WorldWideScience

Sample records for broadcast service security

  1. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

    Directory of Open Access Journals (Sweden)

    Dina Shehada

    2017-01-01

    Full Text Available Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.

  2. Histories of Public Service Broadcasters on the Web

    DEFF Research Database (Denmark)

    This edited volume details multiple and dynamic histories of relations between public service broadcasters and the World Wide Web. What does it mean to be a national broadcaster in a global communications environment? What are the commercial and public service pressures that were brought to bear...... when public service broadcasters implemented web services? How did “one- to-many” broadcasters adapt to the “many-to-many” medium of the internet? The thematic or- ganisation of this collection addresses such major issues, while each chapter offers a particular historical account of relations between...... public service broadcasters and the World Wide Web....

  3. 76 FR 14855 - Television Broadcasting Services; Nashville, TN

    Science.gov (United States)

    2011-03-18

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-29, RM-11622; DA 11-335] Television Broadcasting Services; Nashville, TN AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. Federal Communications Commission. Kevin R. Harding...

  4. 75 FR 10692 - Television Broadcasting Services; Birmingham, AL

    Science.gov (United States)

    2010-03-09

    ...] Television Broadcasting Services; Birmingham, AL AGENCY: Federal Communications Commission. ACTION: Final... Television Commission, the licensee of noncommercial educational station WBIQ(TV), channel *10, Birmingham... Part 73 Television, Television broadcasting. 0 For the reasons discussed in the preamble, the Federal...

  5. 76 FR 76337 - Television Broadcasting Services; Lincoln, NE

    Science.gov (United States)

    2011-12-07

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-192, RM-11646; DA 11-1924] Television Broadcasting Services; Lincoln, NE AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. Federal Communications Commission Barbara A. Kreisman, Chief...

  6. 76 FR 9991 - Television Broadcasting Services; Kalispell, MT

    Science.gov (United States)

    2011-02-23

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 11-224; MB Docket No. 11-20; RM-11619] Television Broadcasting Services; Kalispell, MT AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  7. 75 FR 67077 - Television Broadcasting Services; Huntsville, AL

    Science.gov (United States)

    2010-11-01

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2000; MB Docket No. 08-194; RM-11488] Television Broadcasting Services; Huntsville, AL AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  8. 75 FR 25119 - Television Broadcasting Services; Seaford, DE

    Science.gov (United States)

    2010-05-07

    ...] Television Broadcasting Services; Seaford, DE AGENCY: Federal Communications Commission. ACTION: Final rule... very high frequency commercial television channel to each State, if technically feasible. DATES: This... Part 73 Television, Television broadcasting. 0 For the reasons discussed in the preamble, the Federal...

  9. 76 FR 54188 - Television Broadcasting Services; Montgomery, AL

    Science.gov (United States)

    2011-08-31

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-137, RM-11637; DA 11-1414] Television Broadcasting Services; Montgomery, AL AGENCY: Federal Communications Commission. ACTION: Proposed... 47 CFR Part 73 Television, Television broadcasting. Federal Communications Commission. Barbara A...

  10. 75 FR 9859 - Television Broadcasting Services; Beaumont, TX

    Science.gov (United States)

    2010-03-04

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-307; MB Docket No. 10-49; RM-11593] Television Broadcasting Services; Beaumont, TX AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  11. 76 FR 13966 - Television Broadcasting Services; Topeka, KS

    Science.gov (United States)

    2011-03-15

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-33, RM-11623; DA 11-406] Television Broadcasting Services; Topeka, KS AGENCY: Federal Communications Commission. ACTION: Proposed rule... 73 Television, Television broadcasting. Federal Communications Commission. Barbara A. Kreisman, Chief...

  12. 76 FR 3875 - Television Broadcasting Services; Decatur, IL

    Science.gov (United States)

    2011-01-21

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2426; MB Docket No. 10-264; RM-11615] Television Broadcasting Services; Decatur, IL AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  13. Resource Allocation Management for Broadcast/Multicast Services

    OpenAIRE

    Fuente Iglesias, Alejandro de la; Pérez Leal, Raquel; García-Armada, Ana

    2015-01-01

    Ponencia presentada en: XXX Simposium Nacional de la Unión Científica Internacional de Radio, los dias 2 y 4 septiembre 2015, en Pamplona (españa). Video services are expected to become more than 70% of the mobile traffic in 2020. Broadcast and multicast service is the most efficient mechanism to deliver the same content to many users. Not only focusing on venue casting, but also distributing many other media such as software updates and breaking news, 5G broadcasting is a key driver to a...

  14. Financing Public Service Broadcasting

    DEFF Research Database (Denmark)

    Berg, Christian Edelvold; Lund, Anker Brink

    2012-01-01

    Broadcasting (PSB) financing regimes in Europe, concluding that Denmark, Finland, Iceland, Norway, and Sweden may still be considered conventional, licence fee PSB countries, but with some interesting differences in relation to competitive and market oriented alternatives of resource provision......Recently several European countries have abolished the traditional public service licence fee system, replacing it with direct public funding. But except for Iceland, the Nordic countries have not followed suit. The article discusses this development within a comparative framework of Public Service...

  15. 76 FR 5119 - Television Broadcasting Services; Jackson, MS

    Science.gov (United States)

    2011-01-28

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 11-96; MB Docket No. 11-8; RM-11618] Television Broadcasting Services; Jackson, MS AGENCY: Federal Communications Commission. ACTION: Proposed... CFR 1.415 and 1.420. List of Subjects in 47 CFR Part 73 Television, Television broadcasting. For the...

  16. 76 FR 5290 - Television Broadcasting Services; Huntsville, AL

    Science.gov (United States)

    2011-01-31

    ...] Television Broadcasting Services; Huntsville, AL AGENCY: Federal Communications Commission. ACTION: Final... the Congressional review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal Communications Commission...

  17. 78 FR 44090 - Television Broadcasting Services; Cedar Rapids, Iowa

    Science.gov (United States)

    2013-07-23

    ...] Television Broadcasting Services; Cedar Rapids, Iowa AGENCY: Federal Communications Commission. ACTION... acceptance of full power television rulemaking petitions requesting channel substitutions in May 2011, it... 73 Television, Television broadcasting. Federal Communications Commission. Hossein Hashemzadeh...

  18. 75 FR 76294 - Radio Broadcasting Services; Fairbanks, AK

    Science.gov (United States)

    2010-12-08

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2211; MB Docket No. 10-81; RM-11600] Radio Broadcasting Services; Fairbanks, AK AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY... Subjects in 47 CFR Part 73 Radio, Radio broadcasting. 0 For the reasons discussed in the preamble, the...

  19. 75 FR 1546 - Television Broadcasting Services; Bangor, ME

    Science.gov (United States)

    2010-01-12

    ...] Television Broadcasting Services; Bangor, ME AGENCY: Federal Communications Commission. ACTION: Final rule... the Congressional review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television broadcasting. 0 For the reasons discussed in the preamble, the Federal Communications Commission...

  20. The Use of Television Format Adaptation in Denmark: Public Service Broadcasters Compared to Commercial Broadcasters

    DEFF Research Database (Denmark)

    Jensen, Pia Majbritt

    brought about major changes in both production and scheduling. This paper evaluates the impact that format adaptation has had in Denmark on public service broadcasters (PSBs) compared to commercial broadcasters. To illustrate transnational differences, references are made to Germany and Australia. First......, a quantitative analysis of PSB and commercial schedules in Denmark is presented to establish the extent to which PSBs have employed formats between 2000 and 2012, and how this compares with commercial broadcasters. Secondly, a qualitative analysis looks into genre and the nature of the individual formats...... employed to assess any important differences between the formats in the two sectors. Most formats fall within entertainment and is well suited to providing the consumption friendly environment that commercial broadcasters seek to offer their advertising clients (Brennan 2012). Broadcasters also favour...

  1. 76 FR 52632 - Television Broadcasting Services; Panama City, FL

    Science.gov (United States)

    2011-08-23

    ...] Television Broadcasting Services; Panama City, FL AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY: The Commission has before it a petition for rulemaking filed by Gray Television Licensee... 73 Television, Television broadcasting. Federal Communications Commission. Barbara A. Kreisman, Chief...

  2. 76 FR 35831 - Television Broadcasting Services; Eau Claire, WI

    Science.gov (United States)

    2011-06-20

    ...] Television Broadcasting Services; Eau Claire, WI AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY: The Commission has before it a petition for rulemaking filed by Gray Television Licensee... 73 Television, Television broadcasting. Federal Communications Commission. Barbara A. Kreisman, Chief...

  3. A Secure Network Coding Based on Broadcast Encryption in SDN

    Directory of Open Access Journals (Sweden)

    Yue Chen

    2016-01-01

    Full Text Available By allowing intermediate nodes to encode the received packets before sending them out, network coding improves the capacity and robustness of multicast applications. But it is vulnerable to the pollution attacks. Some signature schemes were proposed to thwart such attacks, but most of them need to be homomorphic that the keys cannot be generated and managed easily. In this paper, we propose a novel fast and secure switch network coding multicast (SSNC on the software defined networks (SDN. In our scheme, the complicated secure multicast management was separated from the fast data transmission based on the SDN. Multiple multicasts will be aggregated to one multicast group according to the requirements of services and the network status. Then, the controller will route aggregated multicast group with network coding; only the trusted switch will be allowed to join the network coding by using broadcast encryption. The proposed scheme can use the traditional cryptography without homomorphy, which greatly reduces the complexity of the computation and improves the efficiency of transmission.

  4. 76 FR 5120 - Television Broadcasting Services; El Paso, TX

    Science.gov (United States)

    2011-01-28

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 11-74; MB Docket No. 11-4; RM-11616] Television Broadcasting Services; El Paso, TX AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal...

  5. 75 FR 5015 - Television Broadcasting Services; Oklahoma City, OK

    Science.gov (United States)

    2010-02-01

    ...] Television Broadcasting Services; Oklahoma City, OK AGENCY: Federal Communications Commission. ACTION... procedures for comments, see 47 CFR 1.415 and 1.420. List of Subjects in 47 CFR Part 73 Television, Television broadcasting. For the reasons discussed in the preamble, the Federal Communications Commission...

  6. Secure Broadcasting with Uncertain Channel State Information

    KAUST Repository

    Hyadi, Amal

    2016-01-06

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper s CSI and not of its channel s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1-a ) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  7. Secure Broadcasting with Uncertain Channel State Information

    KAUST Repository

    Hyadi, Amal

    2017-03-13

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper\\'s CSI and not of its channel\\'s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1-a ) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  8. Technological, political and economic changes and their implications for the evolution of broadcasting services

    DEFF Research Database (Denmark)

    Tadayoni, Reza

    2000-01-01

    The subject of this Ph.D. thesis is changes in the market for broadcasting services as a result of technological, political, and economic drivers. Broadcasting services can be categorised as a part of the ICT-based information and knowledge intensive services that have gone through radical changes...... and demand sites, scarcity of transmission resources, and the historical aspects that make the development of the broadcasting service market different from other information and knowledge intensive services....

  9. 78 FR 27342 - Radio Broadcasting Services; Moran, Texas

    Science.gov (United States)

    2013-05-10

    ... Broadcasting Services; Moran, Texas AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY... service at Moran, Texas. Channel 281A can be allotted at Moran, Texas, in compliance with the Commission's... parties should serve petitioner as follows: Katherine Pyeatt, 215 Cedar Springs Rd., 1605, Dallas, Texas...

  10. 47 CFR 25.225 - Geographic Service Requirements for 17/24 GHz Broadcasting Satellite Service.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Geographic Service Requirements for 17/24 GHz Broadcasting Satellite Service. 25.225 Section 25.225 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES SATELLITE COMMUNICATIONS Technical Standards § 25.225 Geographic Service...

  11. 76 FR 4078 - Television Broadcasting Services; North Pole and Plattsburgh, NY

    Science.gov (United States)

    2011-01-24

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2443; MM Docket No. 99-238; RM-9669] Television Broadcasting Services; North Pole and Plattsburgh, NY AGENCY: Federal Communications Commission... CFR Part 73 Television, Television broadcasting. For the reasons discussed in the preamble, the...

  12. From flip-flopping stereotypes to desecuritizing hybridity: Muslims as threats and security providers in Danish broadcast drama series

    DEFF Research Database (Denmark)

    Gad, Ulrik Pram

    2017-01-01

    by negative stereotypes; another is encouraged by how the very same stereotypes are ironically taken to extremes. Bearing in mind the intimate relation between identity and security, however, the stereotypical representation of difference is never innocent. The overall narratives of Danish public service...... broadcast series such as The Killing, Government and The Protectors rely on stereotypical security policy narratives identifying Muslims as threats. Even when stereotypes are creatively articulated to reverse the negative valuation, Muslim roles are distinctly charged or ‘securitized’ when compared to non......-Muslim roles. However, placing the ‘Muslim’ character centre stage allows a separate level of representation of a distinct role in the way stories articulate stereotypes, facilitating hybrid identities....

  13. 77 FR 6481 - Television Broadcasting Services; Lincoln, NE

    Science.gov (United States)

    2012-02-08

    ...] Television Broadcasting Services; Lincoln, NE AGENCY: Federal Communications Commission. ACTION: Final rule... power television rulemaking petitions requesting channel substitutions in May 2011, it subsequently... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  14. 77 FR 2242 - Radio Broadcasting Services; Pike Road, AL

    Science.gov (United States)

    2012-01-17

    ...] Radio Broadcasting Services; Pike Road, AL AGENCY: Federal Communications Commission. ACTION: Proposed... Corporation, Inc., proposing the allotment of Channel 228A at Pike Road, Alabama, as its second local service. A staff engineering analysis indicates that Channel 228A can be allotted to Pike Road consistent...

  15. 77 FR 64792 - Radio Broadcasting Services; Pike Road, AL

    Science.gov (United States)

    2012-10-23

    ...] Radio Broadcasting Services; Pike Road, AL AGENCY: Federal Communications Commission. ACTION: Proposed... Corporation, Inc., proposing the allotment of Channel 228A at Pike Road, Alabama, as the community's second local service. A staff engineering analysis indicates that Channel 228A can be allotted to Pike Road...

  16. 78 FR 75306 - Television Broadcasting Services; Birmingham, Alabama

    Science.gov (United States)

    2013-12-11

    ...] Television Broadcasting Services; Birmingham, Alabama AGENCY: Federal Communications Commission. ACTION... Television Commission (``AETC''), the licensee of station WBIQ(TV), channel *39, Birmingham, Alabama... freeze on the filing of petitions for rulemaking by television stations seeking channel substitutions in...

