WorldWideScience

Sample records for access-network association policies

  1. LTER network data access policy revision: report and recommendations.

    Science.gov (United States)

    James Brunt; Peter McCartney; Stuart Gage; Don. Henshaw

    2004-01-01

    This document is a report on work carried out to update the LTER Network Data Access Policy. The current LTER Network Data Access Policy, approved by the coordinating committee in 1997, has been in use since 1990. An analysis of the current policies related to the release, access, and use of LTER data has been undertaken by a sub-committee of the LTER Network...

  2. An Adaptive Time-Spread Multiple-Access Policy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Konstantinos Oikonomou

    2007-05-01

    Full Text Available Sensor networks require a simple and efficient medium access control policy achieving high system throughput with no or limited control overhead in order to increase the network lifetime by minimizing the energy consumed during transmission attempts. Time-spread multiple-access (TSMA policies that have been proposed for ad hoc network environments, can also be employed in sensor networks, since no control overhead is introduced. However, they do not take advantage of any cross-layer information in order to exploit the idiosyncrasies of the particular sensor network environment such as the presence of typically static nodes and a common destination for the forwarded data. An adaptive probabilistic TSMA-based policy, that is proposed and analyzed in this paper, exploits these idiosyncrasies and achieves higher system throughput than the existing TSMA-based policies without any need for extra control overhead. As it is analytically shown in this paper, the proposed policy always outperforms the existing TSMA-based policies, if certain parameter values are properly set; the analysis also provides for these proper values. It is also shown that the proposed policy is characterized by a certain convergence period and that high system throughput is achieved for long convergence periods. The claims and expectations of the provided analysis are supported by simulation results presented in this paper.

  3. Router Agent Technology for Policy-Based Network Management

    Science.gov (United States)

    Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston

    2011-01-01

    This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.

  4. Networked publics: multi-disciplinary perspectives on big policy issues

    OpenAIRE

    William H. Dutton

    2018-01-01

    This special issue of Internet Policy Review is the first to bring together the best policy-oriented papers presented at the annual conference of the Association of Internet Researchers (AoIR). This issue is anchored in the 2017 conference in Tartu, Estonia, which was organised around the theme of networked publics. The seven papers span issues concerning whether and how technology and policy are reshaping access to information, perspectives on privacy and security online, and social and lega...

  5. Networks in social policy problems

    CERN Document Server

    Scotti, marco

    2012-01-01

    Network science is the key to managing social communities, designing the structure of efficient organizations and planning for sustainable development. This book applies network science to contemporary social policy problems. In the first part, tools of diffusion and team design are deployed to challenges in adoption of ideas and the management of creativity. Ideas, unlike information, are generated and adopted in networks of personal ties. Chapters in the second part tackle problems of power and malfeasance in political and business organizations, where mechanisms in accessing and controlling informal networks often outweigh formal processes. The third part uses ideas from biology and physics to understand global economic and financial crises, ecological depletion and challenges to energy security. Ideal for researchers and policy makers involved in social network analysis, business strategy and economic policy, it deals with issues ranging from what makes public advisories effective to how networks influenc...

  6. Remote Network Access (RNA)

    National Research Council Canada - National Science Library

    2002-01-01

    .... Remote Network Access (RNA) includes or is associated with all communication devices/software, firewalls, intrusion detection systems and virus protection applications to ensure security of the OIG, DoD, Network from remote...

  7. IP access networks with QoS support

    Science.gov (United States)

    Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique

    2001-07-01

    The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.

  8. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  9. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 Background With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks

  10. Coordinated scheduling for the downlink of cloud radio-access networks

    KAUST Repository

    Douik, Ahmed S.; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    This paper addresses the coordinated scheduling problem in cloud-enabled networks. Consider the downlink of a cloud-radio access network (CRAN), where the cloud is only responsible for the scheduling policy and the synchronization of the transmit

  11. Distributed cloud association in downlink multicloud radio access networks

    KAUST Repository

    Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    This paper considers a multicloud radio access network (M-CRAN), wherein each cloud serves a cluster of base-stations (BS's) which are connected to the clouds through high capacity digital links. The network comprises several remote users, where

  12. Policy reconciliation for access control in dynamic cross-enterprise collaborations

    Science.gov (United States)

    Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.

    2018-03-01

    In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.

  13. Associations between state minimum wage policy and health care access: a multi-level analysis of the 2004 Behavioral Risk Factor survey.

    Science.gov (United States)

    McCarrier, Kelly P; Martin, Diane P; Ralston, James D; Zimmerman, Frederick J

    2010-05-01

    Minimum wage policies have been advanced as mechanisms to improve the economic conditions of the working poor. Both positive and negative effects of such policies on health care access have been hypothesized, but associations have yet to be thoroughly tested. To examine whether the presence of minimum wage policies in excess of the federal standard of $5.15 per hour was associated with health care access indicators among low-skilled adults of working age, a cross-sectional analysis of 2004 Behavioral Risk Factor Surveillance System data was conducted. Self-reported health insurance status and experience with cost-related barriers to needed medical care were adjusted in multi-level logistic regression models to control for potential confounding at the state, county, and individual levels. State-level wage policy was not found to be associated with insurance status or unmet medical need in the models, providing early evidence that increased minimum wage rates may neither strengthen nor weaken access to care as previously predicted.

  14. Optimal Policy of Cross-Layer Design for Channel Access and Transmission Rate Adaptation in Cognitive Radio Networks

    Science.gov (United States)

    He, Hao; Wang, Jun; Zhu, Jiang; Li, Shaoqian

    2010-12-01

    In this paper, we investigate the cross-layer design of joint channel access and transmission rate adaptation in CR networks with multiple channels for both centralized and decentralized cases. Our target is to maximize the throughput of CR network under transmission power constraint by taking spectrum sensing errors into account. In centralized case, this problem is formulated as a special constrained Markov decision process (CMDP), which can be solved by standard linear programming (LP) method. As the complexity of finding the optimal policy by LP increases exponentially with the size of action space and state space, we further apply action set reduction and state aggregation to reduce the complexity without loss of optimality. Meanwhile, for the convenience of implementation, we also consider the pure policy design and analyze the corresponding characteristics. In decentralized case, where only local information is available and there is no coordination among the CR users, we prove the existence of the constrained Nash equilibrium and obtain the optimal decentralized policy. Finally, in the case that the traffic load parameters of the licensed users are unknown for the CR users, we propose two methods to estimate the parameters for two different cases. Numerical results validate the theoretic analysis.

  15. Optimal Policy of Cross-Layer Design for Channel Access and Transmission Rate Adaptation in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Jiang Zhu

    2010-01-01

    Full Text Available In this paper, we investigate the cross-layer design of joint channel access and transmission rate adaptation in CR networks with multiple channels for both centralized and decentralized cases. Our target is to maximize the throughput of CR network under transmission power constraint by taking spectrum sensing errors into account. In centralized case, this problem is formulated as a special constrained Markov decision process (CMDP, which can be solved by standard linear programming (LP method. As the complexity of finding the optimal policy by LP increases exponentially with the size of action space and state space, we further apply action set reduction and state aggregation to reduce the complexity without loss of optimality. Meanwhile, for the convenience of implementation, we also consider the pure policy design and analyze the corresponding characteristics. In decentralized case, where only local information is available and there is no coordination among the CR users, we prove the existence of the constrained Nash equilibrium and obtain the optimal decentralized policy. Finally, in the case that the traffic load parameters of the licensed users are unknown for the CR users, we propose two methods to estimate the parameters for two different cases. Numerical results validate the theoretic analysis.

  16. Developing an agenda for research about policies to improve access to healthy foods in rural communities: a concept mapping study

    Science.gov (United States)

    2014-01-01

    Background Policies that improve access to healthy, affordable foods may improve population health and reduce health disparities. In the United States most food access policy research focuses on urban communities even though residents of rural communities face disproportionately higher risk for nutrition-related chronic diseases compared to residents of urban communities. The purpose of this study was to (1) identify the factors associated with access to healthy, affordable food in rural communities in the United States; and (2) prioritize a meaningful and feasible rural food policy research agenda. Methods This study was conducted by the Rural Food Access Workgroup (RFAWG), a workgroup facilitated by the Nutrition and Obesity Policy Research and Evaluation Network. A national sample of academic and non-academic researchers, public health and cooperative extension practitioners, and other experts who focus on rural food access and economic development was invited to complete a concept mapping process that included brainstorming the factors that are associated with rural food access, sorting and organizing the factors into similar domains, and rating the importance of policies and research to address these factors. As a last step, RFAWG members convened to interpret the data and establish research recommendations. Results Seventy-five participants in the brainstorming exercise represented the following sectors: non-extension research (n = 27), non-extension program administration (n = 18), “other” (n = 14), policy advocacy (n = 10), and cooperative extension service (n = 6). The brainstorming exercise generated 90 distinct statements about factors associated with rural food access in the United States; these were sorted into 5 clusters. Go Zones were established for the factors that were rated highly as both a priority policy target and a priority for research. The highest ranked policy and research priorities include strategies designed to

  17. Social networking policies in nursing education.

    Science.gov (United States)

    Frazier, Blake; Culley, Joan M; Hein, Laura C; Williams, Amber; Tavakoli, Abbas S

    2014-03-01

    Social networking use has increased exponentially in the past few years. A literature review related to social networking and nursing revealed a research gap between nursing practice and education. Although there was information available on the appropriate use of social networking sites, there was limited research on the use of social networking policies within nursing education. The purpose of this study was to identify current use of social media by faculty and students and a need for policies within nursing education at one institution. A survey was developed and administered to nursing students (n = 273) and nursing faculty (n = 33). Inferential statistics included χ², Fisher exact test, t test, and General Linear Model. Cronbach's α was used to assess internal consistency of social media scales. The χ² result indicates that there were associations with the group and several social media items. t Test results indicate significant differences between student and faculty for average of policies are good (P = .0127), policies and discipline (P = .0315), and policy at the study school (P = .0013). General Linear Model analyses revealed significant differences for "friend" a patient with a bond, unprofessional posts, policy, and nursing with class level. Results showed that students and faculty supported the development of a social networking policy.

  18. Internationalisation of information services for publishers' open access policies: the DINI multilingual integration layer

    Science.gov (United States)

    Scholze, Frank

    2008-01-01

    It is essential for the strategy of open access self-archiving that scientific authors are given comprehensive information on publisher copyright policies. DINI, the German Initiative for Networked Information, has developed a German (and potentially multilingual) interface to the English SHERPA/RoMEO service to provide additional information on German publishers' open access policies. As a next step, this interface was enhanced to an integration layer combining different sources on publisher copyright policies. This integration layer can be used in many different contexts. Together with the SHERPA/RoMEO team, DINI aims to build an international support structure for open access information. PMID:18662383

  19. Conviviality-driven access control policy

    NARCIS (Netherlands)

    El Kateb, Donia; Zannone, N.; Moawad, Assaad; Caire, Patrice; Nain, Grégory; Mouelhi, Tejeddine; Le Traon, Yves

    2015-01-01

    Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information. Such policies, however, are often too restrictive, and users do not have the rights

  20. Checklist "Open Access Policies": Analysis of the Open Access Policies of Public Universities in Austria

    Directory of Open Access Journals (Sweden)

    Bruno Bauer

    2016-12-01

    Full Text Available This checklist provides an overview of the Open Access policies implemented at Austrian universities and extramural research institutions. Furthermore, the polices adopted at nine public universities are analyzed and the respective text modules are categorized thematically. The second part of the checklist presents measures for the promotion of Open Access following the implementation of an Open Access policy.

  1. Measuring sustainable accessibility potential using the mobility infrastructure's network configuration

    NARCIS (Netherlands)

    Gil, J.; Read, S.

    2012-01-01

    This paper is an exploration into the analysis of public transport networks using space syntax approaches combined with concepts of sustainable accessibility. Present urban development policy aims to achieve sustainable mobility patterns, shifting mobility to soft transportation modes such as

  2. Contract network in a balkanized grid

    International Nuclear Information System (INIS)

    Parkinson, T.W.

    1992-01-01

    Competition in electricity generation depends critically on access to transmission service at nondiscriminatory prices. Current access and pricing policies in the U.S. do not offer prospective private generators any guarantee of such access. Most proposals for reform, while improvements over current policies, attempt to provide for open access without addressing the underlying problems associated with loop flow and constraints in transmission networks. This paper identifies key design objectives for transmission access and pricing policies and cites critical weakness in one example reform proposal. As alternative proposal, based on contract networks, does address the underlying pricing problems. This paper shows that policies based on contract networks would meet the required objectives and could be feasibly implemented even in the Balkanized grid of U.S. investor-owned utilities. 10 refs

  3. Do Policy Networks lead to Network Governing?

    DEFF Research Database (Denmark)

    Damgaard, Bodil

    This paper challenges the notion that creation of local policy networks necessarily leads to network governing. Through actor-centred case studies in the area of municipally implemented employment policy in Denmark it was found that the local governing mode is determined mainly by the municipality......’s approach to local co-governing as well as by the capacity and interest of key private actors. It is argued that national legislation requesting the creation of local policy networks was not enough to assure network governing and the case studies show that local policy networks may subsist also under...... hierarchical governing modes. Reasons why hierarchical governing modes prevail over network governing in some settings are identified pointing to both actor borne and structural factors. Output indicators of the four cases do not show that a particular governing mode is more efficient in its employment policy...

  4. Hybrid Scheduling/Signal-Level Coordination in the Downlink of Multi-Cloud Radio-Access Networks

    KAUST Repository

    Douik, Ahmed

    2016-03-28

    In the context of resource allocation in cloud- radio access networks, recent studies assume either signal-level or scheduling-level coordination. This paper, instead, considers a hybrid level of coordination for the scheduling problem in the downlink of a multi-cloud radio- access network, so as to benefit from both scheduling policies. Consider a multi-cloud radio access network, where each cloud is connected to several base-stations (BSs) via high capacity links, and therefore allows joint signal processing between them. Across the multiple clouds, however, only scheduling-level coordination is permitted, as it requires a lower level of backhaul communication. The frame structure of every BS is composed of various time/frequency blocks, called power- zones (PZs), and kept at fixed power level. The paper addresses the problem of maximizing a network-wide utility by associating users to clouds and scheduling them to the PZs, under the practical constraints that each user is scheduled, at most, to a single cloud, but possibly to many BSs within the cloud, and can be served by one or more distinct PZs within the BSs\\' frame. The paper solves the problem using graph theory techniques by constructing the conflict graph. The scheduling problem is, then, shown to be equivalent to a maximum- weight independent set problem in the constructed graph, in which each vertex symbolizes an association of cloud, user, BS and PZ, with a weight representing the utility of that association. Simulation results suggest that the proposed hybrid scheduling strategy provides appreciable gain as compared to the scheduling-level coordinated networks, with a negligible degradation to signal-level coordination.

  5. Coordinated scheduling for the downlink of cloud radio-access networks

    KAUST Repository

    Douik, Ahmed S.

    2015-09-11

    This paper addresses the coordinated scheduling problem in cloud-enabled networks. Consider the downlink of a cloud-radio access network (CRAN), where the cloud is only responsible for the scheduling policy and the synchronization of the transmit frames across the connected base-stations (BS). The transmitted frame of every BS consists of several time/frequency blocks, called power-zones (PZ), maintained at fixed transmit power. The paper considers the problem of scheduling users to PZs and BSs in a coordinated fashion across the network, by maximizing a network-wide utility under the practical constraint that each user cannot be served by more than one base-station, but can be served by one or more power-zones within each base-station frame. The paper solves the problem using a graph theoretical approach by introducing the scheduling graph in which each vertex represents an association of users, PZs and BSs. The problem is formulated as a maximum weight clique, in which the weight of each vertex is the benefit of the association represented by that vertex. The paper further presents heuristic algorithms with low computational complexity. Simulation results show the performance of the proposed algorithms and suggest that the heuristics perform near optimal in low shadowing environments. © 2015 IEEE.

  6. Why do policies change? Institutions, interests, ideas and networks in three cases of policy reform.

    Science.gov (United States)

    Shearer, Jessica C; Abelson, Julia; Kouyaté, Bocar; Lavis, John N; Walt, Gill

    2016-11-01

    Policy researchers have used various categories of variables to explain why policies change, including those related to institutions, interests and ideas. Recent research has paid growing attention to the role of policy networks-the actors involved in policy-making, their relationships with each other, and the structure formed by those relationships-in policy reform across settings and issues; however, this literature has largely ignored the theoretical integration of networks with other policy theories, including the '3Is' of institutions, interests and ideas. This article proposes a conceptual framework integrating these variables and tests it on three cases of policy change in Burkina Faso, addressing the need for theoretical integration with networks as well as the broader aim of theory-driven health policy analysis research in low- and middle-income countries. We use historical process tracing, a type of comparative case study, to interpret and compare documents and in-depth interview data within and between cases. We found that while network changes were indeed associated with policy reform, this relationship was mediated by one or more of institutions, interests and ideas. In a context of high donor dependency, new donor rules affected the composition and structure of actors in the networks, which enabled the entry and dissemination of new ideas and shifts in the overall balance of interest power ultimately leading to policy change. The case of strategic networking occurred in only one case, by civil society actors, suggesting that network change is rarely the spark that initiates the process towards policy change. This analysis highlights the important role of changes in institutions and ideas to drive policymaking, but hints that network change is a necessary intermediate step in these processes. © The Author 2016. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine. All rights reserved. For

  7. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  8. Time dependent policy-based access control

    DEFF Research Database (Denmark)

    Vasilikos, Panagiotis; Nielson, Flemming; Nielson, Hanne Riis

    2017-01-01

    also on other attributes of the environment such as the time. In this paper, we use systems of Timed Automata to model distributed systems and we present a logic in which one can express time-dependent policies for access control. We show how a fragment of our logic can be reduced to a logic......Access control policies are essential to determine who is allowed to access data in a system without compromising the data's security. However, applications inside a distributed environment may require those policies to be dependent on the actual content of the data, the flow of information, while...... that current model checkers for Timed Automata such as UPPAAL can handle and we present a translator that performs this reduction. We then use our translator and UPPAAL to enforce time-dependent policy-based access control on an example application from the aerospace industry....

  9. Channel access schemes and fiber optic configurations for integrated-services local area networks. Ph.D. Thesis

    Science.gov (United States)

    Nassehi, M. Mehdi

    1987-01-01

    Local Area Networks are in common use for data communications and have enjoyed great success. Recently, there is a growing interest in using a single network to support many applications in addition to traditional data traffic. These additional applications introduce new requirements in terms of volume of traffic and real-time delivery of data which are not met by existing networks. To satisfy these requirements, a high-bandwidth tranmission medium, such as fiber optics, and a distributed channel access scheme for the efficient sharing of the bandwidth among the various applications are needed. As far as the throughput-delay requirements of the various application are concerned, a network structure along with a distributed channel access are proposed which incorporate appropriate scheduling policies for the transmission of outstanding messages on the network. A dynamic scheduling policy was devised which outperforms all existing policies in terms of minimizing the expected cost per message. A broadcast mechanism was devised for the efficient dissemination of all relevant information. Fiber optic technology is considered for the high-bandwidth transmisison medium.

  10. Distributed cloud association in downlink multicloud radio access networks

    KAUST Repository

    Dahrouj, Hayssam

    2015-03-01

    This paper considers a multicloud radio access network (M-CRAN), wherein each cloud serves a cluster of base-stations (BS\\'s) which are connected to the clouds through high capacity digital links. The network comprises several remote users, where each user can be connected to one (and only one) cloud. This paper studies the user-to-cloud-assignment problem by maximizing a network-wide utility subject to practical cloud connectivity constraints. The paper solves the problem by using an auction-based iterative algorithm, which can be implemented in a distributed fashion through a reasonable exchange of information between the clouds. The paper further proposes a centralized heuristic algorithm, with low computational complexity. Simulations results show that the proposed algorithms provide appreciable performance improvements as compared to the conventional cloud-less assignment solutions. © 2015 IEEE.

  11. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  12. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  13. Next Generation Access Network Deployment in Croatia: Optical Access Networks and Current IoT/5G Status

    Science.gov (United States)

    Breskovic, Damir; Sikirica, Mladen; Begusic, Dinko

    2018-05-01

    This paper gives an overview and background of optical access network deployment in Croatia. Optical access network development in Croatia has been put into a global as well as in the European Union context. All the challenges and the driving factors for optical access networks deployment are considered. Optical access network architectures that have been deployed by most of the investors in Croatian telecommunication market are presented, as well as the architectures that are in early phase of deployment. Finally, an overview on current status of mobile networks of the fifth generation and Internet of Things is given.

  14. Open Access Policy for CERN Physics Publications

    CERN Multimedia

    2014-01-01

    CERN is committed to Open Access. It represents one of the values written in our Convention sixty years ago and is increasingly important for our Member States.   In the last edition of the Bulletin, this article described how CERN is doing with regards to open access publishing today. On Thursday this week, the Open Access Policy for CERN Physics Publications* was endorsed by the Scientific Information Policy Board (SIPB) and approved by the Director-General the same day . For any clarifications regarding the policy, please contact the Scientific Information Service library.desk@cern.ch. * A French version of the policy will be made available shortly.

  15. The entire network topology display system of terminal communication access network

    OpenAIRE

    An Yi

    2016-01-01

    Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...

  16. Alumni access policies in public university libraries | Burclaff ...

    African Journals Online (AJOL)

    This paper explores the current library access policies for alumni at a public university system using document analysis, observations and interviews. We found that alumni are specifically addressed in only two library access policies, and borrowing privileges through cards, on-site access and restricted access to electronic ...

  17. Wireless Multi Hop Access Networks and Protocols

    OpenAIRE

    Nilsson Plymoth, Anders

    2007-01-01

    As more and more applications and services in our society now depend on the Internet, it is important that dynamically deployed wireless multi hop networks are able to gain access to the Internet and other infrastructure networks and services. This thesis proposes and evaluates solutions for providing multi hop Internet Access. It investigates how ad hoc networks can be combined with wireless and mesh networks in order to create wireless multi hop access networks. When several access points t...

  18. Directory Enabled Policy Based Networking; TOPICAL

    International Nuclear Information System (INIS)

    KELIIAA, CURTIS M.

    2001-01-01

    This report presents a discussion of directory-enabled policy-based networking with an emphasis on its role as the foundation for securely scalable enterprise networks. A directory service provides the object-oriented logical environment for interactive cyber-policy implementation. Cyber-policy implementation includes security, network management, operational process and quality of service policies. The leading network-technology vendors have invested in these technologies for secure universal connectivity that transverses Internet, extranet and intranet boundaries. Industry standards are established that provide the fundamental guidelines for directory deployment scalable to global networks. The integration of policy-based networking with directory-service technologies provides for intelligent management of the enterprise network environment as an end-to-end system of related clients, services and resources. This architecture allows logical policies to protect data, manage security and provision critical network services permitting a proactive defense-in-depth cyber-security posture. Enterprise networking imposes the consideration of supporting multiple computing platforms, sites and business-operation models. An industry-standards based approach combined with principled systems engineering in the deployment of these technologies allows these issues to be successfully addressed. This discussion is focused on a directory-based policy architecture for the heterogeneous enterprise network-computing environment and does not propose specific vendor solutions. This document is written to present practical design methodology and provide an understanding of the risks, complexities and most important, the benefits of directory-enabled policy-based networking

  19. Semantically Enriched Data Access Policies in eHealth.

    Science.gov (United States)

    Drozdowicz, Michał; Ganzha, Maria; Paprzycki, Marcin

    2016-11-01

    Internet of Things (IoT) requires novel solutions to facilitate autonomous, though controlled, resource access. Access policies have to facilitate interactions between heterogeneous entities (devices and humans). Here, we focus our attention on access control in eHealth. We propose an approach based on enriching policies, based on well-known and widely-used eXtensible Access Control Markup Language, with semantics. In the paper we describe an implementation of a Policy Information Point integrated with the HL7 Security and Privacy Ontology.

  20. Cost- and reliability-oriented aggregation point association in long-term evolution and passive optical network hybrid access infrastructure for smart grid neighborhood area network

    Science.gov (United States)

    Cheng, Xiao; Feng, Lei; Zhou, Fanqin; Wei, Lei; Yu, Peng; Li, Wenjing

    2018-02-01

    With the rapid development of the smart grid, the data aggregation point (AP) in the neighborhood area network (NAN) is becoming increasingly important for forwarding the information between the home area network and wide area network. Due to limited budget, it is unable to use one-single access technology to meet the ongoing requirements on AP coverage. This paper first introduces the wired and wireless hybrid access network with the integration of long-term evolution (LTE) and passive optical network (PON) system for NAN, which allows a good trade-off among cost, flexibility, and reliability. Then, based on the already existing wireless LTE network, an AP association optimization model is proposed to make the PON serve as many APs as possible, considering both the economic efficiency and network reliability. Moreover, since the features of the constraints and variables of this NP-hard problem, a hybrid intelligent optimization algorithm is proposed, which is achieved by the mixture of the genetic, ant colony and dynamic greedy algorithm. By comparing with other published methods, simulation results verify the performance of the proposed method in improving the AP coverage and the performance of the proposed algorithm in terms of convergence.

  1. Supermarket access, transport mode and BMI: the potential for urban design and planning policy across socio-economic areas.

    Science.gov (United States)

    Murphy, Maureen; Koohsari, Mohammad Javad; Badland, Hannah; Giles-Corti, Billie

    2017-12-01

    To investigate dietary intake, BMI and supermarket access at varying geographic scales and transport modes across areas of socio-economic disadvantage, and to evaluate the implementation of an urban planning policy that provides guidance on spatial access to supermarkets. Cross-sectional study used generalised estimating equations to investigate associations between supermarket density and proximity, vegetable and fruit intake and BMI at five geographic scales representing distances people travel to purchase food by varying transport modes. A stratified analysis by area-level disadvantage was conducted to detect optimal distances to supermarkets across socio-economic areas. Spatial distribution of supermarket and transport access was analysed using a geographic information system. Melbourne, Australia. Adults (n 3128) from twelve local government areas (LGA) across Melbourne. Supermarket access was protective of BMI for participants in high disadvantaged areas within 800 m (P=0·040) and 1000 m (P=0·032) road network buffers around the household but not for participants in less disadvantaged areas. In urban growth area LGA, only 26 % of dwellings were within 1 km of a supermarket, far less than 80-90 % of dwellings suggested in the local urban planning policy. Low public transport access compounded disadvantage. Rapid urbanisation is a global health challenge linked to increases in dietary risk factors and BMI. Our findings highlight the importance of identifying the most appropriate geographic scale to inform urban planning policy for optimal health outcomes across socio-economic strata. Urban planning policy implementation in disadvantaged areas within cities has potential for reducing health inequities.

  2. Associations between minimum wage policy and access to health care: evidence from the Behavioral Risk Factor Surveillance System, 1996-2007.

    Science.gov (United States)

    McCarrier, Kelly P; Zimmerman, Frederick J; Ralston, James D; Martin, Diane P

    2011-02-01

    We examined whether minimum wage policy is associated with access to medical care among low-skilled workers in the United States. We used multilevel logistic regression to analyze a data set consisting of individual-level indicators of uninsurance and unmet medical need from the Behavioral Risk Factor Surveillance System and state-level ecological controls from the US Census, Bureau of Labor Statistics, and several other sources in all 50 states and the District of Columbia between 1996 and 2007. Higher state-level minimum wage rates were associated with significantly reduced odds of reporting unmet medical need after control for the ecological covariates, substate region fixed effects, and individual demographic and health characteristics (odds ratio = 0.853; 95% confidence interval = 0.750, 0.971). Minimum wage rates were not significantly associated with being uninsured. Higher minimum wages may be associated with a reduced likelihood of experiencing unmet medical need among low-skilled workers, and do not appear to be associated with uninsurance. These findings appear to refute the suggestion that minimum wage laws have detrimental effects on access to health care, as opponents of the policies have suggested.

  3. Wi-Fi Networks Security and Accessing Control

    OpenAIRE

    Tarek S. Sobh

    2013-01-01

    As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP) problem has raised more attention and resulted in obtaining wireless access without subscriber permission.This work assumes Wi-Fi...

  4. Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    Science.gov (United States)

    Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  5. Joint control algorithm in access network

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To deal with long probing delay and inaccurate probing results in the endpoint admission control method,a joint local and end-to-end admission control algorithm is proposed,which introduces local probing of access network besides end-to-end probing.Through local probing,the algorithm accurately estimated the resource status of the access network.Simulation shows that this algorithm can improve admission control performance and reduce users' average waiting time when the access network is heavily loaded.

  6. CSchema: A Downgrading Policy Language for XML Access Control

    Institute of Scientific and Technical Information of China (English)

    Dong-Xi Liu

    2007-01-01

    The problem of regulating access to XML documents has attracted much attention from both academic and industry communities.In existing approaches, the XML elements specified by access policies are either accessible or inac-cessible according to their sensitivity.However, in some cases, the original XML elements are sensitive and inaccessible, but after being processed in some appropriate ways, the results become insensitive and thus accessible.This paper proposes a policy language to accommodate such cases, which can express the downgrading operations on sensitive data in XML documents through explicit calculations on them.The proposed policy language is called calculation-embedded schema (CSchema), which extends the ordinary schema languages with protection type for protecting sensitive data and specifying downgrading operations.CSchema language has a type system to guarantee the type correctness of the embedded calcula-tion expressions and moreover this type system also generates a security view after type checking a CSchema policy.Access policies specified by CSchema are enforced by a validation procedure, which produces the released documents containing only the accessible data by validating the protected documents against CSchema policies.These released documents are then ready tobe accessed by, for instance, XML query engines.By incorporating this validation procedure, other XML processing technologies can use CSchema as the access control module.

  7. Editorial: Next Generation Access Networks

    Science.gov (United States)

    Ruffini, Marco; Cincotti, Gabriella; Pizzinat, Anna; Vetter, Peter

    2015-12-01

    Over the past decade we have seen an increasing number of operators deploying Fibre-to-the-home (FTTH) solutions in access networks, in order to provide home users with a much needed network access upgrade, to support higher peak rates, higher sustained rates and a better and more uniform broadband coverage of the territory.

  8. Accessibility in networks: A useful measure for understanding social insect nest architecture

    International Nuclear Information System (INIS)

    Viana, Matheus P.; Fourcassié, Vincent; Perna, Andrea; Costa, Luciano da F.; Jost, Christian

    2013-01-01

    Networks and the associated tools from graph theory have now become well-established approaches to study natural as well as human-made systems. While early studies focused on topology and connectivity, the recent literature has acknowledged the importance of the dynamical properties of these networks. Here we focus on such a dynamic measure: accessibility. It characterizes for any given movement dynamics (such as random walks) the average number of nodes that can be reached in exactly h steps (out-accessibility), or the average number of nodes from which a given node can be reached (in-accessibility). This focus on dynamics makes accessibility particularly appropriate to study movement on networks and to detect complementary properties with respect to topology-based measurements such as betweenness centrality. We apply this measure to six nests of Cubitermes termites. Their mushroom-like 3D architectures consist of chambers and connecting tunnels that can be associated to nodes and edges in a communication network. Accessibilities turn out to be particularly low in the bottom part of the nests that link them to their underground tunneling network. We interpret this result in the context of anti-predator (ants) behavior and/or as a side effect of the global nest shape.

  9. Research, Boundaries, and Policy in Networked Learning

    DEFF Research Database (Denmark)

    This book presents cutting-edge, peer reviewed research on networked learning organized by three themes: policy in networked learning, researching networked learning, and boundaries in networked learning. The "policy in networked learning" section explores networked learning in relation to policy...... networks, spaces of algorithmic governance and more. The "boundaries in networked learning" section investigates frameworks of students' digital literacy practices, among other important frameworks in digital learning. Lastly, the "research in networked learning" section delves into new research methods...

  10. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  11. Rescuing policy in tourism network research

    DEFF Research Database (Denmark)

    Dredge, Dianne

    2018-01-01

    Networks provide a powerful lens to understand complex relational entanglements that are transforming social, economic and political life. Through a discussion of the various streams of network research in tourism, this paper argues that policy matters run across and throughout these strands....... Rather than arguing for increased interest in tourism policy network research as a separate subfield, the paper argues for deeper theoretical engagement with the policy dimension in tourism network research. Researchers adopting a network ontology could gain considerable insights and open up new lines...

  12. Social Networks and Health: Understanding the Nuances of Healthcare Access between Urban and Rural Populations.

    Science.gov (United States)

    Amoah, Padmore Adusei; Edusei, Joseph; Amuzu, David

    2018-05-13

    Communities and individuals in many sub-Saharan African countries often face limited access to healthcare. Hence, many rely on social networks to enhance their chances for adequate health care. While this knowledge is well-established, little is known about the nuances of how different population groups activate these networks to improve access to healthcare. This paper examines how rural and urban dwellers in the Ashanti Region in Ghana distinctively and systematically activate their social networks to enhance access to healthcare. It uses a qualitative cross-sectional design, with in-depth interviews of 79 primary participants (28 urban and 51 rural residents) in addition to the views of eight community leaders and eight health personnel. It was discovered that both intimate and distanced social networks for healthcare are activated at different periods by rural and urban residents. Four main stages of social networks activation, comprising different individuals and groups were observed among rural and urban dwellers. Among both groups, physical proximity, privacy, trust and sense of fairness, socio-cultural meaning attached to health problems, and perceived knowledge and other resources (mainly money) held in specific networks inherently influenced social network activation. The paper posits that a critical analysis of social networks may help to tailor policy contents to individuals and groups with limited access to healthcare.

  13. Associations Between Minimum Wage Policy and Access to Health Care: Evidence From the Behavioral Risk Factor Surveillance System, 1996–2007

    Science.gov (United States)

    Zimmerman, Frederick J.; Ralston, James D.; Martin, Diane P.

    2011-01-01

    Objectives. We examined whether minimum wage policy is associated with access to medical care among low-skilled workers in the United States. Methods. We used multilevel logistic regression to analyze a data set consisting of individual-level indicators of uninsurance and unmet medical need from the Behavioral Risk Factor Surveillance System and state-level ecological controls from the US Census, Bureau of Labor Statistics, and several other sources in all 50 states and the District of Columbia between 1996 and 2007. Results. Higher state-level minimum wage rates were associated with significantly reduced odds of reporting unmet medical need after control for the ecological covariates, substate region fixed effects, and individual demographic and health characteristics (odds ratio = 0.853; 95% confidence interval = 0.750, 0.971). Minimum wage rates were not significantly associated with being uninsured. Conclusions. Higher minimum wages may be associated with a reduced likelihood of experiencing unmet medical need among low-skilled workers, and do not appear to be associated with uninsurance. These findings appear to refute the suggestion that minimum wage laws have detrimental effects on access to health care, as opponents of the policies have suggested. PMID:21164102

  14. Principles and Policies for International Coordination of Research Data Networks

    Science.gov (United States)

    Parsons, M. A.; Mokrane, M.; Sorvari, S.; Treloar, A.; Smith, C.

    2017-12-01

    International data networks enable the sharing of data within and between scientific disciplines and countries and thus provide the foundation for Open Science. Developing effective and sustainable international research data networks is critical for progress in many areas of research and for science to address complex global societal challenges. However, the development and maintenance of effective networks is not always easy, particularly in a context where public resources for science are limited and international cooperation is not a priority for many countries. The global landscape for data sharing in science is complex; many international data networks already exist and have highly variable structures. Some are linked to large intergovernmental research infrastructures, have highly developed centralized services and deal mainly with the data needs of single disciplines. Some are highly distributed, have much less rigid governance structures and provide access to data from many different domains. Most are somewhere between these two extremes and they cover different geographic regions, from regional to global. All provide a mix of data and associated data services which meets the needs of the research community to various extents and this provision depends on a mix of hardware, software, standards and protocols and human skills. These come together, working across national boundaries, in technical and social networks. In all of this, what makes a network function effectively or not is unclear. This means that there is also no simple answer to what can usefully be done at the policy level to promote the development of effective and sustainable data networks. Hence the rational for the present project - to study a variety of currently successful networks, explore the challenges that they are facing and the lessons that can be learned from confronting these challenges, and, where applicable, to translate this analysis into potential policy actions. Detailed

  15. Coordinated Scheduling and Power Control in Cloud-Radio Access Networks

    KAUST Repository

    Douik, Ahmed

    2015-12-01

    This paper addresses the joint coordinated scheduling and power control problem in cloud-enabled networks. Consider the downlink of a cloud-radio access network (CRAN), where the cloud is only responsible for the scheduling policy, power control, and synchronization of the transmit frames across the single-antenna base-stations (BS). The transmit frame consists of several time/frequency blocks, called power-zones (PZ). The paper considers the problem of scheduling users to PZs and determining their power levels (PL), by maximizing the weighted sum-rate under the practical constraints that each user cannot be served by more than one base-station, but can be served by one or more power-zones within each base-station frame. The paper solves the problem using a graph theoretical approach by introducing the joint scheduling and power control graph formed by several clusters, where each is formed by a set of vertices, representing the possible association of users, BSs, and PLs for one specific PZ. The problem is, then, formulated as a maximumweight clique problem, in which the weight of each vertex is the sum of the benefits of the individual associations belonging to that vertex. Simulation results suggest that the proposed crosslayer scheme provides appreciable performance improvement as compared to schemes from recent literature.

  16. Coordinated Scheduling and Power Control in Cloud-Radio Access Networks

    KAUST Repository

    Douik, Ahmed; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    This paper addresses the joint coordinated scheduling and power control problem in cloud-enabled networks. Consider the downlink of a cloud-radio access network (CRAN), where the cloud is only responsible for the scheduling policy, power control, and synchronization of the transmit frames across the single-antenna base-stations (BS). The transmit frame consists of several time/frequency blocks, called power-zones (PZ). The paper considers the problem of scheduling users to PZs and determining their power levels (PL), by maximizing the weighted sum-rate under the practical constraints that each user cannot be served by more than one base-station, but can be served by one or more power-zones within each base-station frame. The paper solves the problem using a graph theoretical approach by introducing the joint scheduling and power control graph formed by several clusters, where each is formed by a set of vertices, representing the possible association of users, BSs, and PLs for one specific PZ. The problem is, then, formulated as a maximumweight clique problem, in which the weight of each vertex is the sum of the benefits of the individual associations belonging to that vertex. Simulation results suggest that the proposed crosslayer scheme provides appreciable performance improvement as compared to schemes from recent literature.

  17. Networks and Bargaining in Policy Analysis

    DEFF Research Database (Denmark)

    Bogason, Peter

    2006-01-01

    A duscussion of the fight between proponents of rationalistic policy analysis and more political interaction models for policy analysis. The latter group is the foundation for the many network models of policy analysis of today.......A duscussion of the fight between proponents of rationalistic policy analysis and more political interaction models for policy analysis. The latter group is the foundation for the many network models of policy analysis of today....

  18. Optical Subsystems for Next Generation Access Networks

    DEFF Research Database (Denmark)

    Lazaro, J.A; Polo, V.; Schrenk, B.

    2011-01-01

    Recent optical technologies are providing higher flexibility to next generation access networks: on the one hand, providing progressive FTTx and specifically FTTH deployment, progressively shortening the copper access network; on the other hand, also opening fixed-mobile convergence solutions...... in next generation PON architectures. It is provided an overview of the optical subsystems developed for the implementation of the proposed NG-Access Networks....

  19. On the Design of Energy Efficient Optical Networks with Software Defined Networking Control Across Core and Access Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Yan, Ying; Dittmann, Lars

    2013-01-01

    This paper presents a Software Defined Networking (SDN) control plane based on an overlay GMPLS control model. The SDN control platform manages optical core networks (WDM/DWDM networks) and the associated access networks (GPON networks), which makes it possible to gather global information...... and enable wider areas' energy efficiency networking. The energy related information of the networks and the types of the traffic flows are collected and utilized for the end-to-end QoS provision. Dynamic network simulation results show that by applying different routing algorithms according to the type...... of traffic in the core networks, the energy efficiency of the network is improved without compromising the quality of service....

  20. [Sustainability of Brazilian policy for access to antiretroviral drugs].

    Science.gov (United States)

    Grangeiro, Alexandre; Teixeira, Luciana; Bastos, Francisco I; Teixeira, Paulo

    2006-04-01

    The expense of acquiring antiretroviral drugs in Brazil has given rise to debate about the sustainability of the policy of universal access to AIDS medications, despite the evident benefits. The objective of this study was to analyze the evolution of the Ministry of Health's spending on acquiring antiretroviral drugs from 1998 to 2005, the determining factors and the medium-term sustainability of this policy (2006-2008). The study on the evolution of spending on antiretrovirals included analysis of their prices, the year-by-year expenditure, the number of patients utilizing the medication, the mean expenditure per patient and the strategies for reducing the prices maintained during this period. To analyze the sustainability of the policy for access to antiretrovirals, the cost of acquiring the drugs over the period from 2006 to 2008 was estimated, along with the proportion of gross domestic product and federal health expenditure represented by this spending. The data were collected from the Ministry of Health, the Brazilian Institute for Geography and Statistics (IBGE) and the Ministry of Planning. The expenditure on antiretrovirals increased by 66% in 2005, breaking the declining trend observed over the period from 2000 to 2004. The main factors associated with this increase were the weakening of the national generics industry and the unsatisfactory results from the process of negotiating with pharmaceutical companies. The Brazilian policy for universal access is unsustainable at the present growth rates of the gross domestic product, unless the country compromises its investments in other fields.

  1. Scalable Lunar Surface Networks and Adaptive Orbit Access

    Science.gov (United States)

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  2. NESDIS OSPO Data Access Policy and CRM

    Science.gov (United States)

    Seybold, M. G.; Donoho, N. A.; McNamara, D.; Paquette, J.; Renkevens, T.

    2012-12-01

    The Office of Satellite and Product Operations (OSPO) is the NESDIS office responsible for satellite operations, product generation, and product distribution. Access to and distribution of OSPO data was formally established in a Data Access Policy dated February, 2011. An extension of the data access policy is the OSPO Customer Relationship Management (CRM) Database, which has been in development since 2008 and is reaching a critical level of maturity. This presentation will provide a summary of the data access policy and standard operating procedure (SOP) for handling data access requests. The tangential CRM database will be highlighted including the incident tracking system, reporting and notification capabilities, and the first comprehensive portfolio of NESDIS satellites, instruments, servers, applications, products, user organizations, and user contacts. Select examples of CRM data exploitation will show how OSPO is utilizing the CRM database to more closely satisfy the user community's satellite data needs with new product promotions, as well as new data and imagery distribution methods in OSPO's Environmental Satellite Processing Center (ESPC). In addition, user services and outreach initiatives from the Satellite Products and Services Division will be highlighted.

  3. Policy gaps and technological deficiencies in social networking environments: Implications for information sharing

    Directory of Open Access Journals (Sweden)

    Stephen M. Mutula

    2013-06-01

    Full Text Available Background: With the growing adoption and acceptance of social networking, there are increased concerns about the violation of the users’ legitimate rights such as privacy, confidentiality, trust, security, safety, content ownership, content accuracy, integrity, access and accessibility to computer and digital networks amongst others.Objectives: The study sought to investigate the following research objectives to: (1 describe the types of social networks, (2 examine global penetration of the social networks, (3 outline the users’ legitimate rights that must be protected in the social networking sites (SNS, (4 determine the methods employed by SNS to protect the users’ legitimate rights and (5 identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS.Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively.Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate.Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.

  4. The Structure of Policy Networks for Injury and Violence Prevention in 15 US Cities.

    Science.gov (United States)

    Harris, Jenine K; Jonson-Reid, Melissa; Carothers, Bobbi J; Fowler, Patrick

    Changes in policy can reduce violence and injury; however, little is known about how partnerships among organizations influence policy development, adoption, and implementation. To understand partnerships among organizations working on injury and violence prevention (IVP) policy, we examined IVP policy networks in 15 large US cities. In summer 2014, we recruited 15 local health departments (LHDs) to participate in the study. They identified an average of 28.9 local partners (SD = 10.2) working on IVP policy. In late 2014, we sent survey questionnaires to 434 organizations, including the 15 LHDs and their local partners, about their partnerships and the importance of each organization to local IVP policy efforts; 319 participated. We used network methods to examine the composition and structure of the policy networks. Each IVP policy network included the LHD and an average of 21.3 (SD = 6.9) local partners. On average, nonprofit organizations constituted 50.7% of networks, followed by government agencies (26.3%), schools and universities (11.8%), coalitions (11.2%), voluntary organizations (9.6%), hospitals (8.5%), foundations (2.2%), and for-profit organizations (0.7%). Government agencies were perceived as important by the highest proportion of partners. Perceived importance was significantly associated with forming partnerships in most networks; odds ratios ranged from 1.07 (95% CI, 1.02-1.13) to 2.35 (95% CI, 1.68-3.28). Organization type was significantly associated with partnership formation in most networks after controlling for an organization's importance to the network. Several strategies could strengthen local IVP policy networks, including (1) developing connections with partners from sectors that are not well integrated into the networks and (2) encouraging indirect or less formal connections with important but missing partners and partner types.

  5. The Structure of Policy Networks for Injury and Violence Prevention in 15 US Cities

    Science.gov (United States)

    Jonson-Reid, Melissa; Carothers, Bobbi J.; Fowler, Patrick

    2017-01-01

    Objectives: Changes in policy can reduce violence and injury; however, little is known about how partnerships among organizations influence policy development, adoption, and implementation. To understand partnerships among organizations working on injury and violence prevention (IVP) policy, we examined IVP policy networks in 15 large US cities. Methods: In summer 2014, we recruited 15 local health departments (LHDs) to participate in the study. They identified an average of 28.9 local partners (SD = 10.2) working on IVP policy. In late 2014, we sent survey questionnaires to 434 organizations, including the 15 LHDs and their local partners, about their partnerships and the importance of each organization to local IVP policy efforts; 319 participated. We used network methods to examine the composition and structure of the policy networks. Results: Each IVP policy network included the LHD and an average of 21.3 (SD = 6.9) local partners. On average, nonprofit organizations constituted 50.7% of networks, followed by government agencies (26.3%), schools and universities (11.8%), coalitions (11.2%), voluntary organizations (9.6%), hospitals (8.5%), foundations (2.2%), and for-profit organizations (0.7%). Government agencies were perceived as important by the highest proportion of partners. Perceived importance was significantly associated with forming partnerships in most networks; odds ratios ranged from 1.07 (95% CI, 1.02-1.13) to 2.35 (95% CI, 1.68-3.28). Organization type was significantly associated with partnership formation in most networks after controlling for an organization’s importance to the network. Conclusions: Several strategies could strengthen local IVP policy networks, including (1) developing connections with partners from sectors that are not well integrated into the networks and (2) encouraging indirect or less formal connections with important but missing partners and partner types. PMID:28426291

  6. Research of Ad Hoc Networks Access Algorithm

    Science.gov (United States)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  7. STAR-TYPE LOCAL AREA NETWORK ACCESS CONTROL

    Institute of Scientific and Technical Information of China (English)

    逯昭义; 齐藤忠夫

    1990-01-01

    The multiple access fashion is a new resolution for the star-type local area network (LAN) access control and star-type optical fibre LAN. Arguments about this network are discussed, and the results are introduced.

  8. A Scalable Policy and SNMP Based Network Management Framework

    Institute of Scientific and Technical Information of China (English)

    LIU Su-ping; DING Yong-sheng

    2009-01-01

    Traditional SNMP-based network management can not deal with the task of managing large-scaled distributed network,while policy-based management is one of the effective solutions in network and distributed systems management. However,cross-vendor hardware compatibility is one of the limitations in policy-based management. Devices existing in current network mostly support SNMP rather than Common Open Policy Service (COPS) protocol. By analyzing traditional network management and policy-based network management, a scalable network management framework is proposed. It is combined with Internet Engineering Task Force (IETF) framework for policybased management and SNMP-based network management. By interpreting and translating policy decision to SNMP message,policy can be executed in traditional SNMP-based device.

  9. Multisector Health Policy Networks in 15 Large US Cities

    Science.gov (United States)

    Leider, J. P.; Carothers, Bobbi J.; Castrucci, Brian C.; Hearne, Shelley

    2016-01-01

    Context: Local health departments (LHDs) have historically not prioritized policy development, although it is one of the 3 core areas they address. One strategy that may influence policy in LHD jurisdictions is the formation of partnerships across sectors to work together on local public health policy. Design: We used a network approach to examine LHD local health policy partnerships across 15 large cities from the Big Cities Health Coalition. Setting/Participants: We surveyed the health departments and their partners about their working relationships in 5 policy areas: core local funding, tobacco control, obesity and chronic disease, violence and injury prevention, and infant mortality. Outcome Measures: Drawing on prior literature linking network structures with performance, we examined network density, transitivity, centralization and centrality, member diversity, and assortativity of ties. Results: Networks included an average of 21.8 organizations. Nonprofits and government agencies made up the largest proportions of the networks, with 28.8% and 21.7% of network members, whereas for-profits and foundations made up the smallest proportions in all of the networks, with just 1.2% and 2.4% on average. Mean values of density, transitivity, diversity, assortativity, centralization, and centrality showed similarity across policy areas and most LHDs. The tobacco control and obesity/chronic disease networks were densest and most diverse, whereas the infant mortality policy networks were the most centralized and had the highest assortativity. Core local funding policy networks had lower scores than other policy area networks by most network measures. Conclusion: Urban LHDs partner with organizations from diverse sectors to conduct local public health policy work. Network structures are similar across policy areas jurisdictions. Obesity and chronic disease, tobacco control, and infant mortality networks had structures consistent with higher performing networks, whereas

  10. Databases as policy instruments. About extending networks as evidence-based policy

    Directory of Open Access Journals (Sweden)

    Stoevelaar Herman

    2007-12-01

    Full Text Available Abstract Background This article seeks to identify the role of databases in health policy. Access to information and communication technologies has changed traditional relationships between the state and professionals, creating new systems of surveillance and control. As a result, databases may have a profound effect on controlling clinical practice. Methods We conducted three case studies to reconstruct the development and use of databases as policy instruments. Each database was intended to be employed to control the use of one particular pharmaceutical in the Netherlands (growth hormone, antiretroviral drugs for HIV and Taxol, respectively. We studied the archives of the Dutch Health Insurance Board, conducted in-depth interviews with key informants and organized two focus groups, all focused on the use of databases both in policy circles and in clinical practice. Results Our results demonstrate that policy makers hardly used the databases, neither for cost control nor for quality assurance. Further analysis revealed that these databases facilitated self-regulation and quality assurance by (national bodies of professionals, resulting in restrictive prescription behavior amongst physicians. Conclusion The databases fulfill control functions that were formerly located within the policy realm. The databases facilitate collaboration between policy makers and physicians, since they enable quality assurance by professionals. Delegating regulatory authority downwards into a network of physicians who control the use of pharmaceuticals seems to be a good alternative for centralized control on the basis of monitoring data.

