is also simulated and discussed.

  6. Patient access to complex chronic disease records on the Internet

    Directory of Open Access Journals (Sweden)

    Bartlett Cherry

    2012-08-01

    Full Text Available Abstract Background Access to medical records on the Internet has been reported to be acceptable and popular with patients, although most published evaluations have been of primary care or office-based practice. We tested the feasibility and acceptability of making unscreened results and data from a complex chronic disease pathway (renal medicine available to patients over the Internet in a project involving more than half of renal units in the UK. Methods Content and presentation of the Renal PatientView (RPV system was developed with patient groups. It was designed to receive information from multiple local information systems and to require minimal extra work in units. After piloting in 4 centres in 2005 it was made available more widely. Opinions were sought from both patients who enrolled and from those who did not in a paper survey, and from staff in an electronic survey. Anonymous data on enrolments and usage were extracted from the webserver. Results By mid 2011 over 17,000 patients from 47 of the 75 renal units in the UK had registered. Users had a wide age range (90 yrs but were younger and had more years of education than non-users. They were enthusiastic about the concept, found it easy to use, and 80% felt it gave them a better understanding of their disease. The most common reason for not enrolling was being unaware of the system. A minority of patients had security concerns, and these were reduced after enrolling. Staff responses were also strongly positive. They reported that it aided patient concordance and disease management, and increased the quality of consultations with a neutral effect on consultation length. Neither patient nor staff responses suggested that RPV led to an overall increase in patient anxiety or to an increased burden on renal units beyond the time required to enrol each patient. Conclusions Patient Internet access to secondary care records concerning a complex chronic disease is feasible and popular

  7. Patient access to complex chronic disease records on the Internet.

    Science.gov (United States)

    Bartlett, Cherry; Simpson, Keith; Turner, A Neil

    2012-08-06

    Access to medical records on the Internet has been reported to be acceptable and popular with patients, although most published evaluations have been of primary care or office-based practice. We tested the feasibility and acceptability of making unscreened results and data from a complex chronic disease pathway (renal medicine) available to patients over the Internet in a project involving more than half of renal units in the UK. Content and presentation of the Renal PatientView (RPV) system was developed with patient groups. It was designed to receive information from multiple local information systems and to require minimal extra work in units. After piloting in 4 centres in 2005 it was made available more widely. Opinions were sought from both patients who enrolled and from those who did not in a paper survey, and from staff in an electronic survey. Anonymous data on enrollment and usage were extracted from the webserver. By mid 2011 over 17,000 patients from 47 of the 75 renal units in the UK had registered. Users had a wide age range (90 yrs) but were younger and had more years of education than non-users. They were enthusiastic about the concept, found it easy to use, and 80% felt it gave them a better understanding of their disease. The most common reason for not enrolling was being unaware of the system. A minority of patients had security concerns, and these were reduced after enrolling. Staff responses were also strongly positive. They reported that it aided patient concordance and disease management, and increased the quality of consultations with a neutral effect on consultation length. Neither patient nor staff responses suggested that RPV led to an overall increase in patient anxiety or to an increased burden on renal units beyond the time required to enroll each patient. Patient Internet access to secondary care records concerning a complex chronic disease is feasible and popular, providing an increased sense of empowerment and understanding, with no

  8. Optical CDMA and WDMA in the access network

    Science.gov (United States)

    Sargent, Edward H.; Stok, Andrew

    2003-08-01

    Optical CDMA provides one avenue to sharing the vast bandwidth of optical fiber among a number of active users in a network. In this work we address two questions central to considering the areas of applicability of CDMA in optics: (1) How do we compare fairly optical CDMA codes of different families, and what do we conclude? (2) How do we compare optical CDMA performance with that of conventional optical WDMA? To answer the first question, we present a method of comparing optical CDMA codes of different families, sizes and weights. We outline why the traditional performance metric of bit-error rate versus number of simultaneous users is lacking and propose a different performance measure -- the peak throughput normalized with respect to the size of the code. This metric is used to show that optical-orthogonal codes (OOCs) with a weight of 4 perform best at low offered loads while OOCs with weight 5 should be used at higher offered loads. By applying the technique across different families of codes, we demonstrate that multi-wavelength OOCs (MWOOCs) perform better than both OOCs (by a factor of approximately 1.25) and asymmetric prime-hop codes (by a factor of approximately 3.5), over a wide range of offered loads. In answer to the second question, we present a comparison of the performance of optical code-division multiple-access (CDMA) systems with that of a wavelength-division multiple-access (WDMA) system. The multiple-access techniques are applied in a time-slotted broadcast local-area network. The utilization, defined as the throughput per unit of time-domain bandwidth expansion, and packet delay are used as metrics of performance. When more than seven wavelengths are available, optical CDMA systems using asymmetric prime-hop codes and all-optical signal processing are shown to have higher peak utilization and lower corresponding delay than a WDMA system with the same number of wavelengths. When the encoders/decoders operate at the chip rate, the utilization

  9. Channel access schemes and fiber optic configurations for integrated-services local area networks. Ph.D. Thesis

    Science.gov (United States)

    Nassehi, M. Mehdi

    1987-01-01

    Local Area Networks are in common use for data communications and have enjoyed great success. Recently, there is a growing interest in using a single network to support many applications in addition to traditional data traffic. These additional applications introduce new requirements in terms of volume of traffic and real-time delivery of data which are not met by existing networks. To satisfy these requirements, a high-bandwidth tranmission medium, such as fiber optics, and a distributed channel access scheme for the efficient sharing of the bandwidth among the various applications are needed. As far as the throughput-delay requirements of the various application are concerned, a network structure along with a distributed channel access are proposed which incorporate appropriate scheduling policies for the transmission of outstanding messages on the network. A dynamic scheduling policy was devised which outperforms all existing policies in terms of minimizing the expected cost per message. A broadcast mechanism was devised for the efficient dissemination of all relevant information. Fiber optic technology is considered for the high-bandwidth transmisison medium.

  10. CHOICE OF OPTION FOR IMPLEMENTATION OF THE MULTILEVEL SECURE ACCESS TO THE EXTERNAL NETWORK

    Directory of Open Access Journals (Sweden)

    V. S. Kolomoitcev

    2016-01-01

    Full Text Available We study the optimal way for design of access scheme called "Direct Connection. This scheme provides a secure access to external network resources, and consists of several groups of routers and two kinds of firewalls. The scheme is considered in view of the fact that the system has got common areas of removing threats in the channel for different means of protection. Parameters of average residence time of request in the system and its reliability were obtained for each variant of access scheme. Based on the results, comparison of the ways of design for access scheme was carried out between themselves and with the standard access scheme (with onefirewall. It was found out that design of access scheme with a single group of routers for the whole system has better performance and reliability than the other variants of "Direct Connection" access scheme.

  11. Distributed Robust Power Minimization for the Downlink of Multi-Cloud Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb

    2017-02-07

    Conventional cloud radio access networks assume single cloud processing and treat inter-cloud interference as background noise. This paper considers the downlink of a multi-cloud radio access network (CRAN) where each cloud is connected to several base-stations (BS) through limited-capacity wireline backhaul links. The set of BSs connected to each cloud, called cluster, serves a set of pre-known mobile users (MUs). The performance of the system becomes therefore a function of both inter-cloud and intra-cloud interference, as well as the compression schemes of the limited capacity backhaul links. The paper assumes independent compression scheme and imperfect channel state information (CSI) where the CSI errors belong to an ellipsoidal bounded region. The problem of interest becomes the one of minimizing the network total transmit power subject to BS power and quality of service constraints, as well as backhaul capacity and CSI error constraints. The paper suggests solving the problem using the alternating direction method of multipliers (ADMM). One of the highlight of the paper is that the proposed ADMM-based algorithm can be implemented in a distributed fashion across the multi-cloud network by allowing a limited amount of information exchange between the coupled clouds. Simulation results show that the proposed distributed algorithm provides a similar performance to the centralized algorithm in a reasonable number of iterations.

  12. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  13. 42 CFR 60.59 - Records and Federal access after a school is no longer a HEAL school.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Records and Federal access after a school is no longer a HEAL school. 60.59 Section 60.59 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GRANTS HEALTH EDUCATION ASSISTANCE LOAN PROGRAM The School § 60.59 Records and Federal...

  14. Self-optimized admission control for multi-tenant radio access networks

    OpenAIRE

    Pérez Romero, Jordi; Sallent Roig, José Oriol; Ferrús Ferré, Ramón Antonio; Agustí Comes, Ramon

    2018-01-01

    © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes,creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Multi-tenant Radio Access Networks (RANs) are envisaged to play a key role in highly dense scenarios for fulfil...

  15. A Novel Approach for Transmission of 56 Gbit/s NRZ Signal in Access Network Using Spectrum Slicing Technique

    DEFF Research Database (Denmark)

    Spolitis, S.; Vegas Olmos, Juan José; Bobrovs, V.

    2013-01-01

    We present the spectrum slicing and stitching concept for high-capacity low optics complexity optical access networks. Spectrum slicing and stitching of a 56 Gbit/s NRZ electrical signal is experimentally demonstrated for the first time.......We present the spectrum slicing and stitching concept for high-capacity low optics complexity optical access networks. Spectrum slicing and stitching of a 56 Gbit/s NRZ electrical signal is experimentally demonstrated for the first time....

  16. ONU power saving modes in next generation optical access networks: progress, efficiency and challenges.

    Science.gov (United States)

    Dixit, Abhishek; Lannoo, Bart; Colle, Didier; Pickavet, Mario; Demeester, Piet

    2012-12-10

    The optical network unit (ONU), installed at a customer's premises, accounts for about 60% of power in current fiber-to-the-home (FTTH) networks. We propose a power consumption model for the ONU and evaluate the ONU power consumption in various next generation optical access (NGOA) architectures. Further, we study the impact of the power savings of the ONU in various low power modes such as power shedding, doze and sleep.

  17. QoS Modeling for End-to-End Performance Evaluation over Networks with Wireless Access

    Directory of Open Access Journals (Sweden)

    Gómez Gerardo

    2010-01-01

    Full Text Available This paper presents an end-to-end Quality of Service (QoS model for assessing the performance of data services over networks with wireless access. The proposed model deals with performance degradation across protocol layers using a bottom-up strategy, starting with the physical layer and moving on up to the application layer. This approach makes it possible to analytically assess performance at different layers, thereby facilitating a possible end-to-end optimization process. As a representative case, a scenario where a set of mobile terminals connected to a streaming server through an IP access node has been studied. UDP, TCP, and the new TCP-Friendly Rate Control (TFRC protocols were analyzed at the transport layer. The radio interface consisted of a variable-rate multiuser and multichannel subsystem, including retransmissions and adaptive modulation and coding. The proposed analytical QoS model was validated on a real-time emulator of an end-to-end network with wireless access and proved to be very useful for the purposes of service performance estimation and optimization.

  18. High optical label switching add-drop multiplexer nodes with nanoseconds latency for 5G metro/access networks

    NARCIS (Netherlands)

    Calabretta, N.; Miao, W.; De Waardt, H.

    2016-01-01

    We present a novel optical add-drop multiplexer for next-generation metro/access networks by exploiting optical label switching technology. Experimental results of a ring network show nanoseconds add/drop operation including multicasting and power equalization of 50Gb/s data.

  19. Coordinated scheduling for the downlink of cloud radio-access networks

    KAUST Repository

    Douik, Ahmed S.

    2015-09-11

    This paper addresses the coordinated scheduling problem in cloud-enabled networks. Consider the downlink of a cloud-radio access network (CRAN), where the cloud is only responsible for the scheduling policy and the synchronization of the transmit frames across the connected base-stations (BS). The transmitted frame of every BS consists of several time/frequency blocks, called power-zones (PZ), maintained at fixed transmit power. The paper considers the problem of scheduling users to PZs and BSs in a coordinated fashion across the network, by maximizing a network-wide utility under the practical constraint that each user cannot be served by more than one base-station, but can be served by one or more power-zones within each base-station frame. The paper solves the problem using a graph theoretical approach by introducing the scheduling graph in which each vertex represents an association of users, PZs and BSs. The problem is formulated as a maximum weight clique, in which the weight of each vertex is the benefit of the association represented by that vertex. The paper further presents heuristic algorithms with low computational complexity. Simulation results show the performance of the proposed algorithms and suggest that the heuristics perform near optimal in low shadowing environments. © 2015 IEEE.

  20. A 10 Gb/s passive-components-based WDM-TDM reconfigurable optical access network architecture

    NARCIS (Netherlands)

    Tran, N.C.; Jung, H.D.; Okonkwo, C.M.; Tangdiongga, E.; Koonen, A.M.J.

    2011-01-01

    We propose a cost-effective, reconfigurable optical access network by employing passive components in the remote node and dual conventional optical transceivers in ONUs. The architecture is demonstrated with bidirectional transmission at 10 Gb/s.

  1. Accessibility Long Term Perspectives

    Directory of Open Access Journals (Sweden)

    Kay Axhausen

    2008-11-01

    Full Text Available Improved accessibility and its correlate lower generalized cost of contact, travel and transport have been sought by dynamic human societies for their economic and social benefits through- out recorded history. The paper will reflect about this process at a number of different spatial and temporal scales based on a conceptual model. Looking back at European history, it will trace the interaction between Christaller's logic of local market areas and the idea of (low contact cost network cities. Focusing on Switzerland since 1950 it will show how network investment changed the relative distribution of population and employment and how this interacted with changes in the preferences of the travelers. Using a recent snapshot of how a substantial sample of Swiss maintain their social networks over often very large areas, it will try to answer the question of what will happen in the future, if the current trend of ever lower costs of contact will persist.

  2. Analysis of the Decoupled Access for Downlink and Uplink in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Smiljkovikj, K.; Popovski, Petar; Gavrilovska, L.

    2015-01-01

    Wireless cellular networks evolve towards a heterogeneous infrastructure, featuring multiple types of Base Stations (BSs), such as Femto BSs (FBSs) and Macro BSs (MBSs). A wireless device observes multiple points (BSs) through which it can access the infrastructure and it may choose to receive th...

  3. Data Archiving and Networked Services (DANS) promotes sustained access to digital research data

    NARCIS (Netherlands)

    van Berchum, M.; Kraaikamp, Emilie

    2015-01-01

    Data Archiving and Networked Services (DANS) promotes sustained access to digital research data. For this purpose, DANS encourages researchers to archive and reuse data in a sustained form. In the online archiving system EASY research data is stored in a permanent and sustainable manner, according

  4. JavaScript Access to DICOM Network and Objects in Web Browser.

    Science.gov (United States)

    Drnasin, Ivan; Grgić, Mislav; Gogić, Goran

    2017-10-01

    Digital imaging and communications in medicine (DICOM) 3.0 standard provides the baseline for the picture archiving and communication systems (PACS). The development of Internet and various communication media initiated demand for non-DICOM access to PACS systems. Ever-increasing utilization of the web browsers, laptops and handheld devices, as opposed to desktop applications and static organizational computers, lead to development of different web technologies. The DICOM standard officials accepted those subsequently as tools of alternative access. This paper provides an overview of the current state of development of the web access technology to the DICOM repositories. It presents a different approach of using HTML5 features of the web browsers through the JavaScript language and the WebSocket protocol by enabling real-time communication with DICOM repositories. JavaScript DICOM network library, DICOM to WebSocket proxy and a proof-of-concept web application that qualifies as a DICOM 3.0 device were developed.