  17. 76 FR 27914 - Television Broadcasting Services; Kalispell, MT

    Science.gov (United States)

    2011-05-13

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-20; RM-11619, DA 11-750] Television Broadcasting Services; Kalispell, MT AGENCY: Federal Communications Commission. ACTION: Final rule... U.S.C. 801(a)(1)(A). [[Page 27915

  18. Digital broadcasting

    International Nuclear Information System (INIS)

    Park, Ji Hyeong

    1999-06-01

    This book contains twelve chapters, which deals with digitization of broadcast signal such as digital open, digitization of video signal and sound signal digitization of broadcasting equipment like DTPP and digital VTR, digitization of equipment to transmit such as digital STL, digital FPU and digital SNG, digitization of transmit about digital TV transmit and radio transmit, digital broadcasting system on necessity and advantage, digital broadcasting system abroad and Korea, digital broadcasting of outline, advantage of digital TV, ripple effect of digital broadcasting and consideration of digital broadcasting, ground wave digital broadcasting of DVB-T in Europe DTV in U.S.A and ISDB-T in Japan, HDTV broadcasting, satellite broadcasting, digital TV broadcasting in Korea, digital radio broadcasting and new broadcasting service.

  19. 78 FR 71557 - Radio Broadcasting Services; Tohatchi, New Mexico

    Science.gov (United States)

    2013-11-29

    ...] Radio Broadcasting Services; Tohatchi, New Mexico AGENCY: Federal Communications Commission. ACTION... Channel 268C2, Tohatchi, New Mexico, as a first local service under the Tribal Priority. A staff... [Amended] 0 2. Section 73.202(b), the Table of FM Allotments under New Mexico, is amended by adding...

  20. 78 FR 12010 - Radio Broadcasting Services; Pearsall, Texas

    Science.gov (United States)

    2013-02-21

    ... Broadcasting Services; Pearsall, Texas AGENCY: Federal Communications Commission. ACTION: Proposed rule... (``Petitioner''), licensee of FM Station KSAG, Channel 277A, Pearsall, Texas. Petitioner proposes to amend the... be allotted at Pearsall, Texas, in compliance with the Commission's minimum distance separation...

  1. 76 FR 33656 - Television Broadcasting Services; Nashville, TN

    Science.gov (United States)

    2011-06-09

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-29; RM-11622, DA 11-949] Television Broadcasting Services; Nashville, TN AGENCY: Federal Communications Commission. ACTION: Final rule... Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  2. 77 FR 46631 - Television Broadcasting Services; Greenville, NC

    Science.gov (United States)

    2012-08-06

    ...] Television Broadcasting Services; Greenville, NC AGENCY: Federal Communications Commission. ACTION: Final... acceptance of full power television rulemaking petitions requesting channel substitutions in May 2011, it... Subjects in 47 CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video...

  3. 77 FR 33997 - Television Broadcasting Services; Greenville, NC

    Science.gov (United States)

    2012-06-08

    ...] Television Broadcasting Services; Greenville, NC AGENCY: Federal Communications Commission. ACTION: Proposed... freeze on the acceptance of rulemaking petitions by full power television stations requesting channel... filed by full power television stations seeking to relocate from channel 51 pursuant to a voluntary...

  4. 76 FR 71909 - Television Broadcasting Services; Montgomery, AL

    Science.gov (United States)

    2011-11-21

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-137; RM-11637, DA 11-1863] Television Broadcasting Services; Montgomery, AL AGENCY: Federal Communications Commission. ACTION: Final... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  5. 76 FR 66250 - Television Broadcasting Services; Cleveland, OH

    Science.gov (United States)

    2011-10-26

    ...] Television Broadcasting Services; Cleveland, OH AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY: The Commission has before it a petition for rulemaking filed by Community Television of Ohio License, LLC (``Community Television''), the licensee of station WJW (TV), channel 8, Cleveland...

  6. 76 FR 18497 - Television Broadcasting Services; Augusta, GA

    Science.gov (United States)

    2011-04-04

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-54, RM-11624; DA 11-499] Television Broadcasting Services; Augusta, GA AGENCY: Federal Communications Commission. ACTION: Proposed... 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division, Media...

  7. Broadcast Services. Information Bulletin No. 3.

    Science.gov (United States)

    Federal Communications Commission, Washington, DC.

    Radio and television broadcasting is authorized and regulated by the Federal Communications Commission (FCC). Following a brief description of the development of broadcasting, broadcast regulations, and the Commission, this report examines various aspects of the subject pertaining to the fairness doctrine, political broadcasting, advertising, sale…

  8. 76 FR 20248 - Television Broadcasting Services; Decatur, IL

    Science.gov (United States)

    2011-04-12

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 10-264; RM-11615, DA 11-572] Television Broadcasting Services; Decatur, IL AGENCY: Federal Communications Commission. ACTION: Final rule... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  9. 75 FR 81190 - Television Broadcasting Services; Yuma, AZ

    Science.gov (United States)

    2010-12-27

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2365; MB Docket No. 02-151; RM-10453] Television Broadcasting Services; Yuma, AZ AGENCY: Federal Communications Commission. ACTION: Dismissal. SUMMARY: The Commission dismisses the petition for rulemaking filed by Arizona Western College, requesting...

  10. 75 FR 3695 - Television Broadcasting Services; Birmingham, AL

    Science.gov (United States)

    2010-01-22

    ...] Television Broadcasting Services; Birmingham, AL AGENCY: Federal Communications Commission. ACTION: Proposed... Television Commission (``AETC''), the licensee of noncommercial educational station WBIQ (TV), channel *10... procedures for comments, see 47 CFR 1.415 and 1.420. List of Subjects in 47 CFR Part 73 Television...

  11. The Use of International Television Formats by Public-Service Broadcasters in Australia, Denmark and Germany

    DEFF Research Database (Denmark)

    Esser, Andrea; Jensen, Pia Majbritt

    adaptations, as Jérôme Bourdon has noted, had no history here because they “contradicted almost everything public service broadcasting stood for” (2012: 114). Even though in many countries PSBs are also expected to provide entertainment, next to quality information and educational material, the overall idea...... the world is such, that it would be no exaggeration to speak of ‘creative destruction’ (Schumpeter 1942). How has this impacted on the production and provision of public-service broadcasting? Public-service broadcasters historically have different objectives to private commercial broadcasters and format...... of structural differences between the respective television markets. Moreover, a closer analysis of the genre and content of those formats employed, shows that the PSBs studied, even when buying and adapting formats from abroad, have tended to choose formats that fulfil the public-service remit....

  12. Reinventing public service broadcasting in Europe: prospects, promises and problems

    NARCIS (Netherlands)

    Bardoel, J.L.H.; d'Haenens, L.S.J.

    2008-01-01

    New information technologies, liberalizing policies and rapidly changing societies – from mono- to multicultural – entail serious consequences for the prospects of European public service broadcasters in a network society. The European concept of PSB as a comprehensive and universal service is

  13. 76 FR 12292 - Radio Broadcasting Services; Kualapuu, HI

    Science.gov (United States)

    2011-03-07

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 11-323; MB Docket No. 09-189; RM-11564] Radio Broadcasting Services; Kualapuu, HI AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY: The Audio Division, at the request of Kemp Communications, Inc., allots FM Channel 296C2 at Kualapuu, Hawaii...

  14. 78 FR 42700 - Radio Broadcasting Services; Matagorda, Texas

    Science.gov (United States)

    2013-07-17

    ... Broadcasting Services; Matagorda, Texas AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY... FM Channel 252A at Matagorda, Texas. This allotment change is part of a hybrid rule making and FM... 291A at Matagorda, Texas, is located within 320 kilometers (199 miles) of the U.S.-Mexican border...

  15. User innovation in public service broadcasts

    DEFF Research Database (Denmark)

    Khajeheian, Datis; Tadayoni, Reza

    2016-01-01

    and develop user innovations into professional content. This study follows a qualitative approach with a document study of Denmark's public service broadcast and two interviews. Findings indicate that the commitment to quality and professional content prevents managers of PSBs from outsourcing......This research aims to understand how public service media can encourage media entrepreneurship in the society to enrich user innovations as a source of ideas, products, contents, talent and creativity. The assumption is that media entrepreneurs turn users into sources of external creativity...... their production to media entrepreneurs, but they trust large media companies as external producers. This research contributes to the field by proposing that public service media can foster media entrepreneurship in a society indirectly and by creating demand for external sources of creativity. Large media...

  16. The role of the public service broadcasting in the european countries

    Directory of Open Access Journals (Sweden)

    Budacia Elisabeta Andreea

    2008-04-01

    Full Text Available Broadcasting in particular has seen remarkable change from the days of single-channel public broadcasting systems. The audiovisual “explosion” is a cultural, social and economic phenomenon of global dimension. The audiovisual sector forms an essential part of Europe’s economic and cultural influence in the world. The fundamental principle of the Union’s audiovisual policy is to provide for the free circulation of reception of trans frontier broadcasts. So the European audiovisual industry is likely to become a stronger and more competitive player on the global scene. The future of public service broadcasting in Europe is increasingly challenged by unfavorable external factors, such as intensifying competition from commercial media, media concentrations, political and economic interests adversary to independent media, and by internal difficulties, such as cost ineffectiveness.

  17. Servicing a globally broadcast interrupt signal in a multi-threaded computer

    Science.gov (United States)

    Attinella, John E.; Davis, Kristan D.; Musselman, Roy G.; Satterfield, David L.

    2015-12-29

    Methods, apparatuses, and computer program products for servicing a globally broadcast interrupt signal in a multi-threaded computer comprising a plurality of processor threads. Embodiments include an interrupt controller indicating in a plurality of local interrupt status locations that a globally broadcast interrupt signal has been received by the interrupt controller. Embodiments also include a thread determining that a local interrupt status location corresponding to the thread indicates that the globally broadcast interrupt signal has been received by the interrupt controller. Embodiments also include the thread processing one or more entries in a global interrupt status bit queue based on whether global interrupt status bits associated with the globally broadcast interrupt signal are locked. Each entry in the global interrupt status bit queue corresponds to a queued global interrupt.

  18. 75 FR 3641 - Television Broadcasting Services; Anchorage, AK

    Science.gov (United States)

    2010-01-22

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-40; MB Docket No. 09-210; RM-11583] Television Broadcasting Services; Anchorage, AK AGENCY: Federal Communications Commission. ACTION: Final rule... review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television...

  19. 76 FR 67397 - Radio Broadcasting Services; Llano, Texas

    Science.gov (United States)

    2011-11-01

    ...] Radio Broadcasting Services; Llano, Texas AGENCY: Federal Communications Commission. ACTION: Proposed... substituting Channel 242C3 for vacant Channel 293C3, at Llano, Texas. The proposal is part of a contingently... required for the allotment of Channel 242C3 at Llano, Texas, because the proposed allotment is located...

  20. 76 FR 19275 - Television Broadcasting Services; Jackson, MS

    Science.gov (United States)

    2011-04-07

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-8; RM-11618, DA 11-516] Television Broadcasting Services; Jackson, MS AGENCY: Federal Communications Commission. ACTION: Final rule... review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television. Federal...

  1. 75 FR 19907 - Television Broadcasting Services; Beaumont, TX

    Science.gov (United States)

    2010-04-16

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-606; MB Docket No. 10-49; RM-11593] Television Broadcasting Services; Beaumont, TX AGENCY: Federal Communications Commission. ACTION: Final rule... Congressional review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television...

  2. Secure Broadcasting with Imperfect Channel State Information at the Transmitter

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Khisti, Ashish; Alouini, Mohamed-Slim

    2015-01-01

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper’s CSI and not of its channel’s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1−) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  3. Secure Broadcasting with Imperfect Channel State Information at the Transmitter

    KAUST Repository

    Hyadi, Amal

    2015-11-13

    We investigate the problem of secure broadcasting over fast fading channels with imperfect main channel state information (CSI) at the transmitter. In particular, we analyze the effect of the noisy estimation of the main CSI on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. Besides, we consider the realistic case where the transmitter is only aware of the statistics of the eavesdropper’s CSI and not of its channel’s realizations. First, we discuss the common message transmission case where the source broadcasts the same information to all the receivers, and we provide an upper and a lower bounds on the ergodic secrecy capacity. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link and we prove that a non-zero secrecy rate can still be achieved even when the CSI at the transmitter is noisy. Then, we look at the independent messages case where the transmitter broadcasts multiple messages to the receivers, and each intended user is interested in an independent message. For this case, we present an expression for the achievable secrecy sum-rate and an upper bound on the secrecy sum-capacity and we show that, in the limit of large number of legitimate receivers K, our achievable secrecy sum-rate follows the scaling law log((1−) log(K)), where is the estimation error variance of the main CSI. The special cases of high SNR, perfect and no-main CSI are also analyzed. Analytical derivations and numerical results are presented to illustrate the obtained expressions for the case of independent and identically distributed Rayleigh fading channels.

  4. 78 FR 14060 - Television Broadcasting Services; Seaford, Delaware and Dover, Delaware

    Science.gov (United States)

    2013-03-04

    ...] Television Broadcasting Services; Seaford, Delaware and Dover, Delaware AGENCY: Federal Communications... waiver of the Commission's freeze on the filing of petitions for rulemaking by televisions stations... first local television service, and that Seaford will remain well-served after the reallotment because...

  5. Coherent detection passive optical access network enabling converged delivery of broadcast and dedicated broadband services

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich; Prince, Kamau; Guerrero Gonzalez, Neil

    2011-01-01

    We propose a passive optical network architecture based on coherent detection for converged delivery of broadcast services from a dedicated remote broadcast server and user-specific services from a local central office. We experimentally demonstrate this architecture with mixed traffic types....... The broadcast channels were transmitted over 78 km of single mode fiber to a central office where they were multiplexed with the unicast channels for further fiber transmission over 34-km to reach the access network. Successful detection of all channels is demonstrated....

  6. 78 FR 58470 - Television Broadcasting Services; Cedar Rapids, Iowa

    Science.gov (United States)

    2013-09-24

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 13-182; RM-11701; DA 13-1882] Television Broadcasting Services; Cedar Rapids, Iowa AGENCY: Federal Communications Commission. ACTION: Final... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  7. 76 FR 18415 - Television Broadcasting Services; New Haven, CT

    Science.gov (United States)

    2011-04-04

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 09-123; RM-11546, DA 11-501] Television Broadcasting Services; New Haven, CT AGENCY: Federal Communications Commission. ACTION: Final rule... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  8. 76 FR 19276 - Television Broadcasting Services; El Paso, TX

    Science.gov (United States)

    2011-04-07

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-4; RM-11616, DA 11-530] Television Broadcasting Services; El Paso, TX AGENCY: Federal Communications Commission. ACTION: Final rule... Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  9. 76 FR 28946 - Television Broadcasting Services; El Paso, TX

    Science.gov (United States)

    2011-05-19

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-74, RM-11630; DA 11-746] Television Broadcasting Services; El Paso, TX AGENCY: Federal Communications Commission. ACTION: Proposed... of Subjects in 47 CFR Part 73 Television Federal Communications Commission. Barbara A. Kreisman...