  11. Policies of access to healthcare services for accompanied asylum-seeking children in the Nordic countries.

    Science.gov (United States)

    Sandahl, Hinuga; Norredam, Marie; Hjern, Anders; Asher, Henry; Nielsen, Signe Smith

    2013-08-01

    Asylum-seeking children constitute a vulnerable group with high prevalence and risk for mental health problems. The aim of this study was to compare policies of access to healthcare services, including physical examination and screening for mental health problems on arrival, for accompanied asylum-seeking children in the Nordic countries. This study was based on the national reports "Reception of refugee children in the Nordic countries" written by independent national experts for the Nordic Network for Research on Refugee Children, supplemented by information from relevant authorities. In Sweden, Norway and Iceland, asylum-seeking children had access to healthcare services equal to children in the general population. On a policy level, Denmark imposed restrictions on non-acute hospitalisations and prolonged specialist treatments. Regarding health examinations, Sweden deviated from the Nordic pattern by not performing these systematically. In Denmark, Iceland, and some counties in Sweden, but not in Norway, screening for mental health problems was offered to asylum-seeking children. Access to healthcare services for asylum-seeking children differs in the Nordic countries; the consequences of these systematic differences for the individual asylum-seeking child are unknown. For asylum-seeking children, access to healthcare has to be considered in a wider context that includes the core conditions of being an asylum-seeker. A comparative study at policy level needs to be supplemented with empirical follow-up studies of the well-being of the study population to document potential consequences of policies in practice.

  12. Rural women and violence situation: access and accessibility limits to the healthcare network.

    Science.gov (United States)

    Costa, Marta Cocco da; Silva, Ethel Bastos da; Soares, Joannie Dos Santos Fachinelli; Borth, Luana Cristina; Honnef, Fernanda

    2017-07-13

    To analyze the access and accessibility to the healthcare network of women dwelling in rural contexts undergoing violence situation, as seen from the professionals' speeches. A qualitative, exploratory, descriptive study with professionals from the healthcare network services about coping with violence in four municipalities in the northern region of Rio Grande do Sul. The information derived from interviews, which have been analyzed by thematic modality. (Lack of) information of women, distance, restricted access to transportation, dependence on the partner and (lack of) attention by professionals to welcome women undergoing violence situation and (non)-articulation of the network are factors that limit the access and, as a consequence, they result in the lack of confrontation of this problem. To bring closer the services which integrate the confrontation network of violence against women and to qualify professionals to welcome these situations are factors that can facilitate the access and adhesion of rural women to the services.

  13. Policy learning and policy networks in theory and practice: The role of policy brokers in the Indonesian biodiesel policy network

    NARCIS (Netherlands)

    M. Howlett (Michael); Mukherjee, I. (Ishani); J.F.M. Koppenjan (Joop)

    2017-01-01

    textabstractThis paper examines how learning has been treated, generally, in policy network theories and what questions have been posed, and answered, about this phenomenon to date. We examine to what extent network characteristics and especially the presence of various types of brokers impede or

  14. Effects of network node consolidation in optical access and aggregation networks on costs and power consumption

    Science.gov (United States)

    Lange, Christoph; Hülsermann, Ralf; Kosiankowski, Dirk; Geilhardt, Frank; Gladisch, Andreas

    2010-01-01

    The increasing demand for higher bit rates in access networks requires fiber deployment closer to the subscriber resulting in fiber-to-the-home (FTTH) access networks. Besides higher access bit rates optical access network infrastructure and related technologies enable the network operator to establish larger service areas resulting in a simplified network structure with a lower number of network nodes. By changing the network structure network operators want to benefit from a changed network cost structure by decreasing in short and mid term the upfront investments for network equipment due to concentration effects as well as by reducing the energy costs due to a higher energy efficiency of large network sites housing a high amount of network equipment. In long term also savings in operational expenditures (OpEx) due to the closing of central office (CO) sites are expected. In this paper different architectures for optical access networks basing on state-of-the-art technology are analyzed with respect to network installation costs and power consumption in the context of access node consolidation. Network planning and dimensioning results are calculated for a realistic network scenario of Germany. All node consolidation scenarios are compared against a gigabit capable passive optical network (GPON) based FTTH access network operated from the conventional CO sites. The results show that a moderate reduction of the number of access nodes may be beneficial since in that case the capital expenditures (CapEx) do not rise extraordinarily and savings in OpEx related to the access nodes are expected. The total power consumption does not change significantly with decreasing number of access nodes but clustering effects enable a more energyefficient network operation and optimized power purchase order quantities leading to benefits in energy costs.

  15. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Mahdi Zareei

    2017-09-01

    Full Text Available New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN. First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.

  16. Climate change impacts on urban wildfire and flooding policy in Idaho: a comparative policy network perspective

    Science.gov (United States)

    Lindquist, E.; Pierce, J. L.

    2013-12-01

    , dominated by a few historically strong interests and is constrained (and supported) by the complex legal and management foundations of Western water rights, as well as federal and state regulatory practices for flood control and water provision. Overlap between these networks does occur as many of the stakeholders are the same, adding another dimension to the comparative approach presented here. It is the physical and natural sciences that bind these two networks, however, and create opportunities for convergence as hydrological inputs (snowmelt and rain) and summer drought simultaneously inform and impact efforts to increase resilience and reduce vulnerability and risk from both fire and flood. For example, early spring snowmelt can both increase risks of flooding and contribute to later severe fire conditions, and fires greatly increase the risk of catastrophic floods and debris flows in burned basins. Contributing to both of these potential hazards are changes in the climate in the region. This paper will present findings from a comparative study of these two policy networks and discuss the implications from how climate change is defined, understood, accepted, and integrated in both networks and the policy processes associated with these urban hazards.

  17. Policy issues in interconnecting networks

    Science.gov (United States)

    Leiner, Barry M.

    1989-01-01

    To support the activities of the Federal Research Coordinating Committee (FRICC) in creating an interconnected set of networks to serve the research community, two workshops were held to address the technical support of policy issues that arise when interconnecting such networks. The workshops addressed the required and feasible technologies and architectures that could be used to satisfy the desired policies for interconnection. The results of the workshop are documented.

  18. Research on optical access network remote management technology

    Science.gov (United States)

    Wang, Wayne; Zou, Chen; Luo, Wenyi

    2008-11-01

    This paper goal is to provide a framework for the remote configuration and management of services for PON (Passive Optical Network) access and fiber access. Also it defines how Auto-Configuration Servers (ACS) in the network can remotely configure, troubleshoot and manage a Passive Optical Network (PON) optical network termination (ONT) with layer 3 capabilities using the CPE WAN management protocol, TR-069.

  19. Networks in Social Policy Problems

    Science.gov (United States)

    Vedres, Balázs; Scotti, Marco

    2012-08-01

    1. Introduction M. Scotti and B. Vedres; Part I. Information, Collaboration, Innovation: The Creative Power of Networks: 2. Dissemination of health information within social networks C. Dhanjal, S. Blanchemanche, S. Clemençon, A. Rona-Tas and F. Rossi; 3. Scientific teams and networks change the face of knowledge creation S. Wuchty, J. Spiro, B. F. Jones and B. Uzzi; 4. Structural folds: the innovative potential of overlapping groups B. Vedres and D. Stark; 5. Team formation and performance on nanoHub: a network selection challenge in scientific communities D. Margolin, K. Ognyanova, M. Huang, Y. Huang and N. Contractor; Part II. Influence, Capture, Corruption: Networks Perspectives on Policy Institutions: 6. Modes of coordination of collective action: what actors in policy making? M. Diani; 7. Why skewed distributions of pay for executives is the cause of much grief: puzzles and few answers so far B. Kogut and J.-S. Yang; 8. Networks of institutional capture: a case of business in the State apparatus E. Lazega and L. Mounier; 9. The social and institutional structure of corruption: some typical network configurations of corruption transactions in Hungary Z. Szántó, I. J. Tóth and S. Varga; Part III. Crisis, Extinction, World System Change: Network Dynamics on a Large Scale: 10. How creative elements help the recovery of networks after crisis: lessons from biology A. Mihalik, A. S. Kaposi, I. A. Kovács, T. Nánási, R. Palotai, Á. Rák, M. S. Szalay-Beko and P. Csermely; 11. Networks and globalization policies D. R. White; 12. Network science in ecology: the structure of ecological communities and the biodiversity question A. Bodini, S. Allesina and C. Bondavalli; 13. Supply security in the European natural gas pipeline network M. Scotti and B. Vedres; 14. Conclusions and outlook A.-L. Barabási; Index.

  20. Location-aware network operation for cloud radio access network

    KAUST Repository

    Wang, Fanggang; Ruan, Liangzhong; Win, Moe Z.

    2017-01-01

    One of the major challenges in effectively operating a cloud radio access network (C-RAN) is the excessive overhead signaling and computation load that scale rapidly with the size of the network. In this paper, the exploitation of location

  1. Dual-mode ultraflow access networks: a hybrid solution for the access bottleneck

    Science.gov (United States)

    Kazovsky, Leonid G.; Shen, Thomas Shunrong; Dhaini, Ahmad R.; Yin, Shuang; De Leenheer, Marc; Detwiler, Benjamin A.

    2013-12-01

    Optical Flow Switching (OFS) is a promising solution for large Internet data transfers. In this paper, we introduce UltraFlow Access, a novel optical access network architecture that offers dual-mode service to its end-users: IP and OFS. With UltraFlow Access, we design and implement a new dual-mode control plane and a new dual-mode network stack to ensure efficient connection setup and reliable and optimal data transmission. We study the impact of the UltraFlow system's design on the network throughput. Our experimental results show that with an optimized system design, near optimal (around 10 Gb/s) OFS data throughput can be attained when the line rate is 10Gb/s.

  2. Directed Security Policies: A Stateful Network Implementation

    Directory of Open Access Journals (Sweden)

    Cornelius Diekmann

    2014-05-01

    Full Text Available Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this policy is often implemented in the network, for example by firewalls, such that A can establish a connection to B and all packets belonging to established connections are allowed. This stateful implementation is usually required for the network's functionality, but it introduces the backflow from B to A, which might contradict the security policy. We derive compliance criteria for a policy and its stateful implementation. In particular, we provide a criterion to verify the lack of side effects in linear time. Algorithms to automatically construct a stateful implementation of security policy rules are presented, which narrows the gap between formalization and real-world implementation. The solution scales to large networks, which is confirmed by a large real-world case study. Its correctness is guaranteed by the Isabelle/HOL theorem prover.

  3. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... control. Highlights of my research include my proposal and experimental proof of principle of an optical coherent detection based optical access network architecture providing support for a large number of users over a single distribution fiber; a spectral amplitude encoded label detection technique...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...

  4. Radio Access Sharing Strategies for Multiple Operators in Cellular Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Iversen, Villy Bæk

    2015-01-01

    deployments (required for coverage enhancement), increased base station utilization, and reduced overall power consumption. Today, network sharing in the radio access part is passive and limited to cell sites. With the introduction of Cloud Radio Access Network and Software Defined Networking adoption...... to the radio access network, the possibility for sharing baseband processing and radio spectrum becomes an important aspect of network sharing. This paper investigates strategies for active sharing of radio access among multiple operators, and analyses the individual benefits depending on the sharing degree...

  5. A multi-modal network approach to model public transport accessibility impacts of bicycle-train integration policies

    NARCIS (Netherlands)

    Geurs, Karst Teunis; La Paix Puello, Lissy Cesarina; van Weperen, Sander

    2016-01-01

    In the Netherlands, the bicycle plays an important in station access and, to a lesser extent, in station egress. There is however fairly little knowledge in the potential effects of bicycle-train integration policies. The aim of this paper is to examine the impacts of bicycle-train integration

  6. Planning Multitechnology Access Networks with Performance Constraints

    Science.gov (United States)

    Chamberland, Steven

    Considering the number of access network technologies and the investment needed for the “last mile” of a solution, in today’s highly competitive markets, planning tools are crucial for the service providers to optimize the network costs and accelerate the planning process. In this paper, we propose to tackle the problem of planning access networks composed of four technologies/architectures: the digital subscriber line (xDSL) technologies deployed directly from the central office (CO), the fiber-to-the-node (FTTN), the fiber-to-the-micro-node (FTTn) and the fiber-to-the-premises (FTTP). A mathematical programming model is proposed for this planning problem that is solved using a commercial implementation of the branch-and-bound algorithm. Next, a detailed access network planning example is presented followed by a systematic set of experiments designed to assess the performance of the proposed approach.

  7. Fiber Access Networks: Reliability Analysis and Swedish Broadband Market

    Science.gov (United States)

    Wosinska, Lena; Chen, Jiajia; Larsen, Claus Popp

    Fiber access network architectures such as active optical networks (AONs) and passive optical networks (PONs) have been developed to support the growing bandwidth demand. Whereas particularly Swedish operators prefer AON, this may not be the case for operators in other countries. The choice depends on a combination of technical requirements, practical constraints, business models, and cost. Due to the increasing importance of reliable access to the network services, connection availability is becoming one of the most crucial issues for access networks, which should be reflected in the network owner's architecture decision. In many cases protection against failures is realized by adding backup resources. However, there is a trade off between the cost of protection and the level of service reliability since improving reliability performance by duplication of network resources (and capital expenditures CAPEX) may be too expensive. In this paper we present the evolution of fiber access networks and compare reliability performance in relation to investment and management cost for some representative cases. We consider both standard and novel architectures for deployment in both sparsely and densely populated areas. While some recent works focused on PON protection schemes with reduced CAPEX the current and future effort should be put on minimizing the operational expenditures (OPEX) during the access network lifetime.

  8. Multiple-Access Quantum-Classical Networks

    Science.gov (United States)

    Razavi, Mohsen

    2011-10-01

    A multi-user network that supports both classical and quantum communication is proposed. By relying on optical code-division multiple access techniques, this system offers simultaneous key exchange between multiple pairs of network users. A lower bound on the secure key generation rate will be derived for decoy-state quantum key distribution protocols.

  9. Policy-based Network Management in Home Area Networks: Interim Test Results

    OpenAIRE

    Ibrahim Rana, Annie; Ó Foghlú, Mícheál

    2009-01-01

    This paper argues that Home Area Networks (HANs) are a good candidate for advanced network management automation techniques, such as Policy-Based Network Management (PBNM). What is proposed is a simple use of policy based network management to introduce some level of Quality of Service (QoS) and Security management in the HAN, whilst hiding this complexity from the home user. In this paper we have presented the interim test results of our research experiments (based on a scenario) using the H...

  10. MPTCP Tunnel: An Architecture for Aggregating Bandwidth of Heterogeneous Access Networks

    Directory of Open Access Journals (Sweden)

    Xiaolan Liu

    2018-01-01

    Full Text Available Fixed and cellular networks are two typical access networks provided by operators. Fixed access network is widely employed; nevertheless, its bandwidth is sometimes not sufficient enough to meet user bandwidth requirements. Meanwhile, cellular access network owns unique advantages of wider coverage, faster increasing link speed, more flexible deployment, and so forth. Therefore, it is attractive for operators to mitigate the bandwidth shortage by bundling these two. Actually, there have been existing schemes proposed to aggregate the bandwidth of two access networks, whereas they all have their own problems, like packet reordering or extra latency overhead. To address this problem, we design new architecture, MPTCP Tunnel, to aggregate the bandwidth of multiple heterogeneous access networks from the perspective of operators. MPTCP Tunnel uses MPTCP, which solves the reordering problem essentially, to bundle multiple access networks. Besides, MPTCP Tunnel sets up only one MPTCP connection at play which adapts itself to multiple traffic types and TCP flows. Furthermore, MPTCP Tunnel forwards intact IP packets through access networks, maintaining the end-to-end TCP semantics. Experimental results manifest that MPTCP Tunnel can efficiently aggregate the bandwidth of multiple access networks and is more adaptable to the increasing heterogeneity of access networks than existing mechanisms.

  11. Policy-Based mobility Management for Heterogeneous Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena D.

    2007-01-01

    Next generation communications will be composed of flexible, scalable and context-aware, secure and resilient architectures and technologies that allow full mobility of the user and enable dynamic management policies that ensure end-to-end secure transmission of data and services across heterogen......Next generation communications will be composed of flexible, scalable and context-aware, secure and resilient architectures and technologies that allow full mobility of the user and enable dynamic management policies that ensure end-to-end secure transmission of data and services across...... access technology (RAT) association, user and flow context transfer, handover decision, and deployment priority. Index Terms— distributed RRM, centralized...

  12. Communication Policies in Knowledge Networks

    Science.gov (United States)

    Ioannidis, Evangelos; Varsakelis, Nikos; Antoniou, Ioannis

    2018-02-01

    Faster knowledge attainment within organizations leads to improved innovation, and therefore competitive advantage. Interventions on the organizational network may be risky or costly or time-demanding. We investigate several communication policies in knowledge networks, which reduce the knowledge attainment time without interventions. We examine the resulting knowledge dynamics for real organizational networks, as well as for artificial networks. More specifically, we investigate the dependence of knowledge dynamics on: (1) the Selection Rule of agents for knowledge acquisition, and (2) the Order of implementation of "Selection" and "Filtering". Significant decrease of the knowledge attainment time (up to -74%) can be achieved by: (1) selecting agents of both high knowledge level and high knowledge transfer efficiency, and (2) implementing "Selection" after "Filtering" in contrast to the converse, implicitly assumed, conventional prioritization. The Non-Commutativity of "Selection" and "Filtering", reveals a Non-Boolean Logic of the Network Operations. The results demonstrate that significant improvement of knowledge dynamics can be achieved by implementing "fruitful" communication policies, by raising the awareness of agents, without any intervention on the network structure.

  13. Solar Access: Issues and Policy Options | State, Local, and Tribal

    Science.gov (United States)

    Governments | NREL Solar Access: Issues and Policy Options Solar Access: Issues and Policy Options June 06, 2017 by Alison Holm Distributed solar capacity in the United States is on the rise : approximately 2,580 megawatts (MW) of new residential solar photovoltaic (PV) capacity was brought online in

  14. Performance analysis of quantum access network using code division multiple access model

    International Nuclear Information System (INIS)

    Hu Linxi; Yang Can; He Guangqiang

    2017-01-01

    A quantum access network has been implemented by frequency division multiple access and time division multiple access, while code division multiple access is limited for its difficulty to realize the orthogonality of the code. Recently, the chaotic phase shifters were proposed to guarantee the orthogonality by different chaotic signals and spread the spectral content of the quantum states. In this letter, we propose to implement the code division multiple access quantum network by using chaotic phase shifters and synchronization. Due to the orthogonality of the different chaotic phase shifter, every pair of users can faithfully transmit quantum information through a common channel and have little crosstalk between different users. Meanwhile, the broadband spectra of chaotic signals efficiently help the quantum states to defend against channel loss and noise. (paper)

  15. Strategies for Success: Open Access Policies at North American Educational Institutions

    Science.gov (United States)

    Fruin, Christine; Sutton, Shan

    2016-01-01

    Recognizing the paucity of quantitative and qualitative data from North American educational institutions that have pursued open access policies, the authors devised a survey to collect information on the characteristics of these institutions, as well as the elements of the open access policies, the methods of promoting these policies, faculty…

  16. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  17. Networks: structure and action : steering in and steering by policy networks

    NARCIS (Netherlands)

    Dassen, A.

    2010-01-01

    This thesis explores the opportunities to build a structural policy network model that is rooted in social network theories. By making a distinction between a process of steering in networks, and a process of steering by networks, it addresses the effects of network structures on network dynamics as

  18. Acting discursively: the development of UK organic food and farming policy networks.

    Science.gov (United States)

    TOMLINSON, Isobel Jane

    2010-01-01

    This paper documents the early evolution of UK organic food and farming policy networks and locates this empirical focus in a theoretical context concerned with understanding the contemporary policy-making process. While policy networks have emerged as a widely acknowledged empirical manifestation of governance, debate continues as to the concept's explanatory utility and usefulness in situations of network and policy transformation since, historically, policy networks have been applied to "static" circumstances. Recognizing this criticism, and in drawing on an interpretivist perspective, this paper sees policy networks as enacted by individual actors whose beliefs and actions construct the nature of the network. It seeks to make links between the characteristics of the policy network and the policy outcomes through the identification of discursively constructed "storylines" that form a tool for consensus building in networks. This study analyses the functioning of the organic policy networks through the discursive actions of policy-network actors.

  19. Do open access data policies inhibit innovation?

    Science.gov (United States)

    Katzner, Todd E.

    2015-01-01

    There has been a great deal of attention paid recently to the idea of data sharing (Van Noorden 2014, Beardsley 2015, Nature Publishing Group2015, www.copdess.com). However, the vast majority of these arguments are in agreement and present as fait accompli the idea that data are a public good and that therefore, once published, they should become open access. In fact, although there are many good reasons for data sharing, there also are a number of cogent and coherent cases to be made against open-access policies (e.g., Fenichel and Skelly 2015). The goal of this piece is not to debate the relevance or accuracy of the points made in favor of data sharing but to elevate the discussion by pointing out key problems with open-access policies and to identify central issues that, if solved, will enhance the utility of data sharing to science and society.

  20. Information Security Policy Modeling for Network Security Systems

    Directory of Open Access Journals (Sweden)

    Dmitry Sergeevich Chernyavskiy

    2014-12-01

    Full Text Available Policy management for network security systems (NSSs is one of the most topical issues of network security management. Incorrect configurations of NSSs lead to system outages and appearance of vulnerabilities. Moreover, policy management process is a time-consuming task, which includes significant amount of manual work. These factors reduce efficiency of NSSs’ utilization. The paper discusses peculiarities of policy management process and existing approaches to policy modeling, presents a model aimed to formalize policies for NSSs independently on NSSs’ platforms and select the most effective NSSs for implementation of the policies.

  1. Accessibility appraisal of integrated land-use/transport policy strategies: more than just adding up travel time savings

    NARCIS (Netherlands)

    Geurs, Karst Teunis; Zondag, Barry; de Jong, Gerard; de Bok, Michiel

    2010-01-01

    We examine the accessibility benefits associated with some land-use policy strategies for the Netherlands that anticipate on expected climate change. A disaggregate logsum accessibility measure using the Dutch national land-use/transport interaction model TIGRIS XL is used to compute changes in

  2. Structural integration and performance of inter-sectoral public health-related policy networks: An analysis across policy phases.

    Science.gov (United States)

    Peters, D T J M; Raab, J; Grêaux, K M; Stronks, K; Harting, J

    2017-12-01

    Inter-sectoral policy networks may be effective in addressing environmental determinants of health with interventions. However, contradictory results are reported on relations between structural network characteristics (i.e., composition and integration) and network performance, such as addressing environmental determinants of health. This study examines these relations in different phases of the policy process. A multiple-case study was performed on four public health-related policy networks. Using a snowball method among network actors, overall and sub-networks per policy phase were identified and the policy sector of each actor was assigned. To operationalise the outcome variable, interventions were classified by the proportion of environmental determinants they addressed. In the overall networks, no relation was found between structural network characteristics and network performance. In most effective cases, the policy development sub-networks were characterised by integration with less interrelations between actors (low cohesion), more equally distributed distances between the actors (low closeness centralisation), and horizontal integration in inter-sectoral cliques. The most effective case had non-public health central actors with less connections in all sub-networks. The results suggest that, to address environmental determinants of health, sub-networks should be inter-sectorally composed in the policy development rather than in the intervention development and implementation phases, and that policy development actors should have the opportunity to connect with other actors, without strong direction from a central actor. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. The OPL Access Control Policy Language

    Science.gov (United States)

    Alm, Christopher; Wolf, Ruben; Posegga, Joachim

    Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of duty [22], binding of duty [26], context constraints [24], Chinese wall properties [10], and obligations [20]. It is often difficult to extend a language in order to retrofit these features once required or it is necessary to use complicated and complex language constructs to express such concepts. The latter, however, is cumbersome and error-prone for humans dealing with policy administration.

  4. The association between network social capital and self-rated health: pouring old wine in new bottles?

    Science.gov (United States)

    Verhaeghe, Pieter-Paul; Pattyn, Elise; Bracke, Piet; Verhaeghe, Mieke; Van De Putte, Bart

    2012-03-01

    This study examines whether there is an association between network social capital and self-rated health after controlling for social support. Moreover, we distinguish between network social capital that emerges from strong ties and weak ties. We used a cross-sectional representative sample of 815 adults from the Belgian population. Social capital is measured with the position generator and perceived social support with the MOS Social Support-scale. Results suggest that network social capital is associated with self-rated health after adjustment for social support. Because different social classes have access to different sets of resources, resources of friends and family from the intermediate and higher service classes are beneficial for self-rated health, whereas resources of friends and family from the working class appear to be rather detrimental for self-rated health. From a health-promoting perspective, these findings indicate that policy makers should deal with the root causes of socioeconomic disadvantages in society. Copyright © 2011 Elsevier Ltd. All rights reserved.

  5. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  6. Statistical network analysis for analyzing policy networks

    DEFF Research Database (Denmark)

    Robins, Garry; Lewis, Jenny; Wang, Peng

    2012-01-01

    and policy network methodology is the development of statistical modeling approaches that can accommodate such dependent data. In this article, we review three network statistical methods commonly used in the current literature: quadratic assignment procedures, exponential random graph models (ERGMs......To analyze social network data using standard statistical approaches is to risk incorrect inference. The dependencies among observations implied in a network conceptualization undermine standard assumptions of the usual general linear models. One of the most quickly expanding areas of social......), and stochastic actor-oriented models. We focus most attention on ERGMs by providing an illustrative example of a model for a strategic information network within a local government. We draw inferences about the structural role played by individuals recognized as key innovators and conclude that such an approach...

  7. Transparency of Biobank Access in Canada: An Assessment of Industry Access and the Availability of Information on Access Policies and Resulting Research.

    Science.gov (United States)

    Gibson, Shannon G; Axler, Renata E; Lemmens, Trudo

    2017-12-01

    A key issue impacting public trust in biobanks is how these resources are utilized, including who is given access to biobank data and samples. To assess the conditions under which researchers are given access to Canadian biobanks, we reviewed websites and contacted Canadian biobanks to determine the availability of information on access policies and procedures; research resulting from access biobank data and samples; and conditions on private industry access to biobanks. We also conducted expert interviews with key Canadian stakeholders ( n = 11) to obtain their perspectives on biobank transparency and access policies. Among 21 Canadian biobanks, there was wide variation in the access information made publicly available, and the majority of these allowed access by industry applicants. Biobanks should be governed by the principles of transparency, accountability, and accessibility, and attention must be given to the conditions around the commercialization of biobank-based research.

  8. Dynamic Resource Allocation in Hybrid Access Femtocell Network

    Directory of Open Access Journals (Sweden)

    Afaz Uddin Ahmed

    2014-01-01

    Full Text Available Intercell interference is one of the most challenging issues in femtocell deployment under the coverage of existing macrocell. Allocation of resources between femtocell and macrocell is essential to counter the effects of interference in dense femtocell networks. Advances in resource management strategies have improved the control mechanism for interference reduction at lower node density, but most of them are ineffective at higher node density. In this paper, a dynamic resource allocation management algorithm (DRAMA for spectrum shared hybrid access OFDMA femtocell network is proposed. To reduce the macro-femto-tier interference and to improve the quality of service, the proposed algorithm features a dynamic resource allocation scheme by controlling them both centrally and locally. The proposed scheme focuses on Femtocell Access Point (FAP owners’ satisfaction and allows maximum utilization of available resources based on congestion in the network. A simulation environment is developed to study the quantitative performance of DRAMA in hybrid access-control femtocell network and compare it to closed and open access mechanisms. The performance analysis shows that higher number of random users gets connected to the FAP without compromising FAP owners’ satisfaction allowing the macrocell to offload a large number of users in a dense heterogeneous network.

  9. Protocol and networking design issues for local access WDM networks

    NARCIS (Netherlands)

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this

  10. A Systematic Scheme for Multiple Access in Ethernet Passive Optical Access Networks

    Science.gov (United States)

    Ma, Maode; Zhu, Yongqing; Hiang Cheng, Tee

    2005-11-01

    While backbone networks have experienced substantial changes in the last decade, access networks have not changed much. Recently, passive optical networks (PONs) seem to be ready for commercial deployment as access networks, due to the maturity of a number of enabling technologies. Among the PON technologies, Ethernet PON (EPON) standardized by the IEEE 802.3ah Ethernet in the First Mile (EFM) Task Force is the most attractive one because of its high speed, low cost, familiarity, interoperability, and low overhead. In this paper, we consider the issue of upstream channel sharing in the EPONs. We propose a novel multiple-access control scheme to provide bandwidth-guaranteed service for high-demand customers, while providing best effort service to low-demand customers according to the service level agreement (SLA). The analytical and simulation results prove that the proposed scheme performs best in what it is designed to do compared to another well-known scheme that has not considered providing differentiated services. With business customers preferring premium services with guaranteed bandwidth and residential users preferring low-cost best effort services, our scheme could benefit both groups of subscribers, as well as the operators.

  11. Instruments and options for environmental policy during the accession process of EU associated countries in the area of environment and energy. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Cames, M.; Matthes, F.C.; Baer, S.; Oberthuer, S.; Krug, M.; Mez, L.; Tempel, S.

    2001-07-01

    With regard to the leading role of the EU in climate protection policies, it is important to consider the impact of the accession process on EU climate policy. This study includes the analysis of the most important issues related to environment and energy within the accession process, namely: 1) status quo and development of the energy sector and structural CO{sub 2} mitigation options; 2) legal gap assessment and analysis of performance in the accession process; 3) identification of implementation patterns through detailed policy analysis; 4) evaluation of co-operation projects in the field of environment and energy in order to develop new projects that promote the accession process. This volume includes comparative analysis of the five Accession Countries. The detailed analysis of each country is documented in five country reports, each in a separate volume available only on the attached CD. (orig.)

  12. A Review of Open Access Self-Archiving Mandate Policies

    Science.gov (United States)

    Xia, Jingfeng; Gilchrist, Sarah B.; Smith, Nathaniel X. P.; Kingery, Justin A.; Radecki, Jennifer R.; Wilhelm, Marcia L.; Harrison, Keith C.; Ashby, Michael L.; Mahn, Alyson J.

    2012-01-01

    This article reviews the history of open access (OA) policies and examines the current status of mandate policy implementations. It finds that hundreds of policies have been proposed and adopted at various organizational levels and many of them have shown a positive effect on the rate of repository content accumulation. However, it also detects…

  13. The Impact of the Physical Activity Policy Research Network.

    Science.gov (United States)

    Manteiga, Alicia M; Eyler, Amy A; Valko, Cheryl; Brownson, Ross C; Evenson, Kelly R; Schmid, Thomas

    2017-03-01

    Lack of physical activity is one of the greatest challenges of the 21st century. The Physical Activity Policy Research Network (PAPRN) is a thematic network established in 2004 to identify determinants, implementation, and outcomes of policies that are effective in increasing physical activity. The purpose of this study is to describe the products of PAPRN and make recommendations for future research and best practices. A mixed methods approach was used to obtain both quantitative and qualitative data on the network. First, in 2014, PAPRN's dissemination products from 2004 to 2014 were extracted and reviewed, including 57 publications and 56 presentations. Next, semi-structured qualitative interviews were conducted with 25 key network participants from 17 locations around the U.S. The transcripts were transcribed and coded. The results of the interviews indicated that the research network addressed several components of its mission, including the identification of physical activity policies, determinants of these policies, and the process of policy implementation. However, research focusing on physical activity policy outcomes was limited. Best practices included collaboration between researchers and practitioners and involvement of practitioners in research design, data collection, and dissemination of results. PAPRN is an example of a productive research network and has contributed to both the process and content of physical activity policy research over the past decade. Future research should emphasize physical activity policy outcomes. Additionally, increased partnerships with practitioners for collaborative, cross-sectoral physical activity policy research should be developed. Copyright © 2016 American Journal of Preventive Medicine. All rights reserved.

  14. Knowledge Access in Rural Inter-connected Areas Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... the existing network to include two thematic networks on food security and rural ... Woman conquering male business in Yemen : Waleya's micro-enterprise.

  15. What is the energy policy-planning network and who dominates it?: A network and QCA analysis of leading energy firms and organizations

    International Nuclear Information System (INIS)

    Crawford, Seth

    2012-01-01

    This study examines the structure of the energy industry and the energy policy-planning network (EPPN). I use cross-sectional director interlocks from 2002 to examine the social networks amongst a sample of the largest energy firms, between these firms and the EPPN, and to calculate relative network centrality measures for the firms. I then use qualitative comparative analysis (QCA) to isolate specific combinations of energy firm attributes that are associated with network position. I find that the energy industry has several key intra-firm interlocks that link dominant companies to each other and that the industry is well represented on the boards of EPPN organizations. Additionally, several dominant energy firms provide links between ultra-conservative and moderate policy development organizations. Finally, QCA models suggest that firms with many employees, high revenue, and who produce oil are most likely to hold prominent positions in the EPPN—though above average political campaign contributions offer an alternative path into the network. - Highlights: ► Identifies organizations in the Energy Policy-Planning Network (EPPN). ► Examines measures of network association between EPPN organizations and energy firms. ► Isolates key attributes of energy firms who are highly embedded within the EPPN. ► Large, oil producing firms hold key positions in the network. ► EPPN organizations act as a bridge between many firms, linking them indirectly.

  16. Protocol and networking design issues for local access WDM networks

    OpenAIRE

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    1999-01-01

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this report. A brief introduction to optical networks and WDM as well as a brief description of Flamingo are also included in this report.

  17. Extending AAA operational model for profile-based access control in ethernet-based Neutral Access Networks

    NARCIS (Netherlands)

    Matias, J.; Jacob, E.; Demchenko, Y.; de Laat, C.; Gommans, L.; Macías López, E.M.; Bogliolo, A.; Perry, M.; Ran, M

    2010-01-01

    Neutral Access Networks (NAN) have appeared as a new model to overcome some restrictions and lack of flexibility that are present currently in broadband access networks. NAN brings new business opportunities by opening this market to new stakeholders. Although the NAN model is accepted, there are

  18. Joint Hybrid Backhaul and Access Links Design in Cloud-Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    The cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio systems. In this paper, we consider the downlink of a CRAN formed of one central processor (the cloud) and several base station

  19. Access to essential medicines in Pakistan: policy and health systems research concerns.

    Directory of Open Access Journals (Sweden)

    Shehla Zaidi

    Full Text Available INTRODUCTION: Inadequate access to essential medicines is a common issue within developing countries. Policy response is constrained, amongst other factors, by a dearth of in-depth country level evidence. We share here i gaps related to access to essential medicine in Pakistan; and ii prioritization of emerging policy and research concerns. METHODS: An exploratory research was carried out using a health systems perspective and applying the WHO Framework for Equitable Access to Essential Medicine. Methods involved key informant interviews with policy makers, providers, industry, NGOs, experts and development partners, review of published and grey literature, and consultative prioritization in stakeholder's Roundtable. FINDINGS: A synthesis of evidence found major gaps in essential medicine access in Pakistan driven by weaknesses in the health care system as well as weak pharmaceutical regulation. 7 major policy concerns and 11 emerging research concerns were identified through consultative Roundtable. These related to weaknesses in medicine registration and quality assurance systems, unclear and counterproductive pricing policies, irrational prescribing and sub-optimal drug availability. Available research, both locally and globally, fails to target most of the identified policy concerns, tending to concentrate on irrational prescriptions. It overlooks trans-disciplinary areas of policy effectiveness surveillance, consumer behavior, operational pilots and pricing interventions review. CONCLUSION: Experience from Pakistan shows that policy concerns related to essential medicine access need integrated responses across various components of the health systems, are poorly addressed by existing evidence, and require an expanded health systems research agenda.

  20. A Systematic Content Analysis of Policy Barriers Impeding Access to Opioid Medication in Central and Eastern Europe: Results of ATOME.

    Science.gov (United States)

    Larjow, Eugenia; Papavasiliou, Evangelia; Payne, Sheila; Scholten, Willem; Radbruch, Lukas

    2016-01-01

    Reliable access to opioid medication is critical to delivering effective pain management, adequate treatment of opioid dependence, and quality palliative care. However, more than 80% of the world population is estimated to be inadequately treated for pain because of difficulties in accessing opioids. Although barriers to opioid access are primarily associated with restrictive laws, regulations, and licensing requirements, a key problem that significantly limits opioid access relates to policy constraints. To identify and explore policy barriers to opioid access in 12 Eastern and Central European countries involved in the Access to Opioid Medication in Europe project, funded by the European Community's Seventh Framework (FP7/2007-2013, no. 222994) Programme. A systematic content analysis of texts retrieved from documents (e.g., protocols of national problem analyses, strategic planning worksheets, and executive summaries) compiled, reviewed, approved, and submitted by either the Access to Opioid Medication in Europe consortium or the national country teams (comprising experts in pain management, harm reduction, and palliative care) between September 2011 and April 2014 was performed. Twenty-five policy barriers were identified (e.g., economic crisis, bureaucratic issues, lack of training initiatives, stigma, and discrimination), classified under four predetermined categories (financial/economic aspects and governmental support, formularies, education and training, and societal attitudes). Key barriers related to issues of funding allocation, affordability, knowledge, and fears associated with opioids. Reducing barriers and improving access to opioids require policy reform at the governmental level with a set of action plans being formulated and concurrently implemented and aimed at different levels of social, education, and economic policy change. Copyright © 2016 American Academy of Hospice and Palliative Medicine. Published by Elsevier Inc. All rights reserved.

  1. Evidence-based policy versus morality policy: the case of syringe access programs.

    Science.gov (United States)

    de Saxe Zerden, Lisa; O'Quinn, Erin; Davis, Corey

    2015-01-01

    Evidence-based practice (EBP) combines proven interventions with clinical experience, ethics, and client preferences to inform treatment and services. Although EBP is integrated into most aspects of social work and public health, at times EBP is at odds with social policy. In this article the authors explore the paradox of evidence-based policy using syringe access programs (SAP) as a case example, and review methods of bridging the gap between the emphasis on EBP and lack of evidence informing SAP policy. Analysis includes the overuse of morality policy and examines historical and current theories why this paradox exists. Action steps are highlighted for creating effective policy and opportunities for public health change. Strategies on reframing the problem and shifting target population focus to garner support for evidence-based policy change are included. This interdisciplinary understanding of the way in which these factors converge is a critical first step in moving beyond morality-based policy toward evidence-based policy.

  2. Networking to Improve Nutrition Policy Research

    OpenAIRE

    Kim, Sonia A.; Blanck, Heidi M.; Cradock, Angie; Gortmaker, Steven

    2015-01-01

    Effective nutrition and obesity policies that improve the food environments in which Americans live, work, and play can have positive effects on the quality of human diets. The Centers for Disease Control and Prevention’s (CDC’s) Nutrition and Obesity Policy Research and Evaluation Network (NOPREN) conducts transdisciplinary practice-based policy research and evaluation to foster understanding of the effectiveness of nutrition policies. The articles in this special collection bring to light a...

  3. File access prediction using neural networks.

    Science.gov (United States)

    Patra, Prashanta Kumar; Sahu, Muktikanta; Mohapatra, Subasish; Samantray, Ronak Kumar

    2010-06-01

    One of the most vexing issues in design of a high-speed computer is the wide gap of access times between the memory and the disk. To solve this problem, static file access predictors have been used. In this paper, we propose dynamic file access predictors using neural networks to significantly improve upon the accuracy, success-per-reference, and effective-success-rate-per-reference by using neural-network-based file access predictor with proper tuning. In particular, we verified that the incorrect prediction has been reduced from 53.11% to 43.63% for the proposed neural network prediction method with a standard configuration than the recent popularity (RP) method. With manual tuning for each trace, we are able to improve upon the misprediction rate and effective-success-rate-per-reference using a standard configuration. Simulations on distributed file system (DFS) traces reveal that exact fit radial basis function (RBF) gives better prediction in high end system whereas multilayer perceptron (MLP) trained with Levenberg-Marquardt (LM) backpropagation outperforms in system having good computational capability. Probabilistic and competitive predictors are the most suitable for work stations having limited resources to deal with and the former predictor is more efficient than the latter for servers having maximum system calls. Finally, we conclude that MLP with LM backpropagation algorithm has better success rate of file prediction than those of simple perceptron, last successor, stable successor, and best k out of m predictors.

  4. A Method for Upper Bounding on Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Patel, A.; Pedersen, Jens Myrup

    2004-01-01

    This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management.......This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management....

  5. Hierarchical micro-mobility management in high-speed multihop access networks

    Institute of Scientific and Technical Information of China (English)

    TANG Bi-hua; MA Xiao-lei; LIU Yuan-an; GAO Jin-chun

    2006-01-01

    This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access routers. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access router (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility management scheme can achieve high packet delivery fraction and improve the lifetime of network.

  6. Implementing multiple intervention strategies in Dutch public health-related policy networks.

    Science.gov (United States)

    Harting, Janneke; Peters, Dorothee; Grêaux, Kimberly; van Assema, Patricia; Verweij, Stefan; Stronks, Karien; Klijn, Erik-Hans

    2017-10-13

    Improving public health requires multiple intervention strategies. Implementing such an intervention mix is supposed to require a multisectoral policy network. As evidence to support this assumption is scarce, we examined under which conditions public health-related policy networks were able to implement an intervention mix. Data were collected (2009-14) from 29 Dutch public health policy networks. Surveys were used to identify the number of policy sectors, participation of actors, level of trust, networking by the project leader, and intervention strategies implemented. Conditions sufficient for an intervention mix (≥3 of 4 non-educational strategies present) were determined in a fuzzy-set qualitative comparative analysis. A multisectoral policy network (≥7 of 14 sectors present) was neither a necessary nor a sufficient condition. In multisectoral networks, additionally required was either the active participation of network actors (≥50% actively involved) or active networking by the project leader (≥monthly contacts with network actors). In policy networks that included few sectors, a high level of trust (positive perceptions of each other's intentions) was needed-in the absence though of any of the other conditions. If the network actors were also actively involved, an extra requirement was active networking by the project leader. We conclude that the multisectoral composition of policy networks can contribute to the implementation of a variety of intervention strategies, but not without additional efforts. However, policy networks that include only few sectors are also able to implement an intervention mix. Here, trust seems to be the most important condition. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  7. Achieving universal access to next generation networks

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders

    The paper examines investment dimensions of next generation networks in a universal service perspective in a European context. The question is how new network infrastructures for getting access to communication, information and entertainment services in the present and future information society...

  8. Adolescents' alcohol use and strength of policy relating to youth access, trading hours and driving under the influence: findings from Australia.

    Science.gov (United States)

    White, Victoria; Azar, Denise; Faulkner, Agatha; Coomber, Kerri; Durkin, Sarah; Livingston, Michael; Chikritzhs, Tanya; Room, Robin; Wakefield, Melanie

    2018-06-01

    To determine (i) whether the strength of Australian alcohol control policy in three domains (youth access, trading hours and drink driving) changed during the 2000s; and (ii) estimate associations between these policies and adolescent drinking after adjusting for television alcohol advertising exposures, alcohol outlet density, alcohol price changes, exposure to negative articles about alcohol in daily newspapers and adult drinking prevalence. Repeated cross-sectional surveys conducted triennially from 2002 to 2011. Multi-level modelling examined the association between alcohol control policies and drinking prevalence after adjusting for covariates. Four Australian capital cities between 2002 and 2011. Students aged 12-17 years participating in a triennial national representative school-based survey (sample size range/survey: 9805-13 119). Outcome measures were: past month drinking and risky drinking (5+ drinks on a day) in the past 7 days. Policy strength in each of three domains (youth access, trading hours, drink-driving) were the key predictor variables. Covariates included: past 3-month television alcohol and alcohol-control advertising, alcohol outlet density, alcohol price change, negatively framed newspaper alcohol articles, adult drinking prevalence and student demographic characteristics. During the study period, the strength of youth access policies increased by 10%, trading hours policies by 14% and drink-driving policies by 58%. Past-month and risky drinking prevalence decreased (e.g. past-month: 2002: 47.4% to 2011: 26.3%). Multivariable analyses that included all policy variables and adjusted for year, student and other covariates showed past-month drinking to be associated inversely with stronger trading hours policies [odds ratio (OR) = 0.80, 95% confidence interval (CI) = 0.69, 0.94], but not youth access (OR = 0.92 95% CI = 0.81, 1.04) or drink-driving (OR = 1.00, 95% CI = 0.93, 1.09). Risky drinking was associated inversely with

  9. Networking to Improve Nutrition Policy Research.

    Science.gov (United States)

    Kim, Sonia A; Blanck, Heidi M; Cradock, Angie; Gortmaker, Steven

    2015-09-10

    Effective nutrition and obesity policies that improve the food environments in which Americans live, work, and play can have positive effects on the quality of human diets. The Centers for Disease Control and Prevention's (CDC's) Nutrition and Obesity Policy Research and Evaluation Network (NOPREN) conducts transdisciplinary practice-based policy research and evaluation to foster understanding of the effectiveness of nutrition policies. The articles in this special collection bring to light a set of policies that are being used across the United States. They add to the larger picture of policies that can work together over time to improve diet and health.

  10. Survey on Cloud Radio Access Network

    Directory of Open Access Journals (Sweden)

    Reeta Chhatani

    2016-01-01

    Full Text Available The existing wireless network will face the challenge of data tsunami in the near future. Densification of network will deal huge data traffic but will increase the interferences and network cost. At the same time, the existing wireless network is underutilized due to dynamic traffic. To deal with this adverse scenario, a change in the current network architecture is required. Based on virtualization, Cloud Radio Access Network (CRAN was proposed for wireless network. In CRAN the functionality of base station will be distributed into base band unit (BBU and remote radio heads (RRH which will achieve benefits of centralization. This paper presents a survey on CRAN centring on optimized resource allocation, energy efficiency and throughput maximization under fronthaul capacity. The existing solution and future opportunities in CRAN are also summarized.

  11. Integration of QoS provisioning in home and access networks

    DEFF Research Database (Denmark)

    Popov, Mikhail; Gavler, A.; Sköldström, P.

    2010-01-01

    Approaches for QoS provisioning using UPnP for home networks and GMPLS for access networks are described. A solution for interworking the UPnP and the GMPLS at the residential gateway is proposed.......Approaches for QoS provisioning using UPnP for home networks and GMPLS for access networks are described. A solution for interworking the UPnP and the GMPLS at the residential gateway is proposed....

  12. Energy challenges in optical access and aggregation networks.

    Science.gov (United States)

    Kilper, Daniel C; Rastegarfar, Houman

    2016-03-06

    Scalability is a critical issue for access and aggregation networks as they must support the growth in both the size of data capacity demands and the multiplicity of access points. The number of connected devices, the Internet of Things, is growing to the tens of billions. Prevailing communication paradigms are reaching physical limitations that make continued growth problematic. Challenges are emerging in electronic and optical systems and energy increasingly plays a central role. With the spectral efficiency of optical systems approaching the Shannon limit, increasing parallelism is required to support higher capacities. For electronic systems, as the density and speed increases, the total system energy, thermal density and energy per bit are moving into regimes that become impractical to support-for example requiring single-chip processor powers above the 100 W limit common today. We examine communication network scaling and energy use from the Internet core down to the computer processor core and consider implications for optical networks. Optical switching in data centres is identified as a potential model from which scalable access and aggregation networks for the future Internet, with the application of integrated photonic devices and intelligent hybrid networking, will emerge. © 2016 The Author(s).

  13. A Fuzzy Preprocessing Module for Optimizing the Access Network Selection in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Faisal Kaleem

    2013-01-01

    Full Text Available A heterogeneous wireless network is characterized by the presence of different wireless access technologies that coexist in an overlay fashion. These wireless access technologies usually differ in terms of their operating parameters. On the other hand, Mobile Stations (MSs in a heterogeneous wireless network are equipped with multiple interfaces to access different types of services from these wireless access technologies. The ultimate goal of these heterogeneous wireless networks is to provide global connectivity with efficient ubiquitous computing to these MSs based on the Always Best Connected (ABC principle. This is where the need for intelligent and efficient Vertical Handoffs (VHOs between wireless technologies in a heterogeneous environment becomes apparent. This paper presents the design and implementation of a fuzzy multicriteria based Vertical Handoff Necessity Estimation (VHONE scheme that determines the proper time for VHO, while considering the continuity and quality of the currently utilized service, and the end-users' satisfaction.