  5. Performance Evaluation of Peer-to-Peer Progressive Download in Broadband Access Networks

    Science.gov (United States)

    Shibuya, Megumi; Ogishi, Tomohiko; Yamamoto, Shu

    P2P (Peer-to-Peer) file sharing architectures have scalable and cost-effective features. Hence, the application of P2P architectures to media streaming is attractive and expected to be an alternative to the current video streaming using IP multicast or content delivery systems because the current systems require expensive network infrastructures and large scale centralized cache storage systems. In this paper, we investigate the P2P progressive download enabling Internet video streaming services. We demonstrated the capability of the P2P progressive download in both laboratory test network as well as in the Internet. Through the experiments, we clarified the contribution of the FTTH links to the P2P progressive download in the heterogeneous access networks consisting of FTTH and ADSL links. We analyzed the cause of some download performance degradation occurred in the experiment and discussed about the effective methods to provide the video streaming service using P2P progressive download in the current heterogeneous networks.

  6. Enabling technologies for millimeter-wave radio-over-fiber systems in next generation heterogeneous mobile access networks

    Science.gov (United States)

    Zhang, Junwen; Yu, Jianjun; Wang, Jing; Xu, Mu; Cheng, Lin; Lu, Feng; Shen, Shuyi; Yan, Yan; Cho, Hyunwoo; Guidotti, Daniel; Chang, Gee-kung

    2017-01-01

    Fifth-generation (5G) wireless access network promises to support higher access data rate with more than 1,000 times capacity with respect to current long-term evolution (LTE) systems. New radio-access-technologies (RATs) based on higher carrier frequencies to millimeter-wave (MMW) radio-over-fiber, and carrier-aggregation (CA) using multi-band resources are intensively studied to support the high data rate access and effectively use of frequency resources in heterogeneous mobile network (Het-Net). In this paper, we investigate several enabling technologies for MMW RoF systems in 5G Het-Net. Efficient mobile fronthaul (MFH) solutions for 5G centralized radio access network (C-RAN) and beyond are proposed, analyzed and experimentally demonstrated based on the analog scheme. Digital predistortion based on memory polynomial for analog MFH linearization are presented with improved EVM performances and receiver sensitivity. We also propose and experimentally demonstrate a novel inter-/intra- RAT CA scheme for 5G Het- Net. The real-time standard 4G-LTE signal is carrier-aggregated with three broadband 60GHz MMW signals based on proposed optical-domain band-mapping method. RATs based on new waveforms have also been studied here to achieve higher spectral-efficiency (SE) in asynchronous environments. Full-duplex asynchronous quasi-gapless carrier aggregation scheme for MMW ROF inter-/intra-RAT based on the FBMC is also presented with 4G-LTE signals. Compared with OFDM-based signals with large guard-bands, FBMC achieves higher spectral-efficiency with better EVM performance at less received power and smaller guard-bands.

  7. Maternity patients' access to their electronic medical records: use and perspectives of a patient portal.

    Science.gov (United States)

    Megan Forster, Megan; Dennison, Kerrie; Callen, Joanne; Andrew, Andrew; Westbrook, Johanna I

    Patients have been able to access clinical information from their paper-based health records for a number of years. With the advent of Electronic Medical Records (EMRs) access to this information can now be achieved online using a secure electronic patient portal. The purpose of this study was to investigate maternity patients' use and perceptions of a patient portal developed at the Mater Mothers' Hospital in Brisbane, Australia. A web-based patient portal, one of the first developed and deployed in Australia, was introduced on 26 June 2012. The portal was designed for maternity patients booked at Mater Mothers' Hospital, as an alternative to the paper-based Pregnancy Health Record. Through the portal, maternity patients are able to complete their hospital registration form online and obtain current health information about their pregnancy (via their EMR), as well as access a variety of support tools to use during their pregnancy such as tailored public health advice. A retrospective cross-sectional study design was employed. Usage statistics were extracted from the system for a one year period (1 July 2012 to 30 June 2013). Patients' perceptions of the portal were obtained using an online survey, accessible by maternity patients for two weeks in February 2013 (n=80). Descriptive statistics were employed to analyse the data. Between July 2012 and June 2013, 10,892 maternity patients were offered a patient portal account and access to their EMR. Of those 6,518 created one (60%; 6,518/10,892) and 3,104 went on to request access to their EMR (48%; 3,104/6,518). Of these, 1,751 had their access application granted by 30 June 2013. The majority of maternity patients submitted registration forms online via the patient portal (56.7%). Patients could view their EMR multiple times: there were 671 views of the EMR, 2,781 views of appointment schedules and 135 birth preferences submitted via the EMR. Eighty survey responses were received from EMR account holders, (response

  8. Amendment of the assured delivery provisions of BPA's Long-Term Intertie Access Policy and increased assured delivery: Access for non-scheduling utilities. Record of decision

    International Nuclear Information System (INIS)

    1994-06-01

    Bonneville Power Administration's BPA's preferred alternative for providing non-Federal Pacific Northwest-Pacific Southwest (PNW-PSW) Intertie access is to adopt the Capacity Ownership alternative combined with the Increased Assured Delivery--Access for Non-Scheduling Utilities alternative. BPA's decision to offer Capacity Ownership was documented in a March 1994 Non-Federal Capacity Ownership Record of Decision (ROD). This ROD documents BPA's decision to facilitate PNW-PSW Intertie access by proceeding with (1) bidirectional Increased Assured Delivery--Access for Non Scheduling Utilities; and (2) amending the Assured Delivery provisions of BPA's Long-Term Intertie Access Policy (LTIAP). Given that the various non-Federal PNW-PSW Intertie access alternatives in the NFP EIS all allowed for different types of contracts, little environmental impact difference among the alternatives was found. Rather, environmental impact was found to be associated with whether exchange contracts or firm power sales contracts would predominate. Such impacts and related environmental analysis are discussed further in section 3.0 of this ROD

  9. Decentralized Group Sparse Beamforming for Multi-Cloud Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb

    2015-12-06

    Recent studies on cloud-radio access networks (CRANs) assume the availability of a single processor (cloud) capable of managing the entire network performance; inter-cloud interference is treated as background noise. This paper considers the more practical scenario of the downlink of a CRAN formed by multiple clouds, where each cloud is connected to a cluster of multiple-antenna base stations (BSs) via high-capacity wireline backhaul links. The network is composed of several disjoint BSs\\' clusters, each serving a pre-known set of single-antenna users. To account for both inter- cloud and intra-cloud interference, the paper considers the problem of minimizing the total network power consumption subject to quality of service constraints, by jointly determining the set of active BSs connected to each cloud and the beamforming vectors of every user across the network. The paper solves the problem using Lagrangian duality theory through a dual decomposition approach, which decouples the problem into multiple and independent subproblems, the solution of which depends on the dual optimization problem. The solution then proceeds in updating the dual variables and the active set of BSs at each cloud iteratively. The proposed approach leads to a distributed implementation across the multiple clouds through a reasonable exchange of information between adjacent clouds. The paper further proposes a centralized solution to the problem. Simulation results suggest that the proposed algorithms significantly outperform the conventional per-cloud update solution, especially at high signal-to-interference-plus- noise ratio (SINR) target.

  10. 7 CFR 4290.1640 - Secretary's access to records of the CRA, Brokers, Dealers and Pool or Trust assemblers.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Secretary's access to records of the CRA, Brokers, Dealers and Pool or Trust assemblers. 4290.1640 Section 4290.1640 Agriculture Regulations of the... to records of the CRA, Brokers, Dealers and Pool or Trust assemblers. The CRA and any broker, dealer...

  11. A three-stage heuristic for harvest scheduling with access road network development

    Science.gov (United States)

    Mark M. Clark; Russell D. Meller; Timothy P. McDonald

    2000-01-01

    In this article we present a new model for the scheduling of forest harvesting with spatial and temporal constraints. Our approach is unique in that we incorporate access road network development into the harvest scheduling selection process. Due to the difficulty of solving the problem optimally, we develop a heuristic that consists of a solution construction stage...

  12. Dynamic optical fiber delivery of Ka-band packet transmissions for wireless access networks

    DEFF Research Database (Denmark)

    Rodríguez Páez, Juan Sebastián; Madsen, Peter; Tafur Monroy, Idelfonso

    2017-01-01

    A Reconfigurable Radio Access Unit is presented and experimentally demonstrated. In the unit, an optical switching system is set to dynamically deliver different packets to different points in the network. The packets are transmitted wirelesslty on the Ka-band (26–40 GHz), achieving BER values...

  13. Network Analysis of Foramen Ovale Electrode Recordings in Drug-resistant Temporal Lobe Epilepsy Patients

    Science.gov (United States)

    Sanz-García, Ancor; Vega-Zelaya, Lorena; Pastor, Jesús; Torres, Cristina V.; Sola, Rafael G.; Ortega, Guillermo J.

    2016-01-01

    Approximately 30% of epilepsy patients are refractory to antiepileptic drugs. In these cases, surgery is the only alternative to eliminate/control seizures. However, a significant minority of patients continues to exhibit post-operative seizures, even in those cases in which the suspected source of seizures has been correctly localized and resected. The protocol presented here combines a clinical procedure routinely employed during the pre-operative evaluation of temporal lobe epilepsy (TLE) patients with a novel technique for network analysis. The method allows for the evaluation of the temporal evolution of mesial network parameters. The bilateral insertion of foramen ovale electrodes (FOE) into the ambient cistern simultaneously records electrocortical activity at several mesial areas in the temporal lobe. Furthermore, network methodology applied to the recorded time series tracks the temporal evolution of the mesial networks both interictally and during the seizures. In this way, the presented protocol offers a unique way to visualize and quantify measures that considers the relationships between several mesial areas instead of a single area. PMID:28060326

  14. Nonadditivity of quantum and classical capacities for entanglement breaking multiple-access channels and the butterfly network

    International Nuclear Information System (INIS)

    Grudka, Andrzej; Horodecki, Pawel

    2010-01-01

    We analyze quantum network primitives which are entanglement breaking. We show superadditivity of quantum and classical capacity regions for quantum multiple-access channels and the quantum butterfly network. Since the effects are especially visible at high noise they suggest that quantum information effects may be particularly helpful in the case of the networks with occasional high noise rates. The present effects provide a qualitative borderline between superadditivities of bipartite and multipartite systems.

  15. Statistical identification of stimulus-activated network nodes in multi-neuron voltage-sensitive dye optical recordings.

    Science.gov (United States)

    Fathiazar, Elham; Anemuller, Jorn; Kretzberg, Jutta

    2016-08-01

    Voltage-Sensitive Dye (VSD) imaging is an optical imaging method that allows measuring the graded voltage changes of multiple neurons simultaneously. In neuroscience, this method is used to reveal networks of neurons involved in certain tasks. However, the recorded relative dye fluorescence changes are usually low and signals are superimposed by noise and artifacts. Therefore, establishing a reliable method to identify which cells are activated by specific stimulus conditions is the first step to identify functional networks. In this paper, we present a statistical method to identify stimulus-activated network nodes as cells, whose activities during sensory network stimulation differ significantly from the un-stimulated control condition. This method is demonstrated based on voltage-sensitive dye recordings from up to 100 neurons in a ganglion of the medicinal leech responding to tactile skin stimulation. Without relying on any prior physiological knowledge, the network nodes identified by our statistical analysis were found to match well with published cell types involved in tactile stimulus processing and to be consistent across stimulus conditions and preparations.

  16. COMPETITIVENESS, MARKETING ACCESS, AND NETWORK CAPABILITY AND ITS IMPACTS ON MARKETING PERFORMANCE

    Directory of Open Access Journals (Sweden)

    Teguh Iman Sayekti

    2016-12-01

    Full Text Available This study is to determine what factors influencingthe performance of SMEs. The population in this study is SMEs in the Central Java. Sample collection was conducted with a purposive sampling method. Criteriaused to take into accountis the SMEs that are already running at leastfortwo years. The sample in this study is intended as the representative of total population,67 (sixty seven. The data were processed and analyzed by computer program of SPSS 20 for Windows. Based on the results of regression analysis, it can be concluded that competitiveness has positive and significant impact on marketing performance marketing access has positive and significant impact on marketing performance. It means that the higher competitiveness and marketing access, the higher its performance. Competitiveness and marketing access have influence on SMEs’ performance through network capability.   

  17. Virtual shelves in a digital library: a framework for access to networked information sources.

    Science.gov (United States)

    Patrick, T B; Springer, G K; Mitchell, J A; Sievert, M E

    1995-01-01

    Develop a framework for collections-based access to networked information sources that addresses the problem of location-dependent access to information sources. This framework uses a metaphor of a virtual shelf. A virtual shelf is a general-purpose server that is dedicated to a particular information subject class. The identifier of one of these servers identifies its subject class. Location-independent call numbers are assigned to information sources. Call numbers are based on standard vocabulary codes. The call numbers are first mapped to the location-independent identifiers of virtual shelves. When access to an information resource is required, a location directory provides a second mapping of these location-independent server identifiers to actual network locations. The framework has been implemented in two different systems. One system is based on the Open System Foundation/Distributed Computing Environment and the other is based on the World Wide Web. This framework applies in new ways traditional methods of library classification and cataloging. It is compatible with two traditional styles of selecting information searching and browsing. Traditional methods may be combined with new paradigms of information searching that will be able to take advantage of the special properties of digital information. Cooperation between the library-informational science community and the informatics community can provide a means for a continuing application of the knowledge and techniques of library science to the new problems of networked information sources.

  18. Layer 2 and 3 contention resolution and radio-over-fiber in OCDMA PON for transparent optical access in personal networks

    NARCIS (Netherlands)

    Huiszoon, B.; Hartog, F.T.H. den; Larrodé, M.G.; Koonen, A.M.J.