  10. Debunking public service? Meta-academic and personal reflections from inside the Swedish Public Service Broadcasting Commission

    Directory of Open Access Journals (Sweden)

    Pelle Snickars

    2016-12-01

    Full Text Available During the last half of 2015, a number of Swedish publishing and broadcasting companies—Bonnier, Schibsted Sweden, Mittmedia, Bauer Group—agreed to fund and establish a national Public Service Broadcasting Commission. The purpose was to initiate a public debate about the behaviour and operation of Swedish public service broadcasters—in particular, how they affected the commercial media market, and generally, to discuss the role of national public service broadcasting in a networked media environment. I was a Commission member, and this article describes the background, debates and proposals put forward by the Commission. On one hand, it focuses the work of the Commission with an emphasis on the different public debates the Commission stirred. On the other hand, the article will in a meta-scholarly fashion elaborate on the academic tradition of doing scholarly work focused on public service in Sweden. A recurrent notion in the article is hence meta-academic. Importantly, the article stresses the scholarly bias in favour of public service that is usually present within this tradition (primarily emanating from the field of political communication. Thus, the article is devoted to various debates surrounding the work of the Commission and the role of academics within these discussions (including myself. Finally, the article presents a few thoughts about what it might mean for academics to be (or become lobbyists.

  11. Altmark, Article 86(2) and Public Service Broadcasting

    DEFF Research Database (Denmark)

    Mortensen, Frands

    2008-01-01

    En analyse af EU-Kommissionens 17 Beslutninger angående statsstøtte til Public Service Broadcasting, der er truffet efter afsigelse af Altmark-dommen i juli 2003. Kommissionen har i alle tilfælde først analyseret om de fire Altmark-krav er opfyldt, og det er aldrig tilfældet. dernæst har den godk...

  12. 75 FR 76294 - Radio Broadcasting Services: Pacific Junction, IA

    Science.gov (United States)

    2010-12-08

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-2236; MB Docket No. 10-108] Radio Broadcasting Services: Pacific Junction, IA AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY: The staff deletes FM Channel 299C2 at Pacific Junction, Iowa, because the record in this...

  13. 77 FR 38761 - Radio Broadcasting Services; Pike Road, AL

    Science.gov (United States)

    2012-06-29

    ... Broadcasting Services; Pike Road, AL AGENCY: Federal Communications Commission. ACTION: Proposal rule..., Inc., proposing the allotment of Channel 228A at Pike Road, Alabama, as the community's second local... Pike Road allotment. It is the Commission's policy to refrain from making an allotment to a community...

  14. 75 FR 13681 - Television Broadcasting Services; Atlantic City, NJ

    Science.gov (United States)

    2010-03-23

    ...] Television Broadcasting Services; Atlantic City, NJ AGENCY: Federal Communications Commission. ACTION: Final... not less than one very high frequency commercial television channel to each State, if technically... Review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television...

  15. 76 FR 44280 - Television Broadcasting Services; El Paso, TX

    Science.gov (United States)

    2011-07-25

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-74; RM-11630, DA 11-1185] Television Broadcasting Services; El Paso, TX AGENCY: Federal Communications Commission. ACTION: Final rule... U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television. Federal Communications...

  16. 76 FR 68117 - Television Broadcasting Services; Panama City, FL

    Science.gov (United States)

    2011-11-03

    ...] Television Broadcasting Services; Panama City, FL AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY: The Commission grants a petition for rulemaking filed by Gray Television Licensee, LLC... the Congressional review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television...

  17. 76 FR 49697 - Television Broadcasting Services; Eau Claire, WI

    Science.gov (United States)

    2011-08-11

    ...] Television Broadcasting Services; Eau Claire, WI AGENCY: Federal Communications Commission. ACTION: Final rule. SUMMARY: The Commission has before it a petition for rulemaking filed by Gray Television Licensee... the Congressional review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television...

  18. 75 FR 13236 - Television Broadcasting Services; Oklahoma City, OK

    Science.gov (United States)

    2010-03-19

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [DA 10-395; MB Docket No. 10-19; RM-11589] Television Broadcasting Services; Oklahoma City, OK AGENCY: Federal Communications Commission. ACTION: Final... review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television, Television...

  19. 47 CFR 25.148 - Licensing provisions for the Direct Broadcast Satellite Service.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Licensing provisions for the Direct Broadcast Satellite Service. 25.148 Section 25.148 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES SATELLITE COMMUNICATIONS Applications and Licenses Space Stations § 25.148...

  20. 76 FR 79113 - Amendment of Service and Eligibility Rules for FM Broadcast Translator Stations

    Science.gov (United States)

    2011-12-21

    ... of Service and Eligibility Rules for FM Broadcast Translator Stations AGENCY: Federal Communications... authorizing the use of FM translators with licenses or permits in effect as of May 1, 2009, to rebroadcast the... and Eligibility Rules for FM Broadcast Translator Stations, published at 74 FR 45126, September 1...

  1. 47 CFR 74.690 - Transition of the 1990-2025 MHz band from the Broadcast Auxiliary Service to emerging technologies.

    Science.gov (United States)

    2010-10-01

    ... Broadcast Auxiliary Service to emerging technologies. 74.690 Section 74.690 Telecommunication FEDERAL... of the 1990-2025 MHz band from the Broadcast Auxiliary Service to emerging technologies. (a) New... licensed emerging technology services will maintain primary status in the band until the Existing Licensee...

  2. 76 FR 68124 - Television Broadcasting Services; Fond du Lac, WI

    Science.gov (United States)

    2011-11-03

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 09-115, RM-11543; DA 11-1502] Television Broadcasting Services; Fond du Lac, WI AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY: In this document, the Commission denies a petition for reconsideration of an August 12...

  3. 47 CFR 73.4102 - FAA communications, broadcast of.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false FAA communications, broadcast of. 73.4102 Section 73.4102 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Rules Applicable to All Broadcast Stations § 73.4102 FAA communications...

  4. A Survivable Wavelength Division Multiplexing Passive Optical Network with Both Point-to-Point Service and Broadcast Service Delivery

    Science.gov (United States)

    Ma, Xuejiao; Gan, Chaoqin; Deng, Shiqi; Huang, Yan

    2011-11-01

    A survivable wavelength division multiplexing passive optical network enabling both point-to-point service and broadcast service is presented and demonstrated. This architecture provides an automatic traffic recovery against feeder and distribution fiber link failure, respectively. In addition, it also simplifies the protection design for multiple services transmission in wavelength division multiplexing passive optical networks.

  5. 78 FR 21565 - Television Broadcasting Services; Jackson, Wyoming to Wilmington, DE

    Science.gov (United States)

    2013-04-11

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 13-73; RM-11695; DA 13-450] Television Broadcasting Services; Jackson, Wyoming to Wilmington, DE AGENCY: Federal Communications... review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 73 Television. Federal...

  6. Integrating Communication and Navigation: Next Generation Broadcast Service (NGBS)

    Science.gov (United States)

    Donaldson, Jennifer

    2017-01-01

    NASA Goddard has been investing in technology demonstrations of a beacon service, now called Next Generation Broadcast Services (NGBS). NGBS is a global, space-based, communications and navigation service for users of Global Navigation Satellite Systems (GNSS) and the Tracking and Data Relay Satellite System (TDRSS). NGBS will provide an S-band beacon messaging source and radio navigation available to users at orbital altitudes 1400 km and below, increasing the autonomy and resiliency of onboard communication and navigation. NGBS will deliver both one-way radiometric (Doppler and pseudorange) and fast forward data transport services to users. Portions of the overall forward data volume will be allocated for fixed message types while the remaining data volume will be left for user forward command data. The NGBS signal will reside within the 2106.43 MHz spectrum currently allocated for the Space Networks multiple access forward (MAF) service and a live service demonstration is currently being planned via the 2nd and 3rd generation TDRS satellites.

  7. 78 FR 21849 - Television Broadcasting Services; Ely, NV to Middletown Township, NJ

    Science.gov (United States)

    2013-04-12

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 13-72; RM-11694, DA 13-448] Television Broadcasting Services; Ely, NV to Middletown Township, NJ AGENCY: Federal Communications... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  8. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  9. Willingness to Pay for Elderly Telecare Service Using the Internet and Digital Terrestrial Broadcasting

    Science.gov (United States)

    Kaga, Satoshi; Suzuki, Teppei

    2017-01-01

    Background In Japan over the past few years, more attention has been focused on unnoticed solitary death in the context of an aging society and the trend toward nuclear family. A number of institutions and companies have implemented a prevention measure with digital terrestrial broadcasting telecare services for the elderly: Hokkaido University; TV-Asahi Corporation; Hitachi, Ltd; Iwamizawa City; Hokkaido Television Broadcasting Co, Ltd; and Hamanasu Information Co, Ltd. Although this system is provided free of charge as a demonstration test, determining the appropriate price for the service is required for its sustainable operation. Objective The aim of this study was to quantify individual willingness to pay (WTP) so as to test the tenability of digital terrestrial broadcasting service for elderly telecare. Methods We used the contingent valuation method (CVM) to estimate the WTP for this service among 305 citizens (valid response rate 76.0%) living in Japan. A questionnaire survey was conducted for people aged 18 to 100 years according to Japanese age distribution from September 2016. To elicit WTP, we adopted a double-bound dichotomous choice method to ask the respondents whether they agree or disagree with the price we offered. Results The median WTP for this service’s monthly fee is estimated to be 431 JPY (approximately US $3.7). The finding suggests that gender (0.66, P=.01), health consciousness (1.08, P=.01), willingness to use (2.38, PCalculated median WTP for digital terrestrial broadcasting service for elderly telecare was 431 JPY (approximately US $3.7). In the analysis of factors that affect WTP, constant factors, log-bid, health consciousness, gender, see others less than one time for week, and willingness to use made positive effect to probability of acceptance. In comparison of WTP in different groups, age groups showed that WTP of the elderly group was higher than WTP of the middle age group and younger age group. However, WTP surveys need to

  10. A Fast and Reliable Broadcast Service for LTE-Advanced Exploiting Multihop Device-to-Device Transmissions

    Directory of Open Access Journals (Sweden)

    Giovanni Nardini

    2017-11-01

    Full Text Available Several applications, from the Internet of Things for smart cities to those for vehicular networks, need fast and reliable proximity-based broadcast communications, i.e., the ability to reach all peers in a geographical neighborhood around the originator of a message, as well as ubiquitous connectivity. In this paper, we point out the inherent limitations of the LTE (Long-Term Evolution cellular network, which make it difficult, if possible at all, to engineer such a service using traditional infrastructure-based communications. We argue, instead, that network-controlled device-to-device (D2D communications, relayed in a multihop fashion, can efficiently support this service. To substantiate the above claim, we design a proximity-based broadcast service which exploits multihop D2D. We discuss the relevant issues both at the UE (User Equipment, which has to run applications, and within the network (i.e., at the eNodeBs, where suitable resource allocation schemes have to be enforced. We evaluate the performance of a multihop D2D broadcasting using system-level simulations, and demonstrate that it is fast, reliable and economical from a resource consumption standpoint.

  11. 47 CFR 25.215 - Technical requirements for space stations in the Direct Broadcast Satellite Service.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Technical requirements for space stations in the Direct Broadcast Satellite Service. 25.215 Section 25.215 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES SATELLITE COMMUNICATIONS Technical Standards § 25.215...

  12. 47 CFR 73.9001 - Redistribution control of digital television broadcasts.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Redistribution control of digital television... RADIO SERVICES RADIO BROADCAST SERVICES Digital Broadcast Television Redistribution Control § 73.9001 Redistribution control of digital television broadcasts. Licensees of TV broadcast stations may utilize the...

  13. Willingness to Pay for Elderly Telecare Service Using the Internet and Digital Terrestrial Broadcasting.

    Science.gov (United States)

    Kaga, Satoshi; Suzuki, Teppei; Ogasawara, Katsuhiko

    2017-10-24

    In Japan over the past few years, more attention has been focused on unnoticed solitary death in the context of an aging society and the trend toward nuclear family. A number of institutions and companies have implemented a prevention measure with digital terrestrial broadcasting telecare services for the elderly: Hokkaido University; TV-Asahi Corporation; Hitachi, Ltd; Iwamizawa City; Hokkaido Television Broadcasting Co, Ltd; and Hamanasu Information Co, Ltd. Although this system is provided free of charge as a demonstration test, determining the appropriate price for the service is required for its sustainable operation. The aim of this study was to quantify individual willingness to pay (WTP) so as to test the tenability of digital terrestrial broadcasting service for elderly telecare. We used the contingent valuation method (CVM) to estimate the WTP for this service among 305 citizens (valid response rate 76.0%) living in Japan. A questionnaire survey was conducted for people aged 18 to 100 years according to Japanese age distribution from September 2016. To elicit WTP, we adopted a double-bound dichotomous choice method to ask the respondents whether they agree or disagree with the price we offered. The median WTP for this service's monthly fee is estimated to be 431 JPY (approximately US $3.7). The finding suggests that gender (0.66, P=.01), health consciousness (1.08, P=.01), willingness to use (2.38, PWTP. We conclude that reliable WTP was elicited by CVM based on an Internet survey. Calculated median WTP for digital terrestrial broadcasting service for elderly telecare was 431 JPY (approximately US $3.7). In the analysis of factors that affect WTP, constant factors, log-bid, health consciousness, gender, see others less than one time for week, and willingness to use made positive effect to probability of acceptance. In comparison of WTP in different groups, age groups showed that WTP of the elderly group was higher than WTP of the middle age group and

  14. Implications of Internet on Broadcasting

    DEFF Research Database (Denmark)

    Henten, Anders; Tadayoni, Reza

    One of the main challenges within broadcasting research in the recent years has been to understand the evolution from traditional broadcasting to digital broadcasting. The aim of this paper is to step further and give an analysis of Internet’s influence on traditional broadcasting services....... In this analysis an inter-disciplinary approach is used, where technological, economic, political and cultural drivers and barriers in this development are identified. It is then shown to what degree these parameters and the inter-relation between them influence this development....

  15. 78 FR 16816 - Television Broadcasting Services; Hampton-Norfolk, Virginia; Norfolk, Virginia-Elizabeth City...

    Science.gov (United States)

    2013-03-19

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 11-139; RM-11636; DA 13-258] Television Broadcasting Services; Hampton-Norfolk, Virginia; Norfolk, Virginia-Elizabeth City, North Carolina... modify its television station, WHRO-TV's license to specify Norfolk, Virginia-Elizabeth City, North...