  14. A Logic for Reasoning About Time-Dependent Access Control Policies

    National Research Council Canada - National Science Library

    DeYoung, Henry

    2008-01-01

    .... Because of the number and complexity of authorization policies in access control systems, it is clear that ad hoc methods for specifying and enforcing policies cannot inspire a high degree of trust...

  15. Plans & Policies for Technology in Education: A Compendium. A Technology Leadership Network Special Report.

    Science.gov (United States)

    National School Boards Association, Alexandria, VA. Inst. for the Transfer of Technology to Education.

    This document shows how education leaders nationwide--many of them part of the National School Boards Association's 345-district Technology Leadership Network--have addressed technology-related policy issues such as copyright, purchasing, network/Internet use, and ethics as well as technology planning topics including staff development, classroom…

  16. Optimizing the next generation optical access networks

    DEFF Research Database (Denmark)

    Amaya Fernández, Ferney Orlando; Soto, Ana Cardenas; Tafur Monroy, Idelfonso

    2009-01-01

    Several issues in the design and optimization of the next generation optical access network (NG-OAN) are presented. The noise, the distortion and the fiber optic nonlinearities are considered to optimize the video distribution link in a passive optical network (PON). A discussion of the effect...

  17. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  18. TCP Performance Enhancement for UMTS Access Network

    DEFF Research Database (Denmark)

    Hu, Liang

    2008-01-01

    is between UMTS access network and Internet. The split proxy divides the bandwidth delay product into two parts, resulting in two TCP connections with smaller bandwidth delay products. Simulation results show, the split TCP proxy can significantly improve the TCP performance under high bit rate DCH channel......We aim at optimize the TCP performance over UMTS access network challenged by the large delay bandwidth product that is mainly caused by the latency from the link layer ARQ retransmissions and diversity technique at physical layer. We propose to place a split TCP proxy at GGSN nodes which...

  19. Resource allocation in heterogeneous cloud radio access networks: advances and challenges

    KAUST Repository

    Dahrouj, Hayssam

    2015-06-01

    Base station densification is increasingly used by network operators to provide better throughput and coverage performance to mobile subscribers in dense data traffic areas. Such densification is progressively diffusing the move from traditional macrocell base stations toward heterogeneous networks with diverse cell sizes (e.g., microcell, picocell, femotcell) and diverse radio access technologies (e.g., GSM, CDMA), and LTE). The coexistence of the different network entities brings an additional set of challenges, particularly in terms of the provisioning of high-speed communications and the management of wireless interference. Resource sharing between different entities, largely incompatible in conventional systems due to the lack of interconnections, becomes a necessity. By connecting all the base stations from different tiers to a central processor (referred to as the cloud) through wire/wireline backhaul links, the heterogeneous cloud radio access network, H-CRAN, provides an open, simple, controllable, and flexible paradigm for resource allocation. This article discusses challenges and recent developments in H-CRAN design. It proposes promising resource allocation schemes in H-CRAN: coordinated scheduling, hybrid backhauling, and multicloud association. Simulations results show how the proposed strategies provide appreciable performance improvement compared to methods from recent literature. © 2015 IEEE.

  20. Export policies for multi-domain WDM networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée

    2010-01-01

    We analyze the performance of six export policies for a multi-domain routing protocol in WDM networks. We show that providing many AS-disjoint paths for survivability and load-balancing does not necessarily guarantee the lowest connection blocking......We analyze the performance of six export policies for a multi-domain routing protocol in WDM networks. We show that providing many AS-disjoint paths for survivability and load-balancing does not necessarily guarantee the lowest connection blocking...

  1. Translanguaging in Self-Access Language Advising: Informing Language Policy

    Directory of Open Access Journals (Sweden)

    Naoki Fujimoto-Adamson

    2012-03-01

    Full Text Available This study investigates language advising in a self-access center (SAC with the purpose of informing language policy. This center is located in a new Japanese university and has shifted from an initially teacher-imposed ‘English-only’ language policy into one which encourages “translanguaging” (Blackledge & Creese, 2010, p. 105 between the students’ and center advisors’ (termed as mentors in this center L1 (Japanese and their L2 (English. Data from audio-recordings of interaction with advisors and students and between students themselves, interviews with mentors, and student questionnaires all reveal how translanguaging occurs in practice and how it helps to create a learning space in which the “local, pragmatic coping tactics” (Lin, 2005, p. 46 of code-switching offer a more viable approach for learning than under its initial monolingual policy. Mentor interviews and student questionnaires indicate generally positive attitudes towards translanguaging; however, some students still favor an ‘English-only’ policy. Conclusions reveal that a looser language policy in the center is emerging in which mentors now guide students towards their own individualized language policies. It is argued in this paper that this “code choice” (Levine, 2011 in language use is therefore aligned more closely to the principles of student-direction in self-access use.

  2. XACML to build access control policies for Internet of Things

    OpenAIRE

    Atlam, Hany F.; Alassafi, Madini, Obad; Alenezi, Ahmed; Walters, Robert; Wills, Gary

    2018-01-01

    Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an ef...

  3. Open Orchestration Cloud Radio Access Network (OOCRAN) Testbed

    OpenAIRE

    Floriach-Pigem, Marti; Xercavins-Torregrosa, Guillem; Marojevic, Vuk; Gelonch-Bosch, Antoni

    2017-01-01

    The Cloud radio access network (C-RAN) offers a revolutionary approach to cellular network deployment, management and evolution. Advances in software-defined radio (SDR) and networking technology, moreover, enable delivering software-defined everything through the Cloud. Resources will be pooled and dynamically allocated leveraging abstraction, virtualization, and consolidation techniques; processes will be automated using common application programming interfaces; and network functions and s...

  4. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  5. Knowledge Access in Rural Inter-connected Areas Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... poor by sharing innovations, best practices and indigenous knowledge using ... A third thematic network - on knowledge management strategies - will play an ...

  6. Sierra Stars Observatory Network: An Accessible Global Network

    Science.gov (United States)

    Williams, Richard; Beshore, Edward

    2011-03-01

    The Sierra Stars Observatory Network (SSON) is a unique partnership among professional observatories that provides its users with affordable high-quality calibrated image data. SSON comprises observatories in the Northern and Southern Hemisphere and is in the process of expanding to a truly global network capable of covering the entire sky 24 hours a day in the near future. The goal of SSON is to serve the needs of science-based projects and programs. Colleges, universities, institutions, and individuals use SSON for their education and research projects. The mission of SSON is to promote and expand the use of its facilities among the thousands of colleges and schools worldwide that do not have access to professional-quality automated observatory systems to use for astronomy education and research. With appropriate leadership and guidance educators can use SSON to help teach astronomy and do meaningful scientific projects. The relatively small cost of using SSON for this type of work makes it affordable and accessible for educators to start using immediately. Remote observatory services like SSON need to evolve to better support education and research initiatives of colleges, institutions and individual investigators. To meet these needs, SSON is developing a sophisticated interactive scheduling system to integrate among the nodes of the observatory network. This will enable more dynamic observations, including immediate priority interrupts, acquiring moving objects using ephemeris data, and more.

  7. Making health policy: networks in research and policy after 1945.

    Science.gov (United States)

    Berridge, Virginia

    2005-01-01

    Science and policy in health and medicine have interacted in new ways in Britain since 1945. The relationship between research and policy has a history. The changing role of social medicine, the rise of health services research and "customer contractor" policies in government have been important. The relationship between research and policy has been analysed by different schools of thought. This chapter categorises them as several groups: "evidence-based", "journalism", "sociology of scientific knowledge" and "science policy studies". The chapters in the book illuminate aspects of these changing relationships. The role of chronic disease epidemiology, of new networks in public health, of media-focussed activism, and of health technology and its advocates have been more important than political interest.

  8. A comparison of policy-networks

    OpenAIRE

    Brand-Schock, Ruth

    2010-01-01

    In four case studies renewable energy policies in Germany and France in the fields of renewable electricity and biofuels are compared since the discussion about renewable energy started in the 1970s. The development of the four policy networks shows how actors influence political decisions by fostering or hindering the development of renewable energies. Under the aspects of eco-efficiency and cost-efficiency biofuels perform considerably worse than electricity from renewable sources. From...

  9. Public management and policy networks: foundations of a network approach to governance

    NARCIS (Netherlands)

    E-H. Klijn (Erik-Hans); J.F.M. Koppenjan (Joop)

    2006-01-01

    markdownabstract__Abstract__ In this article we address the elaboratlon of the central concepts of a theory of networks and of network management. We suggest that the network approach builds on several theoretical traditions After this we clarify the theoretical concepts and axioms of the policy

  10. Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information

    Directory of Open Access Journals (Sweden)

    Raik Kuhlisch

    2017-07-01

    Full Text Available This article discusses potential clashes between different types of security policies that regulate resource access requests on clinical patient data in hospitals by employees. Attribute-based Access Control (ABAC is proposed as a proper means for such regulation. A proper representation of ABAC policies must include a handling of policy attributes among different policy types. In this article, we propose a semantic policy model with predefined policy conflict categories. A conformance verification function detects erroneous, clashing or mutually susceptible rules early during the policy planning phase. The model and conflicts are used in a conceptual application environment and evaluated in a technical experiment during an interoperability test event.

  11. Auditing Medical Records Accesses via Healthcare Interaction Networks

    Science.gov (United States)

    Chen, You; Nyemba, Steve; Malin, Bradley

    2012-01-01

    Healthcare organizations are deploying increasingly complex clinical information systems to support patient care. Traditional information security practices (e.g., role-based access control) are embedded in enterprise-level systems, but are insufficient to ensure patient privacy. This is due, in part, to the dynamic nature of healthcare, which makes it difficult to predict which care providers need access to what and when. In this paper, we show that modeling operations at a higher level of granularity (e.g., the departmental level) are stable in the context of a relational network, which may enable more effective auditing strategies. We study three months of access logs from a large academic medical center to illustrate that departmental interaction networks exhibit certain invariants, such as the number, strength, and reciprocity of relationships. We further show that the relations extracted from the network can be leveraged to assess the extent to which a patient’s care satisfies expected organizational behavior. PMID:23304277

  12. Designing Broadband Access Networks with Triple Redundancy

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Riaz, Muhammad Tahir; Knudsen, Thomas Phillip

    2005-01-01

    An architecture is proposed for designing broadband access networks, which offer triple redundancy to the end users, resulting in networks providing connectivity even in case of any two independent node or line failures. Two physically independent connections are offered by fiber, and the last...... provided by some wireless solution. Based on experience with planning Fiber To The Home, the architecture is designed to meet a number of demands, making it practicable and useful in realworld network planning. The proposed wired topology is planar, and suitable for being fitted onto the road network...

  13. Switched-based interference reduction scheme for open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh

    2012-06-01

    Femtocells have been proposed to enhance the spatial coverage and system capacity of existing cellular networks. However, this technology may result in significant performance loss due to the increase in co-channel interference, particularly when coordination between access points is infeasible. This paper targets interference management in such overlaid networks. It is assumed that the femtocells employ the open-access strategy to reduce cross-tier interference, and can share resources concurrently. It is also assumed that each end user (EU) can access one channel at a time, and transfer limited feedback. To reduce the effect of co-tier interference in the absence of the desired EU channel state information (CSI) at the serving access point as well as coordination between active access points, a switched scheme based on the interference levels associated with available channels is proposed. Through the analysis, the scheme modes of operation in under-loaded and over-loaded channels are studied, from which the statistics of the resulting interference power are quantified. The impact of the proposed scheme on the received desired power is thoroughly discussed. In addition, the effect of the switching threshold on the achieved performance of the desired EU is investigated. The results clarify that the proposed scheme can improve the performance while reducing the number of examined channels and feedback load. © 2012 IEEE.

  14. Moving towards tangible decision-making tools for policy makers: Measuring and monitoring energy access provision

    International Nuclear Information System (INIS)

    Bhanot, Jaya; Jha, Vivek

    2012-01-01

    Access to energy services has been recognised as central to achieving economic growth and sustainable development. However, almost 1.3 billion people in the world still lack access to electricity and 2.7 billion lack access to clean cooking facilities. In this backdrop, the issue of energy access is receiving more interest than ever before and this has brought to the fore, the need for a robust decision support tool for policy makers to measure the progress of energy access provision and also to provide direction for future policy making. The paper studies existing definitions of energy access and identifies the key requirements for an appropriate decision-making tool to measure and monitor energy access provision. In this context the paper assesses the strengths and weaknesses of the metrics currently being used to measure energy access in policy, as well as of contemporary monitoring and evaluation frameworks being used in other sectors. Based on these insights, a dashboard of indicators is proposed as an alternate decision support tool for policy makers to measure energy access. The paper concludes with a discussion on what is needed to operationalise this proposed framework. - Highlights: ► No one indicator or metric can successfully capture progress on energy access. ► A service oriented approach is necessary to measure energy access. ► Socio-economic and political contexts influence success of energy access policies.

  15. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    Science.gov (United States)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  16. Unbundling in Current Broadband and Next-Generation Ultra-Broadband Access Networks

    Science.gov (United States)

    Gaudino, Roberto; Giuliano, Romeo; Mazzenga, Franco; Valcarenghi, Luca; Vatalaro, Francesco

    2014-05-01

    This article overviews the methods that are currently under investigation for implementing multi-operator open-access/shared-access techniques in next-generation access ultra-broadband architectures, starting from the traditional "unbundling-of-the-local-loop" techniques implemented in legacy twisted-pair digital subscriber line access networks. A straightforward replication of these copper-based unbundling-of-the-local-loop techniques is usually not feasible on next-generation access networks, including fiber-to-the-home point-to-multipoint passive optical networks. To investigate this issue, the article first gives a concise description of traditional copper-based unbundling-of-the-local-loop solutions, then focalizes on both next-generation access hybrid fiber-copper digital subscriber line fiber-to-the-cabinet scenarios and on fiber to the home by accounting for the mix of regulatory and technological reasons driving the next-generation access migration path, focusing mostly on the European situation.

  17. Scalable Lunar Surface Networks and Adaptive Orbit Access, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Innovative network architecture, protocols, and algorithms are proposed for both lunar surface networks and orbit access networks. Firstly, an overlaying...

  18. Accessing ANSA Objects from OSI Network Management

    OpenAIRE

    Berrah, Karrim; Gay, David; Genilloud, Guy

    1994-01-01

    OSI network management provides a general framework for the management of OSI systems, and by extension of any distributed system. However, it is not yet possible to tell to what extent the tools developed for network management will be applicable to distributed systems management. This paper assumes that network managers will want to have some control of the distributed infrastructure and applications. It examines how access to some of the ANSA management interfaces can be given to OSI netwo...

  19. Random access procedures and radio access network (RAN) overload control in standard and advanced long-term evolution (LTE and LTE-A) networks

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Popovski, Petar

    2015-01-01

    In this chapter, we describe and discuss the current LTE random access procedure and the Radio Access Network Load Control solution within LTE/LTE-A. We provide an overview of the several considered load control solutions and give a detailed description of the standardized Extended Access Class B...

  20. Policies to Spur Energy Access. Executive Summary; Volume 1, Engaging the Private Sector in Expanding Access to Electricity; Volume 2, Case Studies to Public-Private Models to Finance Decentralized Electricity Access

    Energy Technology Data Exchange (ETDEWEB)

    Walters, Terri [National Renewable Energy Lab. (NREL), Golden, CO (United States); Rai, Neha [International Institute for Environment and Development (IIED), London (England); Esterly, Sean [National Renewable Energy Lab. (NREL), Golden, CO (United States); Cox, Sadie [National Renewable Energy Lab. (NREL), Golden, CO (United States); Reber, Tim [National Renewable Energy Lab. (NREL), Golden, CO (United States); Muzammil, Maliha [Univ. of Oxford (United Kingdom); Mahmood, Tasfiq [International Center for Climate Change and Development, Baridhara (Bangladesh); Kaur, Nanki [International Institute for Environment and Development (IIED), London (England); Tesfaye, Lidya [Echnoserve Consulting (Ethiopia); Mamuye, Simret [Echnoserve Consulting (Ethiopia); Knuckles, James [Univ. of London (England). Cass Business School; Morris, Ellen [Columbia Univ., New York, NY (United States); de Been, Merijn [Delft Univ. of Technology (Netherlands); Steinbach, Dave [International Institute for Environment and Development (IIED), London (England); Acharya, Sunil [Digo Bikas Inst. (Nepal); Chhetri, Raju Pandit [National Renewable Energy Lab. (NREL), Golden, CO (United States); Bhushal, Ramesh [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2015-09-01

    Government policy is one of the most important factors in engaging the private sector in providing universal access to electricity. In particular, the private sector is well positioned to provide decentralized electricity products and services. While policy uncertainty and regulatory barriers can keep enterprises and investors from engaging in the market, targeted policies can create opportunities to leverage private investment and skills to expand electricity access. However, creating a sustainable market requires policies beyond traditional electricity regulation. The report reviews the range of policy issues that impact the development and expansion of a market for decentralized electricity services from establishing an enabling policy environment to catalyzing finance, building human capacity, and integrating energy access with development programs. The case studies in this report show that robust policy frameworks--addressing a wide range of market issues--can lead to rapid transformation in energy access. The report highlights examples of these policies in action Bangladesh, Ethiopia, Mali, Mexico, and Nepal.

  1. Individual Public Transportation Accessibility is Positively Associated with Self-Reported Active Commuting.

    Science.gov (United States)

    Djurhuus, Sune; Hansen, Henning Sten; Aadahl, Mette; Glümer, Charlotte

    2014-01-01

    Active commuters have lower risk of chronic disease. Understanding which of the, to some extent, modifiable characteristics of public transportation that facilitate its use is thus important in a public health perspective. The aim of the study was to examine the association between individual public transportation accessibility and self-reported active commuting, and whether the associations varied with commute distance, age, and gender. Twenty-eight thousand nine hundred twenty-eight commuters in The Capital Region of Denmark reported self-reported time spent either walking or cycling to work or study each day and the distance to work or study. Data were obtained from the Danish National Health Survey collected in February to April 2010. Individual accessibility by public transportation was calculated using a multi-modal network in a GIS. Multilevel logistic regression was used to analyze the association between accessibility, expressed as access area, and being an active commuter. Public transport accessibility area based on all stops within walking and cycling distance was positively associated with being an active commuter. Distance to work, age, and gender modified the associations. Residing within 10 km commute distance and in areas of high accessibility was associated with being an active commuter and meeting the recommendations of physical activity. For the respondents above 29 years, individual public transportation accessibility was positively associated with being an active commuter. Women having high accessibility had significantly higher odds of being an active commuter compared to having a low accessibility. For men, the associations were insignificant. This study extends the knowledge about the driving forces of using public transportation for commuting by examining the individual public transportation accessibility. Findings suggest that transportation accessibility supports active commuting and planning of improved public transit accessibility

  2. SON for LTE-WLAN access network selection : design and performance

    NARCIS (Netherlands)

    Willemen, P.; Laselva, D.; Wang, Y.; Kovács, I.; Djapic, R.; Moerman, I.

    2016-01-01

    Mobile network operators (MNOs) are deploying carrier-grade Wireless Local Area Network (WLAN) as an important complementary system to cellular networks. Access network selection (ANS) between cellular and WLAN is an essential component to improve network performance and user quality-of-service

  3. Wavelength-converted long-reach reconfigurable optical access network

    NARCIS (Netherlands)

    Tran, N.C.; Tangdiongga, E.; Koonen, A.M.J.

    2012-01-01

    Next generation optical access networks should not only increase the capacity but also be able to redistribute the capacity on the fly in order to manage more fluctuated traffic patterns. Wavelength reconfigurability is the instrument to enable such capability of network-wide bandwidth

  4. Environmental Policy of Serbia and Challenges of Accession to Europe

    Directory of Open Access Journals (Sweden)

    Darko Nadić

    2012-01-01

    Full Text Available This article analyzes the environmental policy of the Republic of Serbia within the context of accession conditions to the European Union. The main challenges of environmental integration of the environmental policies of Serbia are: economic challenges, the sustainable development challenge, administrative challenges, democratic deficiency challenges, and political challenges. These challenges, while flaws of the environmental policy in Serbia, are no different than the challenges faced by other Central Eastern European countries during the accession process. However, the influence of the global economic crisis, the constant political crisis and unclear definition of the political scene in Serbia, an incomplete vision of environmental education, as well as too much "green" marketing activities and a lack of true law implementation, are additional factors that make the process of environmental accession of Serbia to the EU even more difficult. Therefore, the harmonization of the Serbian environmental legal frame with the European one must be followed by the harmonization of actions of political institutions, social groups and individual citizens, and the overall democratization of society.

  5. Environmental policy-making networks and the future of the Amazon

    OpenAIRE

    Lemos, Maria Carmen; Roberts, J. Timmons

    2008-01-01

    This article examines four periods of environmental policy-making in the Amazonian region of Brazil. It specifically analyses the role of pro-environment and pro-development policy networks in affecting policy design and implementation. It argues that the efforts of environmentalist networks trying to advocate or block relative developmentalist policies in the Amazon depend on three critical factors - whether they are able to attract the support of elites (or at least block their developmenta...

  6. In an Age of Open Access to Research Policies: Physician and Public Health NGO Staff Research Use and Policy Awareness.

    Science.gov (United States)

    Moorhead, Laura L; Holzmeyer, Cheryl; Maggio, Lauren A; Steinberg, Ryan M; Willinsky, John

    2015-01-01

    Through funding agency and publisher policies, an increasing proportion of the health sciences literature is being made open access. Such an increase in access raises questions about the awareness and potential utilization of this literature by those working in health fields. A sample of physicians (N=336) and public health non-governmental organization (NGO) staff (N=92) were provided with relatively complete access to the research literature indexed in PubMed, as well as access to the point-of-care service UpToDate, for up to one year, with their usage monitored through the tracking of web-log data. The physicians also participated in a one-month trial of relatively complete or limited access. The study found that participants' research interests were not satisfied by article abstracts alone nor, in the case of the physicians, by a clinical summary service such as UpToDate. On average, a third of the physicians viewed research a little more frequently than once a week, while two-thirds of the public health NGO staff viewed more than three articles a week. Those articles were published since the 2008 adoption of the NIH Public Access Policy, as well as prior to 2008 and during the maximum 12-month embargo period. A portion of the articles in each period was already open access, but complete access encouraged a viewing of more research articles. Those working in health fields will utilize more research in the course of their work as a result of (a) increasing open access to research, (b) improving awareness of and preparation for this access, and (c) adjusting public and open access policies to maximize the extent of potential access, through reduction in embargo periods and access to pre-policy literature.

  7. Linking Climate Risk, Policy Networks and Adaptation Planning in Public Lands

    Science.gov (United States)

    Lubell, M.; Schwartz, M.; Peters, C.

    2014-12-01

    Federal public land management agencies in the United States have engaged a variety of planning efforts to address climate adaptation. A major goal of these efforts is to build policy networks that enable land managers to access information and expertise needed for responding to local climate risks. This paper investigates whether the perceived and modeled climate risk faced by different land managers is leading to larger networks or more participating in climate adaptation. In theory, the benefits of climate planning networks are larger when land managers are facing more potential changes. The basic hypothesis is tested with a survey of public land managers from hundreds of local and regional public lands management units in the Southwestern United States, as well as other stakeholders involved with climate adaptation planning. All survey respondents report their perceptions of climate risk along a variety of dimensions, as well as their participation in climate adaptation planning and information sharing networks. For a subset of respondents, we have spatially explicity GIS data about their location, which will be linked with downscaled climate model data. With the focus on climate change, the analysis is a subset of the overall idea of linking social and ecological systems.

  8. Modelling and Analysing Access Control Policies in XACML 3.0

    DEFF Research Database (Denmark)

    Ramli, Carroline Dewi Puspa Kencana

    (c.f. GM03,Mos05,Ris13) and manual analysis of the overall effect and consequences of a large XACML policy set is a very daunting and time-consuming task. In this thesis we address the problem of understanding the semantics of access control policy language XACML, in particular XACML version 3.0....... The main focus of this thesis is modelling and analysing access control policies in XACML 3.0. There are two main contributions in this thesis. First, we study and formalise XACML 3.0, in particular the Policy Decision Point (PDP). The concrete syntax of XACML is based on the XML format, while its standard...... semantics is described normatively using natural language. The use of English text in standardisation leads to the risk of misinterpretation and ambiguity. In order to avoid this drawback, we define an abstract syntax of XACML 3.0 and a formal XACML semantics. Second, we propose a logic-based XACML analysis...

  9. Implementing an Open Access Policy – Modeling KAUST in the Region

    KAUST Repository

    Baessa, Mohamed A.; Vijayakumar, J.K.

    2014-01-01

    The presentation will discuss different open access approaches, and what can well-fit academic and governmental institutions. As a case study of KAUST, presenters will discuss how it can be initiated in a university set-up, how to get academic stakeholder engaged with support, and how the final stage is reached. Details about the KAUST Open Access Policy for research articles, theses and dissertations and the required tools and workflow to implement the policies will be highlighted.

  10. Implementing an Open Access Policy – Modeling KAUST in the Region

    KAUST Repository

    Baessa, Mohamed A.

    2014-11-12

    The presentation will discuss different open access approaches, and what can well-fit academic and governmental institutions. As a case study of KAUST, presenters will discuss how it can be initiated in a university set-up, how to get academic stakeholder engaged with support, and how the final stage is reached. Details about the KAUST Open Access Policy for research articles, theses and dissertations and the required tools and workflow to implement the policies will be highlighted.

  11. Hierarchy Bayesian model based services awareness of high-speed optical access networks

    Science.gov (United States)

    Bai, Hui-feng

    2018-03-01

    As the speed of optical access networks soars with ever increasing multiple services, the service-supporting ability of optical access networks suffers greatly from the shortage of service awareness. Aiming to solve this problem, a hierarchy Bayesian model based services awareness mechanism is proposed for high-speed optical access networks. This approach builds a so-called hierarchy Bayesian model, according to the structure of typical optical access networks. Moreover, the proposed scheme is able to conduct simple services awareness operation in each optical network unit (ONU) and to perform complex services awareness from the whole view of system in optical line terminal (OLT). Simulation results show that the proposed scheme is able to achieve better quality of services (QoS), in terms of packet loss rate and time delay.

  12. Making Policy with "Good Ideas": Policy Networks and the "Intellectuals" of New Labour

    Science.gov (United States)

    Ball, Stephen J.; Exley, Sonia

    2010-01-01

    The proliferation of policy think tanks and more broadly the rise of "policy networks" can be viewed as indicative of important global transformations in the nature of the state. That is, the emergence of new state modalities, with a shift away from government towards forms of polycentric governance, where policy is produced through…

  13. Location-aware network operation for cloud radio access network

    KAUST Repository

    Wang, Fanggang

    2017-06-20

    One of the major challenges in effectively operating a cloud radio access network (C-RAN) is the excessive overhead signaling and computation load that scale rapidly with the size of the network. In this paper, the exploitation of location information of the mobile devices is proposed to address this challenge. We consider an approach in which location-assisted channel state information (CSI) acquisition methods are introduced to complement conventional pilot-based CSI acquisition methods and avoid excessive overhead signaling. A low-complexity algorithm is designed to maximize the sum rate. An adaptive algorithm is also proposed to address the uncertainty issue in CSI acquisition. Both theoretical and numerical analyses show that location information provides a new dimension to improve throughput for next-generation massive cooperative networks.

  14. Software Defined Networking for Next Generation Converged Metro-Access Networks

    Science.gov (United States)

    Ruffini, M.; Slyne, F.; Bluemm, C.; Kitsuwan, N.; McGettrick, S.

    2015-12-01

    While the concept of Software Defined Networking (SDN) has seen a rapid deployment within the data center community, its adoption in telecommunications network has progressed slowly, although the concept has been swiftly adopted by all major telecoms vendors. This paper presents a control plane architecture for SDN-driven converged metro-access networks, developed through the DISCUS European FP7 project. The SDN-based controller architecture was developed in a testbed implementation targeting two main scenarios: fast feeder fiber protection over dual-homed Passive Optical Networks (PONs) and dynamic service provisioning over a multi-wavelength PON. Implementation details and results of the experiment carried out over the second scenario are reported in the paper, showing the potential of SDN in providing assured on-demand services to end-users.

  15. Impacts on the Voltage Profile of DC Distribution Network with DG Access

    Science.gov (United States)

    Tu, J. J.; Yin, Z. D.

    2017-07-01

    With the development of electronic, more and more distributed generations (DGs) access into grid and cause the research fever of direct current (DC) distribution network. Considering distributed generation (DG) location and capacity have great impacts on voltage profile, so use IEEE9 and IEEE33 typical circuit as examples, with DGs access in centralized and decentralized mode, to compare voltage profile in alternating and direct current (AC/DC) distribution network. Introducing the voltage change ratio as an evaluation index, so gets the general results on voltage profile of DC distributed network with DG access. Simulation shows that, in the premise of reasonable location and capacity, DC distribution network is more suitable for DG access.

  16. Quantitative analysis of access strategies to remote information in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach in...

  17. Optical fiber cabling technologies for flexible access network

    Science.gov (United States)

    Tanji, Hisashi

    2008-07-01

    Fiber-to-the-home (FTTH) outside plant infrastructure should be so designed and constructed as to flexibly deal with increasing subscribers and system evolution to be expected in the future, taking minimization of total cost (CAPEX and OPEX) into consideration. With this in mind, fiber access architectures are reviewed and key technologies on optical fiber and cable for supporting flexible access network are presented. Low loss over wide wavelength (low water peak) and bend-insensitive single mode fiber is a future proof solution. Enhanced separable ribbon facilitates mid-span access to individual fibers in a cable installed, improving fiber utilizing efficiency and flexibility of distribution design. It also contributes to an excellent low PMD characteristic which could be required for video RF overlay system or high capacity long reach metro-access convergence network in the future. Bend-insensitive fiber based cabling technique including field installable connector greatly improves fiber/cable handling in installation and maintenance work.

  18. Virtual policy networks: navigating the policy web

    OpenAIRE

    McNutt, Kathleen

    2006-01-01

    Governing in an information-rich environment necessitates a redistribution of power and new approaches to policy learning. The key basis for this organizational repositioning is the accommodation of information. For the first time in human history mass amounts of information may be collected, stored, and searched using networked technologies. While informational assets are a critical commodity in the policymaking process, the extraordinary increase in the creation and dissemination of informa...

  19. Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows

    Directory of Open Access Journals (Sweden)

    Davy Preuveneers

    2017-09-01

    Full Text Available Microservices offer a compelling competitive advantage for building data flow systems as a choreography of self-contained data endpoints that each implement a specific data processing functionality. Such a ‘single responsibility principle’ design makes them well suited for constructing scalable and flexible data integration and real-time data flow applications. In this paper, we investigate microservice based data processing workflows from a security point of view, i.e., (1 how to constrain data processing workflows with respect to dynamic authorization policies granting or denying access to certain microservice results depending on the flow of the data; (2 how to let multiple microservices contribute to a collective data-driven authorization decision and (3 how to put adequate measures in place such that the data within each individual microservice is protected against illegitimate access from unauthorized users or other microservices. Due to this multifold objective, enforcing access control on the data endpoints to prevent information leakage or preserve one’s privacy becomes far more challenging, as authorization policies can have dependencies and decision outcomes cross-cutting data in multiple microservices. To address this challenge, we present and evaluate a workflow-oriented authorization framework that enforces authorization policies in a decentralized manner and where the delegated policy evaluation leverages feature toggles that are managed at runtime by software circuit breakers to secure the distributed data processing workflows. The benefit of our solution is that, on the one hand, authorization policies restrict access to the data endpoints of the microservices, and on the other hand, microservices can safely rely on other data endpoints to collectively evaluate cross-cutting access control decisions without having to rely on a shared storage backend holding all the necessary information for the policy evaluation.

  20. Geographic Accessibility Of Food Outlets Not Associated With Body Mass Index Change Among Veterans, 2009-14.

    Science.gov (United States)

    Zenk, Shannon N; Tarlov, Elizabeth; Wing, Coady; Matthews, Stephen A; Jones, Kelly; Tong, Hao; Powell, Lisa M

    2017-08-01

    In recent years, various levels of government in the United States have adopted or discussed subsidies, tax breaks, zoning laws, and other public policies that promote geographic access to healthy food. However, there is little evidence from large-scale longitudinal or quasi-experimental research to suggest that the local mix of food outlets actually affects body mass index (BMI). We used a longitudinal design to examine whether the proximity of food outlets, by type, was associated with BMI changes between 2009 and 2014 among 1.7 million veterans in 382 metropolitan areas. We found no evidence that either absolute or relative geographic accessibility of supermarkets, fast-food restaurants, or mass merchandisers was associated with changes in an individual's BMI over time. While policies that alter only geographic access to food outlets may promote equitable access to healthy food and improve nutrition, our findings suggest they will do little to combat obesity in adults. Project HOPE—The People-to-People Health Foundation, Inc.

  1. A Unified Access Model for Interconnecting Heterogeneous Wireless Networks

    Science.gov (United States)

    2015-05-01

    validation of the proposed network design for unified network access, and it lays the foundation for implementing a Software - Defined Networking ( SDN ...York (NY): Springer; 2014. Chapter 2, Software - defined networking ; p. 19–32. 5. Sharma S, Staessens D, Colle D, Pickavet M, Demeester P. A...demonstration of fast failure recovery in software defined networking . In: Korakis T, Zink M, Ott, M, editors. Testbeds and research infrastructure

  2. Expanding Access to Insurance by the Poor : Policy, Regulation and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Expanding Access to Insurance by the Poor : Policy, Regulation and Supervision of Micro Insurance. This project aims to facilitate poor people's access to insurance products and services as a means of addressing their vulnerability to risk. It will do so by carrying out case studies in five countries. Potential candidates ...

  3. Enforcement of Privacy Policies over Multiple Online Social Networks for Collaborative Activities

    Science.gov (United States)

    Wu, Zhengping; Wang, Lifeng

    Our goal is to tend to develop an enforcement architecture of privacy policies over multiple online social networks. It is used to solve the problem of privacy protection when several social networks build permanent or temporary collaboration. Theoretically, this idea is practical, especially due to more and more social network tend to support open source framework “OpenSocial”. But as we known different social network websites may have the same privacy policy settings based on different enforcement mechanisms, this would cause problems. In this case, we have to manually write code for both sides to make the privacy policy settings enforceable. We can imagine that, this is a huge workload based on the huge number of current social networks. So we focus on proposing a middleware which is used to automatically generate privacy protection component for permanent integration or temporary interaction of social networks. This middleware provide functions, such as collecting of privacy policy of each participant in the new collaboration, generating a standard policy model for each participant and mapping all those standard policy to different enforcement mechanisms of those participants.

  4. Unification of Information Security Policies for Network Security Solutions

    Directory of Open Access Journals (Sweden)

    D.S. Chernyavskiy

    2012-03-01

    Full Text Available Diversity of command languages on network security solutions’ (NSS interfaces causes problems in a process of information security policy (ISP deployment. Unified model for security policy representation and implementation in NSS could aid to avoid such problems and consequently enhance efficiency of the process. The proposed solution is Unified language for network security policy (ULNSP. The language is based on formal languages theory, and being coupled with its translator, ULNSP makes it possible to formalize and implement ISP independently of particular NSS.

  5. Public Access to Government Electronic Information. Policy Framework.

    Science.gov (United States)

    Bulletin of the American Society for Information Science, 1992

    1992-01-01

    This policy framework provides guidelines for federal agencies on public access to government electronic information. Highlights include reasons for disseminating information; defining user groups; which technology to use; pricing flexibility; security and privacy issues; and the private sector and state and local government roles. (LRW)

  6. Ethernet access network based on free-space optic deployment technology

    Science.gov (United States)

    Gebhart, Michael; Leitgeb, Erich; Birnbacher, Ulla; Schrotter, Peter

    2004-06-01

    The satisfaction of all communication needs from single households and business companies over a single access infrastructure is probably the most challenging topic in communications technology today. But even though the so-called "Last Mile Access Bottleneck" is well known since more than ten years and many distribution technologies have been tried out, the optimal solution has not yet been found and paying commercial access networks offering all service classes are still rare today. Conventional services like telephone, radio and TV, as well as new and emerging services like email, web browsing, online-gaming, video conferences, business data transfer or external data storage can all be transmitted over the well known and cost effective Ethernet networking protocol standard. Key requirements for the deployment technology driven by the different services are high data rates to the single customer, security, moderate deployment costs and good scalability to number and density of users, quick and flexible deployment without legal impediments and high availability, referring to the properties of optical and wireless communication. We demonstrate all elements of an Ethernet Access Network based on Free Space Optic distribution technology. Main physical parts are Central Office, Distribution Network and Customer Equipment. Transmission of different services, as well as configuration, service upgrades and remote control of the network are handled by networking features over one FSO connection. All parts of the network are proven, the latest commercially available technology. The set up is flexible and can be adapted to any more specific need if required.

  7. High Dimensional Modulation and MIMO Techniques for Access Networks

    DEFF Research Database (Denmark)

    Binti Othman, Maisara

    Exploration of advanced modulation formats and multiplexing techniques for next generation optical access networks are of interest as promising solutions for delivering multiple services to end-users. This thesis addresses this from two different angles: high dimensionality carrierless...... the capacity per wavelength of the femto-cell network. Bit rate up to 1.59 Gbps with fiber-wireless transmission over 1 m air distance is demonstrated. The results presented in this thesis demonstrate the feasibility of high dimensionality CAP in increasing the number of dimensions and their potentially......) optical access network. 2 X 2 MIMO RoF employing orthogonal frequency division multiplexing (OFDM) with 5.6 GHz RoF signaling over all-vertical cavity surface emitting lasers (VCSEL) WDM passive optical networks (PONs). We have employed polarization division multiplexing (PDM) to further increase...

  8. Cloud Radio Access Network architecture. Towards 5G mobile networks

    DEFF Research Database (Denmark)

    Checko, Aleksandra

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges that mobile operators face while trying to support ever-growing end-users’ needs towards 5th generation of mobile networks (5G). The main idea behind C-RAN is to split the base...... stations into radio and baseband parts, and pool the Baseband Units (BBUs) from multiple base stations into a centralized and virtualized BBU Pool. This gives a number of benefits in terms of cost and capacity. However, the challenge is then to find an optimal functionality splitting point as well...... as to design the socalled fronthaul network, interconnecting those parts. This thesis focuses on quantifying those benefits and proposing a flexible and capacity-optimized fronthaul network. It is shown that a C-RAN with a functional split resulting in a variable bit rate on the fronthaul links brings cost...

  9. Open Access Journal Policies: A Systematic Analysis of Radiology Journals.

    Science.gov (United States)

    Narayan, Anand; Lobner, Katie; Fritz, Jan

    2018-02-01

    The open access movement has pushed for greater access to scientific knowledge by expanding access to scientific journal articles. There is limited information about the extent to which open access policies have been adopted by radiology journals. We performed a systematic analysis to ascertain the proportion of radiology journals with open access options. A search was performed with the assistance of a clinical informationist. Full and mixed English-language diagnostic and interventional radiology Web of Science journals (impact factors > 1.0) were included. Nuclear medicine, radiation oncology, physics, and solicitation-only journals were excluded. Primary outcome was open access option (yes or no) with additional outcomes including presence or absence of embargo, complete or partial copyright transfer, publication fees, and self-archiving policies. Secondary outcomes included journal citations, journal impact factors, immediacy, Eigenfactor, and article influence scores. Independent double readings were performed with differences resolved by consensus, supplemented by contacting editorial staff at each journal. In all, 125 journals were identified; review yielded 49 journals (39%, mean impact factor of 2.61). Thirty-six of the journals had open access options (73.4%), and four journals were exclusively open access (8.2%). Twelve-month embargoes were most commonly cited (90.6%) with 28.6% of journals stating that they did not require a complete transfer of copyright. Prices for open access options ranged from $750 to $4,000 (median $3,000). No statistically significant differences were found in journal impact measures comparing journals with open access options to journals without open access options. Diagnostic and interventional radiology journals have widely adopted open access options with a few radiology journals being exclusively open access. Copyright © 2017 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  10. Network Layer Protocol Activation for Packet Data Access in UMTS WCDMA Laboratory Network

    OpenAIRE

    Lakkisto, Erkka

    2011-01-01

    The purpose of this Bachelor’s Thesis was to set up the UMTS WCDMA network in the laboratory environment of Helsinki Metropolia University of Applied Sciences and to study the network layer protocol activation for packet data access. The development of 3G technology has been very rapid and it can be considered as one of the main technologies in telecommunication. Implementing the laboratory network in Metropolia enables teaching and researching of the modern network technology. Labora...

  11. ACMECS Bioenergy Network: Implementing a transnational science-based policy network on bioenergy

    Science.gov (United States)

    Bruckman, Viktor J.; Haruthaithanasan, Maliwan; Kraxner, Florian; Brenner, Anna

    2017-04-01

    Despite the currently low prices for fossil energy resulting from a number of geopolitical reasons, intergovernmental efforts are being made towards a transition to a sustainable bio-economy. The main reasons for this include climate change mitigation, decreasing dependencies fossil fuel imports and hence external market fluctuations, diversification of energy generation and feedstock production for industrial processes. Since 2012, the ACMECS bioenergy network initiative leads negotiations and organizes workshops to set up a regional bioenergy network in Indochina, with the aim to promote biomass and -energy markets, technology transfer, rural development and income generation. Policy development is guided by the International Union of Forest Research Institutions (IUFRO) Task Force "Sustainable Forest Bioenergy Network". In this paper, we highlight the achievements so far and present results of a multi-stakeholder questionnaire in combination with a quantitative analysis of the National Bioenergy Development Plans (NBDP's). We found that traditional fuelwood is still the most important resource for generating thermal energy in the region, especially in rural settings, and it will remain an important resource even in 25 years. However, less fuelwood will be sourced from natural forests as compared to today. NBDP's have a focus on market development, technology transfer and funding possibilities of a regional bioenergy strategy, while the responses of the questionnaire favored more altruistic goals, i.e. sustainable resource management, environmental protection and climate change mitigation, generation of rural income and community involvement etc. This is surprising, since a sub-population of the (anonymous) questionnaire respondents was actually responsible drafting the NBDP's. We therefore suggest the following measures to ensure regulations that represent the original aims of the network (climate change mitigation, poverty alleviation, sustainable resource use

  12. South Dakota Department of Education Data Access Policy

    Science.gov (United States)

    South Dakota Department of Education, 2015

    2015-01-01

    The South Dakota Department of Education (DOE) collects education records from local schools and districts in accordance with federal and state laws and regulations. This policy document establishes the procedures and protocols for accessing, maintaining, disclosing, and disposing of confidential data records, including data records containing…

  13. 3PAC: Enforcing Access Policies for Web Services

    NARCIS (Netherlands)

    van Bemmel, J.; Wegdam, M.; Lagerberg, K.

    Web Services fail to deliver on the promise of ubiquitous deployment and seamless interoperability due to the lack of a uniform, standards-based approach to all aspects of security. In particular, the enforcement of access policies in a Service Oriented Architecture is not addressed adequately. We

  14. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  15. Approximate Networking for Universal Internet Access

    Directory of Open Access Journals (Sweden)

    Junaid Qadir

    2017-12-01

    Full Text Available Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost-efficient ways of provisioning high-performance, global Internet. In this paper, we argue that instead of an exclusive focus on a utopian goal of universally accessible “ideal networking” (in which we have a high throughput and quality of service as well as low latency and congestion, we should consider providing “approximate networking” through the adoption of context-appropriate trade-offs. In this regard, we propose to leverage the advances in the emerging trend of “approximate computing” that rely on relaxing the bounds of precise/exact computing to provide new opportunities for improving the area, power, and performance efficiency of systems by orders of magnitude by embracing output errors in resilient applications. Furthermore, we propose to extend the dimensions of approximate computing towards various knobs available at network layers. Approximate networking can be used to provision “Global Access to the Internet for All” (GAIA in a pragmatically tiered fashion, in which different users around the world are provided a different context-appropriate (but still contextually functional Internet experience.

  16. Network Policy and Economic Doctrines

    Science.gov (United States)

    Atkinson, Robert D.

    2010-01-01

    For many years, debates over telecommunications network policy were marked by a relative lack of partisan and ideological conflict. In the last decade, this has changed markedly. Today, debates over a whole set of issues, including broadband competition, net neutrality, copyright, privacy, and others, have become more contentious. These…

  17. Proof-of-Concept System for Opportunistic Spectrum Access in Multi-user Decentralized Networks

    Directory of Open Access Journals (Sweden)

    Sumit J. Darak

    2016-09-01

    Full Text Available Poor utilization of an electromagnetic spectrum and ever increasing demand for spectrum have led to surge of interests in opportunistic spectrum access (OSA based paradigms like cognitive radio and unlicensed LTE. In OSA for decentralized networks, frequency band selection from wideband spectrum is a challenging task since secondary users (SUs do not share any information with each other. In this paper, a new decision making policy (DMP has been proposed for OSA in the multi-user decentralized networks. First contribution is an accurate characterization of frequency bands using Bayes-UCB algorithm. Then, a novel SU orthogonization scheme using Bayes-UCB algorithm is proposed replacing randomization based scheme. At the end, USRP testbed has been developed for analyzing the performance of DMPs using real radio signals. Experimental results show that the proposed DMP offers significant improvement in spectrum utilization, fewer subband switching and collisions compared to other DMPs.

  18. QoS Differentiated and Fair Packet Scheduling in Broadband Wireless Access Networks

    Directory of Open Access Journals (Sweden)

    Zhang Yan

    2009-01-01

    Full Text Available This paper studies the packet scheduling problem in Broadband Wireless Access (BWA networks. The key difficulties of the BWA scheduling problem lie in the high variability of wireless channel capacity and the unknown model of packet arrival process. It is difficult for traditional heuristic scheduling algorithms to handle the situation and guarantee satisfying performance in BWA networks. In this paper, we introduce learning-based approach for a better solution. Specifically, we formulate the packet scheduling problem as an average cost Semi-Markov Decision Process (SMDP. Then, we solve the SMDP by using reinforcement learning. A feature-based linear approximation and the Temporal-Difference learning technique are employed to produce a near optimal solution of the corresponding SMDP problem. The proposed algorithm, called Reinforcement Learning Scheduling (RLS, has in-built capability of self-training. It is able to adaptively and timely regulate its scheduling policy according to the instantaneous network conditions. Simulation results indicate that RLS outperforms two classical scheduling algorithms and simultaneously considers: (i effective QoS differentiation, (ii high bandwidth utilization, and (iii both short-term and long-term fairness.

  19. Multi-level policies and adaptive social networks – a conceptual modeling study for maintaining a polycentric governance system

    Directory of Open Access Journals (Sweden)

    Jean-Denis Mathias

    2017-03-01

    Full Text Available Information and collaboration patterns embedded in social networks play key roles in multilevel and polycentric modes of governance. However, modeling the dynamics of such social networks in multilevel settings has been seldom addressed in the literature. Here we use an adaptive social network model to elaborate the interplay between a central and a local government in order to maintain a polycentric governance. More specifically, our analysis explores in what ways specific policy choices made by a central agent affect the features of an emerging social network composed of local organizations and local users. Using two types of stylized policies, adaptive co-management and adaptive one-level management, we focus on the benefits of multi-level adaptive cooperation for network management. Our analysis uses viability theory to explore and to quantify the ability of these policies to achieve specific network properties. Viability theory gives the family of policies that enables maintaining the polycentric governance unlike optimal control that gives a unique blueprint. We found that the viability of the policies can change dramatically depending on the goals and features of the social network. For some social networks, we also found a very large difference between the viability of the adaptive one-level management and adaptive co-management policies. However, results also show that adaptive co-management doesn’t always provide benefits. Hence, we argue that applying viability theory to governance networks can help policy design by analyzing the trade-off between the costs of adaptive co-management and the benefits associated with its ability to maintain desirable social network properties in a polycentric governance framework.

  20. Network analysis of inter-organizational relationships and policy use among active living organizations in Alberta, Canada.

    Science.gov (United States)

    Loitz, Christina C; Stearns, Jodie A; Fraser, Shawn N; Storey, Kate; Spence, John C

    2017-08-09

    Coordinated partnerships and collaborations can optimize the efficiency and effectiveness of service and program delivery in organizational networks. However, the extent to which organizations are working together to promote physical activity, and use physical activity policies in Canada, is unknown. This project sought to provide a snapshot of the funding, coordination and partnership relationships among provincial active living organizations (ALOs) in Alberta, Canada. Additionally, the awareness, and use of the provincial policy and national strategy by the organizations was examined. Provincial ALOs (N = 27) answered questions regarding their funding, coordination and partnership connections with other ALOs in the network. Social network analysis was employed to examine network structure and position of each ALO. Discriminant function analysis determined the extent to which degree centrality was associated with the use of the Active Alberta (AA) policy and Active Canada 20/20 (AC 20/20) strategy. The funding network had a low density level (density = .20) and was centralized around Alberta Tourism Parks and Recreation (ATPR; degree centralization = 48.77%, betweenness centralization = 32.43%). The coordination network had a moderate density level (density = .31), and was low-to-moderately centralized around a few organizations (degree centralization = 45.37%, betweenness centrality = 19.92%). The partnership network had a low density level (density = .15), and was moderate-to-highly centralized around ATPR. Most organizations were aware of AA (89%) and AC 20/20 (78%), however more were using AA (67%) compared to AC 20/20 (33%). Central ALOs in the funding network were more likely to use AA and AC 20/20. Central ALOs in the coordination network were more likely to use AC 20/20, but not AA. Increasing formal and informal relationships between organizations and integrating disconnected or peripheral organizations could increase the capacity of the

  1. Mobility-Aware User Association in Uplink Cellular Networks

    KAUST Repository

    Arshad, Rabe; Elsawy, Hesham; Sorour, Sameh; Alouini, Mohamed-Slim; Al-Naffouri, Tareq Y.