    2008-01-01

    In this paper, we analyze, for the first time, the eminent role of optical transparent networking in personal networks. We show how an optical access network mitigates many issues with respect to connectivity and mobility management. A concrete personal network user-scenario deduces requirements for

  19. Digital Signal Processing for a Sliceable Transceiver for Optical Access Networks

    DEFF Research Database (Denmark)

    Saldaña Cercos, Silvia; Wagner, Christoph; Vegas Olmos, Juan José

    2015-01-01

    Methods to upgrade the network infrastructure to cope with current traffic demands has attracted increasing research efforts. A promising alternative is signal slicing. Signal slicing aims at re-using low bandwidth equipment to satisfy high bandwidth traffic demands. This technique has been used...... also for implementing full signal path symmetry in real-time oscilloscopes to provide performance and signal fidelity (i.e. lower noise and jitter). In this paper the key digital signal processing (DSP) subsystems required to achieve signal slicing are surveyed. It also presents, for the first time...... penalty is reported for 10 Gbps. Power savings of the order of hundreds of Watts can be obtained when using signal slicing as an alternative to 10 Gbps implemented access networks....

  20. The role of a bus network in access to primary health care in Metropolitan Auckland, New Zealand.

    Science.gov (United States)

    Rocha, C M; McGuire, S; Whyman, R; Kruger, E; Tennant, M

    2015-09-01

    Background: This study examined the spatial accessibility of the population of metropolitan Auckland, New Zealand to the bus network, to connect them to primary health providers, in this case doctors (GP) and dentists. Analysis of accessibility by ethnic identity and socio-economic status were also carried out, because of existing health inequalities along these dimensions. The underlying hypothesis was that most people would live within easy reach of primary health providers, or easy bus transport to such providers. An integrated geographic model of bus transport routes and stops, with population and primary health providers (medical. and dental practices) was developed and analysed. Although the network of buses in metropolitan Auckland is substantial and robust it was evident that many people live more than 150 metres from a stop. Improving the access to bus stops, particularly in areas of high primary health care need (doctors and dentists), would certainly be an opportunity to enhance spatial access in a growing metropolitan area.

  1. Towards the Adoption of Open Source and Open Access Electronic Health Record Systems

    Directory of Open Access Journals (Sweden)

    Ilias Maglogiannis

    2012-01-01

    Full Text Available As the Electronic Health Record (EHR systems constantly expand to support more clinical activities and their implementations in healthcare organizations become more widespread, several communities have been working intensively for several years to develop open access and open source EHR software, aiming at reducing the costs of EHR deployment and maintenance. In this paper, we describe and evaluate the most popular open source electronic medical records such as openEMR, openMRS and patientOS, providing their technical features and potentials. These systems are considered quite important due to their prevalence. The article presents the key features of each system and outlines the advantages and problems of Open Source Software (OSS Systems through a review of the literature, in order to demonstrate the possibility of their adoption in modern electronic healthcare systems. Also discussed are the future trends of OS EHRs in the context of the Personal Health Records and mobile computing paradigm.

  2. Assessing artificial neural networks and statistical methods for infilling missing soil moisture records

    Science.gov (United States)

    Dumedah, Gift; Walker, Jeffrey P.; Chik, Li

    2014-07-01

    Soil moisture information is critically important for water management operations including flood forecasting, drought monitoring, and groundwater recharge estimation. While an accurate and continuous record of soil moisture is required for these applications, the available soil moisture data, in practice, is typically fraught with missing values. There are a wide range of methods available to infilling hydrologic variables, but a thorough inter-comparison between statistical methods and artificial neural networks has not been made. This study examines 5 statistical methods including monthly averages, weighted Pearson correlation coefficient, a method based on temporal stability of soil moisture, and a weighted merging of the three methods, together with a method based on the concept of rough sets. Additionally, 9 artificial neural networks are examined, broadly categorized into feedforward, dynamic, and radial basis networks. These 14 infilling methods were used to estimate missing soil moisture records and subsequently validated against known values for 13 soil moisture monitoring stations for three different soil layer depths in the Yanco region in southeast Australia. The evaluation results show that the top three highest performing methods are the nonlinear autoregressive neural network, rough sets method, and monthly replacement. A high estimation accuracy (root mean square error (RMSE) of about 0.03 m/m) was found in the nonlinear autoregressive network, due to its regression based dynamic network which allows feedback connections through discrete-time estimation. An equally high accuracy (0.05 m/m RMSE) in the rough sets procedure illustrates the important role of temporal persistence of soil moisture, with the capability to account for different soil moisture conditions.

  3. Modeling Social Capital as Dynamic Networks to Promote Access to Oral Healthcare.

    Science.gov (United States)

    Wang, Hua; Northridge, Mary E; Kunzel, Carol; Zhang, Qiuyi; Kum, Susan S; Gilbert, Jessica L; Jin, Zhu; Metcalf, Sara S

    2016-01-01

    Social capital, as comprised of human connections in social networks and their associated benefits, is closely related to the health of individuals, communities, and societies at large. For disadvantaged population groups such as older adults and racial/ethnic minorities, social capital may play a particularly critical role in mitigating the negative effects and reinforcing the positive effects on health. In this project, we model social capital as both cause and effect by simulating dynamic networks. Informed in part by a community-based health promotion program, an agent-based model is contextualized in a GIS environment to explore the complexity of social disparities in oral and general health as experienced at the individual, interpersonal, and community scales. This study provides the foundation for future work investigating how health and healthcare accessibility may be influenced by social networks.

  4. A Lightweight Medium Access Protocol (LMAC) for Wireless Sensor Networks: Reducing Preamble Transmissions and Transceiver State Switches

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2004-01-01

    In this paper, we present an energy-efficient medium access protocol designed for wireless sensor networks. Although the protocol uses TDMA to give nodes in the WSN the opportunity to communicate collision-free, the network is self-organizing in terms of time slot assignment and synchronization. The

  5. 13 CFR 107.1640 - SBA access to records of the CRA, Brokers, Dealers and Pool or Trust assemblers.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false SBA access to records of the CRA, Brokers, Dealers and Pool or Trust assemblers. 107.1640 Section 107.1640 Business Credit and Assistance... records of the CRA, Brokers, Dealers and Pool or Trust assemblers. The CRA and any broker, dealer and Pool...

  6. ADNP-CSMA Random Multiple Access protocol application with the function of monitoring in Ad Hoc network

    Directory of Open Access Journals (Sweden)

    Zhan Gang

    2016-01-01

    Full Text Available In Ad Hoc networks,the net work of mobile nodes exchange information with their wireless transceiver equipment,the network throughput is in increased,compared to other such multiple hops network.Moreover along with the rapid development of modern information,communication business also will be increase.However,the access and adaptive of previous CSMA protocol are insufficient.According to these properties,this paper presents a kind of adaptive dual clock with monitoring function P-CSMA random multiple access protocol(ADNP-CSMA,and discusses two kinds of P-CSMA.ACK with monitoring function is introduced to maintain the stability of the whole system,and the introduction of dual clock mechanism reduces the channel of idle period.It calculate the system throughput expression through the method of average period,and the simulation results show that the system is constant in the case of high load throughput.

  7. Analysis of multiuser mixed RF/FSO relay networks for performance improvements in Cloud Computing-Based Radio Access Networks (CC-RANs)

    Science.gov (United States)

    Alimi, Isiaka A.; Monteiro, Paulo P.; Teixeira, António L.

    2017-11-01

    The key paths toward the fifth generation (5G) network requirements are towards centralized processing and small-cell densification systems that are implemented on the cloud computing-based radio access networks (CC-RANs). The increasing recognitions of the CC-RANs can be attributed to their valuable features regarding system performance optimization and cost-effectiveness. Nevertheless, realization of the stringent requirements of the fronthaul that connects the network elements is highly demanding. In this paper, considering the small-cell network architectures, we present multiuser mixed radio-frequency/free-space optical (RF/FSO) relay networks as feasible technologies for the alleviation of the stringent requirements in the CC-RANs. In this study, we use the end-to-end (e2e) outage probability, average symbol error probability (ASEP), and ergodic channel capacity as the performance metrics in our analysis. Simulation results show the suitability of deployment of mixed RF/FSO schemes in the real-life scenarios.

  8. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  9. A Correlational Analysis: Electronic Health Records (EHR) and Quality of Care in Critical Access Hospitals

    Science.gov (United States)

    Khan, Arshia A.

    2012-01-01

    Driven by the compulsion to improve the evident paucity in quality of care, especially in critical access hospitals in the United States, policy makers, healthcare providers, and administrators have taken the advise of researchers suggesting the integration of technology in healthcare. The Electronic Health Record (EHR) System composed of multiple…

  10. Investigating the impact of ceo’s social network on sme performance and access to external resources in the moroccan textile industry

    Directory of Open Access Journals (Sweden)

    Tahirou Younoussi Meda Adama

    2018-03-01

    Full Text Available This paper analyses the relationship between the social network dimensions, the performance of Moroccan SMEs of the textile industry and their access to external resources. As these companies face a fierce competition in recent years, their CEOs’ social networks are playing a significant role in their success and survival.  Through a sample of 112 SMEs and a quantitative method, our results show that the more the network is important, the more it promotes SME performance and access to information resources, that having closer tie with the bankers allows a better access to financial resources, that knowing and having links with people in high places is a privilege and contributes effectively to an organizational performance.

  11. Are personal health records safe? A review of free web-accessible personal health record privacy policies.

    Science.gov (United States)

    Carrión Señor, Inmaculada; Fernández-Alemán, José Luis; Toval, Ambrosio

    2012-08-23

    Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users' concerns regarding the privacy and security of their personal health information. To analyze the privacy and security characteristics of PHR privacy policies. It is hoped that identification of the strengths and weaknesses of the PHR systems will be useful for PHR users, health care professionals, decision makers, and designers. We conducted a systematic review using the principal databases related to health and computer science to discover the Web-based and free PHR systems mentioned in published articles. The privacy policy of each PHR system selected was reviewed to extract its main privacy and security characteristics. The search of databases and the myPHR website provided a total of 52 PHR systems, of which 24 met our inclusion criteria. Of these, 17 (71%) allowed users to manage their data and to control access to their health care information. Only 9 (38%) PHR systems permitted users to check who had accessed their data. The majority of PHR systems used information related to the users' accesses to monitor and analyze system use, 12 (50%) of them aggregated user information to publish trends, and 20 (83%) used diverse types of security measures. Finally, 15 (63%) PHR systems were based on regulations or principles such as the US Health Insurance Portability and Accountability Act (HIPAA) and the Health on the Net Foundation Code of Conduct (HONcode). Most privacy policies of PHR systems do not provide an in-depth description of the security measures that they use. Moreover, compliance with standards and regulations in PHR systems is still low.

  12. Magnetic Thin Films for Perpendicular Magnetic Recording Systems

    Science.gov (United States)

    Sugiyama, Atsushi; Hachisu, Takuma; Osaka, Tetsuya

    In the advanced information society of today, information storage technology, which helps to store a mass of electronic data and offers high-speed random access to the data, is indispensable. Against this background, hard disk drives (HDD), which are magnetic recording devices, have gained in importance because of their advantages in capacity, speed, reliability, and production cost. These days, the uses of HDD extend not only to personal computers and network servers but also to consumer electronics products such as personal video recorders, portable music players, car navigation systems, video games, video cameras, and personal digital assistances.

  13. Deployment of a Testbed in a Brazilian Research Network using IPv6 and Optical Access Technologies

    Science.gov (United States)

    Martins, Luciano; Ferramola Pozzuto, João; Olimpio Tognolli, João; Chaves, Niudomar Siqueira De A.; Reggiani, Atilio Eduardo; Hortêncio, Claudio Antonio

    2012-04-01

    This article presents the implementation of a testbed and the experimental results obtained with it on the Brazilian Experimental Network of the government-sponsored "GIGA Project." The use of IPv6 integrated to current and emerging optical architectures and technologies, such as dense wavelength division multiplexing and 10-gigabit Ethernet on the core and gigabit capable passive optical network and optical distribution network on access, were tested. These protocols, architectures, and optical technologies are promising and part of a brand new worldwide technological scenario that has being fairly adopted in the networks of enterprises and providers of the world.

  14. Electro-optical time gating based on Mach-Zehnder modulator for multiple access interference elimination in optical code-division multiple access networks

    Science.gov (United States)

    Chen, Yinfang; Wang, Rong; Fang, Tao; Pu, Tao; Xiang, Peng; Zheng, Jilin; Zhu, Huatao

    2014-05-01

    An electro-optical time gating technique, which is based on an electrical return-to-zero (RZ) pulse driven Mach-Zehnder modulator (MZM) for eliminating multiple access interference (MAI) in optical code-division multiple access (OCDMA) networks is proposed. This technique is successfully simulated in an eight-user two-dimensional wavelength-hopping time-spreading system, as well as in a three-user temporal phase encoding system. Results show that in both systems the MAI noise is efficiently removed and the average received power penalty improved. Both achieve error-free transmissions at a bit rate of 2.5 Gb/s. In addition, we also individually discuss effects of parameters in two systems, such as the extinction ratio of the MZM, the duty cycle of the driven RZ pulse, and the time misalignment between the driven pulse and the decoded autocorrelation peak, on the output bit error rate performance. Our work shows that employing a common MZM as a thresholder provides another probability and an interesting cost-effective choice for a smart size, low energy, and less complex thresholding technique for integrated detection in OCDMA networks.

  15. Energy Analysis of Contention Tree-Based Access Protocols in Dense Machine-to-Machine Area Networks

    Directory of Open Access Journals (Sweden)

    Francisco Vázquez-Gallego

    2015-01-01

    Full Text Available Machine-to-Machine (M2M area networks aim at connecting an M2M gateway with a large number of energy-constrained devices that must operate autonomously for years. Therefore, attaining high energy efficiency is essential in the deployment of M2M networks. In this paper, we consider a dense M2M area network composed of hundreds or thousands of devices that periodically transmit data upon request from a gateway or coordinator. We theoretically analyse the devices’ energy consumption using two Medium Access Control (MAC protocols which are based on a tree-splitting algorithm to resolve collisions among devices: the Contention Tree Algorithm (CTA and the Distributed Queuing (DQ access. We have carried out computer-based simulations to validate the accuracy of the theoretical models and to compare the energy performance using DQ, CTA, and Frame Slotted-ALOHA (FSA in M2M area networks with devices in compliance with the IEEE 802.15.4 physical layer. Results show that the performance of DQ is totally independent of the number of contending devices, and it can reduce the energy consumed per device in more than 35% with respect to CTA and in more than 80% with respect to FSA.

  16. Time dependent accessibility

    OpenAIRE

    Kaza, Nikhil

    2015-01-01

    Many place based accessibility studies ignore the time component. Relying on theoretical frameworks that treat distance between two fixed points as constant, these methods ignore the diurnal and seasonal changes in accessibility. Network distances between two nodes are dependent on the network structure and weight distribution on the edges. These weights can change quite frequently and the network structure itself is subject to modification because of availability and unavailability of links ...