  16. Public broadcasting, media engagement, and 2-1-1: using mass communication to increase the use of social services.

    Science.gov (United States)

    Shah, Dhavan V; McLeod, Douglas M; Rojas, Hernando; Sayre, Benjamin G; Vraga, Emily; Scholl, Rosanne M; Jones, Clive; Shaw, Amy

    2012-12-01

    The 2008-2009 subprime mortgage crisis was catastrophic, not only for the global economy but for families across the social spectrum. The resultant economic upheaval threatened the livelihoods, well-being, and health of many citizens, who were often unsure where to turn for help. At this critical juncture, public broadcasting stations worked to connect viewers to support resources through 2-1-1. This study was designed to evaluate the ability of public broadcasting to increase the use of information and referral services. Autoregressive integrated moving average (ARIMA) modeling and regression analysis document the relationship between public broadcasting initiatives and 2-1-1 call volume in 35 highly affected U.S. markets. Time-series data from St. Louis MO were collected and analyzed in 2008. Station-level data from across the nation were collected during 2009-2010 and analyzed in 2010. ARIMA results show a distinct linkage between the timing and duration of Channel 9 in St. Louis MO (KETC) programming and a subsequent (approximately 400%) increase in 2-1-1 calls regarding financial services and assistance. Regression path analysis not only found evidence of this same effect nationally but also showed that differences in the broadcaster's orientation and approach mediated effects. Specifically, stations' orientations toward engagement were mediated through strong outreach strategies to increase 2-1-1 use. This study documents the ability of public broadcasting to help citizens in need connect with social resources through 2-1-1 services. By focusing attention on the mortgage crisis and its attendant consequences, and by publicizing 2-1-1 services as a gateway to supportive resources, public broadcasters fostered linkages between those in need and social resources. Moreover, the level of a station's commitment to engaging citizens had a strong bearing on the success of its programming initiatives and community partnerships with organizations such as 2

  17. 47 CFR 73.6011 - Protection of TV broadcast stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Protection of TV broadcast stations. 73.6011... RADIO BROADCAST SERVICES Class A Television Broadcast Stations § 73.6011 Protection of TV broadcast stations. Class A TV stations must protect authorized TV broadcast stations, applications for minor changes...

  18. 76 FR 54189 - Television Broadcasting Services; Hampton-Norfolk, Virginia; Norfolk, Virginia-Elizabeth City, NC

    Science.gov (United States)

    2011-08-31

    ...] Television Broadcasting Services; Hampton-Norfolk, Virginia; Norfolk, Virginia-Elizabeth City, NC AGENCY... licensee of noncommercial educational television station WHRO-TV, channel *16, Hampton-Norfolk, Virginia... freeze on the filing of television allotment rulemaking petitions, but since HRETA'S proposal...

  19. 76 FR 44279 - Radio Broadcasting Services; Clinchco, VA, and Coal Run, KY

    Science.gov (United States)

    2011-07-25

    ...] Radio Broadcasting Services; Clinchco, VA, and Coal Run, KY AGENCY: Federal Communications Commission... Station WPKE-FM, Coal Run Kentucky, from Channel 276A to Channel 221C3. DATES: Effective August 1, 2011... 221C3 at Coal Run, Kentucky, are 37-23-57 NL and 82-23-42 WL, and for Channel 276A at Clinchco, Virginia...

  20. 75 FR 27199 - Promoting Diversification of Ownership in the Broadcasting Services

    Science.gov (United States)

    2010-05-14

    ...'' in explaining the requirements for broadcasters to certify that their advertising contracts do not... for the Commission to require broadcasters renewing their licenses to certify that their advertising... broadcast licensee, cable television system, daily newspaper, or other media outlet subject to the broadcast...

  1. Seamless Mobile Multimedia Broadcasting Using Adaptive Error Recovery

    Directory of Open Access Journals (Sweden)

    Carlos M. Lentisco

    2017-01-01

    Full Text Available Multimedia services over mobile networks present several challenges, such as ensuring a reliable delivery of multimedia content, avoiding undesired service disruptions, or reducing service latency. HTTP adaptive streaming addresses these problems for multimedia unicast services, but it is not efficient from the point of view of radio resource consumption. In Long-Term Evolution (LTE networks, multimedia broadcast services are provided over a common radio channel using a combination of forward error correction and unicast error recovery techniques at the application level. This paper discusses how to avoid service disruptions and reduce service latency for LTE multimedia broadcast services by adding dynamic adaptation capabilities to the unicast error recovery process. The proposed solution provides a seamless mobile multimedia broadcasting without compromising the quality of the service perceived by the users.

  2. Analysis and Implement of Broadcast Program Monitoring Data

    Directory of Open Access Journals (Sweden)

    Song Jin Bao

    2016-01-01

    Full Text Available With the rapid development of the radio and TV industry and the implementation of INT (the integration of telecommunications networks, cable TV networks and the Internet, the contents of programs and advertisements is showing massive, live and interactive trends. In order to meet the security of radio and television, the broadcast of information have to be controlled and administered. In order to master the latest information of public opinion trends through radio and television network, it is necessary research the specific industry applications of broadcast program monitoring. In this paper, the importance of broadcast monitoring in public opinion analysis is firstly analysed. The monitoring radio and television programs broadcast system architecture is proposed combining with the practice, focusing on the technical requirements and implementation process of program broadcast, advertisement broadcast and TV station broadcast monitoring. The more efficient information is generated through statistical analysis, which provides data analysis for radio and television public opinion analysis.

  3. 47 CFR 73.6026 - Broadcast regulations applicable to Class A television stations.

    Science.gov (United States)

    2010-10-01

    ... television stations. 73.6026 Section 73.6026 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES RADIO BROADCAST SERVICES Class A Television Broadcast Stations § 73.6026 Broadcast regulations applicable to Class A television stations. The following rules are applicable to Class A...

  4. Secure Sessions for Web Services

    NARCIS (Netherlands)

    Reiter, M.; Bhargavan, K.; Corin, R.J.; Fournet, C.; Gordon, A.D.

    2007-01-01

    We address the problem of securing sequences of SOAP messages exchanged between web services and their clients. The WS-Security standard defines basic mechanisms to secure SOAP traffic, one message at a time. For typical web services, however, using WS-Security independently for each message is

  5. Metric-Aware Secure Service Orchestration

    Directory of Open Access Journals (Sweden)

    Gabriele Costa

    2012-12-01

    Full Text Available Secure orchestration is an important concern in the internet of service. Next to providing the required functionality the composite services must also provide a reasonable level of security in order to protect sensitive data. Thus, the orchestrator has a need to check whether the complex service is able to satisfy certain properties. Some properties are expressed with metrics for precise definition of requirements. Thus, the problem is to analyse the values of metrics for a complex business process. In this paper we extend our previous work on analysis of secure orchestration with quantifiable properties. We show how to define, verify and enforce quantitative security requirements in one framework with other security properties. The proposed approach should help to select the most suitable service architecture and guarantee fulfilment of the declared security requirements.

  6. Evolution of broadcast content distribution

    CERN Document Server

    Beutler, Roland

    2017-01-01

    This book discusses opportunities for broadcasters that arise with the advent of broadband networks, both fixed and mobile. It discusses how the traditional way of distributing audio-visual content over broadcasting networks has been complemented by the usage of broadband networks. The author shows how this also gives the possibility to offer new types of interactive or so-called nonlinear services. The book illustrates how change in distribution technology is accelerating the need for broadcasters around the world to adapt their content distribution strategy and how it will impact the portfolios of content they offer. Outlines the shift in broadcast content distribution paradigms and related strategic issues Provides an overview of the new broadcasting ecosystem encompassing new types of content, user habits, expectations, and devices Discusses complementary usage of different distribution technologies and platforms.

  7. An Improved Mathematical Scheme for LTE-Advanced Coexistence with FM Broadcasting Service.

    Science.gov (United States)

    Shamsan, Zaid Ahmed; Al-Hetar, Abdulaziz M

    2016-01-01

    Power spectral density (PSD) overlapping analysis is considered the surest approach to evaluate feasibility of compatibility between wireless communication systems. In this paper, a new closed-form for the Interference Signal Power Attenuation (ISPA) is mathematically derived to evaluate interference caused from Orthogonal Frequency Division Multiplexing (OFDM)-based Long Term Evolution (LTE)-Advanced into Frequency Modulation (FM) broadcasting service. In this scheme, ISPA loss due to PSD overlapping of both OFDM-based LTE-Advanced and FM broadcasting service is computed. The proposed model can estimate power attenuation loss more precisely than the Advanced Minimum Coupling Loss (A-MCL) and approximate-ISPA methods. Numerical results demonstrate that the interference power is less than that obtained using the A-MCL and approximate ISPA methods by 2.8 and 1.5 dB at the co-channel and by 5.2 and 2.2 dB at the adjacent channel with null guard band, respectively. The outperformance of this scheme over the other methods leads to more diminishing in the required physical distance between the two systems which ultimately supports efficient use of the radio frequency spectrum.

  8. 47 CFR 74.705 - TV broadcast analog station protection.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false TV broadcast analog station protection. 74.705... EXPERIMENTAL RADIO, AUXILIARY, SPECIAL BROADCAST AND OTHER PROGRAM DISTRIBUTIONAL SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.705 TV broadcast analog station protection. (a) The TV broadcast...

  9. Broadcast design in cognitive radio ad hoc networks

    CERN Document Server

    Song, Yi

    2014-01-01

    This SpringerBrief investigates the special challenges of broadcast design in cognitive radio (CR) ad hoc networks. It introduces two broadcast protocols in CR ad hoc networks: a quality-of-service based broadcast protocol under blind information and a fully-distributed broadcast protocol with collision avoidance. A novel unified analytical model is also presented to analyze the performance of the broadcast protocols. This is the first book dedicated to the unique broadcast design challenges in CR ad hoc networks. The authors also discuss the recent research on the performance analysis of broa

  10. Characteristics of hybrid broadcast broadband television (HbbTV

    Directory of Open Access Journals (Sweden)

    Jakšić Branimir

    2017-01-01

    Full Text Available This paper describes the working principle of hybrid broadcast-broadband TV (Hybrid Broadcast Broadband TV - HbbTV. The architecture of HbbTV system is given, the principle of its operation, as well as an overview of HbbTV specification standards that are in use, with their basic characteristics. Here are described the services provided by Hybrid TV. It is also provided an overview of the distribution of HbbTV services in Europe in terms of the number of TV channels that HbbTV services offer, the number of active hybrid TV devices, HbbTV standards which are in use and models of broadcast networks used to distribute HbbTV service.

  11. Public service broadcasting (PSB regulation in Indonesia: Between market and public interest

    Directory of Open Access Journals (Sweden)

    Masduki

    2017-01-01

    Full Text Available The reform of public service broadcasting (PSB faces many obstacles in countries with political transition such as Indonesia. After 1998-political change, the arrival of ideas to establish PSB in Indonesia in two decades lacks of appropriate policies. As in other transitional states in Eastern Europe, there is the lack of regulatory design as well as its implementation. This paper examines process of formulating PSB law in 2002, particularly pays attention to industry capture over the making process as a critical tool to observe a long-controvercial of broadcasting law revision process in Indonesia (2012-2016. By use public interest and capture theories in regulation, this paper answers why the outcome of PSB regulation is weak by observing how the law was made. This study provides new analysis on PSB media law that still rare in Indonesia. As independent and non-profit body, Indonesian PSB represented by RRI (Radio of the Republic Indonesia and TVRI (Television of the Republic Indonesia is protected by Broadcasting Act.32/2002. It was enacted in favor of two actors: authoritarian officials with interest to use PSB as their mouthpiece in one side and the industry groups with interest to apply free market policy on the other.

  12. Commercial satellite broadcasting for Europe

    Science.gov (United States)

    Forrest, J. R.

    1988-12-01

    A review is presented of the current television broadcasting situation in European countries, which involves a varied mix of terrestrial VHF or UHF systems and cable networks. A small market has emerged in Europe for receivers using the low-power telecommunications satellite transmission between the program providers and cable network companies. This is expected to change with the launch of medium-power pan-European telecommunication satellites (e.g. ASTRA, EUTELSAT II), which are now directly addressing the market of home reception. DBS (direct broadcast satellite) in the UK, using the D-MAC transmission standard, will offer three additional television channels, data broadcasting services, and a planned evolution to compatible forms of wide-screen, high-definition television. Comments are given on receiver and conditional access system standardization. Some views are expressed on satellite broadcasting as part of an overall broadcasting framework for the future.

  13. 78 FR 78318 - Television Broadcasting Services; Oklahoma City, Oklahoma

    Science.gov (United States)

    2013-12-26

    ...: Proposed rule. SUMMARY: The Commission has before it a petition for rulemaking filed by Family Broadcasting Group, Inc. (``Family Broadcasting''), the licensee of station KSBI(TV), channel 51, Oklahoma City... instituted a freeze on the acceptance of full power television rulemaking petitions requesting channel...

  14. EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR

    Directory of Open Access Journals (Sweden)

    Yang Haomiao

    2014-06-01

    Full Text Available Automatic dependent surveillance-broadcast (ADS-B systems can broadcast satellite-based aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR, an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters’ private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link.

  15. Bridging Gaps in Cross-Cutting Media Exposure: The Role of Public Service Broadcasting

    DEFF Research Database (Denmark)

    Castro, Laia; Nir, Lilach; Skovsgaard, Morten

    2018-01-01

    Abstract Previous studies show that individual political interest is an antecedent of news media exposure, particularly of exposure to differing views. Nevertheless, little is known about this effect from a comparative perspective: How do media institutions affect the relationship between political...... interest and exposure to cross-cutting viewpoints? One institutional feature that varies between countries is the ownership of broadcast media. This study investigates the extent to which the relative dominance of public service broadcasting alters the relationship between political interest and non-like-minded......, or cross-cutting, news media exposure across 27 European Union countries. The analyses employ survey data from 27,079 individuals and media content from 48,983 news stories. The results confirm that the extent to which political interest contributes to cross-cutting exposure is contingent on the strength...

  16. Bridging Gaps in Cross-Cutting Media Exposure: The Role of Public Service Broadcasting

    DEFF Research Database (Denmark)

    Castro, Laia; Nir, Lilach; Skovsgaard, Morten

    2018-01-01

    Abstract Previous studies show that individual political interest is an antecedent of news media exposure, particularly of exposure to differing views. Nevertheless, little is known about this effect from a comparative perspective: How do media institutions affect the relationship between political...... interest and exposure to cross-cutting viewpoints? One institutional feature that varies between countries is the ownership of broadcast media. This study investigates the extent to which the relative dominance of public service broadcasting alters the relationship between political interest and non......-like-minded, or cross-cutting, news media exposure across 27 European Union countries. The analyses employ survey data from 27,079 individuals and media content from 48,983 news stories. The results confirm that the extent to which political interest contributes to cross-cutting exposure is contingent on the strength...

  17. An Efficient Live TV Scheduling System for 4G LTE Broadcast

    KAUST Repository

    Lau, Chun Pong

    2016-01-01

    Traditional live television (TV) broadcasting systems are proven to be spectrum inefficient. Therefore, researchers propose to provide TV services on fourth-generation (4G) long-term evolution (LTE) networks. However, static broadcast, a typical broadcasting method over cellular network, is inefficient in terms of radio resource usage. To solve this problem, the audience-driven live TV scheduling (ADTVS) framework is proposed, to maximize radio resource usage when providing TV broadcasting services over LTE networks. ADTVS, a system-level scheduling framework, considers both available radio resources and audience preferences, in order to dynamically schedule TV channels for broadcasting at various time and locations. By conducting a simulation using real-life data and scenarios, it is shown that ADTVS significantly outperforms the static broadcast method. Numerical results indicate that, on average, ADTVS enables substantial improvement to broadcast efficiency and conserves considerable amount of radio resources, while forgoing less than 5% of user services compared to the benchmark system.