    2017-01-01

    This letter studies the mobility aware user-to-BS association policies, within a stochastic geometry framework, in two tier uplink cellular networks with fractional channel inversion power control. Particularly, we model the base stations’ locations using the widely accepted poisson point process and obtain the coverage probability and handover cost expressions for the coupled and decoupled uplink and downlink associations. To this end, we compute the average throughput for the mobile users and study the merits and demerits of each association strategy.

  2. Mobility-Aware User Association in Uplink Cellular Networks

    KAUST Repository

    Arshad, Rabe

    2017-07-20

    This letter studies the mobility aware user-to-BS association policies, within a stochastic geometry framework, in two tier uplink cellular networks with fractional channel inversion power control. Particularly, we model the base stations’ locations using the widely accepted poisson point process and obtain the coverage probability and handover cost expressions for the coupled and decoupled uplink and downlink associations. To this end, we compute the average throughput for the mobile users and study the merits and demerits of each association strategy.

  3. Policy content and stakeholder network analysis for infant and young child feeding in India

    Directory of Open Access Journals (Sweden)

    Seema Puri

    2017-06-01

    Full Text Available Abstract Background Over the last decade, infant and young child feeding (IYCF indicators in India have improved. However, poor IYCF practices are still apparent, associated with pervasive high rates of child under-nutrition. Interventions to improve IYCF need augmentation by appropriate policy support to consolidate gains. The aim of this study was to identify opportunities to strengthen and support IYCF policies through a policy content and stakeholder network analysis. Methods IYCF policies and guidelines were systematically mapped and coded using predetermined themes. Six ‘net-map’ group interviews were conducted for stakeholder analysis with data analyzed using ORA (organizational risk analyzer, copyright Carley, Carnegie Mellon University software. The study was carried out at a national level and in the states of Maharashtra and unified Andhra Pradesh. Results Thirty relevant policy documents were identified. Support for IYCF was clearly apparent and was actioned within sectoral policies and strategic plans. We identified support for provision of information to mothers and caregivers in both sectoral and high-level/strategic policy documents. At a sectoral level, there was support for training health care workers and for enabling mothers to access IYCF. Opportunities to strengthen policy included expanding coverage and translating policy goals into implementation level documents. At the national level, Ministry of Women and Child Development [MoWCD], Ministry of Health and Family Welfare [MoHFW] and the Prime Minister’s Nutrition Council [PMNC] were the most influential actors in providing technical support while MoHFW, MoWCD, and Bill Melinda Gates Foundation were the most influential actors in providing funding and were therefore influential stakeholders in shaping IYCF policies and programs. Conclusion We identified a wide range of strengths in the IYCF policy environment in India and also opportunities for improvement. One key

  4. Policy content and stakeholder network analysis for infant and young child feeding in India.

    Science.gov (United States)

    Puri, Seema; Fernandez, Sylvia; Puranik, Amrita; Anand, Deepika; Gaidhane, Abhay; Quazi Syed, Zahiruddin; Patel, Archana; Uddin, Shahadat; Thow, Anne Marie

    2017-06-13

    Over the last decade, infant and young child feeding (IYCF) indicators in India have improved. However, poor IYCF practices are still apparent, associated with pervasive high rates of child under-nutrition. Interventions to improve IYCF need augmentation by appropriate policy support to consolidate gains. The aim of this study was to identify opportunities to strengthen and support IYCF policies through a policy content and stakeholder network analysis. IYCF policies and guidelines were systematically mapped and coded using predetermined themes. Six 'net-map' group interviews were conducted for stakeholder analysis with data analyzed using ORA (organizational risk analyzer, copyright Carley, Carnegie Mellon University) software. The study was carried out at a national level and in the states of Maharashtra and unified Andhra Pradesh. Thirty relevant policy documents were identified. Support for IYCF was clearly apparent and was actioned within sectoral policies and strategic plans. We identified support for provision of information to mothers and caregivers in both sectoral and high-level/strategic policy documents. At a sectoral level, there was support for training health care workers and for enabling mothers to access IYCF. Opportunities to strengthen policy included expanding coverage and translating policy goals into implementation level documents. At the national level, Ministry of Women and Child Development [MoWCD], Ministry of Health and Family Welfare [MoHFW] and the Prime Minister's Nutrition Council [PMNC] were the most influential actors in providing technical support while MoHFW, MoWCD, and Bill Melinda Gates Foundation were the most influential actors in providing funding and were therefore influential stakeholders in shaping IYCF policies and programs. We identified a wide range of strengths in the IYCF policy environment in India and also opportunities for improvement. One key strength is the integration of IYCF policies into a range of agendas and

  5. Measuring and monitoring equity in access to deceased donor kidney transplantation.

    Science.gov (United States)

    Stewart, D E; Wilk, A R; Toll, A E; Harper, A M; Lehman, R R; Robinson, A M; Noreen, S A; Edwards, E B; Klassen, D K

    2018-05-07

    The Organ Procurement and Transplantation Network monitors progress toward strategic goals such as increasing the number of transplants and improving waitlisted patient, living donor, and transplant recipient outcomes. However, a methodology for assessing system performance in providing equity in access to transplants was lacking. We present a novel approach for quantifying the degree of disparity in access to deceased donor kidney transplants among waitlisted patients and determine which factors are most associated with disparities. A Poisson rate regression model was built for each of 29 quarterly, period-prevalent cohorts (January 1, 2010-March 31, 2017; 5 years pre-kidney allocation system [KAS], 2 years post-KAS) of active kidney waiting list registrations. Inequity was quantified as the outlier-robust standard deviation (SD w ) of predicted transplant rates (log scale) among registrations, after "discounting" for intentional, policy-induced disparities (eg, pediatric priority) by holding such factors constant. The overall SD w declined by 40% after KAS implementation, suggesting substantially increased equity. Risk-adjusted, factor-specific disparities were measured with the SD w after holding all other factors constant. Disparities associated with calculated panel-reactive antibodies decreased sharply. Donor service area was the factor most associated with access disparities post-KAS. This methodology will help the transplant community evaluate tradeoffs between equity and utility-centric goals when considering new policies and help monitor equity in access as policies change. © 2018 The American Society of Transplantation and the American Society of Transplant Surgeons.

  6. Multirate IP traffic transmission in flexible access networks based on optical FFH-CDMA

    DEFF Research Database (Denmark)

    Raddo, Thiago R.; Sanches, Anderson L.; Tafur Monroy, Idelfonso

    2016-01-01

    In this paper, we propose a new IP transmission architecture over optical fast frequency hopping code-division multiple-access (OFFH-CDMA) network capable of supporting multirate transmissions for applications in flexible optical access networks. The proposed network architecture is independent...

  7. Adaptation of AMO-FBMC-OQAM in optical access network for accommodating asynchronous multiple access in OFDM-based uplink transmission

    Science.gov (United States)

    Jung, Sun-Young; Jung, Sang-Min; Han, Sang-Kook

    2015-01-01

    Exponentially expanding various applications in company with proliferation of mobile devices make mobile traffic exploded annually. For future access network, bandwidth efficient and asynchronous signals converged transmission technique is required in optical network to meet a huge bandwidth demand, while integrating various services and satisfying multiple access in perceived network resource. Orthogonal frequency division multiplexing (OFDM) is highly bandwidth efficient parallel transmission technique based on orthogonal subcarriers. OFDM has been widely studied in wired-/wireless communication and became a Long term evolution (LTE) standard. Consequently, OFDM also has been actively researched in optical network. However, OFDM is vulnerable frequency and phase offset essentially because of its sinc-shaped side lobes, therefore tight synchronism is necessary to maintain orthogonality. Moreover, redundant cyclic prefix (CP) is required in dispersive channel. Additionally, side lobes act as interference among users in multiple access. Thus, it practically hinders from supporting integration of various services and multiple access based on OFDM optical transmission In this paper, adaptively modulated optical filter bank multicarrier system with offset QAM (AMO-FBMC-OQAM) is introduced and experimentally investigated in uplink optical transmission to relax multiple access interference (MAI), while improving bandwidth efficiency. Side lobes are effectively suppressed by using FBMC, therefore the system becomes robust to path difference and imbalance among optical network units (ONUs), which increase bandwidth efficiency by reducing redundancy. In comparison with OFDM, a signal performance and an efficiency of frequency utilization are improved in the same experimental condition. It enables optical network to effectively support heterogeneous services and multiple access.

  8. Joint Hybrid Backhaul and Access Links Design in Cloud-Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb

    2015-09-06

    The cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio systems. In this paper, we consider the downlink of a CRAN formed of one central processor (the cloud) and several base station (BS), where each BS is connected to the cloud via either a wireless or capacity-limited wireline backhaul link. The paper addresses the joint design of the hybrid backhaul links (i.e., designing the wireline and wireless backhaul connections from the cloud to the BSs) and the access links (i.e., determining the sparse beamforming solution from the BSs to the users). The paper formulates the hybrid backhaul and access link design problem by minimizing the total network power consumption. The paper solves the problem using a two-stage heuristic algorithm. At one stage, the sparse beamforming solution is found using a weighted mixed 11/12 norm minimization approach; the correlation matrix of the quantization noise of the wireline backhaul links is computed using the classical rate-distortion theory. At the second stage, the transmit powers of the wireless backhaul links are found by solving a power minimization problem subject to quality-of-service constraints, based on the principle of conservation of rate by utilizing the rates found in the first stage. Simulation results suggest that the performance of the proposed algorithm approaches the global optimum solution, especially at high signal-to-interference-plus-noise ratio (SINR).

  9. Do Your School Policies Provide Equal Access to Computers? Are You Sure?

    Science.gov (United States)

    DuBois, Phyllis A.; Schubert, Jane G.

    1986-01-01

    Outlines how school policies can unintentionally perpetuate gender discrimination in student computer use and access. Describes four areas of administrative policies that can cause inequities and provides ways for administrators to counteract these policies. Includes discussion of a program to balance computer use, and an abstract of an article…

  10. School lunch and snacking patterns among high school students: Associations with school food environment and policies

    Directory of Open Access Journals (Sweden)

    Story Mary

    2005-10-01

    Full Text Available Abstract Objectives This study examined associations between high school students' lunch patterns and vending machine purchases and the school food environment and policies. Methods A randomly selected sample of 1088 high school students from 20 schools completed surveys about their lunch practices and vending machine purchases. School food policies were assessed by principal and food director surveys. The number of vending machines and their hours of operation were assessed by trained research staff. Results Students at schools with open campus policies during lunchtime were significantly more likely to eat lunch at a fast food restaurant than students at schools with closed campus policies (0.7 days/week vs. 0.2 days/week, p Conclusion School food policies that decrease access to foods high in fats and sugars are associated with less frequent purchase of these items in school among high school students. Schools should examine their food-related policies and decrease access to foods that are low in nutrients and high in fats and sugars.

  11. Semantic policy and adversarial modeling for cyber threat identification and avoidance

    Science.gov (United States)

    DeFrancesco, Anton; McQueary, Bruce

    2009-05-01

    Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.

  12. Stochastic geometry model for multi-channel fog radio access networks

    KAUST Repository

    Emara, Mostafa; Elsawy, Hesham; Sorour, Sameh; Al-Ghadhban, Samir; Alouini, Mohamed-Slim; Al-Naffouri, Tareq Y.

    2017-01-01

    Cache-enabled base station (BS) densification, denoted as a fog radio access network (F-RAN), is foreseen as a key component of 5G cellular networks. F-RAN enables storing popular files at the network edge (i.e., BS caches), which empowers local

  13. Learning Automata Based Caching for Efficient Data Access in Delay Tolerant Networks

    Directory of Open Access Journals (Sweden)

    Zhenjie Ma

    2018-01-01

    Full Text Available Effective data access is one of the major challenges in Delay Tolerant Networks (DTNs that are characterized by intermittent network connectivity and unpredictable node mobility. Currently, different data caching schemes have been proposed to improve the performance of data access in DTNs. However, most existing data caching schemes perform poorly due to the lack of global network state information and the changing network topology in DTNs. In this paper, we propose a novel data caching scheme based on cooperative caching in DTNs, aiming at improving the successful rate of data access and reducing the data access delay. In the proposed scheme, learning automata are utilized to select a set of caching nodes as Caching Node Set (CNS in DTNs. Unlike the existing caching schemes failing to address the challenging characteristics of DTNs, our scheme is designed to automatically self-adjust to the changing network topology through the well-designed voting and updating processes. The proposed scheme improves the overall performance of data access in DTNs compared with the former caching schemes. The simulations verify the feasibility of our scheme and the improvements in performance.

  14. Physical rehabilitation in post-conflict settings: analysis of public policy and stakeholder networks.

    Science.gov (United States)

    Blanchet, Karl; Girois, Susan; Urseau, Isabelle; Smerdon, Christine; Drouet, Yann; Jama, Ali

    2014-01-01

    Physical rehabilitation plays a determinant role in post-conflict contexts to restore disabled citizens' mobility and independence. While the main objectives of any physical rehabilitation programme are to ensure that the services provided are accessible and of good quality to meet existing needs, it is intended that the services need to be supported over the long term by public health and social welfare authorities. This article presents the results of a study conducted in three post-conflict countries on the relationships between the level of commitment of national governments to rehabilitation services and the influence of social networks on national policy related to physical rehabilitation. From a policy and resource standpoint, the environment in Nepal is the most favourable for creating leverage at the national level to influence the commitment of ministries in the rehabilitation sector, compared with Cambodia and Somaliland. Stakeholder network analysis in Nepal, furthermore, reveals a dominant civil society and private sector supporting rehabilitation services, including intense involvement of local organisations and user groups. Implications for Rehabilitation Physical rehabilitation is not on the top of the agenda of governments in fragile states. The commitment and involvement of national authorities in the rehabilitation sector is positively influenced by civil society and international organisations. The denser the social network of the rehabilitation sector is, the more influence the actors can exert influence over national authorities.

  15. Cell Deployment Optimization for Cloud Radio Access Networks using Teletraffic Theory

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Christiansen, Henrik Lehrmann; Iversen, Villy Bæk

    2015-01-01

    Cloud Radio Access Network (C-RAN) is a new mobile radio access network design based on centralized and pooled processing. It offers potential cost savings by utilizing the so-called tidal effect due to user mobility in cellular networks. This paper provides a quantitative analysis...... to dynamically re-assign cells to a pool of baseband units. The re-assignment is based on the cell load and traffic characteristics such that effective utilization of the baseband resources is assured....

  16. Passive Optical Access Networks: State of the Art and Future Evolution

    Directory of Open Access Journals (Sweden)

    Tommaso Muciaccia

    2014-10-01

    Full Text Available In the very last years, optical access networks are growing very rapidly, from both the network operators and the research interests points of view. Fiber To The Home (FTTH is already a reality in plenty of real contexts and there has been a further stimulus to the proposal of new solutions and the investigation of new possibilities, in order to optimize network performance and reduce capital and operational expenditure. A complete and systematic overview of passive optical access networks is presented in this paper, concerning both the hot research topics and the main operative issues about the design guidelines and the deployment of Passive Optical Networks (PON architectures, nowadays the most commonly implemented approach to realize optical fiber links in the access networks. A comparison of advantages and disadvantages of different multiplexing techniques is discussed, with specific reference to WDM-based networks, almost universally considered as the enabling technology for future proof bandwidth requirements. An exhaustive summary is also given about the-state-of-the-art of modulation and encoding techniques recently proposed by the scientific community, as well as the open challenges (such as colorless and coolerless ONUs for telecom companies and international standardization compliance.

  17. Algorithmic PON/P2P FTTH Access Network Design for CAPEX Minimization

    DEFF Research Database (Denmark)

    Papaefthimiou, Kostantinos; Tefera, Yonas; Mihylov, Dimitar

    2013-01-01

    one. It provides an obvious advantage for the end users in terms of high achievable data rates. On the other hand, the high initial deployment cost required exists as the heaviest impediment. The main goal of this paper is to study different approaches when designing a fiber access network. More......Due to the emergence of high bandwidth-requiring services, telecommunication operators (telcos) are called to upgrade their fixed access network. In order to keep up with the competition, they must consider different optical access network solutions with Fiber To The Home (FTTH) as the prevailing...

  18. Global Policy Change and Women\\'s Access to safe abortion: The ...

    African Journals Online (AJOL)

    Global Policy Change and Women\\'s Access to safe abortion: The impact of the World Health Organization\\'s guidance in African. ... remains very high in many African countries, stakeholders are increasingly using WHO recommendations in conjunction with other global and regional policy frameworks, including the African ...

  19. Research Network on Regional Economic and Policy History

    NARCIS (Netherlands)

    Molema, A.M.; van der Zwet, Arno

    2017-01-01

    In the spring of 2017, the Research Network on Regional Economic and Policy History organised its inaugural workshop in London. The network aims to stimulate research in relation to regional economic development and planning challenges, by exploring the importance of historical approaches and

  20. Ubiquitous access control and policy management in personal networks

    DEFF Research Database (Denmark)

    Kyriazanos, Dimitris M.; Stassinopoulos, George I.; Prasad, Neeli R.

    2006-01-01

    distributed master devices acting as access points- and also pure peer-to-peer interactions inside the PN. Taking benefit from the modularity and scalability of the design, this solution can be extended into supporting coalitions of different security domains, deriving from the creation of PNs federations....

  1. Implementing multiple intervention strategies in Dutch public health-related policy networks

    NARCIS (Netherlands)

    Harting, Janneke; Peters, Dorothee; Grêaux, Kimberly; van Assema, Patricia; Verweij, Stefan; Stronks, Karien; Klijn, Erik-Hans

    2017-01-01

    Improving public health requires multiple intervention strategies. Implementing such an intervention mix is supposed to require a multisectoral policy network. As evidence to support this assumption is scarce, we examined under which conditions public health-related policy networks were able to

  2. Recommendations for institutional policy and network regulatory frameworks towards distributed generation in EU Member States

    International Nuclear Information System (INIS)

    Ten Donkelaar, M.; Van Oostvoorn, F.

    2005-01-01

    Recommendations regarding the development of regulatory frameworks and institutional policies towards an optimal integration of distributed generation (DG) into electricity networks are presented. These recommendations are based on findings from a benchmarking study conducted in the framework of the ENIRDG-net project. The aim of the benchmarking exercise was to identify examples of well-defined pro-DG policies, with clear targets and adequate implementation mechanisms. In this study an adequate pro-DG policy is defined on the basis of a level playing field, a situation where distributed and centralised generation receive equal incentives and have equal access to the liberalised markets for electricity. The benchmark study includes the results of a similar study conducted in the framework of the SUSTELNET project. When comparing the results a certain discrepancy can be noticed between the actual regulation and policy in a number of countries, the medium to long-term targets and the ideal situation described by the level playing field objective. To overcome this discrepancy, a number of recommendations have been drafted for future policy and regulation towards distributed generation

  3. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  4. Access to Orphan Drugs: A Comprehensive Review of Legislations, Regulations and Policies in 35 Countries.

    Science.gov (United States)

    Gammie, Todd; Lu, Christine Y; Babar, Zaheer Ud-Din

    2015-01-01

    To review existing regulations and policies utilised by countries to enable patient access to orphan drugs. A review of the literature (1998 to 2014) was performed to identify relevant, peer-reviewed articles. Using content analysis, we synthesised regulations and policies for access to orphan drugs by type and by country. Fifty seven articles and 35 countries were included in this review. Six broad categories of regulation and policy instruments were identified: national orphan drug policies, orphan drug designation, marketing authorization, incentives, marketing exclusivity, and pricing and reimbursement. The availability of orphan drugs depends on individual country's legislation and regulations including national orphan drug policies, orphan drug designation, marketing authorization, marketing exclusivity and incentives such as tax credits to ensure research, development and marketing. The majority of countries (27/35) had in place orphan drug legislation. Access to orphan drugs depends on individual country's pricing and reimbursement policies, which varied widely between countries. High prices and insufficient evidence often limit orphan drugs from meeting the traditional health technology assessment criteria, especially cost-effectiveness, which may influence access. Overall many countries have implemented a combination of legislations, regulations and policies for orphan drugs in the last two decades. While these may enable the availability and access to orphan drugs, there are critical differences between countries in terms of range and types of legislations, regulations and policies implemented. Importantly, China and India, two of the largest countries by population size, both lack national legislation for orphan medicines and rare diseases, which could have substantial negative impacts on their patient populations with rare diseases.

  5. Access to Orphan Drugs: A Comprehensive Review of Legislations, Regulations and Policies in 35 Countries.

    Directory of Open Access Journals (Sweden)

    Todd Gammie

    Full Text Available To review existing regulations and policies utilised by countries to enable patient access to orphan drugs.A review of the literature (1998 to 2014 was performed to identify relevant, peer-reviewed articles. Using content analysis, we synthesised regulations and policies for access to orphan drugs by type and by country.Fifty seven articles and 35 countries were included in this review. Six broad categories of regulation and policy instruments were identified: national orphan drug policies, orphan drug designation, marketing authorization, incentives, marketing exclusivity, and pricing and reimbursement. The availability of orphan drugs depends on individual country's legislation and regulations including national orphan drug policies, orphan drug designation, marketing authorization, marketing exclusivity and incentives such as tax credits to ensure research, development and marketing. The majority of countries (27/35 had in place orphan drug legislation. Access to orphan drugs depends on individual country's pricing and reimbursement policies, which varied widely between countries. High prices and insufficient evidence often limit orphan drugs from meeting the traditional health technology assessment criteria, especially cost-effectiveness, which may influence access.Overall many countries have implemented a combination of legislations, regulations and policies for orphan drugs in the last two decades. While these may enable the availability and access to orphan drugs, there are critical differences between countries in terms of range and types of legislations, regulations and policies implemented. Importantly, China and India, two of the largest countries by population size, both lack national legislation for orphan medicines and rare diseases, which could have substantial negative impacts on their patient populations with rare diseases.

  6. Multiple access protocol for supporting multimedia services in wireless ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo

    1999-01-01

    The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications....... In this paper, we propose a multiple access protocol using centralized and distributed channel access control techniques to provide QoS guarantees for multimedia services by taking advantage of the characteristics of different kinds of ATM traffics. Multimedia traffic, including constant bit rate (CBR...

  7. Advance reservation access control using software-defined networking and tokens

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar; Rao, Nageswara S. V.; Foster, Ian T.; Clark, Russ; Owen, Henry

    2018-02-01

    Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present here a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization. We use SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. We conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network. (C) 2017 Elsevier B.V. All rights reserved.

  8. A Method for Automated Planning of FTTH Access Network Infrastructures

    DEFF Research Database (Denmark)

    Riaz, Muhammad Tahir; Pedersen, Jens Myrup; Madsen, Ole Brun

    2005-01-01

    In this paper a method for automated planning of Fiber to the Home (FTTH) access networks is proposed. We introduced a systematic approach for planning access network infrastructure. The GIS data and a set of algorithms were employed to make the planning process more automatic. The method explains...... method. The method, however, does not fully automate the planning but make the planning process significantly fast. The results and discussion are presented and conclusion is given in the end....

  9. Network analysis of inter-organizational relationships and policy use among active living organizations in Alberta, Canada

    Directory of Open Access Journals (Sweden)

    Christina C. Loitz

    2017-08-01

    Full Text Available Abstract Background Coordinated partnerships and collaborations can optimize the efficiency and effectiveness of service and program delivery in organizational networks. However, the extent to which organizations are working together to promote physical activity, and use physical activity policies in Canada, is unknown. This project sought to provide a snapshot of the funding, coordination and partnership relationships among provincial active living organizations (ALOs in Alberta, Canada. Additionally, the awareness, and use of the provincial policy and national strategy by the organizations was examined. Methods Provincial ALOs (N = 27 answered questions regarding their funding, coordination and partnership connections with other ALOs in the network. Social network analysis was employed to examine network structure and position of each ALO. Discriminant function analysis determined the extent to which degree centrality was associated with the use of the Active Alberta (AA policy and Active Canada 20/20 (AC 20/20 strategy. Results The funding network had a low density level (density = .20 and was centralized around Alberta Tourism Parks and Recreation (ATPR; degree centralization = 48.77%, betweenness centralization = 32.43%. The coordination network had a moderate density level (density = .31, and was low-to-moderately centralized around a few organizations (degree centralization = 45.37%, betweenness centrality = 19.92%. The partnership network had a low density level (density = .15, and was moderate-to-highly centralized around ATPR. Most organizations were aware of AA (89% and AC 20/20 (78%, however more were using AA (67% compared to AC 20/20 (33%. Central ALOs in the funding network were more likely to use AA and AC 20/20. Central ALOs in the coordination network were more likely to use AC 20/20, but not AA. Conclusions Increasing formal and informal relationships between organizations and integrating disconnected or

  10. Association of mandated language access programming and quality of care provided by mental health agencies.

    Science.gov (United States)

    McClellan, Sean R; Snowden, Lonnie

    2015-01-01

    This study examined the association between language access programming and quality of psychiatric care received by persons with limited English proficiency (LEP). In 1999, the California Department of Mental Health required county Medicaid agencies to implement a "threshold language access policy" to meet the state's Title VI obligations. This policy required Medi-Cal agencies to provide language access programming, including access to interpreters and translated written material, to speakers of languages other than English if the language was spoken by at least 3,000, or 5%, of the county's Medicaid population. Using a longitudinal study design with a nonequivalent control group, this study examined the quality of care provided to Spanish speakers with LEP and a severe mental illness before and after implementation of mandatory language access programming. Quality was measured by receipt of at least two follow-up medication visits within 90 days or three visits within 180 days of an initial medication visit over a period of 38 quarter-years. On average, only 40% of Spanish-speaking clients received at least three medication follow-up visits within 180 days. In multivariate analyses, language access programming was not associated with receipt of at least two medication follow-up visits within 90 days or at least three visits within 180 days. This study found no evidence that language access programming led to increased rates of follow-up medication visits for clients with LEP.

  11. Access regulation in the next generation access network environment: A comparative study of Hong Kong and Singapore from the transaction cost economics perspectives

    OpenAIRE

    Ho, Au Man

    2012-01-01

    Hong Kong and Singapore have adopted two different models in the regulation of the next generation access (NGA) networks. In Hong Kong, the government has decided that access regulation will not be applied to fibre-based access networks and its strategy will be to rely on facilities-based competition to promote investment in the NGA networks. Singapore, on the other hand, has promoted access/services-based competition over a next generation broadband infrastructure subsidised by public fundin...

  12. Power structure among the actors of financial support to the poor to access health services: Social network analysis approach.

    Science.gov (United States)

    Etemadi, Manal; Gorji, Hasan Abolghasem; Kangarani, Hannaneh Mohammadi; Ashtarian, Kioomars

    2017-12-01

    The extent of universal health coverage in terms of financial protection is worrisome in Iran. There are challenges in health policies to guarantee financial accessibility to health services, especially for poor people. Various institutions offer support to ensure that the poor have financial access to health services. The aim of this study is to investigate the relationship network among the institutions active in this field. This study is a policy document analysis. It evaluates the country's legal documents in the field of financial support to the poor for healthcare after the Islamic Revolution in Iran. The researchers looked for the documents on the related websites and referred to the related organizations. The social network analysis approach was chosen for the analysis of the documents. Block-modelling and multi-dimensional scaling (MDS) was used to determine the network structures. The UCINET software was employed to analyse the data. Most the main actors of this network are chosen from the government budget. There is no legal communication and cooperation among some of the actors because of their improper position in the network. Seven blocks have been clustered by CONCOR in terms of the actor's degree of similarity. The social distance among the actors of the seven blocks is very short. Power distribution in the field of financial support to the poor has a fragmented structure; however, it is mainly run by a dominant block consisting of The Supreme Council of Welfare and Social Security, Health Insurance Organization, and the Ministry of Health and Medical Education. The financial support for the poor network involves multiple actors. This variety has created a series of confusions in terms of the type, level, and scope of responsibilities among the actors. The weak presence legislative and regulatory institutions and also non-governmental institutions are the main weak points of this network. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Spectrum access games for cognitive radio networks

    CSIR Research Space (South Africa)

    Masonta, MT

    2010-09-01

    Full Text Available received a wide acceptance in next generation and intelligent wireless communication systems. In this paper the authors make use of game theory approach to model and analyze cognitive radio networks in order to allow dynamic spectrum access in broadband...

  14. Structural analysis of health-relevant policy-making information exchange networks in Canada.

    Science.gov (United States)

    Contandriopoulos, Damien; Benoît, François; Bryant-Lukosius, Denise; Carrier, Annie; Carter, Nancy; Deber, Raisa; Duhoux, Arnaud; Greenhalgh, Trisha; Larouche, Catherine; Leclerc, Bernard-Simon; Levy, Adrian; Martin-Misener, Ruth; Maximova, Katerina; McGrail, Kimberlyn; Nykiforuk, Candace; Roos, Noralou; Schwartz, Robert; Valente, Thomas W; Wong, Sabrina; Lindquist, Evert; Pullen, Carolyn; Lardeux, Anne; Perroux, Melanie

    2017-09-20

    Health systems worldwide struggle to identify, adopt, and implement in a timely and system-wide manner the best-evidence-informed-policy-level practices. Yet, there is still only limited evidence about individual and institutional best practices for fostering the use of scientific evidence in policy-making processes The present project is the first national-level attempt to (1) map and structurally analyze-quantitatively-health-relevant policy-making networks that connect evidence production, synthesis, interpretation, and use; (2) qualitatively investigate the interaction patterns of a subsample of actors with high centrality metrics within these networks to develop an in-depth understanding of evidence circulation processes; and (3) combine these findings in order to assess a policy network's "absorptive capacity" regarding scientific evidence and integrate them into a conceptually sound and empirically grounded framework. The project is divided into two research components. The first component is based on quantitative analysis of ties (relationships) that link nodes (participants) in a network. Network data will be collected through a multi-step snowball sampling strategy. Data will be analyzed structurally using social network mapping and analysis methods. The second component is based on qualitative interviews with a subsample of the Web survey participants having central, bridging, or atypical positions in the network. Interviews will focus on the process through which evidence circulates and enters practice. Results from both components will then be integrated through an assessment of the network's and subnetwork's effectiveness in identifying, capturing, interpreting, sharing, reframing, and recodifying scientific evidence in policy-making processes. Knowledge developed from this project has the potential both to strengthen the scientific understanding of how policy-level knowledge transfer and exchange functions and to provide significantly improved advice

  15. Dynamic mobility applications policy analysis : policy and institutional issues for intelligent network flow optimization (INFLO).

    Science.gov (United States)

    2014-12-01

    The report documents policy considerations for the Intelligent Network Flow Optimization (INFLO) connected vehicle applications : bundle. INFLO aims to optimize network flow on freeways and arterials by informing motorists of existing and impen...

  16. Optical solutions for unbundled access network

    Science.gov (United States)

    Bacîş Vasile, Irina Bristena

    2015-02-01

    The unbundling technique requires finding solutions to guarantee the economic and technical performances imposed by the nature of the services that can be offered. One of the possible solutions is the optic one; choosing this solution is justified for the following reasons: it optimizes the use of the access network, which is the most expensive part of a network (about 50% of the total investment in telecommunications networks) while also being the least used (telephone traffic on the lines has a low cost); it increases the distance between the master station/central and the terminal of the subscriber; the development of the services offered to the subscribers is conditioned by the subscriber network. For broadband services there is a need for support for the introduction of high-speed transport. A proper identification of the factors that must be satisfied and a comprehensive financial evaluation of all resources involved, both the resources that are in the process of being bought as well as extensions are the main conditions that would lead to a correct choice. As there is no single optimal technology for all development scenarios, which can take into account all access systems, a successful implementation is always done by individual/particularized scenarios. The method used today for the selection of an optimal solution is based on statistics and analysis of the various, already implemented, solutions, and on the experience that was already gained; the main evaluation criterion and the most unbiased one is the ratio between the cost of the investment and the quality of service, while serving an as large as possible number of customers.

  17. Access to Elementary Education in India: Politics, Policies and Progress. CREATE Pathways to Access. Research Monograph No. 44

    Science.gov (United States)

    Little, Angela W.

    2010-01-01

    This monograph examines progress in, and policies for, access to elementary education over the past 60 years, the role played by political factors in the process of policy formulation and implementation and the drivers and inhibitors of the implementation of reforms in elementary education in recent years in India. Drawing on interviews and…

  18. Access to Orphan Drugs: A Comprehensive Review of Legislations, Regulations and Policies in 35 Countries

    Science.gov (United States)

    Gammie, Todd

    2015-01-01

    Objective To review existing regulations and policies utilised by countries to enable patient access to orphan drugs. Methods A review of the literature (1998 to 2014) was performed to identify relevant, peer-reviewed articles. Using content analysis, we synthesised regulations and policies for access to orphan drugs by type and by country. Results Fifty seven articles and 35 countries were included in this review. Six broad categories of regulation and policy instruments were identified: national orphan drug policies, orphan drug designation, marketing authorization, incentives, marketing exclusivity, and pricing and reimbursement. The availability of orphan drugs depends on individual country’s legislation and regulations including national orphan drug policies, orphan drug designation, marketing authorization, marketing exclusivity and incentives such as tax credits to ensure research, development and marketing. The majority of countries (27/35) had in place orphan drug legislation. Access to orphan drugs depends on individual country’s pricing and reimbursement policies, which varied widely between countries. High prices and insufficient evidence often limit orphan drugs from meeting the traditional health technology assessment criteria, especially cost-effectiveness, which may influence access. Conclusions Overall many countries have implemented a combination of legislations, regulations and policies for orphan drugs in the last two decades. While these may enable the availability and access to orphan drugs, there are critical differences between countries in terms of range and types of legislations, regulations and policies implemented. Importantly, China and India, two of the largest countries by population size, both lack national legislation for orphan medicines and rare diseases, which could have substantial negative impacts on their patient populations with rare diseases. PMID:26451948

  19. A slotted access control protocol for metropolitan WDM ring networks

    Science.gov (United States)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  20. Drawbacks and benefits associated with inter-organizational collaboration along the discovery-development-delivery continuum: a cancer research network case study.

    Science.gov (United States)

    Harris, Jenine K; Provan, Keith G; Johnson, Kimberly J; Leischow, Scott J

    2012-07-25

    The scientific process around cancer research begins with scientific discovery, followed by development of interventions, and finally delivery of needed interventions to people with cancer. Numerous studies have identified substantial gaps between discovery and delivery in health research. Team science has been identified as a possible solution for closing the discovery to delivery gap; however, little is known about effective ways of collaborating within teams and across organizations. The purpose of this study was to determine benefits and drawbacks associated with organizational collaboration across the discovery-development-delivery research continuum. Representatives of organizations working on cancer research across a state answered a survey about how they collaborated with other cancer research organizations in the state and what benefits and drawbacks they experienced while collaborating. We used exponential random graph modeling to determine the association between these benefits and drawbacks and the presence of a collaboration tie between any two network members. Different drawbacks and benefits were associated with discovery, development, and delivery collaborations. The only consistent association across all three was with the drawback of difficulty due to geographic differences, which was negatively associated with collaboration, indicating that those organizations that had collaborated were less likely to perceive a barrier related to geography. The benefit, enhanced access to other knowledge, was positive and significant in the development and delivery networks, indicating that collaborating organizations viewed improved knowledge exchange as a benefit of collaboration. 'Acquisition of additional funding or other resources' and 'development of new tools and methods' were negatively significantly related to collaboration in these networks. So, although improved knowledge access was an outcome of collaboration, more tangible outcomes were not being

  1. Spectrum access and management for cognitive radio networks

    CERN Document Server

    2017-01-01

    This book presents cutting-edge research contributions that address various aspects of network design, optimization, implementation, and application of cognitive radio technologies. It demonstrates how to make better utilization of the available spectrum, cognitive radios and spectrum access to achieve effective spectrum sharing between licensed and unlicensed users. The book provides academics and researchers essential information on current developments and future trends in cognitive radios for possible integration with the upcoming 5G networks. In addition, it includes a brief introduction to cognitive radio networks for newcomers to the field.

  2. One goal, many paths: Policy proposals for universal access to broadband in Brazil

    OpenAIRE

    Gomes, André Moura; Cordeiro, Pedro Antero Braga; Araújo, Pedro Lucas da Cruz Pereira

    2014-01-01

    The purpose is to introduce policy proposals for universal access to broadband, assessing the hypothetical implementation of instruments suggested by the sectoral literature to Brazil. The methodology is based on the analysis of the literature on policies for universal access and broadband plans in the context of Latin America and the Organization for Economic Cooperation and Development (OECD) and the discussion of its effects on related sectoral indicators. Then, the impact of the applicati...

  3. Building a multimodal network and determining individual accessibility by public transportation

    DEFF Research Database (Denmark)

    Djurhuus, Sune; Hansen, Henning Sten; Aadahl, Mette

    2016-01-01

    The increased availability of transit schedules from web sites or travel planners as well as more disaggregate data has led to a growing interest in creating individual public transportation accessibility measures. However, used extensively, standard GIS software does not have direct capabilities...... from a travel planner into a multimodal network model using simple SQL (structured query language) programming and standard GIS. The method presented here integrates all parts of travelling by public transportation from individual home addresses to all reachable transit stops within different travel....... The accessibility areas are created at morning rush hour for a study population of 29 447 individuals and a few examples of accessibility areas are presented. The results show a big difference in individual public transportation accessibility in the region. In addition, how the transit network is accessed, whether...

  4. Amendment of the assured delivery provisions of BPA's Long-Term Intertie Access Policy and increased assured delivery: Access for non-scheduling utilities. Record of decision

    International Nuclear Information System (INIS)

    1994-06-01

    Bonneville Power Administration's BPA's preferred alternative for providing non-Federal Pacific Northwest-Pacific Southwest (PNW-PSW) Intertie access is to adopt the Capacity Ownership alternative combined with the Increased Assured Delivery--Access for Non-Scheduling Utilities alternative. BPA's decision to offer Capacity Ownership was documented in a March 1994 Non-Federal Capacity Ownership Record of Decision (ROD). This ROD documents BPA's decision to facilitate PNW-PSW Intertie access by proceeding with (1) bidirectional Increased Assured Delivery--Access for Non Scheduling Utilities; and (2) amending the Assured Delivery provisions of BPA's Long-Term Intertie Access Policy (LTIAP). Given that the various non-Federal PNW-PSW Intertie access alternatives in the NFP EIS all allowed for different types of contracts, little environmental impact difference among the alternatives was found. Rather, environmental impact was found to be associated with whether exchange contracts or firm power sales contracts would predominate. Such impacts and related environmental analysis are discussed further in section 3.0 of this ROD

  5. Wireless ad hoc networks access for aeronautical communications

    OpenAIRE

    Besse , Frédéric; Garcia , Fabien; Pirovano , Alain; Radzik , José

    2010-01-01

    International audience; There is an increasing interest in the current aeronautical context to offer new services for civil aircraft passengers. For example, airlines want to offer their customers the opportunity to access the Internet, to manage their mails, to watch video on demand, to access corporate VPNs.... All these services represent a new type of air-ground communications called APC (Aeronautical Passenger Communications) in the ATN (Aeronautical Telecommunication Network) context. I...

  6. Distributed Robust Power Minimization for the Downlink of Multi-Cloud Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    Conventional cloud radio access networks assume single cloud processing and treat inter-cloud interference as background noise. This paper considers the downlink of a multi-cloud radio access network (CRAN) where each cloud is connected to several

  7. Networks and Fault Lines: Understanding the role of housing associations in neighbourhood regeneration: a network governance perspective

    Directory of Open Access Journals (Sweden)

    Gerard van Bortel

    2016-03-01

    economic objectives. They have largely similar tasks and responsibilities, but work in very divergent contexts. This study devotes careful attention to the contingencies of time and place of decisionmaking in order to regenerate insights that are also relevant outside the case-study areas. Therefore, this study places Dutch and English housing associations in their respective political economies, welfare regimes and rental housing systems. The study also highlights the ambiguous position—between state, market, and society—of housing associations. Neighbourhood regeneration evolved from slum clearance and complete area redevelopment in the 1950s and 1960s, towards more integral place-based approaches—in the 1970s and 1980s—with a stronger emphasis on improving the existing housing stock and involving local communities. The nature of the involvement of housing associations in neighbourhood regeneration has changed over time in response to government policies, public opinion, their own strategies, and the strategies of their umbrella organisations. In both England and the Netherlands, their increasingly prominent role —especially after the start of the new millennium—was driven by pressures on housing associations to take a leading role in neighbourhood regeneration. A governance network perspective on neighbourhood regeneration The emergence of the ‘network society’ has led to a fragmentation of power and resources. This fragmentation has led to increased interdependence of actors; public, private and community actors need to collaborate to solve problems. This study uses a governance network approach to explore the complexity and uncertainties involved in neighbourhood regeneration decision-making. The study explores five interrelated questions [see Chapter 1, §1.2], each related to a component of a theoretical framework on decision-making in a network setting. These questions involve context, networks, actors, processes and outcomes. In order to answer the

  8. High-Capacity Hybrid Optical Fiber-Wireless Communications Links in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan

    of broadband services access. To realize the seamless convergence between the two network segments, the lower capacity of wireless systems need to be increased to match the continuously increasing bandwidth of fiber-optic systems. The research works included in this thesis are devoted to experimental...... investigations of photonic-wireless links with record high capacities to fulfill the requirements of next generation hybrid optical fiber-wireless access networks. The main contributions of this thesis have expanded the state-of-the-art in two main areas: high speed millimeter-wave (mm-wave) communication links......Integration between fiber-optic and wireless communications systems in the "last mile" access networks is currently considered as a promising solution for both service providers and users, in terms of minimizing deployment cost, shortening upgrading period and increasing mobility and flexibility...

  9. Performance of WLAN RSS-based SON for LTE/WLAN access network selection

    NARCIS (Netherlands)

    Wang, Y.; Djapic, R.; Bergström, A.; Kovács, I.Z.; Laselva, D.; Spaey, K.; Sas, B.

    2014-01-01

    Mobile Network Operators (MNOs) are integrating carrier-grade Wireless Local Area Network (WLAN) to cellular networks to improve network performance and user experience. Access network selection (ANS) between cellular and WLAN plays a key role in the integration. Given the complexity of

  10. Models for QoS-Aware Capacity Management in Cable Access Networks

    NARCIS (Netherlands)

    Attema, T.; van den Berg, Hans Leo; Kempker, P.C.; Worm, D.; van der Vliet-Hameeteman, C.

    In this article, mathematical models are presented that “map‿ measured or predicted network utilisations to user throughputs for given network configurations (segment capacity, subscription speeds etc.). They provide valuable insights into the user experience in cable access networks. The models,

  11. Transmission policy in the United States

    Energy Technology Data Exchange (ETDEWEB)

    Joskow, P.L. [Massachusetts Institute of Technology, Cambridge, MA (United States). Department of Economics

    2005-06-01

    This paper provides an overview of the development of electric power transmission access, pricing and investment policies in the US over the last 15 years and evaluates the current state of those policies. Pre-liberalization transmission access and pricing policies are reviewed first since more recent policies have evolved from them. FERC's efforts to ensure that transmission owning utilities provide non-discriminatory access and pricing to wholesale transmission customers, culminating in Order 888 and 889 are discussed. These rules did not respond to problems created by a highly balkanized transmission system and only partially responded to problems caused by common ownership and operation of transmission networks with generating and marketing businesses in the same regions. These problems motivated FERC to seek to create Regional Transmission Organizations (RTO) meeting a long list of criteria related to governance, network operations, transmission pricing and investment as reflected in Order 2000. The slow pace of 'voluntary' reform following Order 2000 led FERC to issue a proposed Standard Market Design Rule (SMD) which provided more detailed prescriptions for wholesale market design, network operations, regional planning, resource adequacy, and transmission investment. The SMD rule confronted enormous resistance from groups of utilities and states that had not embraced an electricity sector liberalization agenda. However, many of the provisions of the SMD are being implemented by the RTOs and ISOs in the Northeast and Midwest. PJM's market rules and transmission pricing, planning and investment policies are reviewed as an articulation of FERC's RTO and SMD visions. (author)

  12. Transmission policy in the United States

    International Nuclear Information System (INIS)

    Joskow, P.L.

    2005-01-01

    This paper provides an overview of the development of electric power transmission access, pricing and investment policies in the US over the last 15 years and evaluates the current state of those policies. Pre-liberalization transmission access and pricing policies are reviewed first since more recent policies have evolved from them. FERC's efforts to ensure that transmission owning utilities provide non-discriminatory access and pricing to wholesale transmission customers, culminating in Order 888 and 889 are discussed. These rules did not respond to problems created by a highly balkanized transmission system and only partially responded to problems caused by common ownership and operation of transmission networks with generating and marketing businesses in the same regions. These problems motivated FERC to seek to create Regional Transmission Organizations (RTO) meeting a long list of criteria related to governance, network operations, transmission pricing and investment as reflected in Order 2000. The slow pace of 'voluntary' reform following Order 2000 led FERC to issue a proposed Standard Market Design Rule (SMD) which provided more detailed prescriptions for wholesale market design, network operations, regional planning, resource adequacy, and transmission investment. The SMD rule confronted enormous resistance from groups of utilities and states that had not embraced an electricity sector liberalization agenda. However, many of the provisions of the SMD are being implemented by the RTOs and ISOs in the Northeast and Midwest. PJM's market rules and transmission pricing, planning and investment policies are reviewed as an articulation of FERC's RTO and SMD visions. (author)

  13. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani

    2013-01-01

    that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over...

  14. Highball: A high speed, reserved-access, wide area network

    Science.gov (United States)

    Mills, David L.; Boncelet, Charles G.; Elias, John G.; Schragger, Paul A.; Jackson, Alden W.

    1990-01-01

    A network architecture called Highball and a preliminary design for a prototype, wide-area data network designed to operate at speeds of 1 Gbps and beyond are described. It is intended for applications requiring high speed burst transmissions where some latency between requesting a transmission and granting the request can be anticipated and tolerated. Examples include real-time video and disk-disk transfers, national filestore access, remote sensing, and similar applications. The network nodes include an intelligent crossbar switch, but have no buffering capabilities; thus, data must be queued at the end nodes. There are no restrictions on the network topology, link speeds, or end-end protocols. The end system, nodes, and links can operate at any speed up to the limits imposed by the physical facilities. An overview of an initial design approach is presented and is intended as a benchmark upon which a detailed design can be developed. It describes the network architecture and proposed access protocols, as well as functional descriptions of the hardware and software components that could be used in a prototype implementation. It concludes with a discussion of additional issues to be resolved in continuing stages of this project.

  15. Cross-border Co-operation and Policy Networks in West Africa

    DEFF Research Database (Denmark)

    Trémolières, Marie; Walther, Olivier

    This publication examines how policy actors involved in cross-border co-operation contribute to the regional integration process in West Africa. It uses a pioneering methodology, known as social network analysis, to visualise the formal and informal relationships between actors involved in cross...... West Africa to develop cross-border initiatives in a number of ways. Combining these two analyses with the perceptions of regional policy makers as to which border areas they consider as priorities for regional integration, the publication concludes with the analytical foundations for more effective......-border policy networks, showing that borders have notable and diverse impacts on exchanges of information and the relative power of networks. The report then analyses a range of regional indicators of co-operation potential, visually demonstrating that borders can also affect the ability of sub-regions within...

  16. Modified network simulation model with token method of bus access

    Directory of Open Access Journals (Sweden)

    L.V. Stribulevich

    2013-08-01

    Full Text Available Purpose. To study the characteristics of the local network with the marker method of access to the bus its modified simulation model was developed. Methodology. Defining characteristics of the network is carried out on the developed simulation model, which is based on the state diagram-layer network station with the mechanism of processing priorities, both in steady state and in the performance of control procedures: the initiation of a logical ring, the entrance and exit of the station network with a logical ring. Findings. A simulation model, on the basis of which can be obtained the dependencies of the application the maximum waiting time in the queue for different classes of access, and the reaction time usable bandwidth on the data rate, the number of network stations, the generation rate applications, the number of frames transmitted per token holding time, frame length was developed. Originality. The technique of network simulation reflecting its work in the steady condition and during the control procedures, the mechanism of priority ranking and handling was proposed. Practical value. Defining network characteristics in the real-time systems on railway transport based on the developed simulation model.

  17. Accessing the digital environment: making policy in academic libraries

    African Journals Online (AJOL)

    Accessing the digital environment: making policy in academic libraries. Dorette Snyman. Abstract. No Abstract Available Innovation No.23 2001: 13-18. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL... for Researchers ...