  17. Impact of Users Identities and Access Conditions on Downlink Performance in Closed Small-Cell Networks

    KAUST Repository

    Radaydeh, Redha; Gaaloul, Fakhreddine; Alouini, Mohamed-Slim

    2015-01-01

    This paper investigates the effect of various operation parameters on the downlink user performance in overlaid small-cell networks. The case study considers closed-access small cells (e.g., femtocells), wherein only active authorized user

  18. The NASA Regional Planetary Image Facility (RPIF) Network: A Key Resource for Accessing and Using Planetary Spatial Data

    Science.gov (United States)

    Hagerty, J. J.

    2017-12-01

    The role of the NASA Regional Planetary Image Facility (RPIF) Network is evolving as new science-ready spatial data products continue to be created and as key historical planetary data sets are digitized. Specifically, the RPIF Network is poised to serve specialized knowledge and services in a user-friendly manner that removes most barriers to locating, accessing, and exploiting planetary spatial data, thus providing a critical data access role within a spatial data infrastructure. The goal of the Network is to provide support and training to a broad audience of planetary spatial data users. In an effort to meet the planetary science community's evolving needs, we are focusing on the following objectives: Maintain and improve the delivery of historical data accumulated over the past four decades so as not to lose critical, historical information. This is being achieved by systematically digitizing fragile materials, allowing increased access and preserving them at the same time. Help users locate, access, visualize, and exploit planetary science data. Many of the facilities have begun to establish Guest User Facilities that allow researchers to use and/or be trained on GIS equipment and other specialized tools like Socet Set/GXP photogrammetry workstations for generating digital elevation maps. Improve the connection between the Network nodes while also leveraging the unique resources of each node. To achieve this goal, each facility is developing and sharing searchable databases of their collections, including robust metadata in a standards compliant way. Communicate more effectively and regularly with the planetary science community in an effort to make potential users aware of resources and services provided by the Network, while also engaging community members in discussions about community needs. Provide a regional resource for the science community, colleges, universities, museums, media, and the public to access planetary data. Introduce new strategies for

  19. On the Impact of Closed Access and Users Identities in Spectrum-Shared Overlaid Wireless Networks

    KAUST Repository

    Radaydeh, Redha M.; Gaaloul, Fakhreddine; Alouini, Mohamed-Slim

    2016-01-01

    © 2015 IEEE. This paper develops analytical models to investigate the impact of various operation terms and parameters on the downlink performance of spectrum-shared overlaid networks under closed-access small cells deployment. It is considered

  20. Throughput Fairness Enhancement Using Differentiated Channel Access in Heterogeneous Sensor Networks

    Directory of Open Access Journals (Sweden)

    James Jong Hyuk Park

    2011-06-01

    Full Text Available Nowadays, with wireless sensor networks (WSNs being widely applied to diverse applications, heterogeneous sensor networks (HSNs, which can simultaneously support multiple sensing tasks in a common sensor field, are being considered as the general form of WSN system deployment. In HSNs, each application generates data packets with a different size, thereby resulting in fairness issues in terms of the network performance. In this paper, we present the design and performance evaluation of a differentiated channel access scheme (abbreviated to DiffCA to resolve the fairness problem in HSNs. DiffCA achieves fair performance among the application groups by providing each node with an additional backoff counter, whose value varies according to the size of the packets. A mathematical model based on the discrete time Markov chain is presented and is analyzed to measure the performance of DiffCA. The numerical results show that the performance degradation of disadvantaged application groups can be effectively compensated for by DiffCA. Simulation results are given to verify the accuracy of the numerical model.

  1. Throughput fairness enhancement using differentiated channel access in heterogeneous sensor networks.

    Science.gov (United States)

    Kim, Eui-Jik; Shon, Taeshik; Park, James Jong Hyuk; Jeong, Young-Sik

    2011-01-01

    Nowadays, with wireless sensor networks (WSNs) being widely applied to diverse applications, heterogeneous sensor networks (HSNs), which can simultaneously support multiple sensing tasks in a common sensor field, are being considered as the general form of WSN system deployment. In HSNs, each application generates data packets with a different size, thereby resulting in fairness issues in terms of the network performance. In this paper, we present the design and performance evaluation of a differentiated channel access scheme (abbreviated to DiffCA) to resolve the fairness problem in HSNs. DiffCA achieves fair performance among the application groups by providing each node with an additional backoff counter, whose value varies according to the size of the packets. A mathematical model based on the discrete time Markov chain is presented and is analyzed to measure the performance of DiffCA. The numerical results show that the performance degradation of disadvantaged application groups can be effectively compensated for by DiffCA. Simulation results are given to verify the accuracy of the numerical model.

  2. Bridging the digital divide: mobile access to personal health records among patients with diabetes.

    Science.gov (United States)

    Graetz, Ilana; Huang, Jie; Brand, Richard J; Hsu, John; Yamin, Cyrus K; Reed, Mary E

    2018-01-01

    Some patients lack regular computer access and experience a digital divide that causes them to miss internet-based health innovations. The diffusion of smartphones has increased internet access across the socioeconomic spectrum, and increasing the channels through which patients can access their personal health records (PHRs) could help bridge the divide in PHR use. We examined PHR use through a computer-based Web browser or mobile device. Cross-sectional historical cohort analysis. Among adult patients in the diabetes registry of an integrated healthcare delivery system, we studied the devices used to access their PHR during 2016. Among 267,208 patients with diabetes, 68.1% used the PHR in 2016; 60.6% of all log-ins were via computer and 39.4% were via mobile device. Overall, 63.9% used it from both a computer and mobile device, 29.6% used only a computer, and 6.5% used only a mobile device. After adjustment, patients who were black, Hispanic, or Asian; lived in lower socioeconomic status (SES) neighborhoods; or had lower engagement were all significantly more likely to use the PHR only from a mobile device (P digital divide in computer use, disproportionately reaching racial/ethnic minorities and lower SES patients. Nonetheless, even with a mobile-optimized and app-accessible PHR, differences in PHR use by race/ethnicity and SES remain. Continued efforts are needed to increase equitable access to PHRs among patients with chronic conditions.

  3. 75 FR 50987 - Privacy Act System of Records; National Animal Health Laboratory Network (NAHLN)

    Science.gov (United States)

    2010-08-18

    ...The U.S. Department of Agriculture (USDA) proposes to add a new Privacy Act system of records to its inventory of records systems subject to the Privacy Act of 1974, as amended, and invites public comment on this new records system. The system of records being proposed is the National Animal Health Laboratory Network. This notice is necessary to meet the requirements of the Privacy Act to publish in the Federal Register notice of the existence and character of record systems maintained by the agency. Although the Privacy Act requires only that the portion of the system that describes ``routine uses'' of the system be published for comment, USDA invites comment on all portions of this notice.

  4. Energy efficiency for cloud-radio access networks with imperfect channel state information

    KAUST Repository

    Al-Oquibi, Bayan

    2016-12-24

    The advent of smartphones and tablets over the past several years has resulted in a drastic increase of global carbon footprint, due to the explosive growth of data traffic. Improving energy efficiency (EE) becomes, therefore, a crucial design metric in next generation wireless systems (5G). Cloud radio access network (C-RAN), a promising 5G network architecture, provides an efficient framework for improving the EE performance, by means of coordinating the transmission across the network. This paper considers a C-RAN system formed by several clusters of remote radio heads (RRHs), each serving a predetermined set of mobile users (MUs), and assumes imperfect channel state information (CSI). The network performance becomes therefore a function of the intra-cluster and inter-cluster interference, as well as the channel estimation error. The paper optimizes the transmit power of each RRH in order to maximize the network global EE subject to MU service rate requirements and RRHs maximum power constraints. The paper proposes solving the optimization problem using a heuristic algorithm based on techniques from optimization theory via a two-stage iterative solution. Simulation results show that the proposed power allocation algorithm provides an appreciable performance improvement as compared to the conventional systems with maximum power transmission strategy. They further highlight the convergence of the proposed algorithm for different networks scenarios.

  5. Functional characterization of GABAA receptor-mediated modulation of cortical neuron network activity in microelectrode array recordings

    DEFF Research Database (Denmark)

    Bader, Benjamin M; Steder, Anne; Klein, Anders Bue

    2017-01-01

    The numerous γ-aminobutyric acid type A receptor (GABAAR) subtypes are differentially expressed and mediate distinct functions at neuronal level. In this study we have investigated GABAAR-mediated modulation of the spontaneous activity patterns of primary neuronal networks from murine frontal...... of the information extractable from the MEA recordings offers interesting insights into the contributions of various GABAAR subtypes/subgroups to cortical network activity and the putative functional interplay between these receptors in these neurons....... cortex by characterizing the effects induced by a wide selection of pharmacological tools at a plethora of activity parameters in microelectrode array (MEA) recordings. The basic characteristics of the primary cortical neurons used in the recordings were studied in some detail, and the expression levels...

  6. A hybrid medium access control for convergence of broadband wireless and wireline ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    2000-01-01

    In this paper, we propose a hybrid medium access control protocol for supporting broadband integrated services in the wireless ATM networks. The integrated services include CBR, VBR and ABR traffic varying from low bit-rate to very high bit-rate. The proposed protocol is an excellent compromise...

  7. 77 FR 52043 - Privacy Act of 1974; Proposed Exempt New System of Records

    Science.gov (United States)

    2012-08-28

    ... networks. According to DHS' Privacy Impact Assessment for Einstein 2 (available on the DHS Cybersecurity... maintained on portable/mobile storage devices only for valid, business purposes, with prior approval, and in... access (i.e., valid, business need- to-know). Records from this system are available to the System...

  8. Prevalence of Sharing Access Credentials in Electronic Medical Records

    Science.gov (United States)

    Korach, Tzfania; Shreberk-Hassidim, Rony; Thomaidou, Elena; Uzefovsky, Florina; Ayal, Shahar; Ariely, Dan

    2017-01-01

    Objectives Confidentiality of health information is an important aspect of the physician patient relationship. The use of digital medical records has made data much more accessible. To prevent data leakage, many countries have created regulations regarding medical data accessibility. These regulations require a unique user ID for each medical staff member, and this must be protected by a password, which should be kept undisclosed by all means. Methods We performed a four-question Google Forms-based survey of medical staff. In the survey, each participant was asked if he/she ever obtained the password of another medical staff member. Then, we asked how many times such an episode occurred and the reason for it. Results A total of 299 surveys were gathered. The responses showed that 220 (73.6%) participants reported that they had obtained the password of another medical staff member. Only 171 (57.2%) estimated how many time it happened, with an average estimation of 4.75 episodes. All the residents that took part in the study (45, 15%) had obtained the password of another medical staff member, while only 57.5% (38/66) of the nurses reported this. Conclusions The use of unique user IDs and passwords to defend the privacy of medical data is a common requirement in medical organizations. Unfortunately, the use of passwords is doomed because medical staff members share their passwords with one another. Strict regulations requiring each staff member to have it's a unique user ID might lead to password sharing and to a decrease in data safety. PMID:28875052

  9. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  10. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  11. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abdul Razaque

    2014-03-01

    Full Text Available This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC for wireless sensor networks (WSNs, which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN, which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS, which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS, which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  12. Optical interconnection network for parallel access to multi-rank memory in future computing systems.

    Science.gov (United States)

    Wang, Kang; Gu, Huaxi; Yang, Yintang; Wang, Kun

    2015-08-10

    With the number of cores increasing, there is an emerging need for a high-bandwidth low-latency interconnection network, serving core-to-memory communication. In this paper, aiming at the goal of simultaneous access to multi-rank memory, we propose an optical interconnection network for core-to-memory communication. In the proposed network, the wavelength usage is delicately arranged so that cores can communicate with different ranks at the same time and broadcast for flow control can be achieved. A distributed memory controller architecture that works in a pipeline mode is also designed for efficient optical communication and transaction address processes. The scaling method and wavelength assignment for the proposed network are investigated. Compared with traditional electronic bus-based core-to-memory communication, the simulation results based on the PARSEC benchmark show that the bandwidth enhancement and latency reduction are apparent.

  13. Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2015-01-01

    Full Text Available Within the challenging environment of intelligent transportation systems (ITS, networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However, cognitive radio (CR combines the capacity to sense the radio spectrum with the flexibility to adapt to transmission parameters in order to maximize system performance and has thus become an effective approach for the design of dynamic spectrum access (DSA mechanisms. This paper presents the enhanced noncooperative cognitive division multiple access (ENCCMA proposal combining time division multiple access (TDMA and frequency division multiple access (FDMA schemes with CR techniques to obtain a mechanism fulfilling the requirements of real-time communications. The analysis presented here considers the IEEE WAVE and 802.11p as reference standards; however, the proposed medium access control (MAC mechanism can be adapted to operate on the physical layer of different standards. The mechanism also offers the advantage of avoiding signaling, thus enhancing system autonomy as well as behavior in adverse scenarios.

  14. Statistics of the uplink co-tier interference in closed access heterogeneous networks

    KAUST Repository

    Tabassum, Hina

    2013-09-01

    In this paper, we derive a statistical model of the co-tier interference in closed access two tier heterogeneous wireless cellular networks with femtocell deployments. The derived model captures the impact of bounded path loss model, wall penetration loss, user distributions, random locations, and density of the femtocells. Firstly, we derive the analytical expressions for the probability density function (PDF) and moment generating function (MGF) of the co-tier interference considering a single femtocell interferer by exploiting the random disc line picking theory from geometric probability. We then derive the MGF of the cumulative interference from all femtocell interferers considering full spectral reuse in each femtocell. Orthogonal spectrum partitioning is assumed between the macrocell and femtocell networks to avoid any cross-tier interference. Finally, the accuracy of the derived expressions is validated through Monte-Carlo simulations and the expressions are shown to be useful in quantifying important network performance metrics such as ergodic capacity. © 2013 IEEE.

  15. Optimal Design of Multitype Groundwater Monitoring Networks Using Easily Accessible Tools.

    Science.gov (United States)

    Wöhling, Thomas; Geiges, Andreas; Nowak, Wolfgang

    2016-11-01

    Monitoring networks are expensive to establish and to maintain. In this paper, we extend an existing data-worth estimation method from the suite of PEST utilities with a global optimization method for optimal sensor placement (called optimal design) in groundwater monitoring networks. Design optimization can include multiple simultaneous sensor locations and multiple sensor types. Both location and sensor type are treated simultaneously as decision variables. Our method combines linear uncertainty quantification and a modified genetic algorithm for discrete multilocation, multitype search. The efficiency of the global optimization is enhanced by an archive of past samples and parallel computing. We demonstrate our methodology for a groundwater monitoring network at the Steinlach experimental site, south-western Germany, which has been established to monitor river-groundwater exchange processes. The target of optimization is the best possible exploration for minimum variance in predicting the mean travel time of the hyporheic exchange. Our results demonstrate that the information gain of monitoring network designs can be explored efficiently and with easily accessible tools prior to taking new field measurements or installing additional measurement points. The proposed methods proved to be efficient and can be applied for model-based optimal design of any type of monitoring network in approximately linear systems. Our key contributions are (1) the use of easy-to-implement tools for an otherwise complex task and (2) yet to consider data-worth interdependencies in simultaneous optimization of multiple sensor locations and sensor types. © 2016, National Ground Water Association.