  18. 75 FR 3871 - Promoting Diversification of Ownership in Broadcast Services; Suspension of Filing Date

    Science.gov (United States)

    2010-01-25

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket Nos. 07-294, 06-121, 02-277, 04-228; MM Docket Nos. 01-235, 01-317, 00-244; DA 09-2618] Promoting Diversification of Ownership in...); Promoting Diversification in the Broadcasting Services, Order, DA 09-2165 (rel. Oct. 2, 2009). See also...

  19. 78 FR 18527 - Implementation of Competitive Bidding for Commercial Broadcast and Instructional Television Fixed...

    Science.gov (United States)

    2013-03-27

    ... Broadcast and Instructional Television Fixed Service Licenses AGENCY: Federal Communications Commission... Implementation of Competitive Bidding for Commercial Broadcast and Instructional Television Fixed Service... for Commercial Broadcast and Instructional Television Fixed Service Licenses, MM Docket No. 97- 234 et...

  20. Security for service oriented architectures

    CERN Document Server

    Williams, Walter

    2014-01-01

    Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, includ

  1. The intelligence-security services and national security

    OpenAIRE

    Mijalković, Saša

    2011-01-01

    Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...

  2. Optic Fibers as a Broadcasting Media

    Directory of Open Access Journals (Sweden)

    Jusuf QARKAXHIJA

    2018-04-01

    Full Text Available Fast brodcasting of an information is always a challange from our daily activities. Through fast broadcasting of the information always created pre-eminence in military activities, business, researching, etc. From ancient times we know that information was orally and hand in hand broadcasted which in most of the times casused in loss of information and due to this also in loss of activities which are mentioned above. Due to information technology notably computer networks and internet overtime information started broadcasting faster. Information started broadcasting through copper wires and through wireless. Big applications started to develop with the increased use of Internet, high quality broadcasting (HD, video on demand broadcasting (VoD, triple pay broadcasting (three services on a medium, etc., then these two mediums couldn’t complete all these requests. Therfore after these problems, optic fiber began to be used as a broadcasting medium which eleminated all the defects of other mediums. Importance of this paper work is telling developing stages of optic fiber, it’s characteristics and it’s losses. Then it is shown that which devises enforce the signal of fibers and in the end all three mediums that we mentioned are compared on the basis of attributes. Findings form the paper will only enforce that knowledge we had before about optic fiber, the best broadcasting medium.

  3. Virtual Private Networks for mobile environments. Development of protocol for mobile security and algorithms for location update.

    OpenAIRE

    Tzvetkov, Vesselin Dimitrov

    2010-01-01

    The classical networks for broadcast, telephony and data are converging to services on the Next Generation Networks (NGN), which are introduced by all major Service Providers (SP). Major requirements on the future IP network are security and mobility, which are reflection of the Internet’s importance and wide use of portable smart devices. Secure IP mobility is the focus of this thesis, i.e. how the user can move through different access networks whilst maintaining uninterrupted and secure IP...

  4. New Generation of Broadcasting Satellite Systems: New Markets and Business Developments

    Science.gov (United States)

    Perrot, Bruno; Michel, Cyril; Villaret, Stéfanie

    2002-01-01

    Since the deployment of the first Digital Broadcasting Satellite Systems, European satellite operators and service providers have been faced with the continuously increasing demand for Digital Broadcasting Services. Their success is built on the availability of the MPEG and DVB standards. Undoubtedly, conventional digital television broadcasting is today the `Killer' application. Various service providers already offer multimedia applications through DVB-S systems based upon the `Push' technology. Although these services do not currently represent the core business for broadcasting satellite operators, their percentage is increasing. `Push' technology services include Data Carousel, Webcasting, Turbo Internet, File casting and so on. Such technology can support the implementation of different emerging multimedia services scenarios from Newsgroups, Network collaborative learning, and tele-medicine, to others that may be invented in the near future. The penetration rate of multi-channel television reception is still increasing. Broadcasting satellites benefit both from the development of new, more segmented and sophisticated offers and from the development of Internet services. Satellite is likely to enter these new markets at different levels of the value chain: Even if the satellite has demonstrated its capacity to fully serve the television, combinations with other networks may be necessary to address the new markets: at the consumer premises, Internet-related services will require a return path; at the backbone level, satellite becomes a component of a full telecommunications solution. This article focuses on the European market and proposes:

  5. Metadata for the description of broadcast assets

    DEFF Research Database (Denmark)

    Efthimiadis, Efthimis N.; Mai, Jens Erik; Burrows, Paul E.

    2003-01-01

    The Corporation for Public Broadcasting (CPB) and public broadcasters consider Media Asset Management (MAM) of critical importance since without a concerted and cooperative plan to manage their vast library of content, broadcasters are unable to reach their potential for service in the digital age....... The concerns for Media Asset Management, human and technical, are myriad. Media Asset Management is the framework upon which many of the largest technology projects will be built, including the future interconnection system between and among CPB member stations. It is CPB's hope that its licensees...... and their partners in university, museum, and library communities, will work together to contribute to Media Asset Management solutions. These issues are not unique to Public Broadcasters. Similar issues are faced by all networks at different levels of complexity. This panel will present efforts by broadcasters...

  6. Between Postage Stamps and Digitalization: The Changing Roles of Educational Broadcasting.

    Science.gov (United States)

    Fleisher, Frederic

    1995-01-01

    Provides a broadcasting practitioner's perspective of educational broadcasting in Europe, and how, with data compression, the emergence of more television channels can affect the educationalist and public service broadcasting. Discusses technological development, equal access to education, cultural maintenance, advertising, future outlooks, and…

  7. Web Services Security - Implementation and Evaluation Issues

    Science.gov (United States)

    Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis

    Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.

  8. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  9. A special broadcast of CERN's Video news

    CERN Multimedia

    2003-01-01

    A special edition of CERN's video news giving a complete update on the LHC project is to be broadcast in the Main Auditorium. After your lunch make a small detour to the Main Auditorium, where you see the big picture. On 14, 15 and 16 May, between 12:30 and 14:00, a special edition of CERN's video news bulletin will be broadcast in the Main Auditorium. You will have the chance get up-to-date on the LHC project and its experiments. With four years to go before the first collisions in the LHC, the LHC Project Leader Lyn Evans will present a status report on the construction of the accelerator. The spokesmen of the five LHC experiments (ALICE, ATLAS, CMS, LHCb and TOTEM) will explain how the work is going and what the state of play will be in four years' time. This special video news broadcast is the result of collaboration between the CERN Audiovisual Service, the Photo Service and the External communication section. The broadcast will begin with a brand-new programme title sequence. And just as in the real c...

  10. Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment

    Science.gov (United States)

    Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun

    2015-01-01

    Objectives Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. Methods This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. Results The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. Conclusions The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical

  11. Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment.

    Science.gov (United States)

    Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun; Cha, Hyo Soung

    2015-10-01

    Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff.

  12. Data broadcasting: merging digital broadcasting with the Internet

    DEFF Research Database (Denmark)

    2001-01-01

    , and for what means it can be used. It also analyses data broadcasting from the perspectives of both the medium and business. * Features the latest developments in electronic media * Discusses the major media opportunities of data broadcasting * Shows how data broadcasting can overcome many notorious problems...... and developers in the telecommunications, software, hardware and media industries of the main commercial, editorial and technical opportunities of data broadcasting....

  13. Admission and Preventive Load Control for Delivery of Multicast and Broadcast Services via S-UMTS

    Science.gov (United States)

    Angelou, E.; Koutsokeras, N.; Andrikopoulos, I.; Mertzanis, I.; Karaliopoulos, M.; Henrio, P.

    2003-07-01

    An Admission Control strategy is proposed for unidirectional satellite systems delivering multicast and broadcast services to mobile users. In such systems, both the radio interface and the targeted services impose particular requirements on the RRM task. We briefly discuss the RRM requirements that stem from the services point of view and from the features of the SATIN access scheme that differentiate it from the conventional T-UMTS radio interface. The main functional entities of RRM and the alternative modes of operation are outlined and the proposed Admission Control algorithm is described in detail. The results from the simulation study that demonstrate its performance for a number of different scenarios are finally presented and conclusions derived.

  14. Context aware adaptive security service model

    Science.gov (United States)

    Tunia, Marcin A.

    2015-09-01

    Present systems and devices are usually protected against different threats concerning digital data processing. The protection mechanisms consume resources, which are either highly limited or intensively utilized by many entities. The optimization of these resources usage is advantageous. The resources that are saved performing optimization may be utilized by other mechanisms or may be sufficient for longer time. It is usually assumed that protection has to provide specific quality and attack resistance. By interpreting context situation of business services - users and services themselves, it is possible to adapt security services parameters to countermeasure threats associated with current situation. This approach leads to optimization of used resources and maintains sufficient security level. This paper presents architecture of adaptive security service, which is context-aware and exploits quality of context data issue.

  15. Measuring relational security in forensic mental health services.

    Science.gov (United States)

    Chester, Verity; Alexander, Regi T; Morgan, Wendy

    2017-12-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment.

  16. Measuring relational security in forensic mental health services

    Science.gov (United States)

    Chester, Verity; Alexander, Regi T.; Morgan, Wendy

    2017-01-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment. PMID:29234515

  17. Research on the Safe Broadcasting of Television Program

    Directory of Open Access Journals (Sweden)

    Song Jin Bao

    2016-01-01

    Full Text Available The existing way of broadcasting and television monitoring has a lot of problems in China. On the basis of the signal technical indicators monitoring in the present broadcasting and television monitoring system, this paper further extends the function of the monitoring network in order to broaden the services of monitoring business and improve the effect and efficiency of monitoring work. The problem of identifying video content and channel in television and related electronic media is conquered at a low cost implementation way and the flexible technology mechanism. The coverage for video content and identification of the channel is expanded. The informative broadcast entries are generated after a series of video processing. The value of the numerous broadcast data is deeply excavated by using big data processing in order to realize a comprehensive, objective and accurate information monitoring for the safe broadcasting of television program.

  18. Architecture and Design of IP Broadcasting System Using Passive Optical Network

    Science.gov (United States)

    Ikeda, Hiroki; Sugawa, Jun; Ashi, Yoshihiro; Sakamoto, Kenichi

    We propose an IP broadcasting system architecture using passive optical networks (PON) utilizing the optical broadcast links of a PON with a downstream bandwidth allocation algorithm to provide a multi-channel IP broadcasting service to home subscribers on single broadband IP network infrastructures. We introduce the design and adaptation of the optical broadcast links to effectively broadcast video contents to home subscribers. We present a performance analysis that includes the downstream bandwidth utilization efficiency of the broadcast link and the bandwidth control of the IP broadcasting and Internet data. Our analysis and simulation results show that the proposed system can provide 100 HDTV channels to every user over fiber lines. We also propose an IPTV channel selection mechanism in an ONT by selecting a broadcast stream. We developed and evaluated a prototype that can achieve a 15-msec IPTV channel selection speed.

  19. 78 FR 75563 - Commission Policies and Procedures Under the Communications Act, Foreign Investment in Broadcast...

    Science.gov (United States)

    2013-12-12

    ... competitive opportunities (ECO) approach for broadcast foreign ownership similar to that applied in common... Technology, a firm that consults with financial institutions and broadcast owners. Adelante Comments at 1-2... threats and national security issues have arisen as technology has advanced,\\33\\ we do not believe that...

  20. An Efficient Live TV Scheduling System for 4G LTE Broadcast

    KAUST Repository

    Lau, Chun Pong; Alabbasi, AbdulRahman; Shihada, Basem

    2016-01-01

    Traditional live television (TV) broadcasting systems are proven to be spectrum inefficient. Therefore, researchers propose to provide TV services on fourth-generation (4G) long-term evolution (LTE) networks. However, static broadcast, a typical

  1. 47 CFR 74.1204 - Protection of FM broadcast, FM Translator and LP100 stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Protection of FM broadcast, FM Translator and... SERVICES FM Broadcast Translator Stations and FM Broadcast Booster Stations § 74.1204 Protection of FM broadcast, FM Translator and LP100 stations. (a) An application for an FM translator station will not be...

  2. Bluetooth broadcasting

    OpenAIRE

    Ho, Johan

    2006-01-01

    Background: The wireless technology Bluetooth has rapidly become more commonly supported by electronic devices like mobile phones and PDAs. Several companies are currently developing Bluetooth broadcasting systems to use for marketing. This report is a result of researching the use of Bluetooth broadcasting for delivering information for more general purposes, how well Bluetooth actually works for broadcasting, and also on the topic of user privacy. Results: Broadcasting with Bluetooth did w...

  3. National association of broadcasters engineering handbook NAB engineering handbook

    CERN Document Server

    Jones, Graham A; Osenkowsky, Thomas G; Williams, Edmund A

    2013-01-01

    The NAB Engineering Handbook provides detailed information on virtually every aspect of the broadcast chain, from news gathering, program production and postproduction through master control and distribution links to transmission, antennas, RF propagation, cable and satellite. Hot topics covered include HD Radio, HDTV, 2 GHz broadcast auxiliary services, EAS, workflow, metadata, digital asset management, advanced video and audio compression, audio and video over IP, and Internet broadcasting. A wide range of related topics that engineers and managers need to understand are also covered, includ

  4. Using Digital Watermarking for Securing Next Generation Media Broadcasts

    Science.gov (United States)

    Birk, Dominik; Gaines, Seán

    The Internet presents a problem for the protection of intellectual property. Those who create content must be adequately compensated for the use of their works. Rights agencies who monitor the use of these works exist in many jurisdictions. In the traditional broadcast environment this monitoring is a difficult task. With Internet Protocol Television (IPTV) and Next Generation Networks (NGN) this situation is further complicated.

  5. History of Satellite TV Broadcasting and Satellite Broadcasting Market in Turkey

    Directory of Open Access Journals (Sweden)

    Mihalis KUYUCU

    2015-09-01

    Full Text Available The present study analyses the satellite broadcasting that is the first important development that emerged as a result of digitalization in communication technologies and its reflections in Turkey. As the first milestone in the globalization of television broadcasting, satellite broadcasting provided substantial contribution towards the development of the media. Satellite bro adcasting both increased the broadcasting quality and geographical coverage of the television media. A conceptual study was carried out in the first part of the study in connection with the history of satellite broadcasting in Turkey and across the world. In the research part of the study, an analysis was performed on 160 television channels that broadcast in Turkey via Turksat Satellite. Economic structure of the television channels broadcasting in Turkey via satellite was studied and an analysis was perfo rmed on the operational structure of the channels. As a result of the study, it was emphasized that the television channels broadcasting via satellite platform also use other platforms for the purpose of spreading their broadcasts and television channel ow ners make investments in different branches of the media, too. Capital owners invest in different business areas other than the media although television channels broadcasting via Turksat mostly focus on thematic broadcasting and make effort to generate ec onomic income from advertisements. Delays are encountered in the course of the convergence between the new media and television channels that broadcast only from the satellite platform and such television channels experience more economic problems than the other channels. New media and many TV broadcasting platforms emerged as a result of the developments in the communication technologies. In television broadcasting, satellite platform is not an effective platform on its own. Channels make effort to reach t o more people by using other platforms in addition to

  6. Planning Security Services for IT Systems

    OpenAIRE

    Henderson, Marie; Page, Howard Philip

    2014-01-01

    Often the hardest job is to get business representatives to look at security as something that makes managing their risks and achieving their objectives easier, with security compliance as just part of that journey. This paper addresses that by making planning for security services a 'business tool'.