  18. Partial Interference and Its Performance Impact on Wireless Multiple Access Networks

    Directory of Open Access Journals (Sweden)

    Lau WingCheong

    2010-01-01

    Full Text Available To determine the capacity of wireless multiple access networks, the interference among the wireless links must be accurately modeled. In this paper, we formalize the notion of the partial interference phenomenon observed in many recent wireless measurement studies and establish analytical models with tractable solutions for various types of wireless multiple access networks. In particular, we characterize the stability region of IEEE 802.11 networks under partial interference with two potentially unsaturated links numerically. We also provide a closed-form solution for the stability region of slotted ALOHA networks under partial interference with two potentially unsaturated links and obtain a partial characterization of the boundary of the stability region for the general M-link case. Finally, we derive a closed-form approximated solution for the stability region for general M-link slotted ALOHA system under partial interference effects. Based on our results, we demonstrate that it is important to model the partial interference effects while analyzing wireless multiple access networks. This is because such considerations can result in not only significant quantitative differences in the predicted system capacity but also fundamental qualitative changes in the shape of the stability region of the systems.

  19. Privacy policies for health social networking sites

    Science.gov (United States)

    Li, Jingquan

    2013-01-01

    Health social networking sites (HSNS), virtual communities where users connect with each other around common problems and share relevant health data, have been increasingly adopted by medical professionals and patients. The growing use of HSNS like Sermo and PatientsLikeMe has prompted public concerns about the risks that such online data-sharing platforms pose to the privacy and security of personal health data. This paper articulates a set of privacy risks introduced by social networking in health care and presents a practical example that demonstrates how the risks might be intrinsic to some HSNS. The aim of this study is to identify and sketch the policy implications of using HSNS and how policy makers and stakeholders should elaborate upon them to protect the privacy of online health data. PMID:23599228

  20. Privacy policies for health social networking sites.

    Science.gov (United States)

    Li, Jingquan

    2013-01-01

    Health social networking sites (HSNS), virtual communities where users connect with each other around common problems and share relevant health data, have been increasingly adopted by medical professionals and patients. The growing use of HSNS like Sermo and PatientsLikeMe has prompted public concerns about the risks that such online data-sharing platforms pose to the privacy and security of personal health data. This paper articulates a set of privacy risks introduced by social networking in health care and presents a practical example that demonstrates how the risks might be intrinsic to some HSNS. The aim of this study is to identify and sketch the policy implications of using HSNS and how policy makers and stakeholders should elaborate upon them to protect the privacy of online health data.

  1. Structural integration and performance of inter-sectoral public health-related policy networks: An analysis across policy phases

    NARCIS (Netherlands)

    Peters, D. T. J. M.; Raab, J.; Grêaux, K. M.; Stronks, K.; Harting, J.

    2017-01-01

    Background: Inter-sectoral policy networks may be effective in addressing environmental determinants of health with interventions. However, contradictory results are reported on relations between structural network characteristics (i.e., composition and integration) and network performance, such as

  2. Structural integration and performance of inter-sectoral public health-related policy networks : An analysis across policy phases

    NARCIS (Netherlands)

    Peters, Dorothee; Raab, J.; Grêaux, Kimberley M.; Stronks, Karien; Harting, Janneke

    2017-01-01

    Background: Inter-sectoral policy networks may be effective in addressing environmental determinants of health with interventions. However, contradictory results are reported on relations between structure and network characteristics (i.e., composition and integration) and network performance, such

  3. Design mobile satellite system architecture as an integral part of the cellular access digital network

    Science.gov (United States)

    Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.

    1988-01-01

    The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.

  4. Service Class Resource Management For Green Wireless-Optical Broadband Access NetworksWOBAN

    Directory of Open Access Journals (Sweden)

    SRUTHY.S

    2015-08-01

    Full Text Available Abstract-Broadband access networks have become an essential part of worldwide communication systems because of the exponential growth of broadband services such as video on demand high definition TV internet protocol TV and video conferencing. Exponential growth in the volume of wireless data boosted by the growing popularity of mobile devices such as smartphone and tablets has forced the telecommunication industries to rethink the way networks are currently designed and to focus on the development of high-capacity mobile broadband networks. In response to this challenge researchers have been working toward the development of an integrated wireless optical broadband access network. Two major candidate technologies which are currently known for their high capacity as well as quality of service QoS for multimedia traffic are passive optical networks PON and fourth generation 4G wireless networks. PON is a wired access technology well known for its cost efficiency and high capacity whereas 4G is a wireless broadband access technology which has achieved broad market acceptance because of its ease of deployment ability to offer mobility and its cost efficiency. Integration of PON and 4G technologies in the form of wireless-optical broadband access networks offers advantages such as extension of networks in rural areas support for mobile broadband services and quick deployment of broadband networks. These two technologies however have different design architectures for handling broadband services that require quality of service. For example 4G networks use traffic classification for supporting different QoS demands whereas the PON architecture has no such mechanism to differentiate between types of traffic. These two technologies also differ in their power saving mechanisms. Propose a service class mapping for the integrated PON-4G network which is based on the MG1 queuing model and class-based power saving mechanism which significantly improves the

  5. The NPC: A Higher Priority for Networking Policy

    Science.gov (United States)

    Kuhns, Jeff C.

    2006-01-01

    This article discusses the scope of activities of the Network Policy Council (NPC), which has been designed to provide a more direct channel of communications within EDUCAUSE and to provide policy formulation more visibility. The NPC is an advisory council to EDUCAUSE whose members are selected from those who have interest in this area and are…

  6. Hopping control channel MAC protocol for opportunistic spectrum access networks

    Institute of Scientific and Technical Information of China (English)

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  7. Modeling Social Capital as Dynamic Networks to Promote Access to Oral Healthcare.

    Science.gov (United States)

    Wang, Hua; Northridge, Mary E; Kunzel, Carol; Zhang, Qiuyi; Kum, Susan S; Gilbert, Jessica L; Jin, Zhu; Metcalf, Sara S

    2016-01-01

    Social capital, as comprised of human connections in social networks and their associated benefits, is closely related to the health of individuals, communities, and societies at large. For disadvantaged population groups such as older adults and racial/ethnic minorities, social capital may play a particularly critical role in mitigating the negative effects and reinforcing the positive effects on health. In this project, we model social capital as both cause and effect by simulating dynamic networks. Informed in part by a community-based health promotion program, an agent-based model is contextualized in a GIS environment to explore the complexity of social disparities in oral and general health as experienced at the individual, interpersonal, and community scales. This study provides the foundation for future work investigating how health and healthcare accessibility may be influenced by social networks.

  8. Association of State Access Standards With Accessibility to Specialists for Medicaid Managed Care Enrollees.

    Science.gov (United States)

    Ndumele, Chima D; Cohen, Michael S; Cleary, Paul D

    2017-10-01

    Medicaid recipients have consistently reported less timely access to specialists than patients with other types of coverage. By 2018, state Medicaid agencies will be required by the Center for Medicare and Medicaid Services (CMS) to enact time and distance standards for managed care organizations to ensure an adequate supply of specialist physicians for enrollees; however, there have been no published studies of whether these policies have significant effects on access to specialty care. To compare ratings of access to specialists for adult Medicaid and commercial enrollees before and after the implementation of specialty access standards. We used Consumer Assessment of Healthcare Providers and Systems survey data to conduct a quasiexperimental difference-in-differences (DID) analysis of 20 163 nonelderly adult Medicaid managed care (MMC) enrollees and 54 465 commercially insured enrollees in 5 states adopting access standards, and 37 290 MMC enrollees in 5 matched states that previously adopted access standards. Reported access to specialty care in the previous 6 months. Seven thousand six hundred ninety-eight (69%) Medicaid enrollees and 28 423 (75%) commercial enrollees reported that it was always or usually easy to get an appointment with a specialist before the policy implementation (or at baseline) compared with 11 889 (67%) of Medicaid enrollees in states that had previously implemented access standards. Overall, there was no significant improvement in timely access to specialty services for MMC enrollees in the period following implementation of standard(s) (adjusted difference-in-differences, -1.2 percentage points; 95% CI, -2.7 to 0.1), nor was there any impact of access standards on insurance-based disparities in access (0.6 percentage points; 95% CI, -4.3 to 5.4). There was heterogeneity across states, with 1 state that implemented both time and distance standards demonstrating significant improvements in access and reductions in disparities

  9. User experience with a health insurance coverage and benefit-package access: implications for policy implementation towards expansion in Nigeria.

    Science.gov (United States)

    Mohammed, Shafiu; Aji, Budi; Bermejo, Justo Lorenzo; Souares, Aurelia; Dong, Hengjin; Sauerborn, Rainer

    2016-04-01

    Developing countries are devising strategies and mechanisms to expand coverage and benefit-package access for their citizens through national health insurance schemes (NHIS). In Nigeria, the scheme aims to provide affordable healthcare services to insured-persons and their dependants. However, inclusion of dependants is restricted to four biological children and a spouse per user. This study assesses the progress of implementation of the NHIS in Nigeria, relating to coverage and benefit-package access, and examines individual factors associated with the implementation, according to users' perspectives. A retrospective, cross-sectional survey was done between October 2010 and March 2011 in Kaduna state and 796 users were randomly interviewed. Questions regarding coverage of immediate-family members and access to benefit-package for treatment were analysed. Indicators of coverage and benefit-package access were each further aggregated and assessed by unit-weighted composite. The additive-ordinary least square regression model was used to identify user factors that may influence coverage and benefit-package access. With respect to coverage, immediate-dependants were included for 62.3% of the users, and 49.6 rated this inclusion 'good' (49.6%). In contrast, 60.2% supported the abolishment of the policy restriction for non-inclusion of enrolees' additional children and spouses. With respect to benefit-package access, 82.7% of users had received full treatments, and 77.6% of them rated this as 'good'. Also, 14.4% of users had been refused treatments because they could not afford them. The coverage of immediate-dependants was associated with age, sex, educational status, children and enrolment duration. The benefit-package access was associated with types of providers, marital status and duration of enrolment. This study revealed that coverage of family members was relatively poor, while benefit-package access was more adequate. Non-inclusion of family members could

  10. Research and Design of Dynamic Migration Access Control Technology Based on Heterogeneous Network

    Directory of Open Access Journals (Sweden)

    Wang Feng

    2017-01-01

    Full Text Available With the continuous development of wireless networks, the amount of privacy services in heterogeneous mobile networks is increasing, such as information storage, user access, and so on. Access control security issues for heterogeneous mobile radio network, this paper proposes a dynamic migration access control technology based on heterogeneous network. Through the system architecture of the mutual trust system, we can understand the real-time mobile node failure or abnormal state. To make the service can be terminated for the node. And adopt the 802.1X authentication way to improve the security of the system. Finally, it by combining the actual running test data, the trust update algorithm of the system is optimized to reduce the actual security threats in the environment. Experiments show that the system’s anti-attack, the success rate of access, bit error rate is in line with the expected results. This system can effectively reduce the system authentication information is illegally obtained after the network security protection mechanism failure and reduce the risk of user data leakage.

  11. Network Security: Policies and Guidelines for Effective Network Management

    Directory of Open Access Journals (Sweden)

    Jonathan Gana KOLO

    2008-12-01

    Full Text Available Network security and management in Information and Communication Technology (ICT is the ability to maintain the integrity of a system or network, its data and its immediate environment. The various innovations and uses to which networks are being put are growing by the day and hence are becoming complex and invariably more difficult to manage by the day. Computers are found in every business such as banking, insurance, hospital, education, manufacturing, etc. The widespread use of these systems implies crime and insecurity on a global scale. In addition, the tremendous benefits brought about by Internet have also widened the scope of crime and insecurity at an alarming rate. Also, ICT has fast become a primary differentiator for institution/organization leaders as it offers effective and convenient means of interaction with each other across the globe. This upsurge in the population of organizations depending on ICT for business transaction has brought with it a growing number of security threats and attacks on poorly managed and secured networks primarily to steal personal data, particularly financial information and password.This paper therefore proposes some policies and guidelines that should be followed by network administrators in organizations to help them ensure effective network management and security of ICT facilities and data.

  12. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP

    Directory of Open Access Journals (Sweden)

    Dan Garcia-Carrillo

    2017-11-01

    Full Text Available The Internet-of-Things (IoT landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN, the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP, which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA infrastructures and the Extensible Authentication Protocol (EAP protocol. For this integration, we use the Constrained Application Protocol (CoAP to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  13. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.

    Science.gov (United States)

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-11-17

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  14. The Role of Social Factors in the Accessibility of Urban Areas for People with Motor Disabilities

    Directory of Open Access Journals (Sweden)

    Amin Gharebaghi

    2018-03-01

    Full Text Available The United Nations Convention on the Rights of People with Disabilities recognizes the right of people with disabilities to attain full social participation without discrimination on the basis of disability. Furthermore, mobility is one of the most important life habits for achieving such participation. Providing people with disabilities with information regarding accessible paths and accessible urban places therefore plays a vital role in achieving these goals. The accessibility of urban places and pedestrian networks depends, however, on the interaction between human capabilities and environmental factors, and may be subdivided into physical or social factors. An optimal analysis of accessibility requires both kinds of factors, social as well as physical. Although there has been considerable work concerning the physical aspects of the environment, social aspects have been largely neglected. In this paper, we highlight the importance of the social dimension of environments and consider a more integrated approach for accessibility assessment. We highlight the ways by which social factors such as policies can be incorporated into accessibility assessment of pedestrian networks for people with motor disabilities. Furthermore, we propose a framework to assess the accessibility of pedestrian network segments that incorporates the confidence level of people with motor disabilities. This framework is then used as a tool to investigate the influence of different policies on accessibility conditions of pedestrian networks. The methodology is implemented in the Saint-Roch neighborhood in Quebec City and the effectiveness of three policy actions is examined by way of illustration.

  15. Studying Policy Transfer through the Lens of Social Network Analysis

    DEFF Research Database (Denmark)

    Staunæs, Dorthe; Brøgger, Katja; Steiner-Khamsi, Gita

    Studying Policy Transfer through the Lens of Social Network Analysis The panelists present the findings of a joint empirical research project carried out at Aarhus University (DPU/Copenhagen) and at Teachers College, Columbia University (New York). The research project succeeded to identify...... discursive networks of political stakeholders and policy advisors that were considered key actors in the Danish school reform. The research team investigated how these networks interrelate, change over time, and represent different constituents (government, academe, business), at times contradicting...... or collaborating with each other, respectively. Against the backdrop of globalization studies in comparative education, the research project attempted to identify borrowers, translators, and brokers of educational reform drawing on a complementary set of expertise from social network analysis methodology (Oren...

  16. The innovation of EU environmental policy

    DEFF Research Database (Denmark)

    actors involved. The seven case-study chapters, written from a variety of perspectives, focus on such topics as the impact of formal and informal institutional factors on policy innovation, the potential influence of new members on EU environmental policy-making, the role of cross-national networks...... and alliances, the shifting balance between leader and laggard members, and the ongoing problem integrating the environment into other policy fields. The book also draws on theoretical approaches ranging from institutional to policy network analyses and examines such pertinent contemporary issues as packaging......Inspired by the recent accession of three environmentally progressive member states to the European Union (EU), this book explores the process of environmental policy innovation in the EU, the forces behind the introduction of new issues and policy approaches, and the roles played by the major...

  17. Computer network access to scientific information systems for minority universities

    Science.gov (United States)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  18. Public support for alcohol policies associated with knowledge of cancer risk.

    Science.gov (United States)

    Buykx, Penny; Gilligan, Conor; Ward, Bernadette; Kippen, Rebecca; Chapman, Kathy

    2015-04-01

    Several options are advocated by policy experts to mitigate alcohol-related harms, although the most effective strategies often have the least public support. While knowledge of tobacco-related health risks predicts support for relevant public health measures, it is not known whether knowledge of alcohol health risks is similarly associated with the acceptability of policies intended to reduce alcohol consumption and related harms. This study aims to gauge public support for a range of alcohol policies and to determine whether or not support is associated with knowledge of a long-term health risk of alcohol consumption, specifically cancer. 2482 adults in New South Wales (NSW), Australia, participated in an online survey. Logistic regression analysis was used to examine the association between demographic data, alcohol consumption, smoking status, knowledge of alcohol as a risk factor for cancer and support for alcohol-related policies. Most participants were supportive of health warnings, restricting access to internet alcohol advertising to young people, and requiring information on national drinking guidelines on alcohol containers. Almost half of participants supported a ban on sport sponsorship, while less than 41% supported price increases, volumetric taxation, or reducing the number of retail outlets. Only 47% of participants identified drinking too much alcohol as a risk factor for cancer. Knowledge of alcohol as a risk factor for cancer was a significant predictor of support for all policies, while level of alcohol consumption had a significant inverse relationship with policy support. The finding that support for alcohol management policies is associated with awareness that drinking too much alcohol may contribute to cancer could assist in the planning of future public health interventions. Improving awareness of the long term health risks of alcohol consumption may be one avenue to increasing public support for effective alcohol harm-reduction policies

  19. Upgrade of hybrid fibre coax networks towards bi-directional access

    NARCIS (Netherlands)

    Khoe, G.D.; Wolters, R.P.C.; Boom, van den H.P.A.; Prati, G.

    1997-01-01

    In this paper we describe an upgrade scenario for Hybrid Fibre Coax (HFC) CATV Networks towards hi-directional access. The communication system described has been newly designed, and is based on the use of Direct Sequence- Code Division Multiple-Access (DS-CDMA). Due to its spread-spectrum

  20. Global Network : Integration and Harmonization of ICT Policy and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC has invested in the development of three regional networks focused on issues of inclusive information and communication technology (ICT) policy and regulation: Latin America - REDIS/DIRSI (103371), Asia - LIRNEAsia (103017). Africa - LINK Centre (101584). The three regional research networks were built as ...

  1. DiffServ resource management in IP-based radio access networks

    NARCIS (Netherlands)

    Heijenk, Geert; Karagiannis, Georgios; Rexhepi, Vlora; Westberg, Lars; prof.dr. Prasad, R.; prof.dr. Bach Andersen, J.

    2001-01-01

    The increasing popularity of the Internet, the flexibility of IP, and the wide deployment of IP technologies, as well as the growth of mobile communications have driven the development of IP-based solutions for wireless networking. The introduction of IP-based transport in Radio Access Networks

  2. Knowledge Access in Rural Inter-connected Areas Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... and indigenous knowledge using information and communication technologies (ICTs) ... for research proposals on the aforementioned topics, action-research projects, ... Evaluating knowledge-sharing methods to improve land utilization and ...

  3. Optical code-division multiple-access networks

    Science.gov (United States)

    Andonovic, Ivan; Huang, Wei

    1999-04-01

    This review details the approaches adopted to implement classical code division multiple access (CDMA) principles directly in the optical domain, resulting in all optical derivatives of electronic systems. There are a number of ways of realizing all-optical CDMA systems, classified as incoherent and coherent based on spreading in the time and frequency dimensions. The review covers the basic principles of optical CDMA (OCDMA), the nature of the codes used in these approaches and the resultant limitations on system performance with respect to the number of stations (code cardinality), the number of simultaneous users (correlation characteristics of the families of codes), concluding with consideration of network implementation issues. The latest developments will be presented with respect to the integration of conventional time spread codes, used in the bulk of the demonstrations of these networks to date, with wavelength division concepts, commonplace in optical networking. Similarly, implementations based on coherent correlation with the aid of a local oscillator will be detailed and comparisons between approaches will be drawn. Conclusions regarding the viability of these approaches allowing the goal of a large, asynchronous high capacity optical network to be realized will be made.

  4. Open-Access Colleges Responsible for Greatest Gains in Graduation Rates. Policy Alert

    Science.gov (United States)

    Doyle, William R.

    2010-01-01

    The largest gains in graduation rates over the past decade have been accomplished at open-access or nearly open-access colleges and universities. In addition, states could see even bigger increases if they directed their policies and supports toward improving graduation rates at these nonselective institutions. These findings from the author's…

  5. Virus spreading in wireless sensor networks with a medium access control mechanism

    International Nuclear Information System (INIS)

    Wang Ya-Qi; Yang Xiao-Yuan

    2013-01-01

    In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. (general)

  6. Switched-based interference reduction scheme for open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh; Alouini, Mohamed-Slim

    2012-01-01

    coordination between access points is infeasible. This paper targets interference management in such overlaid networks. It is assumed that the femtocells employ the open-access strategy to reduce cross-tier interference, and can share resources concurrently

  7. The use of a policy dialogue to facilitate evidence-informed policy development for improved access to care: the case of the Winnipeg Central Intake Service (WCIS).

    Science.gov (United States)

    Damani, Zaheed; MacKean, Gail; Bohm, Eric; DeMone, Brie; Wright, Brock; Noseworthy, Tom; Holroyd-Leduc, Jayna; Marshall, Deborah A

    2016-10-18

    Policy dialogues are critical for developing responsive, effective, sustainable, evidence-informed policy. Our multidisciplinary team, including researchers, physicians and senior decision-makers, comprehensively evaluated The Winnipeg Central Intake Service, a single-entry model in Winnipeg, Manitoba, to improve patient access to hip/knee replacement surgery. We used the evaluation findings to develop five evidence-informed policy directions to help improve access to scheduled clinical services across Manitoba. Using guiding principles of public participation processes, we hosted a policy roundtable meeting to engage stakeholders and use their input to refine the policy directions. Here, we report on the use and input of a policy roundtable meeting and its role in contributing to the development of evidence-informed policy. Our evidence-informed policy directions focused on formal measurement/monitoring of quality, central intake as a preferred model for service delivery, provincial scope, transparent processes/performance indicators, and patient choice of provider. We held a policy roundtable meeting and used outcomes of facilitated discussions to refine these directions. Individuals from our team and six stakeholder groups across Manitoba participated (n = 44), including patients, family physicians, orthopaedic surgeons, surgical office assistants, Winnipeg Central Intake team, and administrators/managers. We developed evaluation forms to assess the meeting process, and collected decision-maker partners' perspectives on the value of the policy roundtable meeting and use of policy directions to improve access to scheduled clinical services after the meeting, and again 15 months later. We analyzed roundtable and evaluation data using thematic analysis to identify key themes. Four key findings emerged. First, participants supported all policy directions, with revisions and key implementation considerations identified. Second, participants felt the policy roundtable

  8. Beyond policy networks: policy framing and the politics of expertise in the 2001 Foot and Mouth Disease crisis.

    Science.gov (United States)

    Wilkinson, Katy; Lowe, Philip; Donaldson, Andrew

    2010-01-01

    For the past decade, the policy community/issue network typology of pressure group interaction has been used to explain policy outcomes and the policy-making process. To re-examine the validity of this typology, the paper focuses on the UK government's response to the 2001 Foot and Mouth Disease (FMD) crisis, and in particular the decision to pursue contiguous culling rather than vaccination to overcome the epidemic. Rather than illustrating the emergence of an issue network in agricultural policy, the decision-making process of the FMD outbreak demonstrates continuity with prior crises. In addition, the politicization of scientific expertise is identified as an emerging trend in crisis management. Policy framing is used to explain the impetus behind the contiguous cull decision, concluding that the legacy of previous policy choices conditioned the crisis response to a far greater degree than contemporaneous pressure group action.

  9. Energy efficiency for cloud-radio access networks with imperfect channel state information

    KAUST Repository

    Al-Oquibi, Bayan; Amin, Osama; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2016-01-01

    metric in next generation wireless systems (5G). Cloud radio access network (C-RAN), a promising 5G network architecture, provides an efficient framework for improving the EE performance, by means of coordinating the transmission across the network

  10. Understanding the political economy and key drivers of energy access in addressing national energy access priorities and policies

    International Nuclear Information System (INIS)

    Rehman, I.H.; Kar, Abhishek; Banerjee, Manjushree; Kumar, Preeth; Shardul, Martand; Mohanty, Jeevan; Hossain, Ijaz

    2012-01-01

    Globally, 1.5 billion people lack access to electricity and nearly 3 billion lack access to modern cooking energy options. Of the world’s “energy poor”, 95% are in Asia and Sub-Saharan Africa. Within Asia, almost 80% of electricity-deprived and 86% of biomass-dependent populations are in the “Big 5” countries: Bangladesh, China, India, Indonesia, and Pakistan. In this paper, we discuss the broad contours of the political economy of energy access in these countries. The political economy is assessed through an examination of three sustainability objectives: accessibility of physical infrastructure; energy service delivery; and conformance to social goals. The key areas of concern include emphasis on supply-driven grid electricity; vested power dynamics favouring affluent and urban areas; unreliability of energy service provision; and misdirected and misappropriated subsidies. The above-mentioned issues are responsible for limiting accelerated achievement of universal energy access in the “Big 5” countries and need to be addressed through innovative approaches. The paper emphasizes the need for firm commitments, policy convergence, and the implementation of 'pro-poor' equitable energy policies through a broad-based energy framework of bench-marked, technology-neutral energy provisioning that ensures reliability and equity. It highlights the need for reorienting of the subsidy regime and incorporating energy service delivery indicators in monitoring and reporting mechanisms. - Highlights: ► Limited emphasis on improved cooking programmes relative to electrification schemes. ► Strong disparity between rural and urban electrification and LPG access. ► Grid extension and subsidy on cooking fuels has limited success. ► Electricity access does not indicate transition to better cooking options. ► Technology neutrality in choosing suitable alternatives may led to improved access. ► There is need to re-orient energy subsidies and incentives.

  11. Energy Saving Scheme Based On Traffic Forwarding For Optical Fiber Access Networks

    DEFF Research Database (Denmark)

    Lopez, G. Arturo Rodes; Estaran Tolosa, Jose Manuel; Vegas Olmos, Juan José

    2013-01-01

    We report on an energy saving block that regroups and powers off OLTs during low traffic periods, resulting in energy savings up to 87,5% in the central office of optical access networks.......We report on an energy saving block that regroups and powers off OLTs during low traffic periods, resulting in energy savings up to 87,5% in the central office of optical access networks....

  12. Highly Reliable PON Optical Splitters for Optical Access Networks in Outside Environments

    Science.gov (United States)

    Watanabe, Hiroshi; Araki, Noriyuki; Fujimoto, Hisashi

    Broadband optical access services are spreading throughout the world, and the number of fiber to the home (FTTH) subscribers is increasing rapidly. Telecom operators are constructing passive optical networks (PONs) to provide optical access services. Externally installed optical splitters for PONs are very important passive devices in optical access networks, and they must provide satisfactory performance as outdoor plant over long periods. Therefore, we calculate the failure rate of optical access networks and assign a failure rate to the optical splitters in optical access networks. The maximum cumulative failure rate of 1 × 8 optical splitters was calculated as 0.025 for an optical access fiber length of 2.1km and a 20-year operating lifetime. We examined planar lightwave circuit (PLC) type optical splitters for use as outside plant in terms of their optical characteristics and environmental reliability. We confirmed that PLC type optical splitters have sufficient optical performance for a PON splitter and sufficient reliability as outside plant in accordance with ITU-T standard values. We estimated the lifetimes of three kinds of PLC type optical splitters by using accelerated aging tests. The estimated failure rate of these splitters installed in optical access networks was below the target value for the cumulative failure rate, and we confirmed that they have sufficient reliability to maintain the quality of the network service. We developed 1 × 8 optical splitter modules with plug and socket type optical connectors and optical fiber cords for optical aerial closures designed for use as outside plant. These technologies make it easy to install optical splitters in an aerial optical closure. The optical splitter modules have sufficient optical performance levels for PONs because the insertion loss at the commercially used wavelengths of 1.31 and 1.55µm is less than the criterion established by ITU-T Recommendation G.671 for optical splitters. We performed a

  13. On Optimal Policies for Network-Coded Cooperation

    DEFF Research Database (Denmark)

    Khamfroush, Hana; Roetter, Daniel Enrique Lucani; Pahlevani, Peyman

    2015-01-01

    Network-coded cooperative communication (NC-CC) has been proposed and evaluated as a powerful technology that can provide a better quality of service in the next-generation wireless systems, e.g., D2D communications. Previous contributions have focused on performance evaluation of NC-CC scenarios...... rather than searching for optimal policies that can minimize the total cost of reliable packet transmission. We break from this trend by initially analyzing the optimal design of NC-CC for a wireless network with one source, two receivers, and half-duplex erasure channels. The problem is modeled...... as a special case of Markov decision process (MDP), which is called stochastic shortest path (SSP), and is solved for any field size, arbitrary number of packets, and arbitrary erasure probabilities of the channels. The proposed MDP solution results in an optimal transmission policy per time slot, and we use...

  14. Future Scenarios for Software-Defined Metro and Access Networks and Software-Defined Photonics

    Directory of Open Access Journals (Sweden)

    Tommaso Muciaccia

    2017-01-01

    Full Text Available In recent years, architectures, devices, and components in telecommunication networks have been challenged by evolutionary and revolutionary factors which are drastically changing the traffic features. Most of these changes imply the need for major re-configurability and programmability not only in data-centers and core networks, but also in the metro-access segment. In a wide variety of contexts, this necessity has been addressed by the proposed introduction of the innovative paradigm of software-defined networks (SDNs. Several solutions inspired by the SDN model have been recently proposed also for metro and access networks, where the adoption of a new generation of software-defined reconfigurable integrated photonic devices is highly desirable. In this paper, we review the possible future application scenarios for software-defined metro and access networks and software-defined photonics (SDP, on the base of analytics, statistics, and surveys. This work describes the reasons underpinning the presented radical change of paradigm and summarizes the most significant solutions proposed in literature, with a specific emphasis to physical-layer reconfigurable networks and a focus on both architectures and devices.

  15. The association between access to public transportation and self-reported active commuting.

    Science.gov (United States)

    Djurhuus, Sune; Hansen, Henning S; Aadahl, Mette; Glümer, Charlotte

    2014-12-05

    Active commuting provides routine-based regular physical activity which can reduce the risk of chronic diseases. Using public transportation involves some walking or cycling to a transit stop, transfers and a walk to the end location and users of public transportation have been found to accumulate more moderate physical activity than non-users. Understanding how public transportation characteristics are associated with active transportation is thus important from a public health perspective. This study examines the associations between objective measures of access to public transportation and self-reported active commuting. Self-reported time spent either walking or cycling commuting each day and the distance to workplace were obtained for adults aged 16 to 65 in the Danish National Health Survey 2010 (n = 28,928). Access to public transportation measures were computed by combining GIS-based road network distances from home address to public transit stops an integrating their service level. Multilevel logistic regression was used to examine the association between access to public transportation measures and active commuting. Distance to bus stop, density of bus stops, and number of transport modes were all positively associated with being an active commuter and with meeting recommendations of physical activity. No significant association was found between bus services at the nearest stop and active commuting. The results highlight the importance of including detailed measurements of access to public transit in order to identify the characteristics that facilitate the use of public transportation and active commuting.

  16. The Association between Access to Public Transportation and Self-Reported Active Commuting

    Directory of Open Access Journals (Sweden)

    Sune Djurhuus

    2014-12-01

    Full Text Available Active commuting provides routine-based regular physical activity which can reduce the risk of chronic diseases. Using public transportation involves some walking or cycling to a transit stop, transfers and a walk to the end location and users of public transportation have been found to accumulate more moderate physical activity than non-users. Understanding how public transportation characteristics are associated with active transportation is thus important from a public health perspective. This study examines the associations between objective measures of access to public transportation and self-reported active commuting. Self-reported time spent either walking or cycling commuting each day and the distance to workplace were obtained for adults aged 16 to 65 in the Danish National Health Survey 2010 (n = 28,928. Access to public transportation measures were computed by combining GIS-based road network distances from home address to public transit stops an integrating their service level. Multilevel logistic regression was used to examine the association between access to public transportation measures and active commuting. Distance to bus stop, density of bus stops, and number of transport modes were all positively associated with being an active commuter and with meeting recommendations of physical activity. No significant association was found between bus services at the nearest stop and active commuting. The results highlight the importance of including detailed measurements of access to public transit in order to identify the characteristics that facilitate the use of public transportation and active commuting.

  17. The Design of Passive Optical Networking+Ethernet over Coaxial Cable Access Networking and Video-on-Demand Services Carrying

    Science.gov (United States)

    Ji, Wei

    2013-07-01

    Video on demand is a very attractive service used for entertainment, education, and other purposes. The design of passive optical networking+Ethernet over coaxial cable accessing and a home gateway system is proposed. The network integrates the passive optical networking and Ethernet over coaxial cable to provide high dedicated bandwidth for the metropolitan video-on-demand services. Using digital video broadcasting, IP television protocol, unicasting, and broadcasting mechanisms maximizes the system throughput. The home gateway finishes radio frequency signal receiving and provides three kinds of interfaces for high-definition video, voice, and data, which achieves triple-play and wire/wireless access synchronously.

  18. Balancing Relations and Results in Regional Networks of Public-Policy Implementation

    NARCIS (Netherlands)

    Klaster, E.; Wilderom, Celeste P.M.; Muntslag, Dennis R.

    2017-01-01

    Regional networks have become popular routes for central governments to translate national ambitions into regional policies and actions; but these networks face challenges, having to balance between the dual objectives of obtaining short-term goals and establishing enduring network relations. This

  19. Access, expansion and equity in Higher Education: new challenges for Brazilian education policy

    Directory of Open Access Journals (Sweden)

    Clarissa Eckert Baeta Neves

    Full Text Available Higher education has come to be included in the list of items considered to be of priority and of strategic importance for the future of a nation: a generally accepted conviction that development requires an ever increasing level of education in the population. In Brazil, however, only 10.6% of those aged between 18 and 24 manage to enter higher education. How to increase access and obtain greater equity whilst providing quality education is a central issue in education policy. In the last decade solutions have been proposed to provide greater access and equity based on the diversification of the system with the creation of new types of HEIs, new types and modalities of courses, as well as those proposals including affirmative action (PROUNI and the policy of quotas. The analysis of statistical data, interviews, documents, and legislation reveals the current situation: the amplification of access as well as the implementation of social inclusion policies, has, particularly in the private higher education sector, resulted in the production of a socially perverse democratization effect.

  20. Open Access Policies of Research Funders: The Case Study of the Austrian Science Fund (FWF)

    OpenAIRE

    Tonto, Yaşar; Doğan, Güleda; Al, Umut; Madran, Orçun

    2015-01-01

    The Austrian Science Fund (FWF) is the main funder for basic research in Austria. FWF has been instrumental in promoting Open Access in Austria and elsewhere and possesses a strong Open Access policy for the research it funds. This case study presents FWF as a good practice of an effective funder policy on account of its comprehensive strategy and multi-faceted approach for implementing and supporting it.

  1. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  2. An access alternative for mobile satellite networks

    Science.gov (United States)

    Wu, W. W.

    1988-01-01

    Conceptually, this paper discusses strategies of digital satellite communication networks for a very large number of low density traffic stations. These stations can be either aeronautical, land mobile, or maritime. The techniques can be applied to international, domestic, regional, and special purpose satellite networks. The applications can be commercial, scientific, military, emergency, navigational or educational. The key strategy is the use of a non-orthogonal access method, which tolerates overlapping signals. With n being either time or frequency partitions, and with a single overlapping signal allowed, a low cost mobile satellite system can be designed with n squared (n squared + n + 1) number of terminals.

  3. Principles of Eliminating Access Control Lists within a Domain

    Directory of Open Access Journals (Sweden)

    Vic Grout

    2012-04-01

    Full Text Available The infrastructure of large networks is broken down into areas that have a common security policy called a domain. Security within a domain is commonly implemented at all nodes. However this can have a negative effect on performance since it introduces a delay associated with packet filtering. When Access Control Lists (ACLs are used within a router for this purpose then a significant overhead is introduced associated with this process. It is likely that identical checks are made at multiple points within a domain prior to a packet reaching its destination. Therefore by eliminating ACLs within a domain by modifying the ingress/egress points with equivalent functionality an improvement in the overall performance can be obtained. This paper considers the effect of the delays when using router operating systems offering different levels of functionality. It considers factors which contribute to the delay particularly due to ACLs and by using theoretical principles modified by practical calculation a model is created. Additionally this paper provides an example of an optimized solution which reduces the delay through network routers by distributing the security rules to the ingress/egress points of the domain without affecting the security policy.

  4. Health in All Policies (HiAP) governance: lessons from network governance.

    Science.gov (United States)

    Khayatzadeh-Mahani, Akram; Ruckert, Arne; Labonté, Ronald; Kenis, Patrick; Akbari-Javar, Mohammad Reza

    2018-05-25

    The Health in All Policies (HiAP) approach requires formal and sustained governance structures and mechanisms to ensure that the policies of various non-health sectors maximize positive and minimize negative impacts on population health. In this paper, we demonstrate the usefulness of a network perspective in understanding and contributing to the effectiveness of HiAP. We undertook an exploratory, qualitative case study of a HiAP structure in Iran, the Kerman province Council of Health and Food Security (CHFS) with diverse members from health and non-health sectors. We analyzed relevant policy texts and interviewed 32 policy actors involved in the CHFS. Data were analyzed using within-case analysis and constant comparative methodology. Our findings suggest that CHFS governance from a network perspective drew in practice on elements of two competing network governance modes: the network administrative organization (NAO) and the lead organization mode. Our results also show that a shift from a hierarchical and market-based mode of interaction to a network logic within CHFS has not yet taken place. In addition, CHFS suffers from large membership and an inability to address complex 'wicked problems', as well as low trust, legitimacy and goal consensus among its members. Drawing on other HiAP studies and commentaries, insights from organization network theory, and in-depth findings from our case study, we conclude that a NAO may be the most effective mode of governance for tackling complex social problems in HiAP structures. Since similar studies are limited, and our single case study may not be transferable across all contexts, we suggest that further research be undertaken to explore HiAP structures from a network perspective in different institutional and cultural settings. With increasing emphasis given to HiAP approaches in national and international health policy discourse, it is important that comparative knowledge about the effectiveness of HiAP governance

  5. Power Allocation and Outage Probability Analysis for SDN-based Radio Access Networks

    Science.gov (United States)

    Zhao, Yongxu; Chen, Yueyun; Mai, Zhiyuan

    2018-01-01

    In this paper, performance of Access network Architecture based SDN (Software Defined Network) is analyzed with respect to the power allocation issue. A power allocation scheme PSO-PA (Particle Swarm Optimization-power allocation) algorithm is proposed, the proposed scheme is subjected to constant total power with the objective of minimizing system outage probability. The entire access network resource configuration is controlled by the SDN controller, then it sends the optimized power distribution factor to the base station source node (SN) and the relay node (RN). Simulation results show that the proposed scheme reduces the system outage probability at a low complexity.

  6. How Can Pricing and Reimbursement Policies Improve Affordable Access to Medicines? Lessons Learned from European Countries.

    Science.gov (United States)

    Vogler, Sabine; Paris, Valérie; Ferrario, Alessandra; Wirtz, Veronika J; de Joncheere, Kees; Schneider, Peter; Pedersen, Hanne Bak; Dedet, Guillaume; Babar, Zaheer-Ud-Din

    2017-06-01

    This article discusses pharmaceutical pricing and reimbursement policies in European countries with regard to their ability to ensure affordable access to medicines. A frequently applied pricing policy is external price referencing. While it provides some benchmark for policy-makers and has been shown to be able to generate savings, it may also contribute to delay in product launch in countries where medicine prices are low. Value-based pricing has been proposed as a policy that promotes access while rewarding useful innovation; however, implementing it has proven quite challenging. For high-priced medicines, managed-entry agreements are increasingly used. These agreements allow policy-makers to manage uncertainty and obtain lower prices. They can also facilitate earlier market access in case of limited evidence about added therapeutic value of the medicine. However, these agreements raise transparency concerns due to the confidentiality clause. Tendering as used in the hospital and offpatent outpatient sectors has been proven to reduce medicine prices but it requires a robust framework and appropriate design with clear strategic goals in order to prevent shortages. These pricing and reimbursement policies are supplemented by the widespread use of Health Technology Assessment to inform decision-making, and by strategies to improve the uptake of generics, and also biosimilars. While European countries have been implementing a set of policy options, there is a lack of thorough impact assessments of several pricing and reimbursement policies on affordable access. Increased cooperation between authorities, experience sharing and improving transparency on price information, including the disclosure of confidential discounts, are opportunities to address current challenges.

  7. Understanding the tariff. Access to the public power transportation network

    International Nuclear Information System (INIS)

    2002-01-01

    Since the European directive of December 19, 1996 about the common rules of the European power market, the eligible companies can chose their power supplier anywhere in Europe. The manager of the French power transportation network (RTE) supplies a network access to these companies according to a tariff fixed by the decree no. 2002-1014 from July 19, 2002. The aim of this document is to explain this tariff: tariffing principles ('mail-stamp' principle, voltage domain, subscribed output power tariffs, input power tariffs), tariffing elements (access to the grid, elements of output tariffs (subscribed power, overload, emergency tariffs, modifications etc..)), invoicing modalities, output tariffs, definitions. (J.S.)

  8. Networks in Action: New Actors and Practices in Education Policy in Brazil

    Science.gov (United States)

    Shiroma, Eneida Oto

    2014-01-01

    This paper focuses on the role of networks in the policy-making process in education and discusses the potential of network analysis as an analytical tool for education policy research. Drawing on publically available data from personal or institutional websites, this paper reports the findings from research carried out between 2005 and 2011.…

  9. Network governance of active employment policy

    DEFF Research Database (Denmark)

    Damgaard, Bodil; Torfing, Jacob

    2010-01-01

    The recent reform of the Danish governance system in the field of active employment policy has been subject to fierce criticism, as many commentators fear that it is the beginning of the end of the Danish Model of active stakeholder involvement. Drawing on both quantitative and qualitative data, ......, the tight metagovernance of the LECs does not seem to straightjacket the LECs as there is a considerable scope for local policy making which makes it worthwhile for the social partners to participate in the local networks.......The recent reform of the Danish governance system in the field of active employment policy has been subject to fierce criticism, as many commentators fear that it is the beginning of the end of the Danish Model of active stakeholder involvement. Drawing on both quantitative and qualitative data......, this study aims to analyse the impact of the governance reform by assessing the initial experiences with the Local Employment Councils (LECs). The analysis shows that the LECs are relatively well-functioning and contribute to an effective and democratic governance of local employment policy. Furthermore...

  10. Network Asymmetries and Access Pricing in Cellular Telecommunications

    NARCIS (Netherlands)

    V. Kocsis

    2005-01-01

    textabstractNetwork shares and retail prices are not symmetric in the telecommunications market with multiple bottlenecks which give rise to new questions of access fee regulation. In this paper we consider a model with two types of asymmetry arising from different entry timing, i.e. a larger

  11. Improving access to skilled attendance at delivery: a policy brief for Uganda.

    Science.gov (United States)

    Nabudere, Harriet; Asiimwe, Delius; Amandua, Jacinto

    2013-04-01

    This study describes the process of production, findings for a policy brief on Increasing Access to Skilled Birth Attendance, and subsequent use of the report by policy makers and others from the health sector in Uganda. The methods used to prepare the policy brief use the SUPPORT Tools for evidence-informed health policy making. The problem that this evidence brief addresses was identified through an explicit priority setting process involving policy makers and other stakeholders, further clarification with key informant interviews of relevant policy makers, and review of relevant documents. A working group of national stakeholder representatives and external reviewers commented on and contributed to successive drafts of the report. Research describing the problem, policy options, and implementation considerations was identified by reviewing government documents, routinely collected data, electronic literature searches, contact with key informants, and reviewing the reference lists of relevant documents that were retrieved. The proportion of pregnant women delivering from public and private non-profit facilities was low at 34 percent in 2008/09. The three policy options discussed in the report could be adopted independently or complementary to the other to increase access to skilled care. The Ministry of Health in deliberating to provide intrapartum care at first level health facilities from the second level of care, requested for research evidence to support these decisions. Maternal waiting shelters and working with the private-for-profit sector to facilitate deliveries in health facilities are promising complementary interventions that have been piloted in both the public and private health sector. A combination of strategies is needed to effectively implement the proposed options as discussed further in this article. The policy brief report was used as a background document for two stakeholder dialogue meetings involving members of parliament, policy makers

  12. Accessing Wireless Sensor Networks Via Dynamically Reconfigurable Interaction Models

    Directory of Open Access Journals (Sweden)

    Maria Cecília Gomes

    2012-12-01

    Full Text Available The Wireless Sensor Networks (WSNs technology is already perceived as fundamental for science across many domains, since it provides a low cost solution for environment monitoring. WSNs representation via the service concept and its inclusion in Web environments, e.g. through Web services, supports particularly their open/standard access and integration. Although such Web enabled WSNs simplify data access, network parameterization and aggregation, the existing interaction models and run-time adaptation mechanisms available to clients are still scarce. Nevertheless, applications increasingly demand richer and more flexible accesses besides the traditional client/server. For instance, applications may require a streaming model in order to avoid sequential data requests, or the asynchronous notification of subscribed data through the publish/subscriber. Moreover, the possibility to automatically switch between such models at runtime allows applications to define flexible context-based data acquisition. To this extent, this paper discusses the relevance of the session and pattern abstractions on the design of a middleware prototype providing richer and dynamically reconfigurable interaction models to Web enabled WSNs.

  13. Quantifying the Error Associated with Alternative GIS-based Techniques to Measure Access to Health Care Services

    Directory of Open Access Journals (Sweden)

    Amy Mizen

    2015-11-01

    Full Text Available The aim of this study was to quantify the error associated with different accessibility methods commonly used by public health researchers. Network distances were calculated from each household to the nearest GP our study area in the UK. Household level network distances were assigned as the gold standard and compared to alternate widely used accessibility methods. Four spatial aggregation units, two centroid types and two distance calculation methods represent commonly used accessibility calculation methods. Spearman's rank coefficients were calculated to show the extent which distance measurements were correlated with the gold standard. We assessed the proportion of households that were incorrectly assigned to GP for each method. The distance method, level of spatial aggregation and centroid type were compared between urban and rural regions. Urban distances were less varied from the gold standard, with smaller errors, compared to rural regions. For urban regions, Euclidean distances are significantly related to network distances. Network distances assigned a larger proportion of households to the correct GP compared to Euclidean distances, for both urban and rural morphologies. Our results, stratified by urban and rural populations, explain why contradicting results have been reported in the literature. The results we present are intended to be used aide-memoire by public health researchers using geographical aggregated data in accessibility research.

  14. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed.......We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  15. The role of discourse and linguistic framing effects in sustaining high carbon energy policy-An accessible introduction

    International Nuclear Information System (INIS)

    Scrase, J. Ivan; Ockwell, David G.

    2010-01-01

    This paper seeks to provide an accessible introduction to the relevance to energy policy of a fundamental insight from the policy sciences. This concerns the role that the linguistic framing of policy problems and solutions can play in sustaining the dominance of existing policy positions. The paper introduces a discourse perspective to understanding the policy process and uses it to analyse four central goals pursued in energy policy: access, security, efficiency and environmental acceptability, drawing on examples from UK policy documents. It introduces readers to how, as well as requiring technical and economic solutions, a transition to a low carbon energy system will also require a 'reframing' of energy policy problems and solutions in a way that either connects with, or overrides the powerful discourses that shape energy policy today.

  16. Does the choice of neighbourhood supermarket access measure influence associations with individual-level fruit and vegetable consumption? A case study from Glasgow.

    Science.gov (United States)

    Thornton, Lukar E; Pearce, Jamie R; Macdonald, Laura; Lamb, Karen E; Ellaway, Anne

    2012-07-27

    Previous studies have provided mixed evidence with regards to associations between food store access and dietary outcomes. This study examines the most commonly applied measures of locational access to assess whether associations between supermarket access and fruit and vegetable consumption are affected by the choice of access measure and scale. Supermarket location data from Glasgow, UK (n = 119), and fruit and vegetable intake data from the 'Health and Well-Being' Survey (n = 1041) were used to compare various measures of locational access. These exposure variables included proximity estimates (with different points-of-origin used to vary levels of aggregation) and density measures using three approaches (Euclidean and road network buffers and Kernel density estimation) at distances ranging from 0.4 km to 5 km. Further analysis was conducted to assess the impact of using smaller buffer sizes for individuals who did not own a car. Associations between these multiple access measures and fruit and vegetable consumption were estimated using linear regression models. Levels of spatial aggregation did not impact on the proximity estimates. Counts of supermarkets within Euclidean buffers were associated with fruit and vegetable consumption at 1 km, 2 km and 3 km, and for our road network buffers at 2 km, 3 km, and 4 km. Kernel density estimates provided the strongest associations and were significant at a distance of 2 km, 3 km, 4 km and 5 km. Presence of a supermarket within 0.4 km of road network distance from where people lived was positively associated with fruit consumption amongst those without a car (coef. 0.657; s.e. 0.247; p0.008). The associations between locational access to supermarkets and individual-level dietary behaviour are sensitive to the method by which the food environment variable is captured. Care needs to be taken to ensure robust and conceptually appropriate measures of access are used and these should be

  17. Implementing evidence-based policy in a network setting: road safety policy in the Netherlands.

    Science.gov (United States)

    Bax, Charlotte; de Jong, Martin; Koppenjan, Joop

    2010-01-01

    In the early 1990s, in order to improve road safety in The Netherlands, the Institute for Road Safety Research (SWOV) developed an evidence-based "Sustainable Safety" concept. Based on this concept, Dutch road safety policy, was seen as successful and as a best practice in Europe. In The Netherlands, the policy context has now changed from a sectoral policy setting towards a fragmented network in which safety is a facet of other transport-related policies. In this contribution, it is argued that the implementation strategy underlying Sustainable Safety should be aligned with the changed context. In order to explore the adjustments needed, two perspectives of policy implementation are discussed: (1) national evidence-based policies with sectoral implementation; and (2) decentralized negotiation on transport policy in which road safety is but one aspect. We argue that the latter approach matches the characteristics of the newly evolved policy context best, and conclude with recommendations for reformulating the implementation strategy.