  16. Symmetric reconfigurable capacity assignment in a bidirectional DWDM access network.

    Science.gov (United States)

    Ortega, Beatriz; Mora, José; Puerto, Gustavo; Capmany, José

    2007-12-10

    This paper presents a novel architecture for DWDM bidirectional access networks providing symmetric dynamic capacity allocation for both downlink and uplink signals. A foldback arrayed waveguide grating incorporating an optical switch enables the experimental demonstration of flexible assignment of multiservice capacity. Different analog and digital services, such as CATV, 10 GHz-tone, 155Mb/s PRBS and UMTS signals have been transmitted in order to successfully test the system performance under different scenarios of total capacity distribution from the Central Station to different Base Stations with two reconfigurable extra channels for each down and upstream direction.

  17. Bayesian neural network modeling of tree-ring temperature variability record from the Western Himalayas

    Directory of Open Access Journals (Sweden)

    R. K. Tiwari

    2011-08-01

    Full Text Available A novel technique based on the Bayesian neural network (BNN theory is developed and employed to model the temperature variation record from the Western Himalayas. In order to estimate an a posteriori probability function, the BNN is trained with the Hybrid Monte Carlo (HMC/Markov Chain Monte Carlo (MCMC simulations algorithm. The efficacy of the new algorithm is tested on the well known chaotic, first order autoregressive (AR and random models and then applied to model the temperature variation record decoded from the tree-ring widths of the Western Himalayas for the period spanning over 1226–2000 AD. For modeling the actual tree-ring temperature data, optimum network parameters are chosen appropriately and then cross-validation test is performed to ensure the generalization skill of the network on the new data set. Finally, prediction result based on the BNN model is compared with the conventional artificial neural network (ANN and the AR linear models results. The comparative results show that the BNN based analysis makes better prediction than the ANN and the AR models. The new BNN modeling approach provides a viable tool for climate studies and could also be exploited for modeling other kinds of environmental data.

  18. Hybrid Access Femtocells in Overlaid MIMO Cellular Networks with Transmit Selection under Poisson Field Interference

    KAUST Repository

    Abdel Nabi, Amr A

    2017-09-21

    This paper analyzes the performance of hybrid control-access schemes for small cells (such as femtocells) in the context of two-tier overlaid cellular networks. The proposed hybrid access schemes allow for sharing the same downlink resources between the small-cell network and the original macrocell network, and their mode of operations are characterized considering post-processed signal-to-interference-plus-noise ratios (SINRs) or pre-processed interference-aware operation. The work presents a detailed treatment of achieved performance of a desired user that benefits from MIMO arrays configuration through the use of transmit antenna selection (TAS) and maximal ratio combining (MRC) in the presence of Poisson field interference processes on spatial links. Furthermore, based on the interference awareness at the desired user, two TAS approaches are treated, which are the signal-to-noise (SNR)-based selection and SINR-based selection. The analysis is generalized to address the cases of highly-correlated and un-correlated aggregated interference on different transmit channels. In addition, the effect of delayed TAS due to imperfect feedback and the impact of arbitrary TAS processing are investigated. The analytical results are validated by simulations, to clarify some of the main outcomes herein.

  19. Hybrid Access Femtocells in Overlaid MIMO Cellular Networks with Transmit Selection under Poisson Field Interference

    KAUST Repository

    Abdel Nabi, Amr A; Al-Qahtani, Fawaz S.; Radaydeh, Redha Mahmoud Mesleh; Shaqfeh, Mohammed

    2017-01-01

    This paper analyzes the performance of hybrid control-access schemes for small cells (such as femtocells) in the context of two-tier overlaid cellular networks. The proposed hybrid access schemes allow for sharing the same downlink resources between the small-cell network and the original macrocell network, and their mode of operations are characterized considering post-processed signal-to-interference-plus-noise ratios (SINRs) or pre-processed interference-aware operation. The work presents a detailed treatment of achieved performance of a desired user that benefits from MIMO arrays configuration through the use of transmit antenna selection (TAS) and maximal ratio combining (MRC) in the presence of Poisson field interference processes on spatial links. Furthermore, based on the interference awareness at the desired user, two TAS approaches are treated, which are the signal-to-noise (SNR)-based selection and SINR-based selection. The analysis is generalized to address the cases of highly-correlated and un-correlated aggregated interference on different transmit channels. In addition, the effect of delayed TAS due to imperfect feedback and the impact of arbitrary TAS processing are investigated. The analytical results are validated by simulations, to clarify some of the main outcomes herein.

  20. An Experimental Performance Measurement of Implemented Wireless Access Point for Interworking Wi-Fi and HSDPA Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of WAP(Wireless Access Point) that provides the wireless Internet access anywhere. Implemented WAP can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. WAP in the IP mechanism has to process connection setup procedure to one wireless WAN. Also, WAP can provide connection management procedures to reconnect interrupted connection automatically. By using WAP, several mobile devices such as netbook, UMPC and smart-phone in a moving vehicle can access to HSDPA network simultaneously. So, it has more convenient for using the WAP when there are needs to access wireless Internet more than two mobile devices in restricted spaces such as car, train and ship.

  1. Security of social network credentials for accessing course portal: Users' experience

    Science.gov (United States)

    Katuk, Norliza; Fong, Choo Sok; Chun, Koo Lee

    2015-12-01

    Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications' database. Although it has been used by many web application providers, its' applicability in accessing learning materials is not yet fully investigated. Hence, this research aims to explore users' (i.e., instructors' and students') perception and experience on the security of SL for accessing learning contents. A course portal was developed for students at a higher learning institution and it provides two types of user authentications (i) traditional user authentication, and (ii) SL facility. Users comprised instructors and students evaluated the login facility of the course portal through a controlled lab experimental study following the within-subject design. The participants provided their feedback in terms of the security of SL for accessing learning contents. The study revealed that users preferred to use SL over the traditional authentication, however, they concerned on the security of SL and their privacy.

  2. 36 CFR 1256.98 - Can I get access to and obtain copies of USIA audiovisual records transferred to the National...

    Science.gov (United States)

    2010-07-01

    ... obtain copies of USIA audiovisual records transferred to the National Archives of the United States? 1256... United States Information Agency Audiovisual Materials in the National Archives of the United States § 1256.98 Can I get access to and obtain copies of USIA audiovisual records transferred to the National...

  3. Wired and wireless convergent extended-reach optical access network using direct-detection of all-optical OFDM super-channel signal.

    Science.gov (United States)

    Chow, C W; Yeh, C H; Sung, J Y; Hsu, C W

    2014-12-15

    We propose and demonstrate the feasibility of using all-optical orthogonal frequency division multiplexing (AO-OFDM) for the convergent optical wired and wireless access networks. AO-OFDM relies on all-optically generated orthogonal subcarriers; hence, high data rate (> 100 Gb/s) can be easily achieved without hitting the speed limit of electronic digital-to-analog and analog-to-digital converters (DAC/ADC). A proof-of-concept convergent access network using AO-OFDM super-channel (SC) is demonstrated supporting 40 - 100 Gb/s wired and gigabit/s 100 GHz millimeter-wave (MMW) ROF transmissions.

  4. Optimizing Cooperative Cognitive Radio Networks with Opportunistic Access

    KAUST Repository

    Zafar, Ammar; Alouini, Mohamed-Slim; Chen, Yunfei; Radaydeh, Redha M.

    2012-01-01

    Optimal resource allocation for cooperative cognitive radio networks with opportunistic access to the licensed spectrum is studied. Resource allocation is based on minimizing the symbol error rate at the receiver. Both the cases of all-participate relaying and selective relaying are considered. The objective function is derived and the constraints are detailed for both scenarios. It is then shown that the objective functions and the constraints are nonlinear and nonconvex functions of the parameters of interest, that is, source and relay powers, symbol time, and sensing time. Therefore, it is difficult to obtain closed-form solutions for the optimal resource allocation. The optimization problem is then solved using numerical techniques. Numerical results show that the all-participate system provides better performance than its selection counterpart, at the cost of greater resources. © 2012 Ammar Zafar et al.

  5. Optimizing Cooperative Cognitive Radio Networks with Opportunistic Access

    KAUST Repository

    Zafar, Ammar

    2012-09-16

    Optimal resource allocation for cooperative cognitive radio networks with opportunistic access to the licensed spectrum is studied. Resource allocation is based on minimizing the symbol error rate at the receiver. Both the cases of all-participate relaying and selective relaying are considered. The objective function is derived and the constraints are detailed for both scenarios. It is then shown that the objective functions and the constraints are nonlinear and nonconvex functions of the parameters of interest, that is, source and relay powers, symbol time, and sensing time. Therefore, it is difficult to obtain closed-form solutions for the optimal resource allocation. The optimization problem is then solved using numerical techniques. Numerical results show that the all-participate system provides better performance than its selection counterpart, at the cost of greater resources. © 2012 Ammar Zafar et al.

  6. Teach yourself visually Access 2013

    CERN Document Server

    McFedries, Paul

    2013-01-01

    The easy, visual way to learn this popular database program Part of the Office 2013 productivity suite, Access enables you to organize, present, analyze, and share data on a network or over the web. With this Visual guide to show you how, you'll master the fundamentals of this robust database application in no time. Clear, step-by-step instructions are illustrated with full-color screen shots that show exactly what you should see on your screen. Learn to enter new records; create, edit, and design tables and forms; develop queries that generate specific reports; add smart tags to y

  7. A method to implement fine-grained access control for personal health records through standard relational database queries.

    Science.gov (United States)

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.

  8. Software defined access networks

    OpenAIRE

    Maricato, José Miguel Duarte

    2016-01-01

    With the increase of internet usage and the exponential growth of bandwidth consumption due to the increasing number of users of new generation equipments and the creation of new services that consume increasingly higher bandwidths, it's necessary to nd solutions to meet these new requirements. Passive optical networks (PONs) promise to solve these problems by providing a better service to users and providers. PON networks are very attractive since they don't depend on a...

  9. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Science.gov (United States)

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  10. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Directory of Open Access Journals (Sweden)

    Seungsoo Baek

    2014-01-01

    Full Text Available There has been an explosive increase in the population of the OSN (online social network in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  11. First steps towards semantic descriptions of electronic laboratory notebook records.

    Science.gov (United States)

    Coles, Simon J; Frey, Jeremy G; Bird, Colin L; Whitby, Richard J; Day, Aileen E

    2013-12-20

    In order to exploit the vast body of currently inaccessible chemical information held in Electronic Laboratory Notebooks (ELNs) it is necessary not only to make it available but also to develop protocols for discovery, access and ultimately automatic processing. An aim of the Dial-a-Molecule Grand Challenge Network is to be able to draw on the body of accumulated chemical knowledge in order to predict or optimize the outcome of reactions. Accordingly the Network drew up a working group comprising informaticians, software developers and stakeholders from industry and academia to develop protocols and mechanisms to access and process ELN records. The work presented here constitutes the first stage of this process by proposing a tiered metadata system of knowledge, information and processing where each in turn addresses a) discovery, indexing and citation b) context and access to additional information and c) content access and manipulation. A compact set of metadata terms, called the elnItemManifest, has been derived and caters for the knowledge layer of this model. The elnItemManifest has been encoded as an XML schema and some use cases are presented to demonstrate the potential of this approach.

  12. Toward Proper Authentication Methods in Electronic Medical Record Access Compliant to HIPAA and C.I.A. Triangle.

    Science.gov (United States)

    Tipton, Stephen J; Forkey, Sara; Choi, Young B

    2016-04-01

    This paper examines various methods encompassing the authentication of users in accessing Electronic Medical Records (EMRs). From a methodological perspective, multiple authentication methods have been researched from both a desktop and mobile accessibility perspective. Each method is investigated at a high level, along with comparative analyses, as well as real world examples. The projected outcome of this examination is a better understanding of the sophistication required in protecting the vital privacy constraints of an individual's Protected Health Information (PHI). In understanding the implications of protecting healthcare data in today's technological world, the scope of this paper is to grasp an overview of confidentiality as it pertains to information security. In addressing this topic, a high level overview of the three goals of information security are examined; in particular, the goal of confidentiality is the primary focus. Expanding upon the goal of confidentiality, healthcare accessibility legal aspects are considered, with a focus upon the Health Insurance Portability and Accountability Act of 1996 (HIPAA). With the primary focus of this examination being access to EMRs, the paper will consider two types of accessibility of concern: access from a physician, or group of physicians; and access from an individual patient.

  13. 32 CFR 701.107 - Record access.

    Science.gov (United States)

    2010-07-01

    ... copies of “all records pertaining to them,” because they do not have a centralized index that would allow... penalty under the laws of the United States of America that the foregoing is true and correct.” (j... military supervisory personnel concerning subordinates are not systems of records within the meaning of...

  14. Multimedia Health Records: user-centered design approach for a multimedia uploading service.

    Science.gov (United States)

    Plazzotta, Fernando; Mayan, John C; Storani, Fernando D; Ortiz, Juan M; Lopez, Gastón E; Gimenez, Gastón M; Luna, Daniel R

    2015-01-01

    Multimedia elements add value to text documents by transmitting information difficult to express in words. In healthcare, many professional and services keep this elements in their own repositories. This brings the problem of information fragmentation in different silos which hinder its access to other healthcare professionals. On the other hand patients have clinical data of their own in different formats generated in different healthcare organizations which is not accessible to professionals within our healthcare network. This paper describes the design, development and implementation processes of a service which allows media elements to be loaded in a patient clinical data repository (CDR) either through an electronic health record by professionals (EHR) or through a personal health record (PHR) by patients, in order to avoid fragmentation of the information.

  15. 28 CFR 700.31 - Exemption of the Office of Independent Counsel's systems of records-limited access.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Exemption of the Office of Independent Counsel's systems of records-limited access. 700.31 Section 700.31 Judicial Administration OFFICE OF INDEPENDENT COUNSEL PRODUCTION OR DISCLOSURE OF MATERIAL OR INFORMATION OF THE OFFICE OF INDEPENDENT COUNSEL Exemption of the Office of Independent...

  16. Assessing Individual Social Capital Capacity: The Development and Validation of a Network Accessibility Scale

    Science.gov (United States)

    Hatala, John-Paul

    2009-01-01

    Any organization that is able to promote the importance of increased levels of social capital and individuals who can leverage and use the resources that exist within the network may experience higher levels of performance. This study sought to add to our knowledge about individuals' accessing social resources for the purpose of accomplishing…

  17. Oceans 2.0 API: Programmatic access to Ocean Networks Canada's sensor data.

    Science.gov (United States)

    Heesemann, M.; Ross, R.; Hoeberechts, M.; Pirenne, B.; MacArthur, M.; Jeffries, M. A.; Morley, M. G.