  7. Broadcast Advertising of Medical Products and Services: Its Regulation by Other Nations.

    Science.gov (United States)

    Powell, Jon T.

    1972-01-01

    Restraints imposed on medical advertising through the broadcast media reflect a worldwide concern for public protection in a sensitive area, where problems of ignorance and misrepresentation are enlarged by false hope. The author examines the broadcast codes of seventeen free-world nations, with respect to their provisions on medical advertising.…

  8. Safe and Secure Services Based on NGN

    Science.gov (United States)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  9. 78 FR 42036 - Radio Broadcasting Services; Port Lions, AK, De Beque, CO, Benjamin, Cisco, Rule, and Shamrock, TX

    Science.gov (United States)

    2013-07-15

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 13-156; DA 13-1377] Radio Broadcasting Services; Port Lions, AK, De Beque, CO, Benjamin, Cisco, Rule, and Shamrock, TX AGENCY: Federal..., under Texas, Channel 237C3; Cisco, Channel 261C3; Rule, Channel 288C2; and Shamrock, Channel 225C2. [FR...

  10. High data-rate video broadcasting over 3G wireless systems

    NARCIS (Netherlands)

    Atici, C.; Sunay, M.O.

    2007-01-01

    In cellular environments, video broadcasting is a challenging problem in which the number of users receiving the service and the average successfully decoded video data-rate have to be intelligently optimized. When video is broadcasted using the 3G packet data standard, 1xEV-DO, the code space may

  11. Information Security Service Branding – beyond information security awareness

    Directory of Open Access Journals (Sweden)

    Rahul Rastogi

    2012-12-01

    Full Text Available End-users play a critical role in the effective implementation and running of an information security program in any organization. The success of such a program depends primarily on the effective implementation and execution of associated information security policies and controls and the resultant behavior and actions of end-users. However, end-users often have negative perception of information security in the organization and exhibit non-compliance. In order to improve compliance levels, it is vital to improve the image of information security in the minds of end-users. This paper borrows the concepts of brands and branding from the domain of marketing to achieve this objective and applies these concepts to information security. The paper also describes a process for creating the information security service brand in the organization.

  12. Security in Service Level Agreements for Cloud Computing

    OpenAIRE

    Bernsmed, Karin; JAATUN, Martin Gilje; Undheim, Astrid

    2011-01-01

    The Cloud computing paradigm promises reliable services, accessible from anywhere in the world, in an on-demand manner. Insufficient security has been identified as a major obstacle to adopting Cloud services. To deal with the risks associated with outsourcing data and applications to the Cloud, new methods for security assurance are urgently needed. This paper presents a framework for security in Service Level Agreements for Cloud computing. The purpose is twofold; to help potential Cloud cu...

  13. Cyber security for greater service reliability

    Energy Technology Data Exchange (ETDEWEB)

    Vickery, P. [N-Dimension Solutions Inc., Richmond Hill, ON (Canada)

    2008-05-15

    Service reliability in the electricity transmission and distribution (T and D) industry is being challenged by increased equipment failures, harsher climatic conditions, and computer hackers who aim to disrupt services by gaining access to transmission and distribution resources. This article discussed methods of ensuring the cyber-security of T and D operators. Weak points in the T and D industry include remote terminal units; intelligent electronic devices; distributed control systems; programmable logic controllers; and various intelligent field devices. An increasing number of interconnection points exist between an operator's service control system and external systems. The North American Electric Reliability Council (NERC) standards specify that cyber security strategies should ensure that all cyber assets are protected, and that access points must be monitored to detect intrusion attempts. The introduction of new advanced metering initiatives must also be considered. Comprehensive monitoring systems should be available to support compliance with cyber security standards. It was concluded that senior management should commit to a periodic cyber security re-assessment program in order to keep up-to-date.

  14. ESA personal communications and digital audio broadcasting systems based on non-geostationary satellites

    Science.gov (United States)

    Logalbo, P.; Benedicto, J.; Viola, R.

    1993-01-01

    Personal Communications and Digital Audio Broadcasting are two new services that the European Space Agency (ESA) is investigating for future European and Global Mobile Satellite systems. ESA is active in promoting these services in their various mission options including non-geostationary and geostationary satellite systems. A Medium Altitude Global Satellite System (MAGSS) for global personal communications at L and S-band, and a Multiregional Highly inclined Elliptical Orbit (M-HEO) system for multiregional digital audio broadcasting at L-band are described. Both systems are being investigated by ESA in the context of future programs, such as Archimedes, which are intended to demonstrate the new services and to develop the technology for future non-geostationary mobile communication and broadcasting satellites.

  15. Broadcasting Stations of the World; Part III. Frequency Modulation Broadcasting Stations.

    Science.gov (United States)

    Foreign Broadcast Information Service, Washington, DC.

    This third part of "Broadcasting Stations of the World", which lists all reported radio broadcasting and television stations, with the exception of those in the United States which broadcast on domestic channels, covers frequency modulation broadcasting stations. It contains two sections: one indexed alphabetically by country and city, and the…

  16. Composite Broadcasting and Ranging via a Satellite Dual-Frequency MPPSK System

    Directory of Open Access Journals (Sweden)

    Yu Yao

    2013-01-01

    Full Text Available Since digital video broadcasting via satellite (DVB-S signals are “inefficient”, regarding the amount of information they convey on the bandwidth they occupy, a joint broadcasting and ranging system would constitute a unique platform for future digital video broadcasting satellite services effecting the essential tasks of satellite navigation system and direct to home (DTH services, in terms of both spectrum efficiency and cost effectiveness. In this paper, the design of dual frequency M-ary position phase shift keying (MPPSK system which is suitable for, respectively, performing both data transmission and range measurement is proposed. The approach is based on MPPSK modulation waveforms utilized in digital video broadcasting. In particular, requirements that allow for employing such signals for range measurements with high accuracy and high range are investigated. Also, the relationship between the frequency difference of dual frequency MPPSK system and range accuracy is discussed. Moreover, the selection of MPPSK modulation parameter for data rate and ranging is considered. In addition to theoretical considerations, the paper presents system simulations and measurement results of new systems, demonstrating the high spectral utilization of integrated broadcasting and ranging applications.

  17. Civilization versus Commerce: On the Sociolinguistic Effects of the Deregulation of the TV Market on Flemish Public Service Broadcasting

    Science.gov (United States)

    Van Hoof, Sarah

    2018-01-01

    In the globalized economy, old metadiscursive regimes have been challenged by new conditions which are often considered to be more favourable to heteroglossic practices. In Flemish Belgium, the liberalization of the TV market is said to have transformed the broadcaster VRT from a public service aiming at educating viewers into a competitive…

  18. Innovative Secure Mobile Banking Services

    Directory of Open Access Journals (Sweden)

    Mousa T AL-Akhras

    2011-01-01

    Full Text Available Due to the widespread use of computer technologies in almost all aspects of life, organisations that are connected to the Internet started extending their services to their customers to include new applications and services that satisfy their customers’ desires to make better businesses. One of these emerging applications is mobile banking. The term mobile banking (or m-banking describes the banking services that the user can perform via a mobile device ubiquitously at anytime and from anywhere. In order for users to access their accounts, they need a mobile device and network connectivity. Therefore, sitting in front of a computer is not a requirement anymore; accessing accounts can occur while users are waiting their turn at the dentist clinic or relaxing at the beach! This paper explores the opportunities of using mobile technology in the electronic banking (e-banking sector to enhance existing banking services by moving toward m-banking using mobile devices and wireless media that can provide opportunities for ubiquitous access to the banking services as mobile technologies can be used at anytime and from anywhere. The technical problems encountered while using the mobile devices presents some technical difficulties and challenges for the m-banking. In this paper we introduce a mobile system that demonstrates the flexibility gained out of this technology and covers the major aspects of such kind of applications. The proposed system covers two parts: the customer services (user interface and the security aspects. In the user interface part, banking facility is provided to the user through the mobile device to implement banking transactions. The model provides customers with the services: billing payments, transferring of funds, viewing of customer’s accounts and transactions, allowing the user to change his/her password and request a cheque book. The application takes into consideration security aspects, it satisfies the following

  19. 77 FR 71104 - Determination of Reasonable Rates and Terms for Noncommercial Broadcasting

    Science.gov (United States)

    2012-11-29

    ... full-time students 2013 2014 2015 2016 2017 Level 1 =20% Feature Music programming: Population count..., Composers and Publishers (``ASCAP''); SESAC, Inc.; Broadcast Music, Inc. (``BMI''); Educational Media Foundation (``EMF''); Music Reports, Inc. (``MRI''); National Public Radio, the Public Broadcasting Service...

  20. 49 CFR 1510.11 - Handling of security service fees.

    Science.gov (United States)

    2010-10-01

    ... air carrier holds neither legal nor equitable interest in the security service fees except for the... 49 Transportation 9 2010-10-01 2010-10-01 false Handling of security service fees. 1510.11 Section 1510.11 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY...

  1. Social Security Number Verification Service (SSNVS)

    Data.gov (United States)

    Social Security Administration — SSNVS is a service offered by SSA's Business Services Online (BSO). It is used by employers and certain third-party submitters to verify the accuracy of the names...

  2. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Castro, R., E-mail: rodrigo.castro@visite.es [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Barbato, P. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Taliercio, C. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy)

    2011-10-15

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  3. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    International Nuclear Information System (INIS)

    Castro, R.; Barbato, P.; Vega, J.; Taliercio, C.

    2011-01-01

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  4. Secure Service Discovery in Home Networks

    NARCIS (Netherlands)

    Scholten, Johan; van Dijk, H.W.; De Cock, Danny; Preneel, Bart; Kung, Antonio; d'Hooge, Michel

    2006-01-01

    This paper presents an architecture for secure service discovery for use in home networks. We give an overview and rationale of a cluster-based home network architecture that bridges different, often vendor specific, network technologies. We show how it integrates security, communication, and

  5. Optimal Service Distribution in WSN Service System Subject to Data Security Constraints

    Science.gov (United States)

    Wu, Zhao; Xiong, Naixue; Huang, Yannong; Gu, Qiong

    2014-01-01

    Services composition technology provides a flexible approach to building Wireless Sensor Network (WSN) Service Applications (WSA) in a service oriented tasking system for WSN. Maintaining the data security of WSA is one of the most important goals in sensor network research. In this paper, we consider a WSN service oriented tasking system in which the WSN Services Broker (WSB), as the resource management center, can map the service request from user into a set of atom-services (AS) and send them to some independent sensor nodes (SN) for parallel execution. The distribution of ASs among these SNs affects the data security as well as the reliability and performance of WSA because these SNs can be of different and independent specifications. By the optimal service partition into the ASs and their distribution among SNs, the WSB can provide the maximum possible service reliability and/or expected performance subject to data security constraints. This paper proposes an algorithm of optimal service partition and distribution based on the universal generating function (UGF) and the genetic algorithm (GA) approach. The experimental analysis is presented to demonstrate the feasibility of the suggested algorithm. PMID:25093346

  6. SecSLA: A Proactive and Secure Service Level Agreement Framework for Cloud Services

    OpenAIRE

    Fahad F. Alruwaili; T. Aaron Gulliver

    2014-01-01

    Cloud customers migrate to cloud services to reduce the operational costs of information technology (IT) and increase organization efficiency. However, ensuring cloud security is very challenging. As a consequence, cloud service providers find it difficult to persuade customers to acquire their services due to security concerns. In terms of outsourcing applications, software, and/or infrastructure services to the cloud, customers are concerned about the availability, integrity, privacy...

  7. An Adaptive Information Quantity-Based Broadcast Protocol for Safety Services in VANET

    Directory of Open Access Journals (Sweden)

    Wenjie Wang

    2016-01-01

    Full Text Available Vehicle-to-vehicle communication plays a significantly important role in implementing safe and efficient road traffic. When disseminating safety messages in the network, the information quantity on safety packets changes over time and space. However, most of existing protocols view each packet the same to disseminate, preventing vehicles from collecting more recent and precise safety information. Hence, an information quantity-based broadcast protocol is proposed in this paper to ensure the efficiency of safety messages dissemination. In particular, we propose the concept of emergency-degree to evaluate packets’ information quantity. Then we present EDCast, an emergency-degree-based broadcast protocol. EDCast differentiates each packet’s priority for accessing the channel based on its emergency-degree so as to provide vehicles with more safety information timely and accurately. In addition, an adaptive scheme is presented to ensure fast dissemination of messages in different network condition. We compare the performance of EDCast with those of three other representative protocols in a typical highway scenario. Simulation results indicate that EDCast achieves higher broadcast efficiency and less redundancy with less delivery delay. What we found demonstrates that it is feasible and necessary for incorporating information quantity of messages in designing an efficient safety message broadcast protocol.

  8. Transmission techniques for emergent multicast and broadcast systems

    CERN Document Server

    da Silva, Mario Marques; Dinis, Rui; Souto, Nuno; Silva, Joao Carlos

    2010-01-01

    Describing efficient transmission schemes for broadband wireless systems, Transmission Techniques for Emergent Multicast and Broadcast Systems examines advances in transmission techniques and receiver designs capable of supporting the emergent wireless needs for multimedia broadcast and multicast service (MBMS) requirements. It summarizes the research and development taking place in wireless communications for multimedia MBMS and addresses the means to improved spectral efficiency to allow for increased user bit rate, as well as increased capacity of the digital cellular radio network.The text

  9. Security infrastructure for on-demand provisioned Cloud infrastructure services

    NARCIS (Netherlands)

    Demchenko, Y.; Ngo, C.; de Laat, C.; Wlodarczyk, T.W.; Rong, C.; Ziegler, W.

    2011-01-01

    Providing consistent security services in on-demand provisioned Cloud infrastructure services is of primary importance due to multi-tenant and potentially multi-provider nature of Clouds Infrastructure as a Service (IaaS) environment. Cloud security infrastructure should address two aspects of the

  10. 78 FR 73109 - Radio Broadcasting Services; Benjamin and Cisco, TX; De Beque, CO; Port Lions, AK; Rule and...