  18. How State Taxes and Policies Targeting Soda Consumption Modify the Association between School Vending Machines and Student Dietary Behaviors: A Cross-Sectional Analysis

    OpenAIRE

    Taber, Daniel R.; Chriqui, Jamie F.; Vuillaume, Renee; Chaloupka, Frank J.

    2014-01-01

    Background: Sodas are widely sold in vending machines and other school venues in the United States, particularly in high school. Research suggests that policy changes have reduced soda access, but the impact of reduced access on consumption is unclear. This study was designed to identify student, environmental, or policy characteristics that modify the associations between school vending machines and student dietary behaviors. Methods: Data on school vending machine access and student diet we...

  19. Formal Specification and Validation of Secure Connection Establishment in a Generic Access Network Scenario

    DEFF Research Database (Denmark)

    Fleischer, Paul; Kristensen, Lars Michael

    2008-01-01

    The Generic Access Network (GAN) architecture is defined by the 3rd Generation Partnership Project (3GPP), and allows telephone services, such as SMS and voice-calls, to be accessed via generic IP networks. The main usage of this is to allow mobile phones to use WiFi in addition to the usual GSM...... network. The GAN specification relies on the Internet Protocol Security layer (IPSec) and the Internet Key Exchange protocol (IKEv2) to provide encryption across IP networks, and thus avoid compromising the security of the telephone networks. The detailed usage of these two Internet protocols (IPSec...

  20. Greening radio access networks using distributed base station architectures

    DEFF Research Database (Denmark)

    Kardaras, Georgios; Soler, José; Dittmann, Lars

    2010-01-01

    Several actions for developing environmentally friendly technologies have been taken in most industrial fields. Significant resources have also been devoted in mobile communications industry. Moving towards eco-friendly alternatives is primarily a social responsibility for network operators....... However besides this, increasing energy efficiency represents a key factor for reducing operating expenses and deploying cost effective mobile networks. This paper presents how distributed base station architectures can contribute in greening radio access networks. More specifically, the advantages...... energy saving. Different subsystems have to be coordinated real-time and intelligent network nodes supporting complicated functionalities are necessary. Distributed base station architectures are ideal for this purpose mainly because of their high degree of configurability and self...

  1. Community access networks: how to connect the next billion to the ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Community access networks: how to connect the next billion to the Internet. Despite recent progress with mobile technology diffusion, more than four billion people worldwide are unconnected and have limited access to global communication infrastructure. The cost of implementing connectivity infrastructure in underserved ...

  2. Resource Allocation for Cloud Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama

    2016-04-01

    Cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio system. In CRANs, joint signal processing is performed at multiple cloud computing centers (clouds) that are connected to several base stations (BSs) via high capacity backhaul links. As a result, large-scale interference management and network power consumption reduction can be effectively achieved. Unlike recent works on CRANs which consider a single cloud processing and treat inter-cloud interference as background noise, the first part of this thesis focuses on the more practical scenario of the downlink of a multi-cloud radio access network where BSs are connected to each cloud through wireline backhaul links. Assume that each cloud serves a set of pre-known single-antenna mobile users (MUs). This part focuses on minimizing the network total power consumption subject to practical constraints. The problems are solved using sophisticated techniques from optimization theory (e.g. Dual Decomposition-based algorithm and the alternating direction method of multipliers (ADMM)-based algorithm). One highlight of this part is that the proposed solutions can be implemented in a distributed fashion by allowing a reasonable information exchange between the coupled clouds. Additionally, feasible solutions of the considered optimization problems can be estimated locally at each iteration. Simulation results show that the proposed distributed algorithms converge to the centralized algorithms in a reasonable number of iterations. To further account of the backhaul congestion due to densification in CRANs, the second part of this thesis considers the downlink of a cache-enabled CRAN where each BS is equipped with a local-cache with limited size used to store the popular files without the need for backhauling. Further, each cache-enabled BS is connected to the cloud via limited capacity backhaul link and can serve a set of pre-known single antenna MUs. This part

  3. Efficient traffic grooming with dynamic ONU grouping for multiple-OLT-based access network

    Science.gov (United States)

    Zhang, Shizong; Gu, Rentao; Ji, Yuefeng; Wang, Hongxiang

    2015-12-01

    Fast bandwidth growth urges large-scale high-density access scenarios, where the multiple Passive Optical Networking (PON) system clustered deployment can be adopted as an appropriate solution to fulfill the huge bandwidth demands, especially for a future 5G mobile network. However, the lack of interaction between different optical line terminals (OLTs) results in part of the bandwidth resources waste. To increase the bandwidth efficiency, as well as reduce bandwidth pressure at the edge of a network, we propose a centralized flexible PON architecture based on Time- and Wavelength-Division Multiplexing PON (TWDM PON). It can provide flexible affiliation for optical network units (ONUs) and different OLTs to support access network traffic localization. Specifically, a dynamic ONU grouping algorithm (DGA) is provided to obtain the minimal OLT outbound traffic. Simulation results show that DGA obtains an average 25.23% traffic gain increment under different OLT numbers within a small ONU number situation, and the traffic gain will increase dramatically with the increment of the ONU number. As the DGA can be deployed easily as an application running above the centralized control plane, the proposed architecture can be helpful to improve the network efficiency for future traffic-intensive access scenarios.

  4. Metro-access integrated network based on optical OFDMA with dynamic sub-carrier allocation and power distribution.

    Science.gov (United States)

    Zhang, Chongfu; Zhang, Qiongli; Chen, Chen; Jiang, Ning; Liu, Deming; Qiu, Kun; Liu, Shuang; Wu, Baojian

    2013-01-28

    We propose and demonstrate a novel optical orthogonal frequency-division multiple access (OFDMA)-based metro-access integrated network with dynamic resource allocation. It consists of a single fiber OFDMA ring and many single fiber OFDMA trees, which transparently integrates metropolitan area networks with optical access networks. The single fiber OFDMA ring connects the core network and the central nodes (CNs), the CNs are on demand reconfigurable and use multiple orthogonal sub-carriers to realize parallel data transmission and dynamic resource allocation, meanwhile, they can also implement flexible power distribution. The remote nodes (RNs) distributed in the user side are connected by the single fiber OFDMA trees with the corresponding CN. The obtained results indicate that our proposed metro-access integrated network is feasible and the power distribution is agile.

  5. Changing access to mental health care and social support when people living with HIV/AIDS become service providers.

    Science.gov (United States)

    Li, Alan Tai-Wai; Wales, Joshua; Wong, Josephine Pui-Hing; Owino, Maureen; Perreault, Yvette; Miao, Andrew; Maseko, Precious; Guiang, Charlie

    2015-01-01

    As people living with HIV/AIDS (PHAs) achieve more stable health, many have taken on active peer support and professional roles within AIDS service organizations. Although the increased engagement has been associated with many improved health outcomes, emerging program and research evidence have identified new challenges associated with such transition. This paper reports on the results of a qualitative interpretive study that explored the effect of this role transition on PHA service providers' access to mental health support and self care. A total of 27 PHA service providers of diverse ethno-racial backgrounds took part in the study. Results show that while role transition often improves access to financial and health-care benefits, it also leads to new stress from workload demands, emotional triggers from client's narratives, feeling of burnout from over-immersion in HIV at both personal and professional levels, and diminished self care. Barriers to seeking support included: concerns regarding confidentiality; self-imposed and enacted stigma associated with accessing mental health services; and boundary issues resulting from changes in relationships with peers and other service providers. Evolving support mechanisms included: new formal and informal peer support networks amongst colleagues or other PHA service providers to address both personal and professional challenges, and having access to professional support offered through the workplace. The findings suggest the need for increased organizational recognition of HIV support work as a form of emotional labor that places complex demands on PHA service providers. Increased access to employer-provided mental health services, supportive workplace policies, and adequate job-specific training will contribute to reduced work-related stress. Community level strategies that support expansion of social networks amongst PHA service providers would reduce isolation. Systemic policies to increase access to insurance

  6. Individual public transportation accessibility is positively associated with self-reported active commuting

    DEFF Research Database (Denmark)

    Djurhuus, Sune; Hansen, Henning Sten; Aadahl, Mette

    2014-01-01

    BACKGROUND: Active commuters have lower risk of chronic disease. Understanding which of the, to some extent, modifiable characteristics of public transportation that facilitate its use is thus important in a public health perspective. The aim of the study was to examine the association between...... individual public transportation accessibility and self-reported active commuting, and whether the associations varied with commute distance, age, and gender. METHODS: Twenty-eight thousand nine hundred twenty-eight commuters in The Capital Region of Denmark reported self-reported time spent either walking...... or cycling to work or study each day and the distance to work or study. Data were obtained from the Danish National Health Survey collected in February to April 2010. Individual accessibility by public transportation was calculated using a multi-modal network in a GIS. Multilevel logistic regression was used...

  7. On Planning of FTTH Access Networks with and without Redundancy

    DEFF Research Database (Denmark)

    Riaz, M. Tahir; Haraldsson, Gustav; Gutierrez Lopez, Jose Manuel

    2010-01-01

    This paper presents a planning analysis of FTTH access network with and without redundancy. Traditionally, access networks are planned only without redundancy, which is mainly due to lowering the cost of deployment. As fiber optics provide a huge amount of capacity, more and more services are being...... offered on a single fiber connection. As a single point of failure in fiber connection can cause multiple service deprivation therefore redundancy is very crucial. In this work, an automated planning model was used to test different scenarios of implementation. A cost estimation is presented in terms...... of digging and amount of fiber used. Three topologies, including the traditional one “tree topology”, were test with combination of various passive optical technologies....

  8. Policies and programs to facilitate access to targeted cancer therapies in Thailand.

    Directory of Open Access Journals (Sweden)

    Rosarin Sruamsiri

    Full Text Available Increasing access to clinically beneficial targeted cancer medicines is a challenge in every country due to their high cost. We describe the interplay of innovative policies and programs involving multiple stakeholders to facilitate access to these medicines in Thailand, as well as the utilization of selected targeted therapies over time.We selected two medicines on the 2013 Thai national list of essential medicines (NLEM [letrozole and imatinib] and three unlisted medicines for the same indications [trastuzumab, nilotinib and dasatinib]. We created timelines of access policies and programs for these products based on scientific and grey literature. Using IMS Health sales data, we described the trajectories of sales volumes of the study medicines between January 2001 and December 2012. We compared estimated average numbers of patients treated before and after the implementation of policies and programs for each product.Different stakeholders implemented multiple interventions to increase access to the study medicines for different patient populations. During 2007-2009, the Thai Government created a special NLEM category with different coverage requirements for payers and issued compulsory licenses; payers negotiated prices with manufacturers and engaged in pooled procurement; pharmaceutical companies expanded patient assistance programs and lowered prices in different ways. Compared to before the interventions, estimated numbers of patients treated with each medicine increased significantly afterwards: for letrozole from 645 (95% CI 366-923 to 3683 (95% CI 2,748-4,618; for imatinib from 103 (95% CI 72-174 to 350 (95% CI 307-398; and for trastuzumab from 68 (95% CI 45-118 to 412 (95% CI 344-563.Government, payers, and manufacturers implemented multi-pronged approaches to facilitate access to targeted cancer therapies for the Thai population, which differed by medicine. Routine monitoring is needed to assess clinical and economic impacts of these

  9. Simulation and measurement of optical access network with different types of optical-fiber amplifiers

    Science.gov (United States)

    Latal, Jan; Vogl, Jan; Koudelka, Petr; Vitasek, Jan; Siska, Petr; Liner, Andrej; Papes, Martin; Vasinek, Vladimir

    2012-01-01

    The optical access networks are nowadays swiftly developing in the telecommunications field. These networks can provide higher data transfer rates, and have great potential to the future in terms of transmission possibilities. Many local internet providers responded to these facts and began gradually installing optical access networks into their originally built networks, mostly based on wireless communication. This allowed enlargement of possibilities for end-users in terms of high data rates and also new services such as Triple play, IPTV (Internet Protocol television) etc. However, with this expansion and building-up is also related the potential of reach in case of these networks. Big cities, such as Prague, Brno, Ostrava or Olomouc cannot be simply covered, because of their sizes and also because of their internal regulations given by various organizations in each city. Standard logical and also physical reach of EPON (IEEE 802.3ah - Ethernet Passive Optical Network) optical access network is about 20 km. However, for networks based on Wavelength Division Multiplex the reach can be up to 80 km, if the optical-fiber amplifier is inserted into the network. This article deals with simulation of different types of amplifiers for WDM-PON (Wavelength Division Multiplexing-Passive Optical Network) network in software application Optiwave OptiSystem and than are the values from the application and from real measurement compared.

  10. A Game-Theoretical Approach to Multimedia Social Networks Security

    Science.gov (United States)

    Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong

    2014-01-01

    The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders. PMID:24977226

  11. Policy framework on energy access and key development indicators: ECOWAS interventions and the case of Ghana

    International Nuclear Information System (INIS)

    Aglina, Moses Kwame; Agbejule, Adebayo; Nyamuame, Godwin Yao

    2016-01-01

    Energy has become the main driver for development as industries grow, agricultural sectors become more modernized, economies boom and countries become wealthy. There are still vast majority of people living under the poverty line especially in the ECOWAS region. The purpose of this study is to explore how improvements in energy access can be a key driver in economic development and progress in the ECOWAS region. Data for the study was obtained from the database of the World Bank. A regression analysis was carried out to establish the relationships between energy access and development indicators. The paper suggests the need for policy makers in the ECOWAS region to focus on targets, such as household access, consumption of electricity, and ease of use instead on supply targets that focus merely on physical coverage. A case on how Ghana is improving energy access is presented. - Highlights: • Energy policies in the ECOWAS region must focus on demand side targets. • Energy policies should target rural and peri-urban areas of the ECOWAS region. • Improved energy access requires a new supply chain energy model.

  12. Optimal Caching in Multicast 5G Networks with Opportunistic Spectrum Access

    KAUST Repository

    Emara, Mostafa

    2018-01-15

    Cache-enabled small base station (SBS) densification is foreseen as a key component of 5G cellular networks. This architecture enables storing popular files at the network edge (i.e., SBS caches), which empowers local communication and alleviates traffic congestions at the core/backhaul network. This paper develops a mathematical framework, based on stochastic geometry, to characterize the hit probability of a cache-enabled multicast 5G network with SBS multi-channel capabilities and opportunistic spectrum access. To this end, we first derive the hit probability by characterizing opportunistic spectrum access success probabilities, service distance distributions, and coverage probabilities. The optimal caching distribution to maximize the hit probability is then computed. The performance and trade-offs of the derived optimal caching distributions are then assessed and compared with two widely employed caching distribution schemes, namely uniform and Zipf caching, through numerical results and extensive simulations. It is shown that the Zipf caching almost optimal only in scenarios with large number of available channels and large cache sizes.

  13. User Centric Policy Management

    Science.gov (United States)

    Cheek, Gorrell P.

    2013-01-01

    Internet use, in general, and online social networking sites, in particular, are experiencing tremendous growth with hundreds of millions of active users. As a result, there is a tremendous amount of privacy information and content online. Protecting this information is a challenge. Access control policy composition is complex, laborious and…

  14. Free Education for Open Learning: Open educational policies, strategies & access for all

    NARCIS (Netherlands)

    Stracke, Christian M.

    2016-01-01

    Invited Speech at the Moscow International Education Fair 2016, Moscow, Russian Federation, by Stracke, C. M. (2016, 15 April): "Free Education for Open Learning: Open educational policies, strategies & access for all"

  15. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    Directory of Open Access Journals (Sweden)

    Kevin McCluskey

    2017-08-01

    Full Text Available The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD. The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.

  16. Applying policy network theory to policy-making in China: the case of urban health insurance reform.

    Science.gov (United States)

    Zheng, Haitao; de Jong, Martin; Koppenjan, Joop

    2010-01-01

    In this article, we explore whether policy network theory can be applied in the People's Republic of China (PRC). We carried out a literature review of how this approach has already been dealt with in the Chinese policy sciences thus far. We then present the key concepts and research approach in policy networks theory in the Western literature and try these on a Chinese case to see the fit. We follow this with a description and analysis of the policy-making process regarding the health insurance reform in China from 1998 until the present. Based on this case study, we argue that this body of theory is useful to describe and explain policy-making processes in the Chinese context. However, limitations in the generic model appear in capturing the fundamentally different political and administrative systems, crucially different cultural values in the applicability of some research methods common in Western countries. Finally, we address which political and cultural aspects turn out to be different in the PRC and how they affect methodological and practical problems that PRC researchers will encounter when studying decision-making processes.

  17. Cross-Layer Framework for Fine-Grained Channel Access in Next Generation High-Density WiFi Networks

    Institute of Scientific and Technical Information of China (English)

    ZHAO Haitao; ZHANG Shaojie; Emiliano Garcia-Palacios

    2016-01-01

    Densely deployed WiFi networks will play a crucial role in providing the capacity for next generation mobile internet.However,due to increasing interference,overlapped channels in WiFi networks and throughput efficiency degradation,densely deployed WiFi networks is not a guarantee to obtain higher throughput.An emergent challenge is how to efficiently utilize scarce spectrum resources,by matching physical layer resources to traffic demand.In this aspect,access control allocation strategies play a pivotal role but remain too coarse-grained.As a solution,this research proposes a flexible framework for fine-grained channel width adaptation and multi-channel access in WiFi networks.This approach,named SFCA (Subcarrier Fine-grained Channel Access),adopts DOFDM (Discontinuous Orthogonal Frequency Division Multiplexing) at the PHY layer.It allocates the frequency resource with a subcarrier granularity,which facilitates the channel width adaptation for multi-channel access and thus brings more flexibility and higher frequency efficiency.The MAC layer uses a frequencytime domain backoff scheme,which combines the popular time-domain BEB scheme with a frequency-domain backoff to decrease access collision,resulting in higher access probability for the contending nodes.SFCA is compared with FICA (an established access scheme) showing significant outperformance.Finally we present results for next generation 802.11 ac WiFi networks.

  18. The city, territoriality and networks in mental health policies

    Directory of Open Access Journals (Sweden)

    Luciana Assis Costa

    2014-09-01

    Full Text Available The understanding of territory, made evident by a decentralized, local based, and non-institutionalized mental health model, is a fundamental element in building a renewed network. The objective of this essay is to understand how mental health policies gradually favor local actions, organized in terms of territories, to develop strategies of care that support the new model of mental health. From this perspective, the aim of this research is to reflect on the possibilities of establishing new social relations that can, in fact, widen the sense of community belonging in the daily living of those presenting mental health conditions. This study draws from theoretical concepts and frameworks of the social sciences, describing the diverse positions held by the main schools of urban sociology with regards to the understanding of territories. The multiple conceptions of territories and their relations to mental health are analyzed. Historical data about mental health in Brazil show a heterogeneous development of mental health policies in different areas of the country. Finally, social inclusion in the cities depends on an effective expansion of territory-based mental health services, as well as an amplification of the access to consumer goods and services not necessarily connected to health care, but to basic social and civil rights. Hopefully, new rules of social interaction will not be restricted to the mental health universe, but will promote new encounters in the urban space, with respect for differences and appreciation of diversity.

  19. Failure Analysis of Network Based Accessible Pedestrian Signals in Closed-Loop Operation

    Science.gov (United States)

    2011-03-01

    The potential failure modes of a network based accessible pedestrian system were analyzed to determine the limitations and benefits of closed-loop operation. The vulnerabilities of the system are accessed using the industry standard process known as ...

  20. Social Network Analysis of Scientific Articles Published by Food Policy

    Directory of Open Access Journals (Sweden)

    József Popp

    2018-02-01

    Full Text Available The article analyses co-authorship and co-citation networks in Food Policy, which is the most important agricultural policy journal in the field of agricultural economics. The paper highlights the principal researchers in this field together with their authorship and citation networks on the basis of 714 articles written between 2006 and 2015. Results suggest that the majority of the articles were written by a small number of researchers, indicating that groups and central authors play an important role in scientific advances. It also turns out that the number of articles and the central role played in the network are not related, contrary to expectations. Results also suggest that groups cite themselves more often than average, thereby boosting the scientific advancement of their own members.

  1. [European integration and health policies: repercussions of the internal European Market on access to health services].

    Science.gov (United States)

    Guimarães, Luisa; Giovanella, Lígia

    2006-09-01

    This article explores the health policy repercussions of countries' regional integration into the European Union. The aim is to review the regulation of access in other countries, with the conclusion of the single European market and the free circulation of persons, services, goods, and capital. The article begins by reviewing the various forms of integration and describes the expansion and institutionalization of Community agencies. The repercussions of European integration on health policies and regulation of access are analyzed. Market impacts on health result from Treaty directives and internal policy adjustments to free circulation. Health services access is gradually regulated and granted by rulings. Projects along borders illustrate the dynamics where differences are used to achieve comprehensive care. In the oldest integration experience, the market regulation has generated intentional and non-intentional impacts on the health policies of member states, regardless of the organizational model. Knowledge and analysis of this experience signals challenges for the Southern Cone Common Market (Mercosur) and adds to future debates and decisions.

  2. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    Science.gov (United States)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  3. Delay-aware adaptive sleep mechanism for green wireless-optical broadband access networks

    Science.gov (United States)

    Wang, Ruyan; Liang, Alei; Wu, Dapeng; Wu, Dalei

    2017-07-01

    Wireless-Optical Broadband Access Network (WOBAN) is capacity-high, reliable, flexible, and ubiquitous, as it takes full advantage of the merits from both optical communication and wireless communication technologies. Similar to other access networks, the high energy consumption poses a great challenge for building up WOBANs. To shot this problem, we can make some load-light Optical Network Units (ONUs) sleep to reduce the energy consumption. Such operation, however, causes the increased packet delay. Jointly considering the energy consumption and transmission delay, we propose a delay-aware adaptive sleep mechanism. Specifically, we develop a new analytical method to evaluate the transmission delay and queuing delay over the optical part, instead of adopting M/M/1 queuing model. Meanwhile, we also analyze the access delay and queuing delay of the wireless part. Based on such developed delay models, we mathematically derive ONU's optimal sleep time. In addition, we provide numerous simulation results to show the effectiveness of the proposed mechanism.

  4. The accessibility of Poland’s Space to the Trans-European Transport Network

    Directory of Open Access Journals (Sweden)

    Wiśniewski Szymon

    2017-09-01

    Full Text Available The aim of the article is to analyse the land transport accessibility of two trans-European corridors within the boundaries of Poland. The adjustment of the course of transport routes to the distribution of the population and the country’s land development (including economic potential and logistic infrastructure was outlined using measurements of cumulative accessibility. The results were presented in both cartographic form (isochrone approach and tabular form (cumulative approach. Research was conducted adopting different forms of transport used for relocation (including foot traffic, car, rail and multimodal transport and both the current and target layout of the transport network. This made it possible to determine the changes that will effectively run the process of investment in transport infrastructure on Polish territory. This allowed the identification of the areas of Poland which are particularly conveniently located in relation to domestic connections (in terms of the international network and those for which the European transport network remains difficult to access.

  5. A Comparative Study of Multiplexing Schemes for Next Generation Optical Access Networks

    Science.gov (United States)

    Imtiaz, Waqas A.; Khan, Yousaf; Shah, Pir Mehar Ali; Zeeshan, M.

    2014-09-01

    Passive optical network (PON) is a high bandwidth, economical solution which can provide the necessary bandwidth to end-users. Wavelength division multiplexed passive optical networks (WDM PONs) and time division multiplexed passive optical networks (TDM PONs) are considered as an evolutionary step for next-generation optical access (NGOA) networks. However they fail to provide highest transmission capacity, efficient bandwidth access, and robust dispersion tolerance. Thus future PONs are considered on simpler, efficient and potentially scalable, optical code division multiplexed (OCDM) PONs. This paper compares the performance of existing PONs with OCDM PON to determine a suitable scheme for NGOA networks. Two system parameter are used in this paper: fiber length, and bit rate. Performance analysis using Optisystem shows that; for a sufficient system performance parameters i.e. bit error rate (BER) ≤ 10-9, and maximum quality factor (Q) ≥ 6, OCDMA PON efficiently performs upto 50 km with 10 Gbit/s per ONU.

  6. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks.

    Science.gov (United States)

    Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Zhang, Xuekun

    2015-12-03

    Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT), Machine-to-Machine (M2M) communications, Vehicular-to-Vehicular (V2V) communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  7. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunyang Lei

    2015-12-01

    Full Text Available Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT, Machine-to-Machine (M2M communications, Vehicular-to-Vehicular (V2V communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  8. Access and Definition: Exploring how STEM Faculty, Department Heads, and University Policy Administrators Navigate the Implementation of a Parental Leave Policy

    OpenAIRE

    Schimpf, Corey T; Santiago, Marisol Mercado; Pawley, Alice L.

    2012-01-01

    Access and Definition: Exploring how STEM Faculty, Department Heads and University Policy Administrators Navigate the Enactment of a Parental Leave Policy A key feature in various reports exploring women’s persisting underrepresentation in STEM faculty positions in the US is the need to disseminate policy information to all stakeholders involved in issues relating to women STEM faculty underrepresentation and retention. Indeed, the National Academies of Science Beyond Barriers and Bias: Fulfi...

  9. Impacts of subsidy policies on vaccination decisions in contact networks

    Science.gov (United States)

    Zhang, Hai-Feng; Wu, Zhi-Xi; Xu, Xiao-Ke; Small, Michael; Wang, Lin; Wang, Bing-Hong

    2013-07-01

    To motivate more people to participate in vaccination campaigns, various subsidy policies are often supplied by government and the health sectors. However, these external incentives may also alter the vaccination decisions of the broader public, and hence the choice of incentive needs to be carefully considered. Since human behavior and the networking-constrained interactions among individuals significantly impact the evolution of an epidemic, here we consider the voluntary vaccination on human contact networks. To this end, two categories of typical subsidy policies are considered: (1) under the free subsidy policy, the total amount of subsidy is distributed to a certain fraction of individual and who are vaccinated without personal cost, and (2) under the partial-offset subsidy policy, each vaccinated person is offset by a certain amount of subsidy. A vaccination decision model based on evolutionary game theory is established to study the effects of these different subsidy policies on disease control. Simulations suggest that, because the partial-offset subsidy policy encourages more people to take vaccination, its performance is significantly better than that of the free subsidy policy. However, an interesting phenomenon emerges in the partial-offset scenario: with limited amount of total subsidy, a moderate subsidy rate for each vaccinated individual can guarantee the group-optimal vaccination, leading to the maximal social benefits, while such an optimal phenomenon is not evident for the free subsidy scenario.

  10. Kenya's Constituency Development Fund, Free Secondary Education Policy, and Access to Secondary Education

    Science.gov (United States)

    Nzuki, Charles Kyalo

    2018-01-01

    The effects of the Constituency Development Fund (CDF) and the Free Secondary Education Policy (FSEP) on access to secondary school education in Kenya's Yatta sub-county have not been adequately explored in available public policy literature. Hence, this qualitative multiple-case study was designed to understand the effects of the 2 policies on…

  11. Medium Access Control in Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon

    Focusing on Wireless Sensor Networks (WSN) that are powered by energy harvesting, this dissertation focuses on energy-efficient communication links between senders and receivers that are alternating between active and sleeping states of operation. In particular, the focus lies on Medium Access...

  12. An encryption scheme for a secure policy updating

    NARCIS (Netherlands)

    Ibraimi, L.; Asim, M.; Petkovic, M.; Obaidat, M.S.; Tsihrintzis, G.A.; Filipe, J.

    2012-01-01

    Ciphertext policy attribute based encryption is an encryption technique where the data is encrypted according to an access policy over attributes. Users who have a secret key associated with a set of attributes which satisfy the access policy can decrypt the encrypted data. However, one of the

  13. A New Hybrid Channel Access Scheme for Ad Hoc Networks

    National Research Council Canada - National Science Library

    Wang, Yu; Garcia-Luna-Aceves, J. J

    2002-01-01

    Many contention-based channel access schemes have been proposed for multi-hop ad hoc networks in the recent past, and they can be divided into two categories, sender-initiated and receiver-initiated...

  14. Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    Science.gov (United States)

    Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.

    2012-01-01

    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are

  15. Gold or green: the debate on open access policies.

    Science.gov (United States)

    Abadal, Ernest

    2013-09-01

    The movement for open access to science seeks to achieve unrestricted and free access to academic publications on the Internet. To this end, two mechanisms have been established: the gold road, in which scientific journals are openly accessible, and the green road, in which publications are self-archived in repositories. The publication of the Finch Report in 2012, advocating exclusively the adoption of the gold road, generated a debate as to whether either of the two options should be prioritized. The recommendations of the Finch Report stirred controversy among academicians specialized in open access issues, who felt that the role played by repositories was not adequately considered and because the green road places the burden of publishing costs basically on authors. The Finch Report's conclusions are compatible with the characteristics of science communication in the UK and they could surely also be applied to the (few) countries with a powerful publishing industry and substantial research funding. In Spain, both the current national legislation and the existing rules at universities largely advocate the green road. This is directly related to the structure of scientific communication in Spain, where many journals have little commercial significance, the system of charging a fee to authors has not been adopted, and there is a good repository infrastructure. As for open access policies, the performance of the scientific communication system in each country should be carefully analyzed to determine the most suitable open access strategy.

  16. FttC-Based Fronthaul for 5G Dense/Ultra-Dense Access Network: Performance and Costs in Realistic Scenarios

    Directory of Open Access Journals (Sweden)

    Franco Mazzenga

    2017-10-01

    Full Text Available One distinctive feature of the next 5G systems is the presence of a dense/ultra-dense wireless access network with a large number of access points (or nodes at short distances from each other. Dense/ultra-dense access networks allow for providing very high transmission capacity to terminals. However, the deployment of dense/ultra-dense networks is slowed down by the cost of the fiber-based infrastructure required to connect radio nodes to the central processing units and then to the core network. In this paper, we investigate the possibility for existing FttC access networks to provide fronthaul capabilities for dense/ultra-dense 5G wireless networks. The analysis is realistic in that it is carried out considering an actual access network scenario, i.e., the Italian FttC deployment. It is assumed that access nodes are connected to the Cabinets and to the corresponding distributors by a number of copper pairs. Different types of cities grouped in terms of population have been considered. Results focus on fronthaul transport capacity provided by the FttC network and have been expressed in terms of the available fronthaul bit rate per node and of the achievable coverage.

  17. A Method for Upper Bounding Long Term Growth of Network Access Speed

    Directory of Open Access Journals (Sweden)

    Thomas Phillip Knudsen

    2006-06-01

    Full Text Available The development in home Internet access speed has shown an exponential development with growth rates averaging 25% per year. For resource management in network provisioning it becomes an urgent question how long such growth can continue. This paper presents a method for calculating an upper bound to visual content driven growth, proceeding from datarate requirements for a full virtual environment. Scenarios and approaches for reducing datarate requirements are considered and discussed. The presented figures for an upper bound on network access speed are discussed and perspectives on further research presented.

  18. A Method for Upper Bounding Long Term Growth of Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Pedersen, Jens Myrup; Madsen, Ole Brun

    2004-01-01

    The development in home Internet access speed has shown an exponential development with growth rates averaging 25% per year. For resource management in network provisioning it becomes an urgent question how long such growth can continue. This paper presents a method for calculating an upper bound...... to visual content driven growth, proceeding from datarate requirements for a full virtual environment. Scenarios and approaches for reducing datarate requirements are considered and discussed. The presented figures for an upper bound on network access speed are discussed and perspectives on further research...

  19. Modeling the video distribution link in the Next Generation Optical Access Networks

    International Nuclear Information System (INIS)

    Amaya, F; Cardenas, A; Tafur, I

    2011-01-01

    In this work we present a model for the design and optimization of the video distribution link in the next generation optical access network. We analyze the video distribution performance in a SCM-WDM link, including the noise, the distortion and the fiber optic nonlinearities. Additionally, we consider in the model the effect of distributed Raman amplification, used to extent the capacity and the reach of the optical link. In the model, we use the nonlinear Schroedinger equation with the purpose to obtain capacity limitations and design constrains of the next generation optical access networks.

  20. Social network types among older Korean adults: Associations with subjective health.

    Science.gov (United States)

    Sohn, Sung Yun; Joo, Won-Tak; Kim, Woo Jung; Kim, Se Joo; Youm, Yoosik; Kim, Hyeon Chang; Park, Yeong-Ran; Lee, Eun

    2017-01-01

    With population aging now a global phenomenon, the health of older adults is becoming an increasingly important issue. Because the Korean population is aging at an unprecedented rate, preparing for public health problems associated with old age is particularly salient in this country. As the physical and mental health of older adults is related to their social relationships, investigating the social networks of older adults and their relationship to health status is important for establishing public health policies. The aims of this study were to identify social network types among older adults in South Korea and to examine the relationship of these social network types with self-rated health and depression. Data from the Korean Social Life, Health, and Aging Project were analyzed. Model-based clustering using finite normal mixture modeling was conducted to identify the social network types based on ten criterion variables of social relationships and activities: marital status, number of children, number of close relatives, number of friends, frequency of attendance at religious services, attendance at organized group meetings, in-degree centrality, out-degree centrality, closeness centrality, and betweenness centrality. Multivariate regression analysis was conducted to examine associations between the identified social network types and self-rated health and depression. The model-based clustering analysis revealed that social networks clustered into five types: diverse, family, congregant, congregant-restricted, and restricted. Diverse or family social network types were significantly associated with more favorable subjective mental health, whereas the restricted network type was significantly associated with poorer ratings of mental and physical health. In addition, our analysis identified unique social network types related to religious activities. In summary, we developed a comprehensive social network typology for older Korean adults. Copyright © 2016

  1. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  2. Variable disparity estimation based intermediate view reconstruction in dynamic flow allocation over EPON-based access networks

    Science.gov (United States)

    Bae, Kyung-Hoon; Lee, Jungjoon; Kim, Eun-Soo

    2008-06-01

    In this paper, a variable disparity estimation (VDE)-based intermediate view reconstruction (IVR) in dynamic flow allocation (DFA) over an Ethernet passive optical network (EPON)-based access network is proposed. In the proposed system, the stereoscopic images are estimated by a variable block-matching algorithm (VBMA), and they are transmitted to the receiver through DFA over EPON. This scheme improves a priority-based access network by converting it to a flow-based access network with a new access mechanism and scheduling algorithm, and then 16-view images are synthesized by the IVR using VDE. Some experimental results indicate that the proposed system improves the peak-signal-to-noise ratio (PSNR) to as high as 4.86 dB and reduces the processing time to 3.52 s. Additionally, the network service provider can provide upper limits of transmission delays by the flow. The modeling and simulation results, including mathematical analyses, from this scheme are also provided.

  3. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    Science.gov (United States)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  4. Optimal Design of Multitype Groundwater Monitoring Networks Using Easily Accessible Tools.

    Science.gov (United States)

    Wöhling, Thomas; Geiges, Andreas; Nowak, Wolfgang

    2016-11-01

    Monitoring networks are expensive to establish and to maintain. In this paper, we extend an existing data-worth estimation method from the suite of PEST utilities with a global optimization method for optimal sensor placement (called optimal design) in groundwater monitoring networks. Design optimization can include multiple simultaneous sensor locations and multiple sensor types. Both location and sensor type are treated simultaneously as decision variables. Our method combines linear uncertainty quantification and a modified genetic algorithm for discrete multilocation, multitype search. The efficiency of the global optimization is enhanced by an archive of past samples and parallel computing. We demonstrate our methodology for a groundwater monitoring network at the Steinlach experimental site, south-western Germany, which has been established to monitor river-groundwater exchange processes. The target of optimization is the best possible exploration for minimum variance in predicting the mean travel time of the hyporheic exchange. Our results demonstrate that the information gain of monitoring network designs can be explored efficiently and with easily accessible tools prior to taking new field measurements or installing additional measurement points. The proposed methods proved to be efficient and can be applied for model-based optimal design of any type of monitoring network in approximately linear systems. Our key contributions are (1) the use of easy-to-implement tools for an otherwise complex task and (2) yet to consider data-worth interdependencies in simultaneous optimization of multiple sensor locations and sensor types. © 2016, National Ground Water Association.

  5. Auction pricing of network access for North American railways

    DEFF Research Database (Denmark)

    Harrod, Steven

    2013-01-01

    The question of pricing train paths for "open access" railway networks in North America is discussed. An auction process is suggested as necessary to maintain transparency in the contracting process. Multiple random samples of auction pricing for a single track railway line demonstrate...... that the infrastructure entity will receive approximately 15.6% less than the true value of the contracted train paths. This loss of revenue threatens the objective of reducing government subsidy for the railway network. (C) 2012 Elsevier Ltd. All rights reserved....

  6. State transformation and policy networks: The challenging implementation of new water policy paradigms in post-apartheid South Africa

    Directory of Open Access Journals (Sweden)

    Magalie Bourblanc

    2017-06-01

    Full Text Available For many years, South Africa had represented a typical example of a hydrocracy. Following the democratic transition in South Africa, however, new policy paradigms emerged, supported by new political elites from the ANC. A reform of the water policy was one of the priorities of the new Government, but with little experience in water management, they largely relied on 'international best practices' in the water sector, although some of these international principles did not perfectly fit the South African water sector landscape. In parallel, a reform called 'transformation' took place across all public organisations with the aim of allowing public administrations to better reflect the racial components in South African society. As a result, civil engineers lost most of their power within the Department of Water Affairs and Sanitation (DWS. However, despite these changes, demand-side management has had difficulties in materializing on the ground. The paper aims at discussing the resilience of supply-side management within the Ministry, despite its new policy orientation. Using a policy network concept, the paper shows that the supply-side approach still prevails today, due to the outsourcing of most DWS tasks to consulting firms with whom DWS engineers have nourished a privileged relationship since the 1980s. The article uses the decision-making process around the Lesotho Highlands Water Project (LHWP Phase 2 as an emblematic case study to illustrate such developments. This policy network, which has enjoyed so much influence over DWS policies and daily activities, is now being contested. As a consequence, we argue that the fate of the LHWP Phase 2 is ultimately linked to a competition between this policy network and a political one.

  7. Strengthening the Indonesia's Health Policy Network to Promote ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    organizing training for researchers; - holding national workshops for researchers and policymakers; - helping members organize forums on locally relevant issues; and - publishing and disseminating research findings. The project will share research results on the network's website and in reports, policy briefs, and articles in ...

  8. The Policy Discourse of Networking and Its Effect on School Autonomy: A Foucauldian Interpretation

    Science.gov (United States)

    Mifsud, Denise

    2016-01-01

    Policy discourse officially operates to distinctly influence public perception in an irrevocable and normalising manner. In a Maltese educational scenario of gradual decentralisation and increased accountability, I explore the "effects" of both the global and the local policy discourse of networks and networking on the practising…

  9. How Drug Control Policy and Practice Undermine Access to Controlled Medicines.

    Science.gov (United States)

    Burke-Shyne, Naomi; Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J K

    2017-06-01

    Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions' prioritization of criminal justice measures-including efforts to prevent non-medical use of controlled substances-undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights-specifically the right to health and the right to enjoy the benefits of scientific progress-are critical to rebalancing drug policy.

  10. Transnational issue-specific expert networking: A pathway to local policy change.

    Science.gov (United States)

    O'Brien, Cheryl

    2015-12-01

    This article reports on key findings from a study of subnational governments in Mexico and Nigeria (O'Brien, 2013). With empirical richness of the case study method and small-n statistical analysis across the subnational units for each country, this study asks: How can we push the needle toward more progressive policy change on violence against women in developing and democratizing contexts? This study finds that issue-specific expert networking is a civic pathway to subnational policy responsiveness in Mexico and Nigeria. The dynamics of this pathway illuminate local-global political connections, and this study shows how issue-specific expert networking is important for the diffusion of an international norm and policies on violence against women. Copyright © 2015 Elsevier Ltd. All rights reserved.

  11. Network Performance and Quality of Experience of Remote Access Laboratories

    Directory of Open Access Journals (Sweden)

    Alexander A. Kist

    2012-11-01

    Full Text Available Remote Access Laboratories (RAL have become important learning and teaching tools. This paper presents a performance study that targets a specific remote access architecture implemented within a universities operational environment. This particular RAL system provides globally authenticated and arbitrated remote access to virtualized computers as well as computer controlled hardware experiments. This paper presents system performance results that have been obtained utilizing both a set of automated and human subject tests. Principle objectives of the study were: To gain a better understanding of the nature of network traffic caused by experimental activity usage; to obtain an indication of user expectations of activity performance; and to develop a measure to predict Quality of Experience, based on easily measurable Quality of Service parameters. The study emulates network layer variation of access-bandwidth and round-trip-time of typical usage scenarios and contrasts against user perception results that allow classifying expected user performance. It demonstrates that failure rate is excellent measure of usability, and that round-trip-time predominantly affects user experience. Thin-client and remote desktop architectures are popular to separate the location of users and the actual data processing and use similar structures, hence results of this study to be applied in these application areas as well.

  12. Evaluating the impact of climate policies on regional food availability and accessibility using an Integrated Assessment Model

    Science.gov (United States)

    Gilmore, E.; Cui, Y. R.; Waldhoff, S.

    2015-12-01

    Beyond 2015, eradicating hunger will remain a critical part of the global development agenda through the Sustainable Development Goals (SDG). Efforts to limit climate change through both mitigation of greenhouse gas emissions and land use policies may interact with food availability and accessibility in complex and unanticipated ways. Here, we develop projections of regional food accessibility to 2050 under the alternative futures outlined by the Shared Socioeconomic Pathways (SSPs) and under different climate policy targets and structures. We use the Global Change Assessment Model (GCAM), an integrated assessment model (IAM), for our projections. We calculate food access as the weighted average of consumption of five staples and the portion of income spend on those commodities and extend the GCAM calculated universal global producer price to regional consumer prices drawing on historical relationships of these prices. Along the SSPs, food access depends largely on expectations of increases in population and economic status. Under a more optimistic scenario, the pressures on food access from increasing demand and rising prices can be counterbalanced by faster economic development. Stringent climate policies that increase commodity prices, however, may hinder vulnerable regions, namely Sub-Saharan Africa, from achieving greater food accessibility.

  13. Impact of Different Carbon Policies on City Logistics Network

    Directory of Open Access Journals (Sweden)

    Yang Jianhua

    2015-01-01

    Full Text Available A programming model for a four-layer urban logistics distribution network is constructed and revised based on three types of carbon emissions policies such as Carbon tax, carbon emissions Cap, Carbon Trade. Effects of different policies on logistics costs and carbon emissions are analyzed based on a spatial Logistics Infrastructure layout of Beijing. Research findings are as follows: First, based on low-carbon policies, the logistics costs and carbon emissions can be changed by different modes of transport in a certain extent; second, only when carbon taxes and carbon trading prices are higher, carbon taxes and carbon trading policies can reduce carbon emissions while not significantly increase logistics costs at the same time, and more effectively achieve carbon reduction targets than use carbon cap policy.

  14. Access to In-Network Emergency Physicians and Emergency Departments Within Federally Qualified Health Plans in 2015

    Directory of Open Access Journals (Sweden)

    Stephen C. Dorner, MSc

    2016-01-01

    Full Text Available Introduction: Under regulations established by the Affordable Care Act, insurance plans must meet minimum standards in order to be sold through the federal Marketplace. These standards to become a qualified health plan (QHP include maintaining a provider network sufficient to assure access to services. However, the complexity of emergency physician (EP employment practices – in which the EPs frequently serve as independent contractors of emergency departments, independently establish insurance contracts, etc... – and regulations governing insurance repayment may hinder the application of network adequacy standards to emergency medicine. As such, we hypothesized the existence of QHPs without in-network access to EPs. The objective is to identify whether there are QHPs without in-network access to EPs using information available through the federal Marketplace and publicly available provider directories. Results: In a national sample of Marketplace plans, we found that one in five provider networks lacks identifiable in-network EPs. QHPs lacking EPs spanned nearly half (44% of the 34 states using the federal Marketplace. Conclusion: Our data suggest that the present regulatory framework governing network adequacy is not generalizable to emergency care, representing a missed opportunity to protect patient access to in-network physicians. These findings and the current regulations governing insurance payment to EPs dis-incentivize the creation of adequate physician networks, incentivize the practice of balance billing, and shift the cost burden to patients.

  15. Quantitative analysis of access strategies to remoteinformation in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    of analytic models to compute different performance metrics for these approaches, with special focus on the so-called mismatch probability. The results of the analytic models allow for design decisions on which strategy to implement for specific input parameters (change rate of the information element......Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach...... initiated by the requesting entity, and two versions of proactive approaches in which the entity that contains the information element actively propagates its changes to potential requesters, either (2) periodically or triggered by changes of the information element (3). This paper first develops a set...

  16. Open Access and OER in Latin America: A survey of the policy landscape in Chile, Colombia and Uruguay

    OpenAIRE

    Toledo, Amalia

    2017-01-01

    This chapter presents an overview of the mechanisms (funding, policy, legislative and procedural) adopted by Latin American governments with respect to Open Access and Open Educational Resources (OER) initiatives in the higher education sector. It addresses three questions: How do the higher education systems of Chile, Colombia and Uruguay operate and fund their activities in general? How do existing policies and processes incorporating Open Access and/or OER influence student access to learn...

  17. Small-Area Estimation of Spatial Access to Care and Its Implications for Policy.

    Science.gov (United States)

    Gentili, Monica; Isett, Kim; Serban, Nicoleta; Swann, Julie

    2015-10-01

    Local or small-area estimates to capture emerging trends across large geographic regions are critical in identifying and addressing community-level health interventions. However, they are often unavailable due to lack of analytic capabilities in compiling and integrating extensive datasets and complementing them with the knowledge about variations in state-level health policies. This study introduces a modeling approach for small-area estimation of spatial access to pediatric primary care that is data "rich" and mathematically rigorous, integrating data and health policy in a systematic way. We illustrate the sensitivity of the model to policy decision making across large geographic regions by performing a systematic comparison of the estimates at the census tract and county levels for Georgia and California. Our results show the proposed approach is able to overcome limitations of other existing models by capturing patient and provider preferences and by incorporating possible changes in health policies. The primary finding is systematic underestimation of spatial access, and inaccurate estimates of disparities across population and across geography at the county level with respect to those at the census tract level with implications on where to focus and which type of interventions to consider.

  18. Resource Sharing in Heterogeneous and Cloud Radio Access Networks

    DEFF Research Database (Denmark)

    Zakrzewska, Anna; Iversen, Villy Bæk

    2012-01-01

    be improved. However, we identify the benefit of individual operators and show that it’s not equal but highly depends on the initial network dimensioning. Furthermore, we demonstrate that under specific conditions the blocking probability in an area is lower than for fully accessible system and therefore...

  19. Optically transparent multiple access networks employing incoherent spectral codes

    NARCIS (Netherlands)

    Huiszoon, B.

    2008-01-01

    This Ph.D. thesis is divided into 7 chapters to provide the reader an overview of the main results achieved in di®erent sub-topics of the study towards optically transparent multiple access networks employing incoherent spectral codes taking into account wireless transmission aspects. The work

  20. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yun Lin

    2016-10-01

    Full Text Available Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel.

  1. Leveraging Mobile Network Big Data for Developmental Policy ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Transportation, diseases, socio-economic monitoring. The Sri Lankan think tank, Learning Initiatives on Reforms for Network Economies Asia (LIRNEasia), has been exploring the possibility of using big data to inform public policy since 2012. Supported by IDRC, this research focused on transportation planning in urban ...

  2. Converged wireline and wireless signal distribution in optical fiber access networks

    DEFF Research Database (Denmark)

    Prince, Kamau

    This thesis presents results obtained during the course of my doctoral studies into the transport of fixed and wireless signaling over a converged otpical access infrastructure. In the formulation, development and assessment of a converged paradigma for multiple-services delivery via optical access...... networking infrastructure, I have demonstrated increased functionalities with existing optical technologies and commercially available optoelectronic devices. I have developed novel systems for extending the range of optical access systems, and have demonstrated the repurposing of standard digital devices...

  3. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad; Elsawy, Hesham; Bader, Ahmed; Alouini, Mohamed-Slim

    2017-01-01

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  4. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad

    2017-02-07

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  5. European Lifelong Guidance Policy Network Representatives' Conceptions of the Role of Information and Communication Technologies Related to National Guidance Policies

    Science.gov (United States)

    Kettunen, Jaana; Vuorinen, Raimo; Ruusuvirta, Outi

    2016-01-01

    This article reports findings from a phenomenographic investigation into European Lifelong Guidance Policy Network representatives' conceptions of the role of information and communication technologies (ICT) related to national lifelong guidance policies. The role of ICT in relation to national lifelong guidance policies was conceived as (1)…

  6. Secret Shoppers Find Access To Providers And Network Accuracy Lacking For Those In Marketplace And Commercial Plans.

    Science.gov (United States)

    Haeder, Simon F; Weimer, David L; Mukamel, Dana B

    2016-07-01

    The adequacy of provider networks for plans sold through insurance Marketplaces established under the Affordable Care Act has received much scrutiny recently. Various studies have established that networks are generally narrow. To learn more about network adequacy and access to care, we investigated two questions. First, no matter the nominal size of a network, can patients gain access to primary care services from providers of their choice in a timely manner? Second, how does access compare to plans sold outside insurance Marketplaces? We conducted a "secret shopper" survey of 743 primary care providers from five of California's nineteen insurance Marketplace pricing regions in the summer of 2015. Our findings indicate that obtaining access to primary care providers was generally equally challenging both inside and outside insurance Marketplaces. In less than 30 percent of cases were consumers able to schedule an appointment with an initially selected physician provider. Information about provider networks was often inaccurate. Problems accessing services for patients with acute conditions were particularly troubling. Effectively addressing issues of network adequacy requires more accurate provider information. Project HOPE—The People-to-People Health Foundation, Inc.