    2017-12-01

    Ocean Networks Canada (ONC) is a not-for-profit society that operates and manages innovative cabled observatories on behalf of the University of Victoria. These observatories supply continuous power and Internet connectivity to various scientific instruments located in coastal, deep-ocean and Arctic environments. The data from the instruments are relayed to the University of Victoria where they are archived, quality-controlled and made freely available to researchers, educators, and the public. The Oceans 2.0 data management system currently contains over 500 terabytes of data collected over 11 years from thousands of sensors. In order to facilitate access to the data, particularly for large datasets and long-time series of high-resolution data, a project was started in 2016 create a comprehensive Application Programming Interface, the "Oceans 2.0 API," to provide programmatic access to all ONC data products. The development is part of a project entitled "A Research Platform for User-Defined Oceanographic Data Products," funded through CANARIE, a Canadian organization responsible for the design and delivery of digital infrastructure for research, education and innovation [1]. Providing quick and easy access to ONC Data Products from within custom software solutions, allows researchers, modelers and decision makers to focus on what is important: solving their problems, answering their questions and making informed decisions. In this paper, we discuss how to access ONC's vast archive of data programmatically, through the Oceans 2.0 API. In particular we discuss the following: Access to ONC Data Products Access to ONC sensor data in near real-time Programming language support Use Cases References [1] CANARIE. Internet: https://www.canarie.ca/; accessed March 6, 2017.

  18. The shipper as the architect of contractual relations in access to natural gas networks

    International Nuclear Information System (INIS)

    Codognet, Marc-Kevin

    2005-01-01

    Transportation and contractual arrangements are in the kernel of the natural gas reform in Europe. Since third party can access to pipelines, those who wish to ship gas between two locations of a gas network have to arrange transportation services. Natural gas transportation is a set of contractual arrangements and has become a complex contracting process. This paper aims at analyzing the typical economic functions of shippers in third-party access regimes in the natural gas industry in a transaction costs approach. Shippers provide and combine intermediation functions in transportation services markets: information management, matching, bundling and transactions guarantees. In this context, the shipper has appeared as a particular market intermediary specialized in transportation arrangements in the new regime of third party access in the natural gas industry. (Author)

  19. Multimedia information processing in the SWAN mobile networked computing system

    Science.gov (United States)

    Agrawal, Prathima; Hyden, Eoin; Krzyzanowsji, Paul; Srivastava, Mani B.; Trotter, John

    1996-03-01

    Anytime anywhere wireless access to databases, such as medical and inventory records, can simplify workflow management in a business, and reduce or even eliminate the cost of moving paper documents. Moreover, continual progress in wireless access technology promises to provide per-user bandwidths of the order of a few Mbps, at least in indoor environments. When combined with the emerging high-speed integrated service wired networks, it enables ubiquitous and tetherless access to and processing of multimedia information by mobile users. To leverage on this synergy an indoor wireless network based on room-sized cells and multimedia mobile end-points is being developed at AT&T Bell Laboratories. This research network, called SWAN (Seamless Wireless ATM Networking), allows users carrying multimedia end-points such as PDAs, laptops, and portable multimedia terminals, to seamlessly roam while accessing multimedia data streams from the wired backbone network. A distinguishing feature of the SWAN network is its use of end-to-end ATM connectivity as opposed to the connectionless mobile-IP connectivity used by present day wireless data LANs. This choice allows the wireless resource in a cell to be intelligently allocated amongst various ATM virtual circuits according to their quality of service requirements. But an efficient implementation of ATM in a wireless environment requires a proper mobile network architecture. In particular, the wireless link and medium-access layers need to be cognizant of the ATM traffic, while the ATM layers need to be cognizant of the mobility enabled by the wireless layers. This paper presents an overview of SWAN's network architecture, briefly discusses the issues in making ATM mobile and wireless, and describes initial multimedia applications for SWAN.

  20. Heard it through the grapevine: indirect networks and employee creativity.

    Science.gov (United States)

    Hirst, Giles; Van Knippenberg, Daan; Zhou, Jing; Quintane, Eric; Zhu, Cherrie

    2015-03-01

    Social networks can be important sources of information and insights that may spark employee creativity. The cross-fertilization of ideas depends not just on access to information and insights through one's direct network-the people one actually interacts with--but at least as much on access to the indirect network one's direct ties connect one to (i.e., people one does not interact with directly, but with whom one's direct ties interact). We propose that the reach efficiency of this indirect network--its nonredundancy in terms of interconnections--is positively related to individual creativity. To help specify the boundaries of this positive influence of the indirect network, we also explore how many steps removed the indirect network still adds to creativity. In addition, we propose that the efficiency (nonredundancy) of one's direct network is important here, because more efficient direct networks give one access to indirect networks with greater reach efficiency. Our hypotheses were supported in a multilevel analysis of multisource survey data from 223 sales representatives nested within 11 divisions of a Chinese pharmaceutical company. This analysis also showed that the creative benefits of reach efficiency were evident for 3 and 4 degrees of separation but were greatest for indirect ties that depend only on one's direct ties. PsycINFO Database Record (c) 2015 APA, all rights reserved.

  1. Coherent detection passive optical access network enabling converged delivery of broadcast and dedicated broadband services

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich; Prince, Kamau; Guerrero Gonzalez, Neil

    2011-01-01

    We propose a passive optical network architecture based on coherent detection for converged delivery of broadcast services from a dedicated remote broadcast server and user-specific services from a local central office. We experimentally demonstrate this architecture with mixed traffic types....... The broadcast channels were transmitted over 78 km of single mode fiber to a central office where they were multiplexed with the unicast channels for further fiber transmission over 34-km to reach the access network. Successful detection of all channels is demonstrated....

  2. 47 CFR 27.16 - Network access requirements for Block C in the 746-757 and 776-787 MHz bands.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Network access requirements for Block C in the 746-757 and 776-787 MHz bands. 27.16 Section 27.16 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... network restrictions on industry-wide consensus standards, such restrictions would be presumed reasonable...

  3. Probabilistic Medium Access Control for Full-Duplex Networks with Half-Duplex Clients

    OpenAIRE

    Chen, Shih-Ying; Huang, Ting-Feng; Lin, Kate Ching-Ju; Hong, H. -W. Peter; Sabharwal, Ashutosh

    2016-01-01

    The feasibility of practical in-band full-duplex radios has recently been demonstrated experimentally. One way to leverage full-duplex in a network setting is to enable three-node full-duplex, where a full- duplex access point (AP) transmits data to one node yet simultaneously receives data from another node. Such three-node full-duplex communication however introduces inter-client interference, directly impacting the full-duplex gain. It hence may not always be beneficial to enable three-nod...

  4. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  5. The Cadmio XML healthcare record.

    Science.gov (United States)

    Barbera, Francesco; Ferri, Fernando; Ricci, Fabrizio L; Sottile, Pier Angelo

    2002-01-01

    The management of clinical data is a complex task. Patient related information reported in patient folders is a set of heterogeneous and structured data accessed by different users having different goals (in local or geographical networks). XML language provides a mechanism for describing, manipulating, and visualising structured data in web-based applications. XML ensures that the structured data is managed in a uniform and transparent manner independently from the applications and their providers guaranteeing some interoperability. Extracting data from the healthcare record and structuring them according to XML makes the data available through browsers. The MIC/MIE model (Medical Information Category/Medical Information Elements), which allows the definition and management of healthcare records and used in CADMIO, a HISA based project, is described in this paper, using XML for allowing the data to be visualised through web browsers.

  6. Planning of Efficient Wireless Access with IEEE 802.16 for Connecting Home Network to the Internet

    Directory of Open Access Journals (Sweden)

    Pichet Ritthisoonthorn

    2010-01-01

    Full Text Available The emergence of IEEE802.16 wireless standard technology (WiMAX has significantly increased the choice to operators for the provisioning of wireless broadband access network. WiMAX is being deployed to compliment with xDSL in underserved or lack of the broadband network area, in both developed and developing countries. Many incumbent operators in developing countries are considering the deployment of WiMAX as part of their broadband access strategy. This paper presents an efficient and simple method for planning of broadband fixed wireless access (BFWA with IEEE802.16 standard to support home connection to Internet. The study formulates the framework for planning both coverage and capacity designs. The relationship between coverage area and access rate from subscriber in each environment area is presented. The study also presents the throughput and channel capacity of IEEE802.16 in different access rates. An extensive analysis is performed and the results are applied to the real case study to demonstrate the practicality of using IEEE 802.16 for connecting home to Internet. Using empirical data and original subscriber traffic from measurement, it is shown that the BFWA with IEEE802.16 standard is a capacity limited system. The capacity of IEEE802.16 is related to different factors including frequency bandwidth, spectrum allocation, estimation of traffic per subscriber, and choice of adaptive modulation from subscriber terminal. The wireless access methods and procedures evolved in this research work and set out in this paper are shown to be well suited for planning BFWA system based on IEEE802.16 which supports broadband home to Internet connections.

  7. Use of a wireless local area network in an orthodontic clinic.

    Science.gov (United States)

    Mupparapu, Muralidhar; Binder, Robert E; Cummins, John M

    2005-06-01

    Radiographic images and other patient records, including medical histories, demographics, and health insurance information, can now be stored digitally and accessed via patient management programs. However, digital image acquisition and diagnosis and treatment planning are independent tasks, and each is time consuming, especially when performed at different computer workstations. Networking or linking the computers in an office enhances access to imaging and treatment planning tools. Access can be further enhanced if the entire network is wireless. Thanks to wireless technology, stand-alone, desk-bound personal computers have been replaced with mobile, hand-held devices that can communicate with each other and the rest of the world via the Internet. As with any emerging technology, some issues should be kept in mind when adapting to the wireless environment. Foremost is network security. Second is the choice of mobile hardware devices that are used by the orthodontist, office staff, and patients. This article details the standards and choices in wireless technology that can be implemented in an orthodontic clinic and suggests how to select suitable mobile hardware for accessing or adding data to a preexisting network. The network security protocols discussed comply with HIPAA regulations and boost the efficiency of a modern orthodontic clinic.

  8. A national seismographic network for assessing seismic hazards

    International Nuclear Information System (INIS)

    Masse, R.P.; Murphy, A.J.

    1989-01-01

    To access the seismic hazard of a region and to establish the design and construction criteria for critical facilities such as nuclear power plants, detailed information is required on the frequency of occurrence, geographical distribution, magnitude, and energy spectra of earthquakes. Also important is information on the frequency-dependent attenuation of seismic waves. This information can all be obtained from data recorded by networks of seismograph stations. A new seismograph network for the US which takes advantage of advances in technology is currently under development. This network is the US National Seismograph Network (USNSN). The USNSN is a cooperative effort between the National Earthquake Information Center (NEIC) of the US Geological survey and the Nuclear Regulatory Commission. The USNSN will be installed and operated by the NEIC. The network will consist of approximately 150 seismograph stations distributed across the lower 48 states and across Alaska, Hawaii, Puerto Rico, and the Virgin Islands. The design goal for the network is the on-scale recording by at least five well-distributed stations of any event of magnitude 2.5 or larger in the continental US, Hawaii, and Puerto Rico, and of any event of magnitude 3.5 or larger in Alaska. The rapid access to all USNSN data will be provided by the NEIC. This will be accomplished both via a dial-up capability to the event waveform data base and by satellite transmission in a broadcast mode. All earthquake data will also be distributed on compact disk with read only memory (CD-ROM) to all institutions having an interest in the seismic data

  9. Securing optical code-division multiple-access networks with a postswitching coding scheme of signature reconfiguration

    Science.gov (United States)

    Huang, Jen-Fa; Meng, Sheng-Hui; Lin, Ying-Chen

    2014-11-01

    The optical code-division multiple-access (OCDMA) technique is considered a good candidate for providing optical layer security. An enhanced OCDMA network security mechanism with a pseudonoise (PN) random digital signals type of maximal-length sequence (M-sequence) code switching to protect against eavesdropping is presented. Signature codes unique to individual OCDMA-network users are reconfigured according to the register state of the controlling electrical shift registers. Examples of signature reconfiguration following state switching of the controlling shift register for both the network user and the eavesdropper are numerically illustrated. Dynamically changing the PN state of the shift register to reconfigure the user signature sequence is shown; this hinders eavesdroppers' efforts to decode correct data sequences. The proposed scheme increases the probability of eavesdroppers committing errors in decoding and thereby substantially enhances the degree of an OCDMA network's confidentiality.

  10. Dynamic Downlink Spectrum Access for D2D-Enabled Heterogeneous Networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh

    2018-01-15

    This paper proposes new approaches for underlay device- to-device (D2D) communication in spectrum-shared het- erogeneous cellular networks. It considers devices that share downlink resources and have an enabled D2D feature to improve coverage. The mode of operation classifies devices according to their experienced base station (BS) coverage, potential to be served by BS, ability of BS to meet their quality of service (QoS), and their downlink resources occupancy. The initiation of D2D cooperation is conditioned on proposed provisional access by an active device, wherein its serving BS attempts to meet its QoS using as low number of spectrum channels as possible, while treating remaining channels for feasible D2D cooperation. Detailed formulations for the mode of operation and a proposed D2D path allocation scheme are presented under perfect and imperfect operation scenarios. The developed results are generally applicable for any performance metric and network model.

  11. Multistandard wireless transmission over SSMF and large-core POF for access and in-home networks

    NARCIS (Netherlands)

    Shi, Y.; Morant, M.; Okonkwo, C.M.; Llorente, R.; Tangdiongga, E.; Koonen, A.M.J.

    2012-01-01

    An end-to-end transmission of coexisting multistandard radio (LTE, WiMAX, and UWB) signals is demonstrated for the first time with the transmission over a combined access and in-home networks consisting of 25-km SSMF, 25-m large-core diameter polymethylmethacrylate graded-index plastic optical fiber

  12. Ultrafast all-optical code-division multiple-access networks

    Science.gov (United States)

    Kwong, Wing C.; Prucnal, Paul R.; Liu, Yanming

    1992-12-01

    In optical code-division multiple access (CDMA), the architecture of optical encoders/decoders is another important factor that needs to be considered, besides the correlation properties of those already extensively studied optical codes. The architecture of optical encoders/decoders affects, for example, the amount of power loss and length of optical delays that are associated with code sequence generation and correlation, which, in turn, affect the power budget, size, and cost of an optical CDMA system. Various CDMA coding architectures are studied in the paper. In contrast to the encoders/decoders used in prime networks (i.e., prime encodes/decoders), which generate, select, and correlate code sequences by a parallel combination of fiber-optic delay-lines, and in 2n networks (i.e., 2n encoders/decoders), which generate and correlate code sequences by a serial combination of 2 X 2 passive couplers and fiber delays with sequence selection performed in a parallel fashion, the modified 2n encoders/decoders generate, select, and correlate code sequences by a serial combination of directional couplers and delays. The power and delay- length requirements of the modified 2n encoders/decoders are compared to that of the prime and 2n encoders/decoders. A 100 Mbit/s optical CDMA experiment in free space demonstrating the feasibility of the all-serial coding architecture using a serial combination of 50/50 beam splitters and retroreflectors at 10 Tchip/s (i.e., 100,000 chip/bit) with 100 fs laser pulses is reported.