    Science.gov (United States)

    2013-12-05

    ... Broadcasting Services; Benjamin and Cisco, TX; De Beque, CO; Port Lions, AK; Rule and Shamrock, TX AGENCY... 237C3 at Benjamin, Texas; Channel 261C3 at Cisco, Texas; Channel 288C2 at Rule, Texas; and Channel 225C2..., Channel 237C3; by removing Cisco, Channel 261C3; by removing Channel 288C2 at Rule; and by removing...

  11. Broadcasted Location-Aware Data Cache for Vehicular Application

    Directory of Open Access Journals (Sweden)

    Fukuda Akira

    2007-01-01

    Full Text Available There has been increasing interest in the exploitation of advances in information technology, for example, mobile computing and wireless communications in ITS (intelligent transport systems. Classes of applications that can benefit from such an infrastructure include traffic information, roadside businesses, weather reports, entertainment, and so on. There are several wireless communication methods currently available that can be utilized for vehicular applications, such as cellular phone networks, DSRC (dedicated short-range communication, and digital broadcasting. While a cellular phone network is relatively slow and a DSRC has a very small communication area, one-segment digital terrestrial broadcasting service was launched in Japan in 2006, high-performance digital broadcasting for mobile hosts has been available recently. However, broadcast delivery methods have the drawback that clients need to wait for the required data items to appear on the broadcast channel. In this paper, we propose a new cache system to effectively prefetch and replace broadcast data using "scope" (an available area of location-dependent data and "mobility specification" (a schedule according to the direction in which a mobile host moves. We numerically evaluate the cache system on the model close to the traffic road environment, and implement the emulation system to evaluate this location-aware data delivery method for a concrete vehicular application that delivers geographic road map data to a car navigation system.

  12. Strategic Management for IT Services on Outsourcing Security Company

    Directory of Open Access Journals (Sweden)

    Lydia Wijaya

    2018-04-01

    Full Text Available Information Technology (IT is used by many organizations to enhance competitive advantage, but many outsource security firms have not used IT in their business processes. In this research, we will design Strategic Management for IT Services for outsourcing security company. We use an outsourcing security company as a case study of IT Strategy Management for IT Services development. The purpose of this study is to create an IT services strategy for security outsourcing companies. The framework used is the ITIL (Information Technology Infrastructure Library framework service strategy in strategy management for IT services process. There are several steps taken in the making of the strategy: (a Strategic assessment stage to analyzed internal and external factors of the company. (b Strategy generation by creating the strategic plan. (c Strategy execution to determine the tactical plan. And (d strategy measurement and evaluation. This study produced the proposed IT service system that suits the needs of the company in the form of strategic, tactical plans and strategy measurement. This result can be used as the foundations of IT service development in outsourcing security company. In the process of this study, we work closely with stakeholders; every work product has been verified and validated by stakeholders.

  13. [Calculation on ecological security baseline based on the ecosystem services value and the food security].

    Science.gov (United States)

    He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao

    2016-01-01

    The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.

  14. Selective epidemic broadcast algorithm to suppress broadcast storm in vehicular ad hoc networks

    Directory of Open Access Journals (Sweden)

    M. Chitra

    2018-03-01

    Full Text Available Broadcasting in Vehicular Ad Hoc Networks is the best way to spread emergency messages all over the network. With the dynamic nature of vehicular ad hoc networks, simple broadcast or flooding faces the problem called as Broadcast Storm Problem (BSP. The issue of the BSP will degrade the performance of a message broadcasting process like increased overhead, collision and dissemination delay. The paper is motivated to solve the problems in the existing Broadcast Strom Suppression Algorithms (BSSAs like p-Persistence, TLO, VSPB, G-SAB and SIR. This paper proposes to suppress the Broadcast Storm Problem and to improve the Emergency Safety message dissemination rate through a new BSSA based on Selective Epidemic Broadcast Algorithm (SEB. The simulation results clearly show that the SEB outperforms the existing algorithms in terms of ESM Delivery Ratio, Message Overhead, Collision Ratio, Broadcast Storm Ratio and Redundant Rebroadcast Ratio with decreased Dissemination Delay.

  15. Work environment and health determinants : Longitudinal, controlled intervention and cross-sectional studies in public-service broadcasting companies

    OpenAIRE

    Schell, Elisabet

    2008-01-01

    This thesis focuses on ongoing working life. The overall aim was to identify determinants for work health. Various occupational groups in two public service broadcasting companies in Sweden were included. Study persons: Participants were from all over the country (n=1961, participation rate 74%) divided in 11 occupational groups. Those on leave more than 6 months were excluded. Mean age was 48 yrs (21-67 yrs), 58% were males. Questionnaire and company register data were col...

  16. Secure Data Service Outsourcing with Untrusted Cloud

    OpenAIRE

    Xiong, Huijun

    2013-01-01

    Outsourcing data services to the cloud is a nature fit for cloud usage. However, increasing security and privacy concerns from both enterprises and individuals on their outsourced data inhibit this trend. In this dissertation, we introduce service-centric solutions to address two types of security threats existing in the current cloud environments: semi-honest cloud providers and malicious cloud customers. Our solution aims not only to provide confidentiality and access controllability of out...

  17. The design of an ultra-low sidelobe offset-fed 1.22m antenna for use in the broadcasting satellite service

    Science.gov (United States)

    Janky, J. M.

    1981-01-01

    A feed design and reflector geometry were determined for an ultra low sidelobe offset fed 1.22 meter antenna suitable for use in the 12 GHz broadcasting satellite service. Arbitrary constraints used to evaluate the relative merits of the feed horns and range of f/D geometries are: minimum efficiency of 55 percent, -30 dB first sidelobe level (relative to on axis gain), a 0 dBi plateau beyond the near in sidelobe region, and a Chebyshev polynomial based envelope (borrowed from filter theory) for the region from the -3 dB beamwidth points to the 0 dBi plateau region. This envelope is extremely stringent but the results of this research effort indicate that two steps of corrugated feed and a cluster array of small 1 lambda horns do meet the constraints. A set of performance specifications and a mechanical design suitable for a consumer oriented market in the broadcasting satellite service was developed. Costs for production quantities of 10,000 units/yr. are estimated to be around $150.

  18. Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home

    NARCIS (Netherlands)

    Wolthuis, R.; Broenink, E.G.; Fransen, F.; Schultz, S.; Vries, A. de

    2010-01-01

    This paper is the result of research on the security perception of users in ICT services and equipment. We analyze the rationale of users to have an interest in security and to decide to change security parameters of equipment and services. We focus on the home environment, where more and more

  19. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.

    Science.gov (United States)

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-04-21

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.

  20. On the secrecy capacity of the broadcast wiretap channel with limited CSI feedback

    KAUST Repository

    Hyadi, Amal

    2016-10-27

    In this paper, we investigate the problem of secure broadcasting over block-fading channels with limited channel knowledge at the transmitter. More particularly, we analyze the effect of having imperfect channel state information (CSI) via a finite rate feedback on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. First, we partially characterize the ergodic secrecy capacity of the system when the source broadcasts the same information to all the receivers, i.e., common message transmission. Then, we look at the independent messages case, where the transmitter broadcasts multiple independent messages to the legitimate receivers. For this case, we present lower and upper bounds on the ergodic secrecy sum-capacity. In both scenarios, we show that the proposed lower and upper bounds coincide asymptotically as the capacity of the feedback links becomes large, hence, fully characterizing the secrecy capacity in this case.

  1. On the secrecy capacity of the broadcast wiretap channel with limited CSI feedback

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Alouini, Mohamed-Slim

    2016-01-01

    In this paper, we investigate the problem of secure broadcasting over block-fading channels with limited channel knowledge at the transmitter. More particularly, we analyze the effect of having imperfect channel state information (CSI) via a finite rate feedback on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. First, we partially characterize the ergodic secrecy capacity of the system when the source broadcasts the same information to all the receivers, i.e., common message transmission. Then, we look at the independent messages case, where the transmitter broadcasts multiple independent messages to the legitimate receivers. For this case, we present lower and upper bounds on the ergodic secrecy sum-capacity. In both scenarios, we show that the proposed lower and upper bounds coincide asymptotically as the capacity of the feedback links becomes large, hence, fully characterizing the secrecy capacity in this case.

  2. The large satellite program of ESA and its relevance for broadcast missions

    Science.gov (United States)

    Fromm, H.-H.; Herdan, B. L.

    1981-03-01

    In an investigation of the market prospects and payload requirements of future communications satellites, it was concluded that during the next 15 years many space missions will demand larger satellite platforms than those currently available. These platforms will be needed in connection with direct-broadcasting satellites, satellites required to enhance capacities in the case of traditional services, and satellites employed to introduce new types of satellite-based communications operating with small terminals. Most of the larger satellites would require the Ariane III capability, corresponding to about 1400 kg satellite mass in geostationary orbit. Attention is given to L-SAT platform capabilities and broadcast payload requirements, taking into account a European direct-broadcast satellite and Canadian direct-broadcast missions.

  3. The quandry of benchmarking broadcasts

    International Nuclear Information System (INIS)

    Karonis, N T; Supinski, B R

    1999-01-01

    A message passing library's implementation of broadcast communication can significantly affect the performance of applications built with that library. In order to choose between similar implementations or to evaluate available libraries, accurate measurements of broadcast performance are required. As we demonstrate, existing methods for measuring broadcast performance are either inaccurate or inadequate. Fortunately, we have designed an accurate method for measuring broadcast performance. Measuring broadcast performance is not simple. Simply sending one broadcast after another allows them to proceed through the network concurrently, thus resulting in accurate per broadcast timings. Existing methods either fail to eliminate this pipelining effect or eliminate it by introducing overheads that are as difficult to measure as the performance of the broadcast itself. Our method introduces a measurable overhead to eliminate the pipelining effect

  4. Economic differences among regional public service broadcasters in Spain according to their management model. An empirical analysis for period 2010-2013

    Directory of Open Access Journals (Sweden)

    Víctor Orive Serrano

    2016-03-01

    Full Text Available Purpose: This piece of research quantifies and analyses empirically the given economic differences among public service television in Spain according to the adopted management model (classic or outsourced. Design/methodology/approach: In so doing, an average contrast of different economic variables studied in the literature is conducted (audience share, total assets, public subsidies, cost of personnel, suppliers spending and profit after taxes. In addition, these variables are related so as to calculate productivity obtained by each two groups of television operators. This analysis is conducted for period 2010-2013, featured by a crisis context in the Spanish economy. Findings: Management model adopted by each regional broadcaster impacts on different economic variables as obtained share, total assets, public subsidies, cost of personnel, suppliers spending or profit after taxes. Moreover, those public corporations adopting an outsourced management model present better productivity values. Research limitations/implications: Only one country has been analyzed for a 4 years period. Practical implications: Regional public service broadcasters with an outsourced model present less economic losses and require less public subsidies by their corresponding regional governments. Social implications: Outsourcing part of the value chain can be useful so as to guarantee sustainability of regional public service television. Originality/value: It has been proven empirically that the management model of a regional public service television impacts its economic results.

  5. Web-Services Development in Secure Way for Highload Systems

    Directory of Open Access Journals (Sweden)

    V. M. Nichiporchouk

    2011-12-01

    Full Text Available This paper describes approach to design of web-services in secure, high load and fault tolerant implementation for mass message processing. The multicomponent architecture of web-service with possibility for high security zone is provided as well as scalability evaluation of the architecture.

  6. Broadcasted Location-Aware Data Cache for Vehicular Application

    Directory of Open Access Journals (Sweden)

    Kenya Sato

    2007-05-01

    Full Text Available There has been increasing interest in the exploitation of advances in information technology, for example, mobile computing and wireless communications in ITS (intelligent transport systems. Classes of applications that can benefit from such an infrastructure include traffic information, roadside businesses, weather reports, entertainment, and so on. There are several wireless communication methods currently available that can be utilized for vehicular applications, such as cellular phone networks, DSRC (dedicated short-range communication, and digital broadcasting. While a cellular phone network is relatively slow and a DSRC has a very small communication area, one-segment digital terrestrial broadcasting service was launched in Japan in 2006, high-performance digital broadcasting for mobile hosts has been available recently. However, broadcast delivery methods have the drawback that clients need to wait for the required data items to appear on the broadcast channel. In this paper, we propose a new cache system to effectively prefetch and replace broadcast data using “scope” (an available area of location-dependent data and “mobility specification” (a schedule according to the direction in which a mobile host moves. We numerically evaluate the cache system on the model close to the traffic road environment, and implement the emulation system to evaluate this location-aware data delivery method for a concrete vehicular application that delivers geographic road map data to a car navigation system.

  7. Probabilistic broadcasting of mixed states

    International Nuclear Information System (INIS)

    Li Lvjun; Li Lvzhou; Wu Lihua; Zou Xiangfu; Qiu Daowen

    2009-01-01

    It is well known that the non-broadcasting theorem proved by Barnum et al is a fundamental principle of quantum communication. As we are aware, optimal broadcasting (OB) is the only method to broadcast noncommuting mixed states approximately. In this paper, motivated by the probabilistic cloning of quantum states proposed by Duan and Guo, we propose a new way for broadcasting noncommuting mixed states-probabilistic broadcasting (PB), and we present a sufficient condition for PB of mixed states. To a certain extent, we generalize the probabilistic cloning theorem from pure states to mixed states, and in particular, we generalize the non-broadcasting theorem, since the case that commuting mixed states can be exactly broadcast can be thought of as a special instance of PB where the success ratio is 1. Moreover, we discuss probabilistic local broadcasting (PLB) of separable bipartite states

  8. Security Issues for Intelligence Information System based on Service-Oriented Architecture

    OpenAIRE

    Ackoski, Jugoslav; Trajkovik, Vladimir; Davcev, Danco

    2011-01-01

    Security is important requirement for service-oriented architecture (SOA), because SOA considers widespread services on different location and diverse operational platforms. Main challenge for SOA Security still drifts around “clouds” and that is insufficient frameworks for security models based on consistent and convenient methods. Contemporary security architectures and security protocols are in the phase of developing. SOA based systems are characterized with differences ...

  9. The Viability of Mobile Services (SMS and Cell Broadcast in Emergency Management Solutions: An Exploratory Study

    Directory of Open Access Journals (Sweden)

    Mahmoud Al-dalahmeh

    2018-01-01

    Full Text Available In this paper the path forward in location-based mobile phone warning systems is given against a concise backdrop of their deployment worldwide. Of relevance here is (i how the systems are implemented using legislation, contractual service level agreement instruments or a hybrid approach, (ii whether or not governments who deploy these systems will carry the cost of the deployment during an emergency or disaster, and (iii whether or not carrier participation is mandated. Of particular importance are also the underlying technologies of this kind of emergency systems. To date, the short message service and cell broadcast service have been the main technologies to be utilised by governments in the application of location-based services in modern emergency management solutions. However, these technologies will most certainly be superseded by newer, more powerful capabilities. A comprehensive list of requirements for the future location-based emergency systems is presented also in this paper. In essence, these are recommendations to be adhered to if robust solutions using new technologies are to be deployed in a nation state.