  7. Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks.

    Science.gov (United States)

    Anwar, Asim; Seet, Boon-Chong; Ding, Zhiguo

    2018-02-08

    Ubiquitous wireless sensor networks (UWSNs) have become a critical technology for enabling smart cities and other ubiquitous monitoring applications. Their deployment, however, can be seriously hampered by the spectrum available to the sheer number of sensors for communication. To support the communication needs of UWSNs without requiring more spectrum resources, the power-domain non-orthogonal multiple access (NOMA) technique originally proposed for 5th Generation (5G) cellular networks is investigated for UWSNs for the first time in this paper. However, unlike 5G networks that operate in the licensed spectrum, UWSNs mostly operate in unlicensed spectrum where sensors also experience cross-technology interferences from other devices sharing the same spectrum. In this paper, we model the interferences from various sources at the sensors using stochastic geometry framework. To evaluate the performance, we derive a theorem and present new closed form expression for the outage probability of the sensors in a downlink scenario under interference limited environment. In addition, diversity analysis for the ordered NOMA users is performed. Based on the derived outage probability, we evaluate the average link throughput and energy consumption efficiency of NOMA against conventional orthogonal multiple access (OMA) technique in UWSNs. Further, the required computational complexity for the NOMA users is presented.

  8. Resistance Genes in Global Crop Breeding Networks.

    Science.gov (United States)

    Garrett, K A; Andersen, K F; Asche, F; Bowden, R L; Forbes, G A; Kulakow, P A; Zhou, B

    2017-10-01

    Resistance genes are a major tool for managing crop diseases. The networks of crop breeders who exchange resistance genes and deploy them in varieties help to determine the global landscape of resistance and epidemics, an important system for maintaining food security. These networks function as a complex adaptive system, with associated strengths and vulnerabilities, and implications for policies to support resistance gene deployment strategies. Extensions of epidemic network analysis can be used to evaluate the multilayer agricultural networks that support and influence crop breeding networks. Here, we evaluate the general structure of crop breeding networks for cassava, potato, rice, and wheat. All four are clustered due to phytosanitary and intellectual property regulations, and linked through CGIAR hubs. Cassava networks primarily include public breeding groups, whereas others are more mixed. These systems must adapt to global change in climate and land use, the emergence of new diseases, and disruptive breeding technologies. Research priorities to support policy include how best to maintain both diversity and redundancy in the roles played by individual crop breeding groups (public versus private and global versus local), and how best to manage connectivity to optimize resistance gene deployment while avoiding risks to the useful life of resistance genes. [Formula: see text] Copyright © 2017 The Author(s). This is an open access article distributed under the CC BY 4.0 International license .

  9. Conditions for addressing environmental determinants of health behavior in intersectoral policy networks: A fuzzy set Qualitative Comparative Analysis.

    Science.gov (United States)

    Peters, D T J M; Verweij, S; Grêaux, K; Stronks, K; Harting, J

    2017-12-01

    Improving health requires changes in the social, physical, economic and political determinants of health behavior. For the realization of policies that address these environmental determinants, intersectoral policy networks are considered necessary for the pooling of resources to implement different policy instruments. However, such network diversity may increase network complexity and therefore hamper network performance. Network complexity may be reduced by network management and the provision of financial resources. This study examined whether network diversity - amidst the other conditions - is indeed needed to address environmental determinants of health behavior. We included 25 intersectoral policy networks in Dutch municipalities aimed at reducing overweight, smoking, and alcohol/drugs abuse. For our fuzzy set Qualitative Comparative Analysis we used data from three web-based surveys among (a) project leaders regarding network diversity and size (n = 38); (b) project leaders and project partners regarding management (n = 278); and (c) implementation professionals regarding types of environmental determinants addressed (n = 137). Data on budgets were retrieved from project application forms. Contrary to their intentions, most policy networks typically addressed personal determinants. If the environment was addressed too, it was mostly the social environment. To address environmental determinants of health behavior, network diversity (>50% of the actors are non-public health) was necessary in networks that were either small (policy networks in improving health behaviors by addressing a variety of environmental determinants. Copyright © 2017. Published by Elsevier Ltd.

  10. Delay Tolerant Networking with Data Triage Method based on Emergent User Policies for Disaster Information Network System

    Directory of Open Access Journals (Sweden)

    Noriki Uchida

    2014-01-01

    Full Text Available When Disaster Information Network System is considered in local areas that were heavy damaged by the East Japan Great Earthquake in 2011, the resiliency of the network system is one of significant subjects for the restoration of the areas. DTN (Delay Tolerant Network has been focused for the effective methods for such inoperable network circumstances. However, when DTN is applied for the local areas, there are some problems such as message delivery rate and latency because there are fewer roads, cars, and pedestrians than in urban areas. In this paper, we propose the Enhanced Media Coordinate System for its architecture, and Data Triage method by emergent user policies is introduced to improve the QoS in Disaster Information Network System in local areas. In the proposed method, every message is tagged with the priority levels by data types with considering emergent user policies, and the high priority messages are firstly duplicated to transmittable nodes. Then, the experimental results by the GIS map of a Japanese coastal town and the future studies are discussed.

  11. ALPHA: Proposal of Mapping QoS Parameters between UPnP Home Network and GMPLS Access

    DEFF Research Database (Denmark)

    Brewka, Lukasz Jerzy; Sköldström, Pontus; Gavler, Anders

    2011-01-01

    This paper is treating the interdomain QoS signaling between the home and access domains with a focus on applying it for providing QoS between a UPnP-QoS based home network and GMPLS based access network. The work presented here is defining a possible approach for an interface between UPn...

  12. Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application

    NARCIS (Netherlands)

    Ibraimi, L.; Petkovic, M.; Nikova, S.I.; Hartel, Pieter H.; Jonker, Willem; Youm, Heung Youl; Yung, Moti

    2009-01-01

    In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), a user secret key is associated with a set of attributes, and the ciphertext is associated with an access policy over attributes. The user can decrypt the ciphertext if and only if the attribute set of his secret key satisfies the access

  13. Access to antiretroviral treatment, issues of well-being and public health governance in Chad: what justifies the limited success of the universal access policy?

    Science.gov (United States)

    Azétsop, Jacquineau; Diop, Blondin A

    2013-08-01

    Universal access to antiretroviral treatment (ART) in Chad was officially declared in December 2006. This presidential initiative was and is still funded 100% by the country's budget and external donors' financial support. Many factors have triggered the spread of AIDS. Some of these factors include the existence of norms and beliefs that create or increase exposure, the low-level education that precludes access to health information, social unrest, and population migration to areas of high economic opportunities and gender-based discrimination. Social forces that influence the distribution of dimensions of well-being and shape risks for infection also determine the persistence of access barriers to ART. The universal access policy is quite revolutionary but should be informed by the systemic barriers to access so as to promote equity. It is not enough to distribute ARVs and provide health services when health systems are poorly organized and managed. Comprehensive access to ART raises many organizational, ethical and policy problems that need to be solved to achieve equity in access. This paper argues that the persistence of access barriers is due to weak health systems and a poor public health leadership. AIDS has challenged health systems in a manner that is essentially different from other health problems.

  14. Unofficial policy: access to housing, housing information and social services among homeless drug users in Hartford, Connecticut

    Directory of Open Access Journals (Sweden)

    Corbett A Michelle

    2007-03-01

    Full Text Available Abstract Background Much research has shown that the homeless have higher rates of substance abuse problems than housed populations and that substance abuse increases individuals' vulnerability to homelessness. However, the effects of housing policies on drug users' access to housing have been understudied to date. This paper will look at the "unofficial" housing policies that affect drug users' access to housing. Methods Qualitative interviews were conducted with 65 active users of heroin and cocaine at baseline, 3 and 6 months. Participants were purposively sampled to reflect a variety of housing statuses including homeless on the streets, in shelters, "doubled-up" with family or friends, or permanently housed in subsidized, unsubsidized or supportive housing. Key informant interviews and two focus group interviews were conducted with 15 housing caseworkers. Data were analyzed to explore the processes by which drug users receive information about different housing subsidies and welfare benefits, and their experiences in applying for these. Results A number of unofficial policy mechanisms limit drug users' access to housing, information and services, including limited outreach to non-shelter using homeless regarding housing programs, service provider priorities, and service provider discretion in processing applications and providing services. Conclusion Unofficial policy, i.e. the mechanisms used by caseworkers to ration scarce housing resources, is as important as official housing policies in limiting drug users' access to housing. Drug users' descriptions of their experiences working with caseworkers to obtain permanent, affordable housing, provide insights as to how access to supportive and subsidized housing can be improved for this population.

  15. Public Policy and Protection from Exclusion - Phase III | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    In November 2001, IDRC supported the establishment of a research network on the theme of equal access to health services in West Africa under project 101160. The network was made up of researchers and decision-makers active in the promotion of equitable health policies, with a view to promoting the emergence of an ...

  16. Modeling the video distribution link in the Next Generation Optical Access Networks

    DEFF Research Database (Denmark)

    Amaya, F.; Cárdenas, A.; Tafur Monroy, Idelfonso

    2011-01-01

    In this work we present a model for the design and optimization of the video distribution link in the next generation optical access network. We analyze the video distribution performance in a SCM-WDM link, including the noise, the distortion and the fiber optic nonlinearities. Additionally, we...... consider in the model the effect of distributed Raman amplification, used to extent the capacity and the reach of the optical link. In the model, we use the nonlinear Schrödinger equation with the purpose to obtain capacity limitations and design constrains of the next generation optical access networks....

  17. Open-Access-Kooperationen in Österreich: Open Access Network Austria und E-Infrastructures Austria – aktuelle Entwicklungen seit 2012

    Directory of Open Access Journals (Sweden)

    Bauer, Bruno

    2014-12-01

    Full Text Available [english] The Berlin Declaration on Open Access to scientific knowledge was published in October 2003. All over the world initiatives and projects were started. However, in Austria Open Access got little attention over many years. This was confirmed by a study among Austrian universities on behalf of the Council of Austrian University Libraries. Finally at the turn of the year 2012/2013 the Open Access Network Austria and the university infrastructure project E-Infrastructure Austria were started to push Open Access in Austria on a national level. So 10 years after the Berlin Declaration Austria set up the preconditions to establish sustainable Open Access.

  18. mCRAN: A radio access network architecture for 5G indoor ccommunications

    NARCIS (Netherlands)

    Chandra, Kishor; Cao, Zizheng; Bruintjes, Tom; Prasad, R.V.; Karagiannis, Georgios; Tangdiongga, E.; van den Boom, H.P.A.; Kokkeler, Andre B.J.

    2015-01-01

    Millimeter wave (mmWave) communication is being seen as a disruptive technology for 5G era. In particular, 60GHz frequency band has emerged as a promising candidate for multi-Gbps connectivity in indoor and hotspot areas. In terms of network architecture, cloud radio access network (CRAN) has

  19. mCRAN : a radio access network architecture for 5G indoor communications

    NARCIS (Netherlands)

    Chandra, Kishor; Cao, Zizheng; Bruintjes, T. M.; Prasad, R. Venkatesha; Karagiannis, G.; Tangdiongga, Eduward; van den Boom, H.P.A.; Kokkeler, A. B J

    2015-01-01

    Millimeter wave (mmWave) communication is being seen as a disruptive technology for 5G era. In particular, 60GHz frequency band has emerged as a promising candidate for multi-Gbps connectivity in indoor and hotspot areas. In terms of network architecture, cloud radio access network (CRAN) has

  20. Network access charges, vertical integration, and property rights structure - experiences from the German electricity markets

    International Nuclear Information System (INIS)

    Growitsch, C.; Wein, T.

    2005-01-01

    After the deregulation of the German electricity markets in 1998, the German government opted for a regulatory regime called negotiated third party access, which would be subject to ex-post control by the federal cartel office. Network access charges for new competitors are based on contractual arrangements between energy producers and industrial consumers. As the electricity networks are incontestable natural monopolies, the local and regional network operators are able to set (monopolistic) charges at their own discretion, restricted only by the possible interference of the federal cartel office (Bundeskartellamt). In this paper we analyze if there is evidence for varying charging behaviour depending on the supplier's economic independence (structure of property rights) or its level of vertical integration. For this purpose, we hypothesise that incorporated and vertically integrated suppliers set different charges than independent utility companies. Multivariate estimations show a relation between network access charges and the network operator's economic independence as well as level of vertical integration: on the low voltage level for an estimated annual consumption of 1700 kW/h, vertically integrated firms set-in accordance with our hypothesis-significantly lower access charges than vertically separated suppliers, whereas incorporated network operators charge significantly higher charges compared to independent suppliers. These results could not have been confirmed for other consumptions or voltage levels. (author)

  1. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  2. Dengue research networks: building evidence for policy and planning in Brazil.

    Science.gov (United States)

    de Paula Fonseca E Fonseca, Bruna; Zicker, Fabio

    2016-11-08

    The analysis of scientific networks has been applied in health research to map and measure relationships between researchers and institutions, describing collaboration structures, individual roles, and research outputs, and helping the identification of knowledge gaps and cooperation opportunities. Driven by dengue continued expansion in Brazil, we explore the contribution, dynamics and consolidation of dengue scientific networks that could ultimately inform the prioritisation of research, financial investments and health policy. Social network analysis (SNA) was used to produce a 20-year (1995-2014) retrospective longitudinal evaluation of dengue research networks within Brazil and with its partners abroad, with special interest in describing institutional collaboration and their research outputs. The analysis of institutional co-authorship showed a significant expansion of collaboration over the years, increased international involvement, and ensured a shift from public health research toward vector control and basic biomedical research, probably as a reflection of the expansion of transmission, high burden and increasing research funds from the Brazilian government. The analysis identified leading national organisations that maintained the research network connectivity, facilitated knowledge exchange and reduced network vulnerability. SNA proved to be a valuable tool that, along with other indicators, can strengthen a knowledge platform to inform future policy, planning and funding decisions. The paper provides relevant information to policy and planning for dengue research as it reveals: (1) the effectiveness of the research network in knowledge generation, sharing and diffusion; (2) the near-absence of collaboration with the private sector; and (3) the key central organisations that can support strategic decisions on investments, development and implementation of innovations. In addition, the increase in research activities and collaboration has not yet

  3. Requirements and Algorithms for Cooperation of Heterogeneous Radio Access Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena D.; Tragos, Elias; Mino, Emilio

    2009-01-01

    systems.The RRM mechanisms are evaluated for the scenario of intra-RAN and inter-RAN user mobility. The RRM framework incorporates as novelty improved triggering mechanisms, a network-controlledmobility management scheme with policy enforcement on different levels in the RANarchitecture, and a distributed...

  4. Local government broadband policies for areas with limited Internet access

    Directory of Open Access Journals (Sweden)

    Yoshio Arai

    2014-03-01

    Full Text Available Despite their wide diffusion in developed countries, broadband services are still limited in areas where providing them is not profitable for private telecom carriers. To address this, many local governments in Japan have implemented broadband deployment projects subsidized by the national government. In this paper, we discuss local government broadband policies based on survey data collected from municipalities throughout the country. With the support of national promotion policies, broadband services were rapidly introduced to most local municipalities in Japan during the 2000s. Local government deployment policies helped to reduce the number of areas with no broadband access. A business model based on the Indefeasible Right of Use (IRU contract between a private telecom carrier and a local government has been developed in recent years. Even local governments without the technical capacity to operate a broadband business can introduce broadband services into their territory using the IRU business model.

  5. Distributed Hybrid Scheduling in Multi-Cloud Networks using Conflict Graphs

    KAUST Repository

    Douik, Ahmed; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    Recent studies on cloud-radio access networks assume either signal-level or scheduling-level coordination. This paper considers a hybrid coordinated scheme as a means to benefit from both policies. Consider the downlink of a multi-cloud radio access

  6. Safety vs. reputation: risk controversies in emerging policy networks regarding school safety in the Netherlands

    NARCIS (Netherlands)

    Binkhorst, J.; Kingma, S.F.

    2012-01-01

    This article deals with risk controversies in emerging policy networks regarding school safety in the Netherlands. It offers a grounded account of the interpretations of school risks and safety measures by the various stakeholders of the policy network, in particular, schools, local government and

  7. Adaptive spectrum decision framework for heterogeneous dynamic spectrum access networks

    CSIR Research Space (South Africa)

    Masonta, M

    2015-09-01

    Full Text Available Spectrum decision is the ability of a cognitive radio (CR) system to select the best available spectrum band to satisfy dynamic spectrum access network (DSAN) users¿ quality of service (QoS) requirements without causing harmful interference...

  8. Support the Open Access Movement

    CERN Multimedia

    2005-01-01

    CERN's Executive Board recently endorsed a new policy of open access to the laboratory's results: Continuing CERN action on Open Access (OA) [http://cds.cern.ch/record/828991/files/open-2005-006.pdf]. What does this policy mean for you? CERN authors have two responsibilities: Submit your document to the CERN Document Server; Consider submitting future articles to an Open Access journal. Since 2001, Operational Circular No. 6 has required every CERN author (Staff member, Fellow, or any Associated member of personnel who is allowed to use CERN as his affiliation) to submit a copy of their scientific documents to the CERN Document Server (CDS). For some groups all approved documents are submitted by the secretary (see the Departments' policies at: http://library.cern.ch/cern_publications/cern_publication_policy.html). Each author should personally also ensure the submission of any other articles which are not added in this way, such as conference contributions and review articles. It is not sufficient to re...

  9. Creating collaboration opportunities for marine research across the Arctic: The SEARCH-ACCESS partnership and an emerging sea ice prediction research network

    Science.gov (United States)

    Eicken, H.; Bitz, C. M.; Gascard, J.; Kaminski, T.; Karcher, M. J.; Kauker, F.; Overland, J. E.; Stroeve, J. C.; Wiggins, H. V.

    2013-12-01

    Rapid Arctic environmental and socio-economic change presents major challenges and opportunities to Arctic residents, government agencies and the private sector. The Arctic Ocean and its ice cover, in particular, are in the midst of transformative change, ranging from declines in sea-ice thickness and summer ice extent to threats to coastal communities and increases in maritime traffic and offshore resource development. The US interagency Study of Environmental Arctic Change (SEARCH) and the European Arctic Climate Change, Economy and Society (ACCESS) project are addressing both scientific research needs and stakeholder information priorities to improve understanding and responses to Arctic change. Capacity building, coordination and integration of activities at the international level and across sectors and stakeholder groups are major challenges that have to be met. ACCESS and SEARCH build on long-standing collaborations with a focus on environmental change in the Arctic ocean-ice-atmosphere system and the most pressing research needs to inform marine policy, resource management and threats to Arctic coastal communities. To illustrate the approach, key results and major conclusions from this international coordination and collaboration effort, we focus on a nascent sea-ice prediction research network. This activity builds on the Arctic Sea Ice Outlook that was initiated by SEARCH and the European DAMOCLES project (a precursor to ACCESS) and has now grown into an international community of practice that synthesizes, evaluates and discusses sea-ice predictions on seasonal to interannual scales. Key goals of the effort which is now entering into a new phase include the comparative evaluation of different prediction approaches, including the combination of different techniques, the compilation of reference datasets and model output, guidance on the design and implementation of observing system efforts to improve predictions and information transfer into private

  10. Cyber Network Mission Dependencies

    Science.gov (United States)

    2015-09-18

    leak paths”) and determine if firewalls and router access control lists are violating network policy. Visualization tools are provided to help analysts...with which a supply agent may not be familiar. In this environment, errors in requisition are easy to make, and they are costly : an incomplete cyber...establishing an email network and recommend a firewall and additional laptops. YMAL would also match mission details like the deployment location with

  11. Removing financial barriers to access reproductive, maternal and newborn health services: the challenges and policy implications for human resources for health.

    Science.gov (United States)

    McPake, Barbara; Witter, Sophie; Ensor, Tim; Fustukian, Suzanne; Newlands, David; Martineau, Tim; Chirwa, Yotamu

    2013-09-22

    The last decade has seen widespread retreat from user fees with the intention to reduce financial constraints to users in accessing health care and in particular improving access to reproductive, maternal and newborn health services. This has had important benefits in reducing financial barriers to access in a number of settings. If the policies work as intended, service utilization rates increase. However this increases workloads for health staff and at the same time, the loss of user fee revenues can imply that health workers lose bonuses or allowances, or that it becomes more difficult to ensure uninterrupted supplies of health care inputs.This research aimed to assess how policies reducing demand-side barriers to access to health care have affected service delivery with a particular focus on human resources for health. We undertook case studies in five countries (Ghana, Nepal, Sierra Leone, Zambia and Zimbabwe). In each we reviewed financing and HRH policies, considered the impact financing policy change had made on health service utilization rates, analysed the distribution of health staff and their actual and potential workloads, and compared remuneration terms in the public sectors. We question a number of common assumptions about the financing and human resource inter-relationships. The impact of fee removal on utilization levels is mostly not sustained or supported by all the evidence. Shortages of human resources for health at the national level are not universal; maldistribution within countries is the greater problem. Low salaries are not universal; most of the countries pay health workers well by national benchmarks. The interconnectedness between user fee policy and HRH situations proves difficult to assess. Many policies have been changing over the relevant period, some clearly and others possibly in response to problems identified associated with financing policy change. Other relevant variables have also changed.However, as is now well

  12. Grouping by association: using associative networks for document categorization

    NARCIS (Netherlands)

    Bloom, Niels

    2015-01-01

    In this thesis we describe a method of using associative networks for automatic doc- ument grouping. Associative networks are networks of ideas or concepts in which each concept is linked to concepts that are semantically similar to it. By activating concepts in the network based on the text of a

  13. How to construct the statistic network? An association network of herbaceous

    Directory of Open Access Journals (Sweden)

    WenJun Zhang

    2012-06-01

    Full Text Available In present study I defined a new type of network, the statistic network. The statistic network is a weighted and non-deterministic network. In the statistic network, a connection value, i.e., connection weight, represents connection strength and connection likelihood between two nodes and its absolute value falls in the interval (0,1]. The connection value is expressed as a statistical measure such as correlation coefficient, association coefficient, or Jaccard coefficient, etc. In addition, all connections of the statistic network can be statistically tested for their validity. A connection is true if the connection value is statistically significant. If all connection values of a node are not statistically significant, it is an isolated node. An isolated node has not any connection to other nodes in the statistic network. Positive and negative connection values denote distinct connectiontypes (positive or negative association or interaction. In the statistic network, two nodes with the greater connection value will show more similar trend in the change of their states. At any time we can obtain a sample network of the statistic network. A sample network is a non-weighted and deterministic network. Thestatistic network, in particular the plant association network that constructed from field sampling, is mostly an information network. Most of the interspecific relationships in plant community are competition and cooperation. Therefore in comparison to animal networks, the methodology of statistic network is moresuitable to construct plant association networks. Some conclusions were drawn from this study: (1 in the plant association network, most connections are weak and positive interactions. The association network constructed from Spearman rank correlation has most connections and isolated taxa are fewer. From net linear correlation,linear correlation, to Spearman rank correlation, the practical number of connections and connectance in the

  14. Pharmaceutical policies and access to medicines : a hospital-pharmacy perspective from Ghana

    NARCIS (Netherlands)

    Ankrah, D.

    2017-01-01

    Access to quality medicines is a universal human right which featured prominently on the agenda of the World Health Organisation (WHO) over the past decades. Hospital pharmacists play a pivotal role in ensuring that treatment outcomes are optimal. This thesis studied pharmaceutical policies and

  15. Associations among Different Internet Access Time, Gender and Cyberbullying Behaviors in Taiwan?s Adolescents

    OpenAIRE

    Chao, Cheng-Min; Yu, Tai-Kuei

    2017-01-01

    With the increasing convenience of social networking sites and their interconnectedness with human interaction, verbal and image bullying have turned digital, making cyberbullying a new form of bullying attracting the attention of researchers, social workers, and schools. This study focuses on the status quo of attitude toward cyberbullying and cyberbullying behavior, explores associations of attitude toward behavior on cyberbullying behavior in gender and different internet access times. In ...

  16. Ultrafast all-optical code-division multiple-access networks

    Science.gov (United States)

    Kwong, Wing C.; Prucnal, Paul R.; Liu, Yanming

    1992-12-01

    In optical code-division multiple access (CDMA), the architecture of optical encoders/decoders is another important factor that needs to be considered, besides the correlation properties of those already extensively studied optical codes. The architecture of optical encoders/decoders affects, for example, the amount of power loss and length of optical delays that are associated with code sequence generation and correlation, which, in turn, affect the power budget, size, and cost of an optical CDMA system. Various CDMA coding architectures are studied in the paper. In contrast to the encoders/decoders used in prime networks (i.e., prime encodes/decoders), which generate, select, and correlate code sequences by a parallel combination of fiber-optic delay-lines, and in 2n networks (i.e., 2n encoders/decoders), which generate and correlate code sequences by a serial combination of 2 X 2 passive couplers and fiber delays with sequence selection performed in a parallel fashion, the modified 2n encoders/decoders generate, select, and correlate code sequences by a serial combination of directional couplers and delays. The power and delay- length requirements of the modified 2n encoders/decoders are compared to that of the prime and 2n encoders/decoders. A 100 Mbit/s optical CDMA experiment in free space demonstrating the feasibility of the all-serial coding architecture using a serial combination of 50/50 beam splitters and retroreflectors at 10 Tchip/s (i.e., 100,000 chip/bit) with 100 fs laser pulses is reported.

  17. Access, fronthaul and backhaul networks for 5G and beyond

    CERN Document Server

    Imran, Muhammad Ali; Shakir, Muhammad Zeeshan

    2017-01-01

    This book provides an overview from both academic and industrial stakeholders of innovative backhaul/fronthaul solutions, covering a wide spectrum of underlying themes ranging from the recent thrust in edge caching for backhaul relaxation to mmWave based fronthauling for radio access networks.

  18. Downlink Non-Orthogonal Multiple Access (NOMA) in Poisson Networks

    KAUST Repository

    Ali, Konpal S.

    2018-03-21

    A network model is considered where Poisson distributed base stations transmit to $N$ power-domain non-orthogonal multiple access (NOMA) users (UEs) each that employ successive interference cancellation (SIC) for decoding. We propose three models for the clustering of NOMA UEs and consider two different ordering techniques for the NOMA UEs: mean signal power-based and instantaneous signal-to-intercell-interference-and-noise-ratio-based. For each technique, we present a signal-to-interference-and-noise ratio analysis for the coverage of the typical UE. We plot the rate region for the two-user case and show that neither ordering technique is consistently superior to the other. We propose two efficient algorithms for finding a feasible resource allocation that maximize the cell sum rate $\\\\mathcal{R}_{\\ m tot}$, for general $N$, constrained to: 1) a minimum rate $\\\\mathcal{T}$ for each UE, 2) identical rates for all UEs. We show the existence of: 1) an optimum $N$ that maximizes the constrained $\\\\mathcal{R}_{\\ m tot}$ given a set of network parameters, 2) a critical SIC level necessary for NOMA to outperform orthogonal multiple access. The results highlight the importance in choosing the network parameters $N$, the constraints, and the ordering technique to balance the $\\\\mathcal{R}_{\\ m tot}$ and fairness requirements. We also show that interference-aware UE clustering can significantly improve performance.

  19. Downlink Non-Orthogonal Multiple Access (NOMA) in Poisson Networks

    KAUST Repository

    Ali, Konpal S.; Haenggi, Martin; Elsawy, Hesham; Chaaban, Anas; Alouini, Mohamed-Slim

    2018-01-01

    A network model is considered where Poisson distributed base stations transmit to $N$ power-domain non-orthogonal multiple access (NOMA) users (UEs) each that employ successive interference cancellation (SIC) for decoding. We propose three models for the clustering of NOMA UEs and consider two different ordering techniques for the NOMA UEs: mean signal power-based and instantaneous signal-to-intercell-interference-and-noise-ratio-based. For each technique, we present a signal-to-interference-and-noise ratio analysis for the coverage of the typical UE. We plot the rate region for the two-user case and show that neither ordering technique is consistently superior to the other. We propose two efficient algorithms for finding a feasible resource allocation that maximize the cell sum rate $\\mathcal{R}_{\\rm tot}$, for general $N$, constrained to: 1) a minimum rate $\\mathcal{T}$ for each UE, 2) identical rates for all UEs. We show the existence of: 1) an optimum $N$ that maximizes the constrained $\\mathcal{R}_{\\rm tot}$ given a set of network parameters, 2) a critical SIC level necessary for NOMA to outperform orthogonal multiple access. The results highlight the importance in choosing the network parameters $N$, the constraints, and the ordering technique to balance the $\\mathcal{R}_{\\rm tot}$ and fairness requirements. We also show that interference-aware UE clustering can significantly improve performance.

  20. Increasing access into higher education: Insights from the 2011 African Network on Evidence-to-Action on Disability Symposium - Education Commission.

    Science.gov (United States)

    Lyner-Cleophas, Marcia; Swart, Estelle; Chataika, Tsitsi; Bell, Diane

    2014-01-01

    This article provides some insights into the challenges regarding inclusion in higher education of students with disabilities. It does this by elucidating aspects of the proceedings of the Education Commission at the African Network on Evidence-to-Action on Disability (AfriNEAD) Symposium, which took place in Zimbabwe in November 2011. The presentations specifically focused on the education of people with disabilities from early childhood through to higher education. This article, however, is informed by presentations focusing on increasing access to higher education. The article is focused on the implementation of evidence in practice, research and policies stemming from rigorous debate and scientific foundations, whilst taking into account the dynamic realities of the higher education context. Themes such as the systemic approach needed for inclusion to be successful, increasing access and the dynamic role of students with disabilities are highlighted.

  1. Scalable Active Optical Access Network Using Variable High-Speed PLZT Optical Switch/Splitter

    Science.gov (United States)

    Ashizawa, Kunitaka; Sato, Takehiro; Tokuhashi, Kazumasa; Ishii, Daisuke; Okamoto, Satoru; Yamanaka, Naoaki; Oki, Eiji

    This paper proposes a scalable active optical access network using high-speed Plumbum Lanthanum Zirconate Titanate (PLZT) optical switch/splitter. The Active Optical Network, called ActiON, using PLZT switching technology has been presented to increase the number of subscribers and the maximum transmission distance, compared to the Passive Optical Network (PON). ActiON supports the multicast slot allocation realized by running the PLZT switch elements in the splitter mode, which forces the switch to behave as an optical splitter. However, the previous ActiON creates a tradeoff between the network scalability and the power loss experienced by the optical signal to each user. It does not use the optical power efficiently because the optical power is simply divided into 0.5 to 0.5 without considering transmission distance from OLT to each ONU. The proposed network adopts PLZT switch elements in the variable splitter mode, which controls the split ratio of the optical power considering the transmission distance from OLT to each ONU, in addition to PLZT switch elements in existing two modes, the switching mode and the splitter mode. The proposed network introduces the flexible multicast slot allocation according to the transmission distance from OLT to each user and the number of required users using three modes, while keeping the advantages of ActiON, which are to support scalable and secure access services. Numerical results show that the proposed network dramatically reduces the required number of slots and supports high bandwidth efficiency services and extends the coverage of access network, compared to the previous ActiON, and the required computation time for selecting multicast users is less than 30msec, which is acceptable for on-demand broadcast services.

  2. Dynamic RACH Partition for Massive Access of Differentiated M2M Services

    Directory of Open Access Journals (Sweden)

    Qinghe Du

    2016-03-01

    Full Text Available In machine-to-machine (M2M networks, a key challenge is to overcome the overload problem caused by random access requests from massive machine-type communication (MTC devices. When differentiated services coexist, such as delay-sensitive and delay-tolerant services, the problem becomes more complicated and challenging. This is because delay-sensitive services often use more aggressive policies, and thus, delay-tolerant services get much fewer chances to access the network. To conquer the problem, we propose an efficient mechanism for massive access control over differentiated M2M services, including delay-sensitive and delay-tolerant services. Specifically, based on the traffic loads of the two types of services, the proposed scheme dynamically partitions and allocates the random access channel (RACH resource to each type of services. The RACH partition strategy is thoroughly optimized to increase the access performances of M2M networks. Analyses and simulation demonstrate the effectiveness of our design. The proposed scheme can outperform the baseline access class barring (ACB scheme, which ignores service types in access control, in terms of access success probability and the average access delay.

  3. Convergence of broadband optical and wireless access networks

    Science.gov (United States)

    Chang, Gee-Kung; Jia, Zhensheng; Chien, Hung-Chang; Chowdhury, Arshad; Hsueh, Yu-Ting; Yu, Jianjun

    2009-01-01

    This paper describes convergence of optical and wireless access networks for delivering high-bandwidth integrated services over optical fiber and air links. Several key system technologies are proposed and experimentally demonstrated. We report here, for the first ever, a campus-wide field trial demonstration of radio-over-fiber (RoF) system transmitting uncompressed standard-definition (SD) high-definition (HD) real-time video contents, carried by 2.4-GHz radio and 60- GHz millimeter-wave signals, respectively, over 2.5-km standard single mode fiber (SMF-28) through the campus fiber network at Georgia Institute of Technology (GT). In addition, subsystem technologies of Base Station and wireless tranceivers operated at 60 GHz for real-time video distribution have been developed and tested.

  4. Image transmission in multicore-fiber code-division multiple access network

    Science.gov (United States)

    Yang, Guu-Chang; Kwong, Wing C.

    1997-01-01

    Recently, two-dimensional (2-D) signature patterns were proposed to encode binary digitized image pixels in optical code-division multiple-access (CDMA) networks with 'multicore' fiber. The new technology enables parallel transmission and simultaneous access of 2-D images in multiple-access environment, where these signature patterns are defined as optical orthogonal signature pattern codes (OOSPCs). However, previous work on OOSPCs assumed that the weight of each signature pattern was the same. In this paper, we construct a new family of OOSPCs with the removal of this assumption. Since varying the weight of a user's signature pattern affects that user's performance, this approach is useful for CDMA optical systems with multiple performance requirements.

  5. Receiver-initiated medium access control protocols for wireless sensor networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.

    2015-01-01

    One of the fundamental building blocks of a Wireless Sensor Network (WSN) is the Medium Access Control (MAC) protocol, that part of the system governing when and how two independent neighboring nodes activate their respective transceivers to directly interact. Historically, data exchange has always...

  6. A network collaboration implementing technology to improve medication dispensing and administration in critical access hospitals.

    Science.gov (United States)

    Wakefield, Douglas S; Ward, Marcia M; Loes, Jean L; O'Brien, John

    2010-01-01

    We report how seven independent critical access hospitals collaborated with a rural referral hospital to standardize workflow policies and procedures while jointly implementing the same health information technologies (HITs) to enhance medication care processes. The study hospitals implemented the same electronic health record, computerized provider order entry, pharmacy information systems, automated dispensing cabinets (ADC), and barcode medication administration systems. We conducted interviews and examined project documents to explore factors underlying the successful implementation of ADC and barcode medication administration across the network hospitals. These included a shared culture of collaboration; strategic sequencing of HIT component implementation; interface among HIT components; strategic placement of ADCs; disciplined use and sharing of workflow analyses linked with HIT applications; planning for workflow efficiencies; acquisition of adequate supply of HIT-related devices; and establishing metrics to monitor HIT use and outcomes.

  7. Association Between Academic Medical Center Pharmaceutical Detailing Policies and Physician Prescribing.

    Science.gov (United States)

    Larkin, Ian; Ang, Desmond; Steinhart, Jonathan; Chao, Matthew; Patterson, Mark; Sah, Sunita; Wu, Tina; Schoenbaum, Michael; Hutchins, David; Brennan, Troyen; Loewenstein, George

    2017-05-02

    decrease in the market share of detailed drugs of 1.67 percentage points (95% CI, -2.18 to -1.18 percentage points; P attention-deficit/hyperactivity disorder drugs, and antidepressant drugs) and for 9 of the 19 AMCs that implemented policies. Eleven of the 19 AMCs regulated salesperson gifts to physicians, restricted salesperson access to facilities, and incorporated explicit enforcement mechanisms. For 8 of these 11 AMCs, there was a significant change in prescribing. In contrast, there was a significant change at only 1 of 8 AMCs that did not enact policies in all 3 areas. Implementation of policies at AMCs that restricted pharmaceutical detailing between 2006 and 2012 was associated with modest but significant reductions in prescribing of detailed drugs across 6 of 8 major drug classes; however, changes were not seen in all of the AMCs that enacted policies.

  8. Entrepreneurs’ growth-expectations: Enhanced by their networking and by national growth-policy

    DEFF Research Database (Denmark)

    Schøtt, Thomas; Ashourizadeh, Shayegheh

    or running the business. The entrepreneur’s expectation is shaped partly by individual behavior, including networking with others who give advice on the business. The entrepreneur’s expectation is also shaped by the societal context, including policies. Policy for growth-entrepreneurship is the societal...

  9. Channel Access and Power Control for Mobile Crowdsourcing in Device-to-Device Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yue Ma

    2018-01-01

    Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.

  10. Enhancing Sensing and Channel Access in Cognitive Radio Networks

    KAUST Repository

    Hamza, Doha R.

    2014-06-18

    Cognitive radio technology is a promising technology to solve the wireless spectrum scarcity problem by intelligently allowing secondary, or unlicensed, users access to the primary, licensed, users\\' frequency bands. Cognitive technology involves two main tasks: 1) sensing the wireless medium to assess the presence of the primary users and 2) designing secondary spectrum access techniques that maximize the secondary users\\' benefits while maintaining the primary users\\' privileged status. On the spectrum sensing side, we make two contributions. First, we maximize a utility function representing the secondary throughput while constraining the collision probability with the primary below a certain value. We optimize therein the channel sensing time, the sensing decision threshold, the channel probing time, together with the channel sensing order for wideband primary channels. Second, we design a cooperative spectrum sensing technique termed sensing with equal gain combining whereby cognitive radios simultaneously transmit their sensing results to the fusion center over multipath fading reporting channels. The proposed scheme is shown to outperform orthogonal reporting systems in terms of achievable secondary throughput and to be robust against phase and synchronization errors. On the spectrum access side, we make four contributions. First, we design a secondary scheduling scheme with the goal of minimizing the secondary queueing delay under constraints on the average secondary transmit power and the maximum tolerable primary outage probability. Second, we design another secondary scheduling scheme based on the spectrum sensing results and the primary automatic repeat request feedback. The optimal medium access probabilities are obtained via maximizing the secondary throughput subject to constraints that guarantee quality of service parameters for the primary. Third, we propose a three-message superposition coding scheme to maximize the secondary throughput without

  11. Internet Access Practices and Employee Attitudes toward Internet Usage Policy Implementation in Selected Philippines Financial Institutions

    Directory of Open Access Journals (Sweden)

    Maria Sagrario R. Simbulan

    2004-06-01

    Full Text Available This study explores the employees’ concept of appropriate use of Internet facilities as well as their perception of the rights and liabilities, both of the individual and of the organization, associated with the grant of Internet access privileges in the workplace. It further examines how employees perceive their organization’s monitoring of employees online activities and the use of an Internet Usage Policy, whether these are seen as monitoring and control mechanisms or as ways to ensure that Internet access facilities are shared equitably and used responsibly. While the issue of the impact of Internet access on employee productivity will not directly be tackled, the study will provide insights into the frequency and type of usage of Internet facilities in the workplace. Considering the sizeable investment that an organization makes to provide Internet facilities, determining how employees use these facilities to achieve the goals of the organization is, in the very least, interesting and for most organizations concerned with their survival in difficult times, critically important.

  12. Modeling Accessibility of Screening and Treatment Facilities for Older Adults using Transportation Networks.

    Science.gov (United States)

    Zhang, Qiuyi; Northridge, Mary E; Jin, Zhu; Metcalf, Sara S

    2018-04-01

    Increased lifespans and population growth have resulted in an older U.S. society that must reckon with the complex oral health needs that arise as adults age. Understanding accessibility to screening and treatment facilities for older adults is necessary in order to provide them with preventive and restorative services. This study uses an agent-based model to examine the accessibility of screening and treatment facilities via transportation networks for older adults living in the neighborhoods of northern Manhattan, New York City. Older adults are simulated as socioeconomically distinct agents who move along a GIS-based transportation network using transportation modes that mediate their access to screening and treatment facilities. This simulation model includes four types of mobile agents as a simplifying assumption: walk, by car, by bus, or by van (i.e., a form of transportation assistance for older adults). These mobile agents follow particular routes: older adults who travel by car, bus, and van follow street roads, whereas pedestrians follow walkways. The model enables the user to focus on one neighborhood at a time for analysis. The spatial dimension of an older adult's accessibility to screening and treatment facilities is simulated through the travel costs (indicated by travel time or distance) incurred in the GIS-based model environment, where lower travel costs to screening and treatment facilities imply better access. This model provides a framework for representing health-seeking behavior that is contextualized by a transportation network in a GIS environment.

  13. Foundation for a Time Interval Access Control Model

    National Research Council Canada - National Science Library

    Afinidad, Francis B; Levin, Timothy E; Irvine, Cynthia E; Nguyen, Thuy D

    2005-01-01

    A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects and objects, and a time interval access graph...

  14. Associations between access to recreational physical activity facilities and body mass index in Scottish adults.

    Science.gov (United States)

    Ellaway, Anne; Lamb, Karen E; Ferguson, Neil S; Ogilvie, David

    2016-08-09

    The aim of this country-wide study was to link individual health and behavioural data with area-level spatial data to examine whether the body mass index (BMI) of adults was associated with access to recreational physical activity (PA) facilities by different modes of transport (bus, car, walking, cycling) and the extent to which any associations were mediated by PA participation. Data on individual objectively-measured BMI, PA (number of days of (a) ≥20 min of moderate-to-vigorous PA, and (b) ≥15 min of sport or exercise, in previous 4 weeks), and socio-demographic characteristics were obtained from a nationally representative sample of 6365 adults. The number of accessible PA facilities per 1,000 individuals in each small area (data zones) was obtained by mapping a representative list of all fixed PA facilities throughout mainland Scotland. A novel transport network was developed for the whole country, and routes on foot, by bike, by car and by bus from the weighted population centroid of each data zone to each facility were calculated. Separate multilevel models were fitted to examine associations between BMI and each of the 24 measures of accessibility of PA facilities and BMI, adjusting for age, gender, longstanding illness, car availability, social class, dietary quality and urban/rural classification. We found associations (p < 0.05) between BMI and 7 of the 24 accessibility measures, with mean BMI decreasing with increasing accessibility of facilities-for example, an estimated decrease of 0.015 BMI units per additional facility within a 20-min walk (p = 0.02). None of these accessibility measures were found to be associated with PA participation. Our national study has shown that some measures of the accessibility of PA facilities by different modes of transport (particularly by walking and cycling) were associated with BMI; but PA participation, as measured here, did not appear to play a part in this relationship. Understanding the multi

  15. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  16. Acoustic Metadata Management and Transparent Access to Networked Oceanographic Data Sets

    Science.gov (United States)

    2015-09-30

    Transparent Access to Networked Oceanographic Data Sets Marie A. Roch Dept. of Computer Science San Diego State University 5500 Campanile Drive San...specific technologies for processing Excel spreadsheets and Access databases. The architecture (Figure 4) is based on a client-server model...Keesey, M. S., Lieske, J. H., Ostro, S. J., Standish, E. M., and Wimberly, R. N. (1996). "JPL’s On-Line Solar System Data Service," B. Am. Astron

  17. Toward more effective regional networks: a multi-method study on top-down stimulated networks within the Dutch public-policy areas of education and employment

    NARCIS (Netherlands)

    Klaster, E.

    2015-01-01

    Regional networks have become a popular way for the Dutch central government to translate national ambitions into regional policies and actions. This thesis focuses on regional networks in the public-policy fields of education and employment, which consist of various actors, including schools, local

  18. Simple measurement-based admission control for DiffServ access networks

    Science.gov (United States)

    Lakkakorpi, Jani

    2002-07-01

    In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.

  19. Gain transient control for wavelength division multiplexed access networks using semiconductor optical amplifiers

    DEFF Research Database (Denmark)

    Gibbon, Timothy Braidwood; Osadchiy, Alexey Vladimirovich; Kjær, Rasmus

    2009-01-01

    Gain transients can severely hamper the upstream network performance in wavelength division multiplexed (WDM) access networks featuring erbium doped fiber amplifiers (EDFAs) or Raman amplification. We experimentally demonstrate for the first time using 10 Gb/s fiber transmission bit error rate...... measurements how a near-saturated semiconductor optical amplifier (SOA) can be used to control these gain transients. An SOA is shown to reduce the penalty of transients originating in an EDFA from 2.3 dB to 0.2 dB for 10 Gb/s transmission over standard single mode fiber using a 231-1 PRBS pattern. The results...... suggest that a single SOA integrated within a WDM receiver at the metro node could offer a convenient all-optical solution for upstream transient controlin WDM access networks....

  20. Association between neighborhood need and spatial access to food stores and fast food restaurants in neighborhoods of colonias.

    Science.gov (United States)

    Sharkey, Joseph R; Horel, Scott; Han, Daikwon; Huber, John C

    2009-02-16

    To determine the extent to which neighborhood needs (socioeconomic deprivation and vehicle availability) are associated with two criteria of food environment access: 1) distance to the nearest food store and fast food restaurant and 2) coverage (number) of food stores and fast food restaurants within a specified network distance of neighborhood areas of colonias, using ground-truthed methods. Data included locational points for 315 food stores and 204 fast food restaurants, and neighborhood characteristics from the 2000 U.S. Census for the 197 census block group (CBG) study area. Neighborhood deprivation and vehicle availability were calculated for each CBG. Minimum distance was determined by calculating network distance from the population-weighted center of each CBG to the nearest supercenter, supermarket, grocery, convenience store, dollar store, mass merchandiser, and fast food restaurant. Coverage was determined by calculating the number of each type of food store and fast food restaurant within a network distance of 1, 3, and 5 miles of each population-weighted CBG center. Neighborhood need and access were examined using Spearman ranked correlations, spatial autocorrelation, and multivariate regression models that adjusted for population density. Overall, neighborhoods had best access to convenience stores, fast food restaurants, and dollar stores. After adjusting for population density, residents in neighborhoods with increased deprivation had to travel a significantly greater distance to the nearest supercenter or supermarket, grocery store, mass merchandiser, dollar store, and pharmacy for food items. The results were quite different for association of need with the number of stores within 1 mile. Deprivation was only associated with fast food restaurants; greater deprivation was associated with fewer fast food restaurants within 1 mile. CBG with greater lack of vehicle availability had slightly better access to more supercenters or supermarkets, grocery

  1. Association between neighborhood need and spatial access to food stores and fast food restaurants in neighborhoods of Colonias

    Directory of Open Access Journals (Sweden)

    Han Daikwon

    2009-02-01

    Full Text Available Abstract Objective To determine the extent to which neighborhood needs (socioeconomic deprivation and vehicle availability are associated with two criteria of food environment access: 1 distance to the nearest food store and fast food restaurant and 2 coverage (number of food stores and fast food restaurants within a specified network distance of neighborhood areas of colonias, using ground-truthed methods. Methods Data included locational points for 315 food stores and 204 fast food restaurants, and neighborhood characteristics from the 2000 U.S. Census for the 197 census block group (CBG study area. Neighborhood deprivation and vehicle availability were calculated for each CBG. Minimum distance was determined by calculating network distance from the population-weighted center of each CBG to the nearest supercenter, supermarket, grocery, convenience store, dollar store, mass merchandiser, and fast food restaurant. Coverage was determined by calculating the number of each type of food store and fast food restaurant within a network distance of 1, 3, and 5 miles of each population-weighted CBG center. Neighborhood need and access were examined using Spearman ranked correlations, spatial autocorrelation, and multivariate regression models that adjusted for population density. Results Overall, neighborhoods had best access to convenience stores, fast food restaurants, and dollar stores. After adjusting for population density, residents in neighborhoods with increased deprivation had to travel a significantly greater distance to the nearest supercenter or supermarket, grocery store, mass merchandiser, dollar store, and pharmacy for food items. The results were quite different for association of need with the number of stores within 1 mile. Deprivation was only associated with fast food restaurants; greater deprivation was associated with fewer fast food restaurants within 1 mile. CBG with greater lack of vehicle availability had slightly better

  2. Graphs for information security control in software defined networks

    Science.gov (United States)

    Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.

    2017-07-01

    Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.