  13. The use of mapped network drive to enhance the availability and accessibility of patient archive in ge-elscint Xpert workstations

    International Nuclear Information System (INIS)

    Chau; Kam Hung

    2004-01-01

    Purpose: To enhance the search and retrieval of patients' past record for clinical purpose. Methods: In the past, patient data was stored by MOD (Magnetic Optical Disk - Write Many Read Many). Its capacity is 327 MByte per side (654 MByte Total). In our department, each disk take up around 10 days of study. To search for patients' past record, we need to pick up a particular disk from a pile of MODs. With the advent of high speed network and high capacity hard disk, we have developed a method to put patients' past record on line so that the search was made easier and faster. The GE-Elscint Xpert Workstation is running on OS/2 Warp Connect Version 3 with inherent TCP/IP support. The current application is Apex Xpert Version 5.13. The Central Archive Unit is a 9 Gbyte Hard Disk which limited the on-line capacity of around 6 months. The Workstation was connected to a Windows NT based PC on the network. A folder was created and shared for network access. To make resources sharing possible. We installed OS/2Warp Connect software - IBM Peer for OS/2 on the Xpert Workstation. In addition, the Xpert based system was configured to be able to initiate communication with remote TCP/IP and ApexNet nodes. On the Xpert Workstation, Ne apply drive mapping by assigning a drive letter to the remote share located on the Windows NT based PC. To map a shared folder to a drive letter, specify the drive letter and the share's name on the Net Use command. For example, net use s: //WinNTPC /DataFilesmaps the DataFiles share on the WinNTPC computer to drive S. If any folder in the share's path contains a space, you must put the entire path, including the opening double backslash (//), in quotation marks. Connections to NT resources can also be made through the OS/2 network browser, the Sharing and Connecting Graphic User Interface on the Desktop. An active user ID and password authorizes the user to browse and use shared drives. With this mapped drive, we can copy patient record to it. The

  14. Pharma Pricing & Market Access Europe 2016--Health Network Communications' Tenth Annual Conference (February 23-25, 2016--London, UK).

    Science.gov (United States)

    D'Souza, P

    2016-03-01

    Tighter national budgets and escalating drug prices continue to present challenges for pharmaceutical market access strategies and societal cost of care. As pharmaceutical companies and medical governmental advisory organizations enter tougher negotiations, hospital trusts and other dispensary firms face barriers to receiving the best medical treatment, and as a result patient access is limited. The 2016 HealthNetwork Communications' Pharma Pricing & Market Access Europe meeting brought together pharmaceutical, medical governmental advisory and stakeholders and market access/pricing consultants, to encourage discussions and negotiations into how to improve the drug pricing system and consequential market access strategies while achieving the respective reimbursement and affordability objectives. Copyright 2016 Prous Science, S.A.U. or its licensors. All rights reserved.

  15. Gigabit Access Passive Optical Network Using Wavelength Division Multiplexing—GigaWaM

    DEFF Research Database (Denmark)

    Iglesias Olmedo, Miguel; Suhr, Lau; Prince, Kamau

    2014-01-01

    passive optical network (WDM-PON) architecture that can deliver symmetric 1 Gb/s to 64 users over 20 km standard single mode fiber using the L and C bands for down and upstream, respectively. During the course of the project, a number of key enabling technologies were developed including tunable......This paper summarizes the research and technical achievements done under the EU project GigaWaM. The goal of this project was to develop a cost-effective solution that can meet the increasing bandwidth demands in access networks. The approach was to use a novel wavelength division multiplexing...... transceivers, athermal 50 GHz spaced arrayed waveguide grating multiplexer devices, novel hybridization technologies for integration of passive and active electro-optic devices, and system-level algorithms that ensure the quality of service. The outcome of the project proved a reliable, cost...

  16. Easy access to the version of record (VoR could help combat piracy: views from a publishing technologist

    Directory of Open Access Journals (Sweden)

    Tasha Mellins-Cohen

    2017-07-01

    Full Text Available In the 1990s many publishers saw the potential of the internet and started to move their content online. This consolidated the need for a shift in their business models from a focus on individuals to IP-mediated institutional access. Libraries were purchasing institution-wide subscriptions with access facilitated through fixed computers, in libraries and offices on campus. Over time, publishers added other institutional authentication mechanisms – trusted referrer URLs, library cards, EZProxy support, and so on – but we never addressed the poor user experience associated with off-campus access. Now, with the rise in mobile and tablet devices and increasing flexibility in work spaces, access control is failing.    In this article, I argue that we need to find a balance between our desire for security and lowering barriers to access. As an industry, we can make use of technologies and initiatives which are already in place to help us to strike that balance, encouraging users to access versions of record instead of resorting to less legitimate copies through services such as Sci-Hub.

  17. A systematic review of the status of children's school access in low- and middle-income countries between 1998 and 2013: using the INDEPTH Network platform to fill the research gaps.

    Science.gov (United States)

    Kamanda, Mamusu; Sankoh, Osman

    2015-01-01

    The framework for expanding children's school access in low- and middle-income countries (LMICs) has been directed by universal education policies as part of Education for All since 1990. In measuring progress to universal education, a narrow conceptualisation of access which dichotomises children's participation as being in or out of school has often been assumed. Yet, the actual promise of universal education goes beyond this simple definition to include retention, progression, completion, and learning. Our first objective was to identify gaps in the literature on children's school access using the zones of exclusion of the Consortium for Research on Educational Access, Transition, and Equity as a framework. Second, we gave consideration to how these gaps can be met by using longitudinal and cross-country data from Health and Demographic Surveillance System (HDSS) sites within the International Network for the Demographic Evaluation of Population and Their Health (INDEPTH) in LMICs. Using Web of Science, we conducted a literature search of studies published in international peer-reviewed journals between 1998 and 2013 in LMICs. The phrases we searched included six school outcomes: school enrolment, school attendance, grade progression, school dropout, primary to secondary school transition, and school completion. From our search, we recorded studies according to: 1) school outcomes; 2) whether longitudinal data were used; and 3) whether data from more than one country were analysed. The area of school access most published is enrolment followed by attendance and dropout. Primary to secondary school transition and grade progression had the least number of publications. Of 132 publications which we found to be relevant to school access, 33 made use of longitudinal data and 17 performed cross-country analyses. The majority of studies published in international peer-reviewed journals on children's school access between 1998 and 2013 were focused on three outcomes

  18. A systematic review of the status of children's school access in low- and middle-income countries between 1998 and 2013: using the INDEPTH Network platform to fill the research gaps

    Directory of Open Access Journals (Sweden)

    Mamusu Kamanda

    2015-11-01

    Full Text Available Background: The framework for expanding children's school access in low- and middle-income countries (LMICs has been directed by universal education policies as part of Education for All since 1990. In measuring progress to universal education, a narrow conceptualisation of access which dichotomises children's participation as being in or out of school has often been assumed. Yet, the actual promise of universal education goes beyond this simple definition to include retention, progression, completion, and learning. Objective: Our first objective was to identify gaps in the literature on children's school access using the zones of exclusion of the Consortium for Research on Educational Access, Transition, and Equity as a framework. Second, we gave consideration to how these gaps can be met by using longitudinal and cross-country data from Health and Demographic Surveillance System (HDSS sites within the International Network for the Demographic Evaluation of Population and Their Health (INDEPTH in LMICs. Design: Using Web of Science, we conducted a literature search of studies published in international peer-reviewed journals between 1998 and 2013 in LMICs. The phrases we searched included six school outcomes: school enrolment, school attendance, grade progression, school dropout, primary to secondary school transition, and school completion. From our search, we recorded studies according to: 1 school outcomes; 2 whether longitudinal data were used; and 3 whether data from more than one country were analysed. Results: The area of school access most published is enrolment followed by attendance and dropout. Primary to secondary school transition and grade progression had the least number of publications. Of 132 publications which we found to be relevant to school access, 33 made use of longitudinal data and 17 performed cross-country analyses. Conclusions: The majority of studies published in international peer-reviewed journals on children

  19. Cafe Variome: general-purpose software for making genotype-phenotype data discoverable in restricted or open access contexts.

    Science.gov (United States)

    Lancaster, Owen; Beck, Tim; Atlan, David; Swertz, Morris; Thangavelu, Dhiwagaran; Veal, Colin; Dalgleish, Raymond; Brookes, Anthony J

    2015-10-01

    Biomedical data sharing is desirable, but problematic. Data "discovery" approaches-which establish the existence rather than the substance of data-precisely connect data owners with data seekers, and thereby promote data sharing. Cafe Variome (http://www.cafevariome.org) was therefore designed to provide a general-purpose, Web-based, data discovery tool that can be quickly installed by any genotype-phenotype data owner, or network of data owners, to make safe or sensitive content appropriately discoverable. Data fields or content of any type can be accommodated, from simple ID and label fields through to extensive genotype and phenotype details based on ontologies. The system provides a "shop window" in front of data, with main interfaces being a simple search box and a powerful "query-builder" that enable very elaborate queries to be formulated. After a successful search, counts of records are reported grouped by "openAccess" (data may be directly accessed), "linkedAccess" (a source link is provided), and "restrictedAccess" (facilitated data requests and subsequent provision of approved records). An administrator interface provides a wide range of options for system configuration, enabling highly customized single-site or federated networks to be established. Current uses include rare disease data discovery, patient matchmaking, and a Beacon Web service. © 2015 WILEY PERIODICALS, INC.

  20. Efficient Priority Access to the Shared Commercial Radio with Offloading for Public Safety in LTE Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Chafika Tata

    2014-01-01

    Full Text Available This paper presents the algorithm Courteous Priority Access to the shared commercial radio with offloading (CPAwO, for public safety network (PSN over LTE heterogeneous networks (HetNets. We propose a solution for prioritization of PSN users with access to the commercial radio network resources. Our model offers additional radio resources to the PSN. Furthermore, it ensures a certain priority for commercial users by assigning quantities of additional radio resources through the courteous scheme. This allows delaying preemption and blocking bearers when the radio resources are limited. The other part of CPAwO model is to apply the principle of offloading in order to reduce the impact of the macrocell congestion. This technique is to switch the new bearers arriving at the LTE macrocells to small cells, in order to decrease the number of the blocked and interrupted bearers in the network. The results of the simulation showed that the allocation of radio resources via the courteous mechanism with offloading of new bearers to small cells reduces the rate of blocking bearers and delays the preemption of active bearers present in the LTE HetNets. It also reduces the cost of the end-to-end communications, thanks to the reallocation of free frequencies.

  1. Voltage-sensitive dye recording from networks of cultured neurons

    Science.gov (United States)

    Chien, Chi-Bin

    This thesis describes the development and testing of a sensitive apparatus for recording electrical activity from microcultures of rat superior cervical ganglion (SCG) neurons by using voltage-sensitive fluorescent dyes.The apparatus comprises a feedback-regulated mercury arc light source, an inverted epifluorescence microscope, a novel fiber-optic camera with discrete photodiode detectors, and low-noise preamplifiers. Using an NA 0.75 objective and illuminating at 10 W/cm2 with the 546 nm mercury line, a typical SCG neuron stained with the styryl dye RH423 gives a detected photocurrent of 1 nA; the light source and optical detectors are quiet enough that the shot noise in this photocurrent--about.03% rms--dominates. The design, theory, and performance of this dye-recording apparatus are discussed in detail.Styryl dyes such as RH423 typically give signals of 1%/100 mV on these cells; the signals are linear in membrane potential, but do not appear to arise from a purely electrochromic mechanism. Given this voltage sensitivity and the noise level of the apparatus, it should be possible to detect both action potentials and subthreshold synaptic potentials from SCG cell bodies. In practice, dye recording can easily detect action potentials from every neuron in an SCG microculture, but small synaptic potentials are obscured by dye signals from the dense network of axons.In another microculture system that does not have such long and complex axons, this dye-recording apparatus should be able to detect synaptic potentials, making it possible to noninvasively map the synaptic connections in a microculture, and thus to study long-term synaptic plasticity.

  2. Personalizing Access to Learning Networks

    DEFF Research Database (Denmark)

    Dolog, Peter; Simon, Bernd; Nejdl, Wolfgang

    2008-01-01

    In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address in this fra......In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address...... in this framework, enabling personalized access to federated learning repositories with a vast number of learning offers. Our infrastructure includes personalization strategies both at the query and the query results level. Query rewriting is based on learning and language preferences; rule-based and ranking...

  3. SoNeUCON_{ABC}Pro: an access control model for social networks with translucent user provenance

    OpenAIRE

    González Manzano, Lorena; Slaymaker, Mark; Fuentes García Romero de Tejada, José María de; Vayenas, Dimitris

    2018-01-01

    Proceedings of: SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017 Web-Based Social Networks (WBSNs) are used by millions of people worldwide. While WBSNs provide many benefits, privacy preservation is a concern. The management of access control can help to assure data is accessed by authorized users. However, it is critical to provide sufficient flexibility so that a rich set of conditions may be imposed by users. In this paper we coi...

  4. 75 FR 21662 - Access to Employee Exposure and Medical Records; Extension of the Office of Management and Budget...

    Science.gov (United States)

    2010-04-26

    ..., express mail, messenger, or courier service: When using this method, you must submit three copies of your... costs associated with exposure monitoring and measurement, medical surveillance, and the other... occupationally-related health impairment and disease. Providing the Agency with access to the records permits it...

  5. Ad Hoc Access Gateway Selection Algorithm

    Science.gov (United States)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  6. Data Access Based on a Guide Map of the Underwater Wireless Sensor Network.

    Science.gov (United States)

    Wei, Zhengxian; Song, Min; Yin, Guisheng; Song, Houbing; Wang, Hongbin; Ma, Xuefei; Cheng, Albert M K

    2017-10-17

    Underwater wireless sensor networks (UWSNs) represent an area of increasing research interest, as data storage, discovery, and query of UWSNs are always challenging issues. In this paper, a data access based on a guide map (DAGM) method is proposed for UWSNs. In DAGM, the metadata describes the abstracts of data content and the storage location. The center ring is composed of nodes according to the shortest average data query path in the network in order to store the metadata, and the data guide map organizes, diffuses and synchronizes the metadata in the center ring, providing the most time-saving and energy-efficient data query service for the user. For this method, firstly the data is stored in the UWSN. The storage node is determined, the data is transmitted from the sensor node (data generation source) to the storage node, and the metadata is generated for it. Then, the metadata is sent to the center ring node that is the nearest to the storage node and the data guide map organizes the metadata, diffusing and synchronizing it to the other center ring nodes. Finally, when there is query data in any user node, the data guide map will select a center ring node nearest to the user to process the query sentence, and based on the shortest transmission delay and lowest energy consumption, data transmission routing is generated according to the storage location abstract in the metadata. Hence, specific application data transmission from the storage node to the user is completed. The simulation results demonstrate that DAGM has advantages with respect to data access time and network energy consumption.