  3. ODIN. Online Database Information Network: ODIN Policy & Procedure Manual.

    Science.gov (United States)

    Townley, Charles T.; And Others

    Policies and procedures are outlined for the Online Database Information Network (ODIN), a cooperative of libraries in south-central Pennsylvania, which was organized to improve library services through technology. The first section covers organization and goals, members, and responsibilities of the administrative council and libraries. Patrons…

  4. Design Aspects of An Energy-Efficient, Lightweight Medium Access Control Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2006-01-01

    This document gives an overview of the most relevant design aspects of the lightweight medium access control (LMAC) protocol [16] for wireless sensor networks (WSNs). These aspects include selfconfiguring and localized operation of the protocol, time synchronization in multi-hop networks, network

  5. Implementing the data preservation and open access policy in CMS

    International Nuclear Information System (INIS)

    Lassila-Perini, K; Lampén, T; Luukka, P; Alverson, G; Cabrillo, I; Calderon, A; Marco, J; Colling, D; Huffman, A; Hildreth, M; McCauley, T; Sonnenschein, L

    2014-01-01

    Implementation of the CMS policy on long-term data preservation, re-use and open access has started. Current practices in providing data additional to published papers and distributing simplified data-samples for outreach are promoted and consolidated. The first measures have been taken for analysis and data preservation for the internal use of the collaboration and for open access to part of the data. Two complementary approaches are followed. First, a virtual machine environment, which will pack all ingredients needed to compile and run a software release with which the legacy data was reconstructed. Second, a validation framework, maintaining the capability not only to read the old raw data, but also to reprocess them with an updated release or to another format to help ensure long-term reusability of the legacy data.

  6. Open DOAR the Directory of Open Access Repositories

    CERN Multimedia

    CERN. Geneva

    2005-01-01

    The last year has seen wide-spread growth in the idea of using open access repositories as a part of a research institution's accepted infrastructure. Policy development from institutions and funding bodies has also supported the growth of the repository network. The next stage of expansion will be in the provision of services and cross-repository facilities and resources. Of course, it is hoped that these will then establish a feed-back loop to encourage repository population and further repository establishment, as the potential of open access to research materials is realised. The growth of repositories has been organic, with a variety of different repositories based in departments, institutions, funding agencies or subject communities, with a range of content, both in type and subject. Existing repositories are expanding their holdings, from eprints to associated research data-sets, or with learning objects and multimedia material. This presentation will look at the development of the Directory of Open Ac...

  7. Monday 9 January 2006: RESTRICTED ACCESS to the Technical Network

    CERN Multimedia

    CNIC Users Exchange and IT/CS

    2005-01-01

    As of Monday 9 January 2006, Ethernet access from the general CERN network to the Technical Network (TN) will be restricted in order to improve security on the TN. As a result, all Ethernet communication between the General Purpose Network (GPN) and the TN will be filtered. Only communication lines to the general IT services such as DNS, TP, NICE, DFS, AFS, Antivirus, Linux installation servers, License servers, OracleDB, TSM backup servers and dedicated AB and TS servers on the GPN will remain open. Please make sure that all your devices are registered properly in the network database (LANDB): http://network.cern.ch/. You are encouraged to make proper use of the 'Tag' and 'Description' fields in order to identify your system later on. If your system depends on special services on the GPN or is split between the GPN and the TN, e.g. consists of devices (PCs, PLCs, VME crates, webcams, etc.) connected to both the TN and the GPN, please contact the Technical-Network.Administrator@cern.ch . They will include...

  8. Accounting for Energy Cost When Designing Energy-Efficient Wireless Access Networks

    Directory of Open Access Journals (Sweden)

    Greta Vallero

    2018-03-01

    Full Text Available Because of the increase of the data traffic demand, wireless access networks, through which users access telecommunication services, have expanded, in terms of size and of capability and, consequently, in terms of power consumption. Therefore, costs to buy the necessary power for the supply of base stations of those networks is becoming very high, impacting the communication cost. In this study, strategies to reduce the amount of money spent for the purchase of the energy consumed by the base stations are proposed for a network powered by solar panels, energy batteries and the power grid. First, the variability of the energy prices is exploited. It provides a cost reduction of up to 30%, when energy is bought in advance. If a part of the base stations is deactivated when the energy price is higher than a given threshold, a compromise between the energy cost and the user coverage drop is needed. In the simulated scenario, the necessary energy cost can be reduced by more than 40%, preserving the user coverage by greater than 94%. Second, the network is introduced to the energy market: it buys and sells energy from/to the traditional power grid. Finally, costs are reduced by the reduction of power consumption of the network, achieved by using microcell base stations. In the considered scenario, up to a 31% cost reduction is obtained, without the deterioration of the quality of service, but a huge Capex expenditure is required.

  9. The ENSDF radioactivity data base for IBM-PC and computer network access

    International Nuclear Information System (INIS)

    Ekstroem, P.; Spanier, L.

    1989-08-01

    A data base system for radioactivity gamma rays is described. A base with approximately 15000 gamma rays from 2777 decays is available for installation on the hard disk of a PC, and a complete system with approximately 73000 gamma rays is available for on-line access via the NORDic University computer NETwork (NORDUNET) and the Swedish University computer NETwork (SUNET)

  10. Trans-European transport networks and urban systems in European Union

    OpenAIRE

    Maksin-Mićić Marija

    2003-01-01

    The trans-European transport network has different effects at interregional macro-regional and mezzo-regional level, and its effectiveness rises at the lower regional levels. Possible approaches to the trans-European transport network impact and effect survey and policy options have been pointed out. In that respect the brief review of survies, strategic framework and policies in European Union has been given. The importance of increased accessibility and mobility for regional expansion and f...

  11. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever-ch...

  12. A system to build distributed multivariate models and manage disparate data sharing policies: implementation in the scalable national network for effectiveness research.

    Science.gov (United States)

    Meeker, Daniella; Jiang, Xiaoqian; Matheny, Michael E; Farcas, Claudiu; D'Arcy, Michel; Pearlman, Laura; Nookala, Lavanya; Day, Michele E; Kim, Katherine K; Kim, Hyeoneui; Boxwala, Aziz; El-Kareh, Robert; Kuo, Grace M; Resnic, Frederic S; Kesselman, Carl; Ohno-Machado, Lucila

    2015-11-01

    Centralized and federated models for sharing data in research networks currently exist. To build multivariate data analysis for centralized networks, transfer of patient-level data to a central computation resource is necessary. The authors implemented distributed multivariate models for federated networks in which patient-level data is kept at each site and data exchange policies are managed in a study-centric manner. The objective was to implement infrastructure that supports the functionality of some existing research networks (e.g., cohort discovery, workflow management, and estimation of multivariate analytic models on centralized data) while adding additional important new features, such as algorithms for distributed iterative multivariate models, a graphical interface for multivariate model specification, synchronous and asynchronous response to network queries, investigator-initiated studies, and study-based control of staff, protocols, and data sharing policies. Based on the requirements gathered from statisticians, administrators, and investigators from multiple institutions, the authors developed infrastructure and tools to support multisite comparative effectiveness studies using web services for multivariate statistical estimation in the SCANNER federated network. The authors implemented massively parallel (map-reduce) computation methods and a new policy management system to enable each study initiated by network participants to define the ways in which data may be processed, managed, queried, and shared. The authors illustrated the use of these systems among institutions with highly different policies and operating under different state laws. Federated research networks need not limit distributed query functionality to count queries, cohort discovery, or independently estimated analytic models. Multivariate analyses can be efficiently and securely conducted without patient-level data transport, allowing institutions with strict local data storage

  13. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    Directory of Open Access Journals (Sweden)

    Antonio F. Gomez Skarmeta

    2013-11-01

    Full Text Available Internet of Things (IoT networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA has been standardized by the Internet engineering task force (IETF to carry the Extensible Authentication Protocol (EAP, which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1 to demonstrate the feasibility of EAP/PANA in IoT devices; (2 to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS, called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  14. PANATIKI: a network access control implementation based on PANA for IoT devices.

    Science.gov (United States)

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  15. Allocation of spectral and spatial modes in multidimensional metro-access optical networks

    Science.gov (United States)

    Gao, Wenbo; Cvijetic, Milorad

    2018-04-01

    Introduction of spatial division multiplexing (SDM) has added a new dimension in an effort to increase optical fiber channel capacity. At the same time, it can also be explored as an advanced optical networking tool. In this paper, we have investigated the resource allocation to end-users in multidimensional networking structure with plurality of spectral and spatial modes actively deployed in different networking segments. This presents a more comprehensive method as compared to the common practice where the segments of optical network are analyzed independently since the interaction between network hierarchies is included into consideration. We explored the possible transparency from the metro/core network to the optical access network, analyzed the potential bottlenecks from the network architecture perspective, and identified an optimized network structure. In our considerations, the viability of optical grooming through the entire hierarchical all-optical network is investigated by evaluating the effective utilization and spectral efficiency of the network architecture.

  16. Increasing access into higher education: Insights from the 2011 African Network on Evidence-to-Action on Disability Symposium – Education Commission

    Directory of Open Access Journals (Sweden)

    Marcia Lyner-Cleophas

    2014-06-01

    Full Text Available This article provides some insights into the challenges regarding inclusion in higher education of students with disabilities. It does this by elucidating aspects of the proceedings of the Education Commission at the African Network on Evidence-to-Action on Disability (AfriNEAD Symposium, which took place in Zimbabwe in November 2011. The presentations specifically focused on the education of people with disabilities from early childhood through to higher education. This article, however, is informed by presentations focusing on increasing access to higher education. The article is focused on the implementation of evidence in practice, research and policies stemming from rigorous debate and scientific foundations, whilst taking into account the dynamic realities of the higher education context. Themes such as the systemic approach needed for inclusion to be successful, increasing access and the dynamic role of students with disabilities are highlighted.

  17. Increasing access into higher education: Insights from the 2011 African Network on Evidence-to-Action on Disability Symposium – Education Commission

    Science.gov (United States)

    Swart, Estelle; Chataika, Tsitsi; Bell, Diane

    2014-01-01

    This article provides some insights into the challenges regarding inclusion in higher education of students with disabilities. It does this by elucidating aspects of the proceedings of the Education Commission at the African Network on Evidence-to-Action on Disability (AfriNEAD) Symposium, which took place in Zimbabwe in November 2011. The presentations specifically focused on the education of people with disabilities from early childhood through to higher education. This article, however, is informed by presentations focusing on increasing access to higher education. The article is focused on the implementation of evidence in practice, research and policies stemming from rigorous debate and scientific foundations, whilst taking into account the dynamic realities of the higher education context. Themes such as the systemic approach needed for inclusion to be successful, increasing access and the dynamic role of students with disabilities are highlighted. PMID:28730011

  18. Open Learning for Smart Education: Open educational policies, strategies & access for all

    NARCIS (Netherlands)

    Stracke, Christian M.

    2016-01-01

    keynote on Open Learning at the International IEEE EDUCON Conference 2016: I will speak about “Open Learning for Smart Education: Open educational policies, strategies and access for all”. This year EDUCON is taking place from 10th to 13th of April 2016 in Abu Dhabi. My questions of the keynote

  19. Resource allocation in heterogeneous cloud radio access networks: advances and challenges

    KAUST Repository

    Dahrouj, Hayssam; Douik, Ahmed S.; Dhifallah, Oussama Najeeb; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    , becomes a necessity. By connecting all the base stations from different tiers to a central processor (referred to as the cloud) through wire/wireline backhaul links, the heterogeneous cloud radio access network, H-CRAN, provides an open, simple

  20. A Federated Network for Translational Cancer Research Using Clinical Data and Biospecimens.

    Science.gov (United States)

    Jacobson, Rebecca S; Becich, Michael J; Bollag, Roni J; Chavan, Girish; Corrigan, Julia; Dhir, Rajiv; Feldman, Michael D; Gaudioso, Carmelo; Legowski, Elizabeth; Maihle, Nita J; Mitchell, Kevin; Murphy, Monica; Sakthivel, Mayurapriyan; Tseytlin, Eugene; Weaver, JoEllen

    2015-12-15

    Advances in cancer research and personalized medicine will require significant new bridging infrastructures, including more robust biorepositories that link human tissue to clinical phenotypes and outcomes. In order to meet that challenge, four cancer centers formed the Text Information Extraction System (TIES) Cancer Research Network, a federated network that facilitates data and biospecimen sharing among member institutions. Member sites can access pathology data that are de-identified and processed with the TIES natural language processing system, which creates a repository of rich phenotype data linked to clinical biospecimens. TIES incorporates multiple security and privacy best practices that, combined with legal agreements, network policies, and procedures, enable regulatory compliance. The TIES Cancer Research Network now provides integrated access to investigators at all member institutions, where multiple investigator-driven pilot projects are underway. Examples of federated search across the network illustrate the potential impact on translational research, particularly for studies involving rare cancers, rare phenotypes, and specific biologic behaviors. The network satisfies several key desiderata including local control of data and credentialing, inclusion of rich phenotype information, and applicability to diverse research objectives. The TIES Cancer Research Network presents a model for a national data and biospecimen network. ©2015 American Association for Cancer Research.

  1. Can free open access resources strengthen knowledge-based emerging public health priorities, policies and programs in Africa?

    Science.gov (United States)

    Tambo, Ernest; Madjou, Ghislaine; Khayeka-Wandabwa, Christopher; Tekwu, Emmanuel N; Olalubi, Oluwasogo A; Midzi, Nicolas; Bengyella, Louis; Adedeji, Ahmed A; Ngogang, Jeanne Y

    2016-01-01

    Tackling emerging epidemics and infectious diseases burden in Africa requires increasing unrestricted open access and free use or reuse of regional and global policies reforms as well as timely communication capabilities and strategies. Promoting, scaling up data and information sharing between African researchers and international partners are of vital importance in accelerating open access at no cost. Free Open Access (FOA) health data and information acceptability, uptake tactics and sustainable mechanisms are urgently needed. These are critical in establishing real time and effective knowledge or evidence-based translation, proven and validated approaches, strategies and tools to strengthen and revamp health systems.  As such, early and timely access to needed emerging public health information is meant to be instrumental and valuable for policy-makers, implementers, care providers, researchers, health-related institutions and stakeholders including populations when guiding health financing, and planning contextual programs.

  2. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Meng Yi

    2016-11-01

    Full Text Available This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  3. Government policy and access to natural gas service in Canada

    International Nuclear Information System (INIS)

    Plourde, A.; Ryan, D.L.

    1995-01-01

    As part of the Canadian energy policy between the mid-1970's to the mid-1980's, consumers were encouraged to use fuels alternative to oil. The first set of policy issues involved measures to provide consumers with incentives to switch to non-oil-burning equipment, whereas the second set of. policy papers emphasized the expansion of the natural gas distribution system. More than $1 billion have been spent on the gas pipeline expansion project. Consequences of program expenditures in each province were examined. With the exception of Manitoba, it was found that annual net pipeline additions were higher during the program period, indicating that the program policies induced these activities to occur sooner than if the policies were not in place. Kilometres of gas pipeline per individual constructed was highest in Quebec, where construction proceeded mainly between the more densely populated centres. In contrast, in Saskatchewan and Alberta, the program encouraged natural gas pipeline construction in rural areas with lower populations. Without the program, these areas may not have had access to natural gas for a very long time. It was concluded that, in this, and some other instances, public investment had the effect of accelerating developments, or encouraging the completion of projects that otherwise would not have been undertaken. It was suggested that in the future decision-makers consider the costs of changes in activity patterns prior to designing such programs. 2 figs., 1 table

  4. Applying 4-regular grid structures in large-scale access networks

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Knudsen, Thomas P.; Patel, Ahmed

    2006-01-01

    4-Regular grid structures have been used in multiprocessor systems for decades due to a number of nice properties with regard to routing, protection, and restoration, together with a straightforward planar layout. These qualities are to an increasing extent demanded also in largescale access...... networks, but concerning protection and restoration these demands have been met only to a limited extent by the commonly used ring and tree structures. To deal with the fact that classical 4-regular grid structures are not directly applicable in such networks, this paper proposes a number of extensions...... concerning restoration, protection, scalability, embeddability, flexibility, and cost. The extensions are presented as a tool case, which can be used for implementing semi-automatic and in the longer term full automatic network planning tools....

  5. Global Scenarios of Air Pollution until 2030: Combining Air Quality, Climate Change and Energy Access Policies

    Science.gov (United States)

    Rao, S.; Dentener, F. J.; Klimont, Z.; Riahi, K.

    2011-12-01

    Outdoor air pollution is increasingly recognized as a significant contributor to global health outcomes. This has led to the implementation of a number of air quality policies worldwide, with total air pollution control costs in 2005 estimated at US$195 billion. More than 80% of the world's population is still found to be exposed to PM2.5 concentrations exceeding WHO air quality guidelines and health impacts resulting from these exposures estimated at around 2-5% of the global disease burden. Key questions to answer are 1) How will pollutant emissions evolve in the future given developments in the energy system and how will energy and environmental policies influence such emission trends. 2) What implications will this have for resulting exposures and related health outcomes. In order to answer these questions, varying levels of stringency of air quality legislation are analyzed in combination with policies on universal access to clean cooking fuels and limiting global temperature change to 2°C in 2100. Bottom-up methodologies using energy emissions modeling are used to derive sector-based pollutant emission trajectories until 2030. Emissions are spatially downscaled and used in combination with a global transport chemistry model to derive ambient concentrations of PM2.5. Health impacts of these exposures are further estimated consistent with WHO data and methodology. The results indicate that currently planned air quality legislation combined with rising energy demand will be insufficient in controlling future emissions growth in developing countries. In order to achieve significant reductions in pollutant emissions of the order of more than 50% from 2005 levels and reduce exposures to levels consistent with WHO standards, it will be necessary to increase the stringency of such legislations and combine them with policies on energy access and climate change. Combined policies also result in reductions in air pollution control costs as compared to those associated

  6. Application-Defined Decentralized Access Control

    Science.gov (United States)

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  7. Combining apps targeting professionals and senior citizens to improve housing accessibility and influence housing provision policies

    DEFF Research Database (Denmark)

    Helle, Tina; Iwarsson, Susanne; Lunn, Tine Bieber

    2015-01-01

    Two separate apps that address the increasingly important issue of accessible housing for senior citizens have been developed in different project settings. One of the apps was developed to facilitate the process for professional raters to assess housing accessibility in the context of individual...... and influence housing provision policies....

  8. Patient access to medicines in two countries with similar health systems and differing medicines policies: Implications from a comprehensive literature review.

    Science.gov (United States)

    Babar, Zaheer-Ud-Din; Gammie, Todd; Seyfoddin, Ali; Hasan, Syed Shahzad; Curley, Louise E

    2018-04-13

    Countries with similar health systems but different medicines policies might result in substantial medicines usage differences and resultant outcomes. The literature is sparse in this area. To review pharmaceutical policy research in New Zealand and Australia and discuss differences between the two countries and the impact these differences may have on subsequent medicine access. A review of the literature (2008-2016) was performed to identify relevant, peer-reviewed articles. Systematic searches were conducted across the six databases MEDLINE, PubMed, Science Direct, Springer Links, Scopus and Google Scholar. A further search of journals of high relevance was also conducted. Using content analysis, a narrative synthesis of pharmaceutical policy research influencing access to medicines in Australia and New Zealand was conducted. The results were critically assessed in the context of policy material available via grey literature from the respective countries. Key elements regarding pharmaceutical policy were identified from the 35 research papers identified for this review. Through a content analysis, three broad categories of pharmaceutical policy were found, which potentially could influence patient access to medicines in each country; the national health system, pricing and reimbursement. Within these three categories, 9 subcategories were identified: national health policy, pharmacy system, marketing authorization and regulation, prescription to non-prescription medicine switch, orphan drug policies, generic medicine substitution, national pharmaceutical schedule and health technology assessment, patient co-payment and managed entry agreements. This review systematically evaluated the current literature and identified key areas of difference in policy between Australia and NZ. Australia appears to cover and reimburse a greater number of medicines, while New Zealand achieves much lower prices for medicines than their Australian counterparts and has been more

  9. Socioeconomic disparities in access to ART treatment and the differential impact of a policy that increased consumer costs.

    Science.gov (United States)

    Chambers, G M; Hoang, V P; Illingworth, P J

    2013-11-01

    socioeconomic advantage and disadvantage of small geographic areas, and therefore may not reflect the SES of an individual. Additionally, the policy impact was limited to the 12 months following its introduction, and may not reflect longer term trends in ART treatment. While financial barriers are an important obstacle to equitable access to ARTs, socioeconomic differences in utilization are likely to persist in countries with supportive public funding, due in part to differences in childbearing patterns and treatment seeking behaviour. Policy makers should be informed of the impact that changes in the level of cost subsidization have on access to ART treatment by different socioeconomic groups. G.M.C. receives grant support to her institution from the Australian Government, Australian Research Council (ARC) Linkage Grant No LP1002165; ARC Linkage Grant Partner Organisations are IVFAustralia, Melbourne IVF and Queensland Fertility Group. V.P.H. is employed as an Economics Research Associate on the same grant. P.J.I. is Medical Director of the IVF Clinic, IVFAustralia and has a financial interest in the parent group, Virtus. N/A.

  10. EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks

    Science.gov (United States)

    Zrelli, Saber; Okabe, Nobuo; Shinoda, Yoichi

    The wireless medium is a key technology for enabling ubiquitous and continuous network connectivity. It is becoming more and more important in our daily life especially with the increasing adoption of networking technologies in many fields such as medical care and transportation systems. Although most wireless technologies nowadays provide satisfying bandwidth and higher speeds, several of these technologies still lack improvements with regard to handoff performance. In this paper, we focus on wireless network technologies that rely on the Extensible Authentication Protocol for mutual authentication between the station and the access network. Such technologies include local area wireless networks (IEEE 802.11) as well as broadband wireless networks (IEEE 802.16). We present a new EAP authentication method based on a three party authentication scheme, namely Kerberos, that considerably shortens handoff delays. Compared to other methods, the proposed method has the advantage of not requiring any changes on the access points, making it readily deployable at reasonable costs.

  11. Performance analysis and improvement of WPAN MAC for home networks.

    Science.gov (United States)

    Mehta, Saurabh; Kwak, Kyung Sup

    2010-01-01

    The wireless personal area network (WPAN) is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC) is proposed to coordinate the access to the wireless medium among the competing devices, especially for short range and high data rate applications in home networks. In this paper we use analytical modeling to study the performance analysis of WPAN (IEEE 802.15.3) MAC in terms of throughput, efficient bandwidth utilization, and delay with various ACK policies under error channel condition. This allows us to introduce a K-Dly-ACK-AGG policy, payload size adjustment mechanism, and Improved Backoff algorithm to improve the performance of the WPAN MAC. Performance evaluation results demonstrate the impact of our improvements on network capacity. Moreover, these results can be very useful to WPAN application designers and protocol architects to easily and correctly implement WPAN for home networking.

  12. Performance Analysis and Improvement of WPAN MAC for Home Networks

    Directory of Open Access Journals (Sweden)

    Saurabh Mehta

    2010-03-01

    Full Text Available The wireless personal area network (WPAN is an emerging wireless technology for future short range indoor and outdoor communication applications. The IEEE 802.15.3 medium access control (MAC is proposed to coordinate the access to the wireless medium among the competing devices, especially for short range and high data rate applications in home networks. In this paper we use analytical modeling to study the performance analysis of WPAN (IEEE 802.15.3 MAC in terms of throughput, efficient bandwidth utilization, and delay with various ACK policies under error channel condition. This allows us to introduce a K-Dly-ACK-AGG policy, payload size adjustment mechanism, and Improved Backoff algorithm to improve the performance of the WPAN MAC. Performance evaluation results demonstrate the impact of our improvements on network capacity. Moreover, these results can be very useful to WPAN application designers and protocol architects to easily and correctly implement WPAN for home networking.

  13. Association between quality domains and health care spending across physician networks

    Science.gov (United States)

    Rahman, Farah; Guan, Jun; Glazier, Richard H.; Brown, Adalsteinn; Bierman, Arlene S.; Croxford, Ruth; Stukel, Therese A.

    2018-01-01

    One of the more fundamental health policy questions is the relationship between health care quality and spending. A better understanding of these relationships is needed to inform health systems interventions aimed at increasing quality and efficiency of care. We measured 65 validated quality indicators (QI) across Ontario physician networks. QIs were aggregated into domains representing six dimensions of care: screening and prevention, evidence-based medications, hospital-community transitions (7-day post-discharge visit with a primary care physician; 30-day post-discharge visit with a primary care physician and specialist), potentially avoidable hospitalizations and emergency department (ED) visits, potentially avoidable readmissions and unplanned returns to the ED, and poor cancer end of life care. Each domain rate was computed as a weighted average of QI rates, weighting by network population at risk. We also measured overall and sector-specific per capita healthcare network spending. We evaluated the associations between domain rates, and between domain rates and spending using weighted correlations, weighting by network population at risk, using an ecological design. All indicators were measured using Ontario health administrative databases. Large variations were seen in timely hospital-community transitions and potentially avoidable hospitalizations. Networks with timely hospital-community transitions had lower rates of avoidable admissions and readmissions (r = -0.89, -0.58, respectively). Higher physician spending, especially outpatient primary care spending, was associated with lower rates of avoidable hospitalizations (r = -0.83) and higher rates of timely hospital-community transitions (r = 0.81) and moderately associated with lower readmission rates (r = -0.46). Investment in effective primary care services may help reduce burden on the acute care sector and associated expenditures. PMID:29614131

  14. Geographical accessibility and spatial coverage modeling of the primary health care network in the Western Province of Rwanda

    Directory of Open Access Journals (Sweden)

    Huerta Munoz Ulises

    2012-09-01

    Full Text Available Abstract Background Primary health care is essential in improving and maintaining the health of populations. It has the potential to accelerate achievement of the Millennium Development Goals and fulfill the “Health for All” doctrine of the Alma-Ata Declaration. Understanding the performance of the health system from a geographic perspective is important for improved health planning and evidence-based policy development. The aims of this study were to measure geographical accessibility, model spatial coverage of the existing primary health facility network, estimate the number of primary health facilities working under capacity and the population underserved in the Western Province of Rwanda. Methods This study uses health facility, population and ancillary data for the Western Province of Rwanda. Three different travel scenarios utilized by the population to attend the nearest primary health facility were defined with a maximum travelling time of 60 minutes: Scenario 1 – walking; Scenario 2 – walking and cycling; and Scenario 3 – walking and public transportation. Considering these scenarios, a raster surface of travel time between primary health facilities and population was developed. To model spatial coverage and estimate the number of primary health facilities working under capacity, the catchment area of each facility was calculated by taking into account population coverage capacity, the population distribution, the terrain topography and the travelling modes through the different land categories. Results Scenario 2 (walking and cycling has the highest degree of geographical accessibility followed by Scenario 3 (walking and public transportation. The lowest level of accessibility can be observed in Scenario 1 (walking. The total population covered differs depending on the type of travel scenario. The existing primary health facility network covers only 26.6% of the population in Scenario 1. In Scenario 2, the use of a bicycle

  15. Enabling Broadband as Commodity within Access Networks: A QoS Recipe

    Science.gov (United States)

    Areizaga, Enrique; Foglar, Andreas; Elizondo, Antonio J.; Geilhardt, Frank

    This paper describes the QoS features that will transform the access networks landscape in order to bring “Broadband” as a commodity while setting up the pillars of the “Future Media Internet”. Quality of Experience is obviously key for emerging and future services. Broadcasting services will first need to equal the QoE of their counterparts in the Open-air market (for IP-TV examples would be artifact-free, no picture freezing, fast zapping times) and offer new features often using interactivity (Time-shifted TV, access to more content, 3DTV with feeling of presence). The huge variety of communications alternatives will lead to different requirements per customer, whose needs will also be dependent on parameters like where the connection is made, the time of the day/day of the week/period of the year or even his/her mood. Today’s networks, designed for providing just Broadband connectivity, will not be enough to satisfy customer’s needs and will necessarily support the introduction of new and innovative services. The Networks of the future should learn from the way the users are communicating, what services they are using, where, when, and how, and adapt accordingly.

  16. CERN’s Computing rules updated to include policy for control systems

    CERN Multimedia

    IT Department

    2008-01-01

    The use of CERN’s computing facilities is governed by rules defined in Operational Circular No. 5 and its subsidiary rules of use. These rules are available from the web site http://cern.ch/ComputingRules. Please note that the subsidiary rules for Internet/Network use have been updated to include a requirement that control systems comply with the CNIC(Computing and Network Infrastructure for Control) Security Policy. The security policy for control systems, which was approved earlier this year, can be accessed at https://edms.cern.ch/document/584092 IT Department

  17. Electricity access for geographically disadvantaged rural communities--technology and policy insights

    International Nuclear Information System (INIS)

    Chaurey, Akanksha; Ranganathan, Malini; Mohanty, Parimita

    2004-01-01

    The purpose of this paper is to weigh the issues and options for increasing electricity access in remote and geographically challenged villages in interior Rajasthan, the desertstate in Western India where power sector reforms are currently underway. By first providing an overview of reforms and various electrification policy initiatives in India, the paper then analyzes the specific problems as studied at the grass-roots level with respect to rural electricity access and the use of off-grid renewables. Finally, it discusses interventions that could facilitate access to electricity by suggesting a sequential distributed generation (DG)-based approach, wherein consecutive DG schemes--incorporating the requisite technological, financial, and institutional arrangements--are designed depending on the developmental requirements of the community. In essence, this approach fits under the broader need to understand how the three 'Rs'- rural electrification (the process), power sector reforms (the catalyst), and the use of renewable energy technologies (the means) - could potentially converge to meet the needs of India's rural poor

  18. Electricity access for geographically disadvantaged rural communities--technology and policy insights

    Energy Technology Data Exchange (ETDEWEB)

    Chaurey, Akanksha E-mail: akanksha@teri.res.in; Ranganathan, Malini E-mail: malinir@teri.res.in; Mohanty, Parimita

    2004-10-01

    The purpose of this paper is to weigh the issues and options for increasing electricity access in remote and geographically challenged villages in interior Rajasthan, the desertstate in Western India where power sector reforms are currently underway. By first providing an overview of reforms and various electrification policy initiatives in India, the paper then analyzes the specific problems as studied at the grass-roots level with respect to rural electricity access and the use of off-grid renewables. Finally, it discusses interventions that could facilitate access to electricity by suggesting a sequential distributed generation (DG)-based approach, wherein consecutive DG schemes--incorporating the requisite technological, financial, and institutional arrangements--are designed depending on the developmental requirements of the community. In essence, this approach fits under the broader need to understand how the three 'Rs'- rural electrification (the process), power sector reforms (the catalyst), and the use of renewable energy technologies (the means) - could potentially converge to meet the needs of India's rural poor.

  19. Low-Complexity Scheduling and Power Adaptation for Coordinated Cloud-Radio Access Networks

    KAUST Repository

    Douik, Ahmed; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    In practical wireless systems, the successful implementation of resource allocation techniques strongly depends on the algorithmic complexity. Consider a cloud-radio access network (CRAN), where the central cloud is responsible for scheduling

  20. 3. Informationsveranstaltung des Open Access Network Austria (OANA (Wien, 1. Juni 2016

    Directory of Open Access Journals (Sweden)

    Katharina Rieck

    2016-09-01

    Full Text Available Dieser Beitrag fasst die Ergebnisse der 3. OANA-Veranstaltung, die am 01.06.2016 im Palais Harrach in Wien stattfand, zusammen. Das „Open Access Network Austria“ (OANA ist eine „joint activity“ unter dem organisatorischen Dach des Fonds zur Förderung der wissenschaftlichen Forschung (FWF und der Österreichischen Universitätenkonferenz (UNIKO mit dem Ziel Open Access Aktivitäten in der österreichischen Forschungslandschaft zu koordinieren. Die fünf Arbeitsgruppen, die im Jänner 2015 gebildet wurden, präsentierten bei der Informationsveranstaltung die Ergebnisse und Fortschritte aus eineinhalb Jahren Arbeit. Ab Herbst 2016 werden sich vier neue Arbeitsgruppen mit den Themenschwerpunkten „Strategische Positionierung & Administration der Open-Access-Transition“, „Open Access & die Zukunft von Scholarly Communication“, „Open Access & Open Research Data“ und „Open Access & Open Educational Resources“ beschäftigen.

  1. Insights into the government's role in food system policy making: improving access to healthy, local food alongside other priorities.

    Science.gov (United States)

    Wegener, Jessica; Raine, Kim D; Hanning, Rhona M

    2012-11-12

    Government actors have an important role to play in creating healthy public policies and supportive environments to facilitate access to safe, affordable, nutritious food. The purpose of this research was to examine Waterloo Region (Ontario, Canada) as a case study for "what works" with respect to facilitating access to healthy, local food through regional food system policy making. Policy and planning approaches were explored through multi-sectoral perspectives of: (a) the development and adoption of food policies as part of the comprehensive planning process; (b) barriers to food system planning; and (c) the role and motivation of the Region's public health and planning departments in food system policy making. Forty-seven in-depth interviews with decision makers, experts in public health and planning, and local food system stakeholders provided rich insight into strategic government actions, as well as the local and historical context within which food system policies were developed. Grounded theory methods were used to identify key overarching themes including: "strategic positioning", "partnerships" and "knowledge transfer" and related sub-themes ("aligned agendas", "issue framing", "visioning" and "legitimacy"). A conceptual framework to illustrate the process and features of food system policy making is presented and can be used as a starting point to  engage multi-sectoral stakeholders in plans and actions to facilitate access to healthy food.

  2. Stochastic geometry model for multi-channel fog radio access networks

    KAUST Repository

    Emara, Mostafa

    2017-06-29

    Cache-enabled base station (BS) densification, denoted as a fog radio access network (F-RAN), is foreseen as a key component of 5G cellular networks. F-RAN enables storing popular files at the network edge (i.e., BS caches), which empowers local communication and alleviates traffic congestions at the core/backhaul network. The hitting probability, which is the probability of successfully transmitting popular files request from the network edge, is a fundamental key performance indicator (KPI) for F-RAN. This paper develops a scheduling aware mathematical framework, based on stochastic geometry, to characterize the hitting probability of F-RAN in a multi-channel environment. To this end, we assess and compare the performance of two caching distribution schemes, namely, uniform caching and Zipf caching. The numerical results show that the commonly used single channel environment leads to pessimistic assessment for the hitting probability of F-RAN. Furthermore, the numerical results manifest the superiority of the Zipf caching scheme and quantify the hitting probability gains in terms of the number of channels and cache size.

  3. Impact of Users Identities and Access Conditions on Downlink Performance in Closed Small-Cell Networks

    KAUST Repository

    Radaydeh, Redha

    2015-05-26

    This paper investigates the effect of various operation parameters on the downlink user performance in overlaid small-cell networks. The case study considers closed-access small cells (e.g., femtocells), wherein only active authorized user equipments (UEs) can be served, and each of which is allocated single downlink channel at a time. On the other hand, the macrocell base station can unconditionally serve macrocell UEs that exist inside its coverage space. The available channels can be shared simultaneously in the macrocell network and the femtocell network. Moreover, a channel can be reused only at the macrocell base station. The analysis provides quantitative approaches to model UEs identities, their likelihoods of being active, and their likelihoods of producing interference, considering UEs classifications, locations, and access capabilities. Moreover, it develops models for various interference sources observed from effective interference femtocells, considering femtocells capacities and operation conditions. The associated formulations to describe a desired UE performance and the impact of the number of available channels as well as the adopted channel assignment approach are thoroughly investigated. The results are generally presented for any channel models of interference sources as well as the desired source of the served UE. Moreover, specific channel models are then adopted, for which generalized closedform analytical results for the desired UE outage probability performance are obtained. Numerical and simulation results are presented to further clarify the main outcomes of the developed analysis.

  4. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  5. Access Selection Algorithm of Heterogeneous Wireless Networks for Smart Distribution Grid Based on Entropy-Weight and Rough Set

    Science.gov (United States)

    Xiang, Min; Qu, Qinqin; Chen, Cheng; Tian, Li; Zeng, Lingkang

    2017-11-01

    To improve the reliability of communication service in smart distribution grid (SDG), an access selection algorithm based on dynamic network status and different service types for heterogeneous wireless networks was proposed. The network performance index values were obtained in real time by multimode terminal and the variation trend of index values was analyzed by the growth matrix. The index weights were calculated by entropy-weight and then modified by rough set to get the final weights. Combining the grey relational analysis to sort the candidate networks, and the optimum communication network is selected. Simulation results show that the proposed algorithm can implement dynamically access selection in heterogeneous wireless networks of SDG effectively and reduce the network blocking probability.

  6. The National Technical Association: A Hallmark for Access and Success

    Science.gov (United States)

    Jearld, A., Jr.

    2017-12-01

    Minority Technical Organizations (MTO) are under-utilized as a valuable resource that can help develop the next generation of scientists and engineers. For over 90 years, the National Technical Association (NTA) (www.ntaonline.org) has been the premiere technical association for scientists, engineers, architects, technologist, educators, and technical business entrepreneurs for people of color, offering professional development, mentoring and awards recognition to technical professionals. NTA and its partners are developing a diverse workforce by emphasizing enhanced access opportunities to skills development for youth among underrepresented STEM populations. Established in 1925 by Charles Summer Duke, the first African American to receive an engineering degree from Harvard University, NTA served as the model organization for more than 40 other minority technical organizations that began forming in the 1970's. NTA has served as consultants to the US government on the status of African Americans in science and engineering. The first technical organization to establish community based technical mentoring programs targeting minorities, NTA shares information and assists institutions in identifying minority talent. Members developed the first science and engineering curriculum at Historically Black Colleges and Universities (HBCU's), and are working to produce more students with geoscience degrees to ensure greater career placement with increased minority participation in the geosciences. NTA addresses the lack of access, support, and the need for networking through the longest running annual conference for technical practitioners of color. A hallmark of NTA has been access and success through inter-organizational collaborations with communities of scholars, highly experienced professionals and students to discuss the definition of what is successful geoscience education, research, and employment.

  7. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    OpenAIRE

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols,...

  8. Internet accessibility and disability policy: lessons for digital inclusion and equality from Australia

    Directory of Open Access Journals (Sweden)

    Gerard Goggin

    2017-03-01

    Full Text Available In the fifth decade of the internet, accessibility for all, especially those with disabilities, is central to digital inclusion. Yet internationally, the score card on internet and accessibility remains mixed, at best; and woefully inadequate, at worst. Via an Australian case study, we argue that it is imperative to better understand how internet technology interacts with the life worlds and dynamics of disability, and we suggest how policy can be articulated and improved to put people with disabilities on an equal basis to others in digital societies.

  9. Education as networking: Rethinking the success of the harm reduction policy of Taiwan.

    Science.gov (United States)

    Chen, Jia-shin

    2015-05-01

    The harm reduction policy of Taiwan has been considered a success. However, the HIV incidence among injection drug users declined before the nationwide needle and syringe program and drug substitution treatments were implemented. Thus, other factors in the policy might have contributed to its success. Some authors have suggested that education may have played a pivotal part. In this research, the purported significance of education in the success of the policy is conceptualized by reviewing the studies on harm reduction in Taiwan and reflecting upon my own fieldwork. Moreover, relevant literature is used as reference to reformulate this notion of education. This article shows that harm reduction education may be conducted in numerous forms, most of which are non-formal, improvisational, and contingent. Non-governmental organizations may play a role, but more actors, strategies, infrastructures, and interactions should be considered. This article draws from actor-network theory and refines the current thesis that attributes the policy success to education by utilizing three reflections, namely, appreciating materiality and spatiality, recognizing covert actors in the networking, and treating education as an outcome rather than a means. In conclusion, looking at education as a form of networking offers theoretical insight that increases understanding of its participants, mechanisms, processes, and permutations. © The Author(s) 2014.

  10. Heterogeneous wireless/wireline optical access networks with the R-EAT as backend component

    Science.gov (United States)

    Hagedorn, Klaus; Gindera, Ralf; Stohr, Andreas; Jager, Dieter

    2004-09-01

    A heterogeneous wireless/wireline optical transmission link using a reflection type electroabsorption transceiver (R-EAT) is presented. Simultaneous transmission of full-duplex broadband wireless LAN (WLAN) channels and 1Gb/s base band data is experimentally demonstrated. The system link employs sub-carrier multiplexing (SCM) and two optical channels for full duplex transmission of various analog WLAN channels and downlink digital base band data. The developed link architecture is suitable for simultaneous transmission of broadband wireline and wireless signals, it enables the coexistence and interoperability between wireline and wireless access technologies. The developed R-EAT component employed in this wireline/wireless access system, features "single-chip-component" base stations in access networks with star type topology where only a single optical fiber is used for bidirectional optical transmission. The R-EAT can be used within the optical C-band (1530- 1560nm) and is suitable for (D)WDM networks. Bit error rate measurements demonstrate the capabilities of the R-EAT for 1Gb/s base band transmission. The analog performance for WLAN transmission is characterised by a spurious free dynamic range (SFDR) of more than 75dB and 90dB for uplink and downlink transmission, respectively. The link gain for uplink and downlink transmission is -42dB and -37dB, respectively. The demonstrates the analog performances of the R-EAT for being used in wireless access networks such as W-LAN.

  11. Wide area network access to CMS data using the LustreTM filesystem

    Science.gov (United States)

    Rodriguez, J. L.; Avery, P.; Brody, T.; Bourilkov, D.; Fu, Y.; Kim, B.; Prescott, C.; Wu, Y.

    2010-04-01

    In this paper, we explore the use of the LustreTM cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed LustreTM filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with IOzone for sequential access to data.

  12. Wide area network access to CMS data using the LustreTM filesystem

    International Nuclear Information System (INIS)

    Rodriguez, J L; Brody, T; Avery, P; Bourilkov, D; Fu, Y; Kim, B; Wu, Y; Prescott, C

    2010-01-01

    In this paper, we explore the use of the Lustre TM cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed Lustre TM filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with IOzone for sequential access to data.

  13. Open Access and OER in Latin America: A survey of the policy landscape in Chile, Colombia and Uruguay (Advance online publication)

    OpenAIRE

    Toledo, Amalia

    2017-01-01

    This chapter presents an overview of the mechanisms (funding, policy, legislative and procedural) adopted by Latin American governments with respect to Open Access and Open Educational Resources (OER) initiatives in the higher education sector. It addresses three questions: How do the higher education systems of Chile, Colombia and Uruguay operate and fund their activities in general? How do existing policies and processes incorporating Open Access and/or OER influence student access to learn...

  14. On-demand virtual optical network access using 100 Gb/s Ethernet.

    Science.gov (United States)

    Ishida, Osamu; Takamichi, Toru; Arai, Sachine; Kawate, Ryusuke; Toyoda, Hidehiro; Morita, Itsuro; Araki, Soichiro; Ichikawa, Toshiyuki; Hoshida, Takeshi; Murai, Hitoshi

    2011-12-12

    Our Terabit LAN initiatives attempt to enhance the scalability and utilization of lambda resources. This paper describes bandwidth-on-demand virtualized 100GE access to WDM networks on a field fiber test-bed using multi-domain optical-path provisioning. © 2011 Optical Society of America

  15. Associations between access to recreational physical activity facilities and body mass index in Scottish adults

    Directory of Open Access Journals (Sweden)

    Anne Ellaway

    2016-08-01

    Full Text Available Abstract Background The aim of this country-wide study was to link individual health and behavioural data with area-level spatial data to examine whether the body mass index (BMI of adults was associated with access to recreational physical activity (PA facilities by different modes of transport (bus, car, walking, cycling and the extent to which any associations were mediated by PA participation. Methods Data on individual objectively-measured BMI, PA (number of days of (a ≥20 min of moderate-to-vigorous PA, and (b ≥15 min of sport or exercise, in previous 4 weeks, and socio-demographic characteristics were obtained from a nationally representative sample of 6365 adults. The number of accessible PA facilities per 1,000 individuals in each small area (data zones was obtained by mapping a representative list of all fixed PA facilities throughout mainland Scotland. A novel transport network was developed for the whole country, and routes on foot, by bike, by car and by bus from the weighted population centroid of each data zone to each facility were calculated. Separate multilevel models were fitted to examine associations between BMI and each of the 24 measures of accessibility of PA facilities and BMI, adjusting for age, gender, longstanding illness, car availability, social class, dietary quality and urban/rural classification. Results We found associations (p < 0.05 between BMI and 7 of the 24 accessibility measures, with mean BMI decreasing with increasing accessibility of facilities—for example, an estimated decrease of 0.015 BMI units per additional facility within a 20-min walk (p = 0.02. None of these accessibility measures were found to be associated with PA participation. Conclusions Our national study has shown that some measures of the accessibility of PA facilities by different modes of transport (particularly by walking and cycling were associated with BMI; but PA participation, as measured here, did not appear to

  16. Decentralized Opportunistic Spectrum Resources Access Model and Algorithm toward Cooperative Ad-Hoc Networks

    Science.gov (United States)

    Liu, Ming; Xu, Yang; Mohammed, Abdul-Wahid

    2016-01-01

    Limited communication resources have gradually become a critical factor toward efficiency of decentralized large scale multi-agent coordination when both system scales up and tasks become more complex. In current researches, due to the agent’s limited communication and observational capability, an agent in a decentralized setting can only choose a part of channels to access, but cannot perceive or share global information. Each agent’s cooperative decision is based on the partial observation of the system state, and as such, uncertainty in the communication network is unavoidable. In this situation, it is a major challenge working out cooperative decision-making under uncertainty with only a partial observation of the environment. In this paper, we propose a decentralized approach that allows agents cooperatively search and independently choose channels. The key to our design is to build an up-to-date observation for each agent’s view so that a local decision model is achievable in a large scale team coordination. We simplify the Dec-POMDP model problem, and each agent can jointly work out its communication policy in order to improve its local decision utilities for the choice of communication resources. Finally, we discuss an implicate resource competition game, and show that, there exists an approximate resources access tradeoff balance between agents. Based on this discovery, the tradeoff between real-time decision-making and the efficiency of cooperation using these channels can be well improved. PMID:26727504

  17. Decentralized Opportunistic Spectrum Resources Access Model and Algorithm toward Cooperative Ad-Hoc Networks.

    Directory of Open Access Journals (Sweden)

    Ming Liu

    Full Text Available Limited communication resources have gradually become a critical factor toward efficiency of decentralized large scale multi-agent coordination when both system scales up and tasks become more complex. In current researches, due to the agent's limited communication and observational capability, an agent in a decentralized setting can only choose a part of channels to access, but cannot perceive or share global information. Each agent's cooperative decision is based on the partial observation of the system state, and as such, uncertainty in the communication network is unavoidable. In this situation, it is a major challenge working out cooperative decision-making under uncertainty with only a partial observation of the environment. In this paper, we propose a decentralized approach that allows agents cooperatively search and independently choose channels. The key to our design is to build an up-to-date observation for each agent's view so that a local decision model is achievable in a large scale team coordination. We simplify the Dec-POMDP model problem, and each agent can jointly work out its communication policy in order to improve its local decision utilities for the choice of communication resources. Finally, we discuss an implicate resource competition game, and show that, there exists an approximate resources access tradeoff balance between agents. Based on this discovery, the tradeoff between real-time decision-making and the efficiency of cooperation using these channels can be well improved.

  18. Real-World Data: Policy Issues Regarding their Access and Use.

    Science.gov (United States)

    Basu, Anirban; Axelsen, Kirsten; Grabowski, David C; Meltzer, David O; Polsky, Daniel; Ridley, David B; Wiederkehr, Daniel; Philipson, Tomas J

    2016-12-01

    As real-world data (RWD) in health care begin to cross over to the Big Data realms, a panel of health economists was gathered to establish how well the current US policy environment further the goals of RWD and, if not, what can be done to improve matters. This report summarizes these discussions spanning the current US landscape of RWD availability and usefulness, private versus public development of RWD assets, the current inherent bias in terms of access to RWD, and guiding principles in providing quality assessments of new RWD studies. Three main conclusions emerge: (1) a business case is often required to incentivize investments in RWD assets. However, access restrictions for public data assets have failed to generate a proper market for these data and hence may have led to an underinvestment of public RWDs; (2) Very weak empirical evidence exist on for-profit entities misusing public RWD data entities to further their own agendas, which is the basis for supporting access restrictions of public RWD data; and (3) perhaps developing standardized metrics that could flag misuse of RWDs in an efficient way could help quell some of the fear of sharing public RWD assets with for-profit entities. It is hoped that these discussions and conclusions would pave the way for more rigorous and timely debates on the greater availability and accessibility of RWD assets.

  19. Performance Evaluation of TDMA Medium Access Control Protocol in Cognitive Wireless Networks

    Directory of Open Access Journals (Sweden)

    Muhammed Enes Bayrakdar

    2017-02-01

    Full Text Available Cognitive radio paradigm has been revealed as a new communication technology that shares channels in wireless networks. Channel assignment is a crucial issue in the field of cognitive wireless networks because of the spectrum scarcity. In this work, we have evaluated the performance of TDMA medium access control protocol. In our simulation scenarios, primary users and secondary users utilize TDMA as a medium access control protocol. We have designed a network environment in Riverbed simulation software that consists of primary users, secondary users, and base stations. In our system model, secondary users sense the spectrum and inform the base station about empty channels. Then, the base station decides accordingly which secondary user may utilize the empty channel. Energy detection technique is employed as a spectrum sensing technique because it is the best when information about signal of primary user is acquired. Besides, different number of users is selected in simulation scenarios in order to obtain accurate delay and throughput results. Comparing analytical model with simulation results, we have shown that performance analysis of our system model is consistent and accurate.

  20. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....