  7. QoS Differentiated and Fair Packet Scheduling in Broadband Wireless Access Networks

    Directory of Open Access Journals (Sweden)

    Zhang Yan

    2009-01-01

    Full Text Available This paper studies the packet scheduling problem in Broadband Wireless Access (BWA networks. The key difficulties of the BWA scheduling problem lie in the high variability of wireless channel capacity and the unknown model of packet arrival process. It is difficult for traditional heuristic scheduling algorithms to handle the situation and guarantee satisfying performance in BWA networks. In this paper, we introduce learning-based approach for a better solution. Specifically, we formulate the packet scheduling problem as an average cost Semi-Markov Decision Process (SMDP. Then, we solve the SMDP by using reinforcement learning. A feature-based linear approximation and the Temporal-Difference learning technique are employed to produce a near optimal solution of the corresponding SMDP problem. The proposed algorithm, called Reinforcement Learning Scheduling (RLS, has in-built capability of self-training. It is able to adaptively and timely regulate its scheduling policy according to the instantaneous network conditions. Simulation results indicate that RLS outperforms two classical scheduling algorithms and simultaneously considers: (i effective QoS differentiation, (ii high bandwidth utilization, and (iii both short-term and long-term fairness.

  8. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  9. 45 CFR 310.40 - What requirements apply for accessing systems and records for monitoring Computerized Tribal IV-D...

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false What requirements apply for accessing systems and records for monitoring Computerized Tribal IV-D Systems and Office Automation? 310.40 Section 310.40... COMPUTERIZED TRIBAL IV-D SYSTEMS AND OFFICE AUTOMATION Accountability and Monitoring Procedures for...

  10. 78 FR 55114 - Access to Employee Exposure and Medical Records; Extension of the Office of Management and Budget...

    Science.gov (United States)

    2013-09-09

    ... Courier Service: When using this method, you must submit a copy of your comments and attachments to the... and costs associated with exposure monitoring and measurement, medical surveillance, and the other... occupationally-related health impairment and disease. Providing the Agency with access to the records permits it...

  11. Assessing sensory versus optogenetic network activation by combining (o)fMRI with optical Ca2+ recordings.

    Science.gov (United States)

    Schmid, Florian; Wachsmuth, Lydia; Schwalm, Miriam; Prouvot, Pierre-Hugues; Jubal, Eduardo Rosales; Fois, Consuelo; Pramanik, Gautam; Zimmer, Claus; Faber, Cornelius; Stroh, Albrecht

    2016-11-01

    Encoding of sensory inputs in the cortex is characterized by sparse neuronal network activation. Optogenetic stimulation has previously been combined with fMRI (ofMRI) to probe functional networks. However, for a quantitative optogenetic probing of sensory-driven sparse network activation, the level of similarity between sensory and optogenetic network activation needs to be explored. Here, we complement ofMRI with optic fiber-based population Ca 2+ recordings for a region-specific readout of neuronal spiking activity in rat brain. Comparing Ca 2+ responses to the blood oxygenation level-dependent signal upon sensory stimulation with increasing frequencies showed adaptation of Ca 2+ transients contrasted by an increase of blood oxygenation level-dependent responses, indicating that the optical recordings convey complementary information on neuronal network activity to the corresponding hemodynamic response. To study the similarity of optogenetic and sensory activation, we quantified the density of cells expressing channelrhodopsin-2 and modeled light propagation in the tissue. We estimated the effectively illuminated volume and numbers of optogenetically stimulated neurons, being indicative of sparse activation. At the functional level, upon either sensory or optogenetic stimulation we detected single-peak short-latency primary Ca 2+ responses with similar amplitudes and found that blood oxygenation level-dependent responses showed similar time courses. These data suggest that ofMRI can serve as a representative model for functional brain mapping. © The Author(s) 2015.

  12. Assessing sensory versus optogenetic network activation by combining (o)fMRI with optical Ca2+ recordings

    Science.gov (United States)

    Schmid, Florian; Wachsmuth, Lydia; Schwalm, Miriam; Prouvot, Pierre-Hugues; Jubal, Eduardo Rosales; Fois, Consuelo; Pramanik, Gautam; Zimmer, Claus; Stroh, Albrecht

    2015-01-01

    Encoding of sensory inputs in the cortex is characterized by sparse neuronal network activation. Optogenetic stimulation has previously been combined with fMRI (ofMRI) to probe functional networks. However, for a quantitative optogenetic probing of sensory-driven sparse network activation, the level of similarity between sensory and optogenetic network activation needs to be explored. Here, we complement ofMRI with optic fiber-based population Ca2+ recordings for a region-specific readout of neuronal spiking activity in rat brain. Comparing Ca2+ responses to the blood oxygenation level-dependent signal upon sensory stimulation with increasing frequencies showed adaptation of Ca2+ transients contrasted by an increase of blood oxygenation level-dependent responses, indicating that the optical recordings convey complementary information on neuronal network activity to the corresponding hemodynamic response. To study the similarity of optogenetic and sensory activation, we quantified the density of cells expressing channelrhodopsin-2 and modeled light propagation in the tissue. We estimated the effectively illuminated volume and numbers of optogenetically stimulated neurons, being indicative of sparse activation. At the functional level, upon either sensory or optogenetic stimulation we detected single-peak short-latency primary Ca2+ responses with similar amplitudes and found that blood oxygenation level-dependent responses showed similar time courses. These data suggest that ofMRI can serve as a representative model for functional brain mapping. PMID:26661247

  13. Guidelines for Outsourcing Remote Access.

    Science.gov (United States)

    Hassler, Ardoth; Neuman, Michael

    1996-01-01

    Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…

  14. Performance of Non-Orthogonal Multiple Access (NOMA) in mmWave wireless communications for 5G networks

    DEFF Research Database (Denmark)

    Marcano, Andrea; Christiansen, Henrik Lehrmann

    2017-01-01

    Among the key technologies that have been identified as capacity boosters for fifth generation - 5G - mobile networks, are millimeter wave (mmWave) transmissions and non-orthogonal multiple access (NOMA). The large amount of spectrum available at mmWave frequencies combined with a more effective...... use of available resources, helps improving the overall capacity. NOMA, unlike orthogonal multiple access (OMA) methods, allows sharing the same frequency resources at the same time, by implementing adaptive power allocation. In this paper we present a performance analysis of NOMA in mmWave cells...

  15. Technical note: The US Dobson station network data record prior to 2015, re-evaluation of NDACC and WOUDC archived records with WinDobson processing software

    Science.gov (United States)

    Evans, Robert D.; Petropavlovskikh, Irina; McClure-Begley, Audra; McConville, Glen; Quincy, Dorothy; Miyagawa, Koji

    2017-10-01

    The United States government has operated Dobson ozone spectrophotometers at various sites, starting during the International Geophysical Year (1 July 1957 to 31 December 1958). A network of stations for long-term monitoring of the total column content (thickness of the ozone layer) of the atmosphere was established in the early 1960s and eventually grew to 16 stations, 14 of which are still operational and submit data to the United States of America's National Oceanic and Atmospheric Administration (NOAA). Seven of these sites are also part of the Network for the Detection of Atmospheric Composition Change (NDACC), an organization that maintains its own data archive. Due to recent changes in data processing software the entire dataset was re-evaluated for possible changes. To evaluate and minimize potential changes caused by the new processing software, the reprocessed data record was compared to the original data record archived in the World Ozone and UV Data Center (WOUDC) in Toronto, Canada. The history of the observations at the individual stations, the instruments used for the NOAA network monitoring at the station, the method for reducing zenith-sky observations to total ozone, and calibration procedures were re-evaluated using data quality control tools built into the new software. At the completion of the evaluation, the new datasets are to be published as an update to the WOUDC and NDACC archives, and the entire dataset is to be made available to the scientific community. The procedure for reprocessing Dobson data and the results of the reanalysis on the archived record are presented in this paper. A summary of historical changes to 14 station records is also provided.

  16. Joint Mode Selection and Resource Allocation for Downlink Fog Radio Access Networks Supported D2D

    Directory of Open Access Journals (Sweden)

    Xiang Hongyu

    2015-09-01

    Full Text Available Presented as an innovative paradigm incorporating the cloud computing into radio access network, Cloud radio access networks (C-RANs have been shown advantageous in curtailing the capital and operating expenditures as well as providing better services to the customers. However, heavy burden on the non-ideal fronthaul limits performances of CRANs. Here we focus on the alleviation of burden on the fronthaul via the edge devices’ caches and propose a fog computing based RAN (F-RAN architecture with three candidate transmission modes: device to device, local distributed coordination, and global C-RAN. Followed by the proposed simple mode selection scheme, the average energy efficiency (EE of systems optimization problem considering congestion control is presented. Under the Lyapunov framework, the problem is reformulated as a joint mode selection and resource allocation problem, which can be solved by block coordinate descent method. The mathematical analysis and simulation results validate the benefits of F-RAN and an EE-delay tradeoff can be achieved by the proposed algorithm.

  17. Energy Efficiency in TDMA-Based Next-Generation Passive Optical Access Networks

    KAUST Repository

    Dhaini, Ahmad R.; Ho, Pin-Han; Shen, Gangxiang; Shihada, Basem

    2014-01-01

    Next-generation passive optical network (PON) has been considered in the past few years as a cost-effective broadband access technology. With the ever-increasing power saving concern, energy efficiency has been an important issue in its operations. In this paper, we propose a novel sleep-time sizing and scheduling framework for the implementation of green bandwidth allocation (GBA) in TDMA-PONs. The proposed framework leverages the batch-mode transmission feature of GBA to minimize the overhead due to frequent ONU on-off transitions. The optimal sleeping time sequence of each ONU is determined in every cycle without violating the maximum delay requirement. With multiple ONUs possibly accessing the shared media simultaneously, a collision may occur. To address this problem, we propose a new sleep-time sizing mechanism, namely Sort-And-Shift (SAS), in which the ONUs are sorted according to their expected transmission start times, and their sleep times are shifted to resolve any possible collision while ensuring maximum energy saving. Results show the effectiveness of the proposed framework and highlight the merits of our solutions.

  18. Energy Efficiency in TDMA-Based Next-Generation Passive Optical Access Networks

    KAUST Repository

    Dhaini, Ahmad R.

    2014-06-01

    Next-generation passive optical network (PON) has been considered in the past few years as a cost-effective broadband access technology. With the ever-increasing power saving concern, energy efficiency has been an important issue in its operations. In this paper, we propose a novel sleep-time sizing and scheduling framework for the implementation of green bandwidth allocation (GBA) in TDMA-PONs. The proposed framework leverages the batch-mode transmission feature of GBA to minimize the overhead due to frequent ONU on-off transitions. The optimal sleeping time sequence of each ONU is determined in every cycle without violating the maximum delay requirement. With multiple ONUs possibly accessing the shared media simultaneously, a collision may occur. To address this problem, we propose a new sleep-time sizing mechanism, namely Sort-And-Shift (SAS), in which the ONUs are sorted according to their expected transmission start times, and their sleep times are shifted to resolve any possible collision while ensuring maximum energy saving. Results show the effectiveness of the proposed framework and highlight the merits of our solutions.

  19. Application of artificial neural networks for versatile preprocessing of electrocardiogram recordings.

    Science.gov (United States)

    Mateo, J; Rieta, J J

    2012-02-01

    The electrocardiogram (ECG) is the most widely used method for diagnosis of heart diseases, where a good quality of recordings allows the proper interpretation and identification of physiological and pathological phenomena. However, ECG recordings often have interference from noises including thermal, muscle, baseline and powerline noises. These signals severely limit ECG recording utility and, hence, have to be removed. To deal with this problem, the present paper proposes an artificial neural network (ANN) as a filter to remove all kinds of noise in just one step. The method is based on a growing ANN which optimizes both the number of nodes in the hidden layer and the coefficient matrices, which are optimized by means of the Widrow-Hoff delta algorithm. The ANN has been trained with a database comprising all kinds of noise, both from synthesized and real ECG recordings, in order to handle any noise signal present in the ECG. The proposed system improves results yielded by conventional techniques of ECG filtering, such as FIR-based systems, adaptive filtering and wavelet filtering. Therefore, the algorithm could serve as an effective framework to substantially reduce noise in ECG recordings. In addition, the resulting ECG signal distortion is notably more reduced in comparison with conventional methodologies. In summary, the current contribution introduces a new method which is able to suppress all ECG interference signals in only one step with low ECG distortion and a high noise reduction.

  20. Chromatin accessibility prediction via convolutional long short-term memory networks with k-mer embedding.

    Science.gov (United States)

    Min, Xu; Zeng, Wanwen; Chen, Ning; Chen, Ting; Jiang, Rui

    2017-07-15

    Experimental techniques for measuring chromatin accessibility are expensive and time consuming, appealing for the development of computational approaches to predict open chromatin regions from DNA sequences. Along this direction, existing methods fall into two classes: one based on handcrafted k -mer features and the other based on convolutional neural networks. Although both categories have shown good performance in specific applications thus far, there still lacks a comprehensive framework to integrate useful k -mer co-occurrence information with recent advances in deep learning. We fill this gap by addressing the problem of chromatin accessibility prediction with a convolutional Long Short-Term Memory (LSTM) network with k -mer embedding. We first split DNA sequences into k -mers and pre-train k -mer embedding vectors based on the co-occurrence matrix of k -mers by using an unsupervised representation learning approach. We then construct a supervised deep learning architecture comprised of an embedding layer, three convolutional layers and a Bidirectional LSTM (BLSTM) layer for feature learning and classification. We demonstrate that our method gains high-quality fixed-length features from variable-length sequences and consistently outperforms baseline methods. We show that k -mer embedding can effectively enhance model performance by exploring different embedding strategies. We also prove the efficacy of both the convolution and the BLSTM layers by comparing two variations of the network architecture. We confirm the robustness of our model to hyper-parameters by performing sensitivity analysis. We hope our method can eventually reinforce our understanding of employing deep learning in genomic studies and shed light on research regarding mechanisms of chromatin accessibility. The source code can be downloaded from https://github.com/minxueric/ismb2017_lstm . tingchen@tsinghua.edu.cn or ruijiang@tsinghua.edu.cn. Supplementary materials are available at