  10. Innovation in small and mediumsized firms in the security service industry

    DEFF Research Database (Denmark)

    Langergaard, Luise Li; Møller, Jørn Kjølseth; Hansen, Anne Vorre

    2014-01-01

    This article is a study of innovation in the security sector based on an analysis of three Danish security companies. It uncovers the logics and dynamics of innovation in the security business, which is part of the operational service sector. Operational service companies are forced to choose...... activities. In order to overcome this general ‘service squeeze’ and break with a mature market, security companies use different strategies for innovation. These strategies depend on the ability of the individual security companies to activate the innovative resources among employees in order to move...... the business activities further up in the market hierarchy of security services by offering more complex and knowledge-intensive solutions to the customers, thereby reducing price competition and increasing the profits of the business activity in the same way as known from other industries...

  11. How we use online broadcasting - Web TV - for community engagement

    Science.gov (United States)

    Allison, M. L.; Conway, F. M.; Matti, J.; Palmer, R.

    2013-12-01

    The Arizona Geological Survey uses online broadcasting (Webcast or 'Web TV') to help fulfill our statutory mission to 'Inform, advise and assist the public in matters concerning the geological processes, materials and landscapes and the development and use of the mineral resources of this state.' We launched a monthly online broadcast called 'Arizona Mining Review' via Livestream, a low-cost or free video streaming service. The show provides news, interviews, and discussions about mining and mineral resources topics of interest in Arizona, the nation's second largest non-fuel mining state. The costs to set up and broadcast are minor. Interviews with local guests are held in a corner of the AZGS conference room with easy chairs and a couch; long-distance interviews are held via Skype. The broadcast originates from a desktop computer with a webcam, a $60 microphone, three sets of earbud headphones and a powered amplifier. During broadcasts, we supplement interview footage with slides, photos, or video clips that we have or are provided by guests. Initial broadcasts were live; recordings of these were later uploaded to our YouTube channel. Because scheduling and executing a live Internet broadcast is stressful and demanding for both the production team and guests, we recently elected to record and produce episodes prior to broadcasting them. This allows us more control over supplementary materials used during the broadcast; it also permits us to record the broadcast using a high-definition digital video camera that cannot be used for streaming video. In addition to the Arizona Mining Review, we record conferences and workshops and special presentations on topical issues. A video on the recently discovered Little Chino fault has drawn over 3,000 views. Our latest presentations are short 1-2 minute 'video abstracts' delivered by authors of new publications released by the Survey. These include maps and graphics from the reports to help illustrate the topics and their

  12. 47 CFR 76.1601 - Deletion or repositioning of broadcast signals.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Deletion or repositioning of broadcast signals... RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Notices § 76.1601 Deletion or... to § 76.1601: No deletion or repositioning of a local commercial television station shall occur...

  13. Applied Anthropology in Broadcasting

    Science.gov (United States)

    Eiselein, E. B.

    1976-01-01

    Three different applied media anthropology projects are described. These projects stem from the broadcasters' legal need to know about the community (community ascertainment), the broadcasters' need to know about the station audience (audience profile), and the broadcasters' desire to change a community (action projects). (Author)

  14. On the Efficient Broadcasting of Heterogeneous Services over Band-Limited Channels: Unequal Power Allocation for Wavelet Packet Division Multiplexing

    Directory of Open Access Journals (Sweden)

    Maurizio Murroni

    2008-01-01

    Full Text Available Multiple transmission of heterogeneous services is a central aspect of broadcasting technology. Often, in this framework, the design of efficient communication systems is complicated by stringent bandwidth constraint. In wavelet packet division multiplexing (WPDM, the message signals are waveform coded onto wavelet packet basis functions. The overlapping nature of such waveforms in both time and frequency allows improving the performance over the commonly used FDM and TDM schemes, while their orthogonality properties permit to extract the message signals by a simple correlator receiver. Furthermore, the scalable structure of WPDM makes it suitable for broadcasting heterogeneous services. This work investigates unequal error protection (UEP of data which exhibit different sensitivities to channel errors to improve the performance of WPDM for transmission over band-limited channels. To cope with bandwidth constraint, an appropriate distribution of power among waveforms is proposed which is driven by the channel error sensitivities of the carried message signals in case of Gaussian noise. We address this problem by means of the genetic algorithms (GAs, which allow flexible suboptimal solution with reduced complexity. The mean square error (MSE between the original and the decoded message, which has a strong correlation with subjective perception, is used as an optimization criterion.

  15. 39 CFR 761.8 - Servicing book-entry Postal Service securities; payment of interest, payment at maturity or upon...

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Servicing book-entry Postal Service securities... POSTAL SERVICE POSTAL SERVICE DEBT OBLIGATIONS; DISBURSEMENT POSTAL MONEY ORDERS BOOK-ENTRY PROCEDURES § 761.8 Servicing book-entry Postal Service securities; payment of interest, payment at maturity or upon...

  16. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems.

    Science.gov (United States)

    Wu, Jun; Su, Zhou; Wang, Shen; Li, Jianhua

    2017-07-30

    Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on "friend" relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems.

  17. WPSS: Watching people security services

    NARCIS (Netherlands)

    Bouma, H.; Baan, J.; Borsboom, S.; Zon, K. van; Luo, X.; Loke, B.; Stoeller, B.; Kuilenburg, H. van; Dijk, J.

    2013-01-01

    To improve security, the number of surveillance cameras is rapidly increasing. However, the number of human operators remains limited and only a selection of the video streams are observed. Intelligent software services can help to find people quickly, evaluate their behavior and show the most

  18. Theme Issue: European Broadcasting.

    Science.gov (United States)

    Howkins, John, Ed.

    1977-01-01

    In this document separate articles deal with the following topics: recommendations for future British broadcasting policies that recently were proposed to the British Parliament by the Committee on the Future of Broadcasting; specific media goals set by the Swedish Committee on Broadcasting; communications policy making in Austria; a new…

  19. Broadcasting house

    DEFF Research Database (Denmark)

    Sattrup, Peter Andreas

    2008-01-01

    Regarding the transformation of the Danish Broadcasting Hq. (1934-1945) in Frederiksberg by Vilhelm Lauritzen into the Royal Danish Academy of Music. Analysis, principles, flexibility and change.......Regarding the transformation of the Danish Broadcasting Hq. (1934-1945) in Frederiksberg by Vilhelm Lauritzen into the Royal Danish Academy of Music. Analysis, principles, flexibility and change....

  20. Resource allocation for multichannel broadcasting visible light communication

    Science.gov (United States)

    Le, Nam-Tuan; Jang, Yeong Min

    2015-11-01

    Visible light communication (VLC), which offers the possibility of using light sources for both illumination and data communications simultaneously, will be a promising incorporation technique with lighting applications. However, it still remains some challenges especially coverage because of field-of-view limitation. In this paper, we focus on this issue by suggesting a resource allocation scheme for VLC broadcasting system. By using frame synchronization and a network calculus QoS approximation, as well as diversity technology, the proposed VLC architecture and QoS resource allocation for the multichannel-broadcasting MAC (medium access control) protocol can solve the coverage limitation problem and the link switching problem of exhibition service.

  1. Broadcast scheduling for mobile advertising

    OpenAIRE

    De Reyck, B.; Degraeve, Z.

    2003-01-01

    We describe a broadcast scheduling system developed for a precision marketing firm specialized in location-sensitive permission-based mobile advertising using SMS (Short Message Service) text messaging. Text messages containing advertisements were sent to registered customers when they were shopping in one of two shopping centers in the vicinity of London. The ads typically contained a limited-time promotional offer. The company's problem was deciding which ads to send out to which customers ...

  2. RESTful Java web services security

    CERN Document Server

    Enríquez, René

    2014-01-01

    A sequential and easy-to-follow guide which allows you to understand the concepts related to securing web apps/services quickly and efficiently, since each topic is explained and described with the help of an example and in a step-by-step manner, helping you to easily implement the examples in your own projects. This book is intended for web application developers who use RESTful web services to power their websites. Prior knowledge of RESTful is not mandatory, but would be advisable.

  3. Ecosystem services for energy security

    Energy Technology Data Exchange (ETDEWEB)

    Athanas, Andrea; McCormick, Nadine

    2010-09-15

    The world is at an energy crossroads. The changes underway will have implications for ecosystems and livelihoods. Energy security is the reliable supply of affordable energy, of which there are two dimensions; reliability and resilience. Changes in ecosystem services linked to degradation and climate change have the potential to impact both on the reliabiity of energy systems and on their resiliance. Investing in ecosystems can help safeguard energy systems, and mitigate unforeseen risks to energy security. The energy and conservation community should come together to build reliable and resilliant energy systems in ways which recognise and value supporting ecosystems.

  4. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems

    Directory of Open Access Journals (Sweden)

    Jun Wu

    2017-07-01

    Full Text Available Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on “friend” relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems.

  5. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems

    Science.gov (United States)

    Wu, Jun; Su, Zhou; Li, Jianhua

    2017-01-01

    Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on “friend” relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems. PMID:28758943

  6. Economic Theory and Broadcasting.

    Science.gov (United States)

    Bates, Benjamin J.

    Focusing on access to audience through broadcast time, this paper examines the status of research into the economics of broadcasting. The paper first discusses the status of theory in the study of broadcast economics, both as described directly and as it exists in the statement of the basic assumptions generated by prior work and general…

  7. 8 CFR 204.13 - How can the International Broadcasting Bureau of the United States Broadcasting Board of...

    Science.gov (United States)

    2010-01-01

    ... description of the job to be performed; and (ii) The broadcasting expertise held by the alien, including how... broadcasts; hosts for news broadcasts, news analysis, editorial and other broadcast features; or a news analysis specialist. The term broadcaster does not include individuals performing purely technical or...

  8. Cloud Security Requirements - A checklist with security and privacy requirements for public cloud services

    OpenAIRE

    Bernsmed, Karin; Meland, Per Håkon; Jaatun, Martin Gilje

    2015-01-01

    - This document contains a checklist that can be used to develop or evaluate security and privacy requirements for Cloud computing services. The content has been gathered from established industry standards and best practices, supplemented with requirements from European data protection legislation, and taking into account security issues identified in recent research on Cloud security. The document is intended to be used by potential cloud customers that need to assess the security of a c...

  9. 47 CFR 0.434 - Data bases and lists of authorized broadcast stations and pending broadcast applications.

    Science.gov (United States)

    2010-10-01

    ... stations and pending broadcast applications. 0.434 Section 0.434 Telecommunication FEDERAL COMMUNICATIONS... Commission § 0.434 Data bases and lists of authorized broadcast stations and pending broadcast applications... broadcast stations, pending applications for such stations, and rulemaking proceedings involving amendments...

  10. Design and Implementation of Wiki Services in a Multilevel Secure Environment

    National Research Council Canada - National Science Library

    Ong, Kar L

    2007-01-01

    The Monterey Security Architecture (MYSEA) provides a distributed multilevel secure networking environment where authenticated users can securely access data and services at different security classification levels...

  11. Security management of next generation telecommunications networks and services

    CERN Document Server

    Jacobs, Stuart

    2014-01-01

    This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to enc

  12. RSS based CERN Alerter. Information broadcast to all CERN offices.

    CERN Multimedia

    Otto, R

    2007-01-01

    Nearly every large organization uses a tool to broadcast messages and information across the internal campus (messages like alerts announcing interruption in services or just information about upcoming events). These tools typically allow administrators (operators) to send "targeted" messages which are sent only to specific groups of users or computers, e/g only those located in a specified building or connected to a particular computing service. CERN has a long history of such tools: CERNVMS€™s SPM_quotMESSAGE command, Zephyr and the most recent the NICE Alerter based on the NNTP protocol. The NICE Alerter used on all Windows-based computers had to be phased out as a consequence of phasing out NNTP at CERN. The new solution to broadcast information messages on the CERN campus continues to provide the service based on cross-platform technologies, hence minimizing custom developments and relying on commercial software as much as possible. The new system, called CERN Alerter, is based on RSS (Really Simpl...

  13. FlySec: a risk-based airport security management system based on security as a service concept

    Science.gov (United States)

    Kyriazanos, Dimitris M.; Segou, Olga E.; Zalonis, Andreas; Thomopoulos, Stelios C. A.

    2016-05-01

    Complementing the ACI/IATA efforts, the FLYSEC European H2020 Research and Innovation project (http://www.fly-sec.eu/) aims to develop and demonstrate an innovative, integrated and end-to-end airport security process for passengers, enabling a guided and streamlined procedure from the landside to airside and into the boarding gates, and offering for an operationally validated innovative concept for end-to-end aviation security. FLYSEC ambition turns through a well-structured work plan into: (i) innovative processes facilitating risk-based screening; (ii) deployment and integration of new technologies and repurposing existing solutions towards a risk-based Security paradigm shift; (iii) improvement of passenger facilitation and customer service, bringing security as a real service in the airport of tomorrow;(iv) achievement of measurable throughput improvement and a whole new level of Quality of Service; and (v) validation of the results through advanced "in-vitro" simulation and "in-vivo" pilots. On the technical side, FLYSEC achieves its ambitious goals by integrating new technologies on video surveillance, intelligent remote image processing and biometrics combined with big data analysis, open-source intelligence and crowdsourcing. Repurposing existing technologies is also in the FLYSEC objectives, such as mobile application technologies for improved passenger experience and positive boarding applications (i.e. services to facilitate boarding and landside/airside way finding) as well as RFID for carry-on luggage tracking and quick unattended luggage handling. In this paper, the authors will describe the risk based airport security management system which powers FLYSEC intelligence and serves as the backend on top of which FLYSEC's front end technologies reside for security services management, behaviour and risk analysis.

  14. Time-Zone-Pattern Satellite Broadcasting Antenna

    Science.gov (United States)

    Galindo, Victor; Rahmat-Samii, Yahya; Imbriale, William A.; Cohen, Herb; Cagnon, Ronald R.

    1988-01-01

    Direct-broadcast satellite antenna designs provide contoured beams to match four time zones in 48 contiguous states and spot beams for Alaska, Hawaii, and Puerto Rico presented in 29-page report. Includes descriptions of procedures used to arrive at optimized designs. Arrangements, amplitudes, and phases of antenna feeds presented in tables. Gain contours shown graphically. Additional tables of performance data given for cities in service area of Eastern satellite.

  15. Privacy-preserving security solution for cloud services

    OpenAIRE

    L. Malina; J. Hajny; P. Dzurenda; V. Zeman

    2015-01-01

    We propose a novel privacy-preserving security solution for cloud services. Our solution is based on an efficient non-bilinear group signature scheme providing the anonymous access to cloud services and shared storage servers. The novel solution offers anonymous authenticationfor registered users. Thus, users' personal attributes (age, valid registration, successful payment) can be proven without revealing users' identity, and users can use cloud services without any threat of profiling their...

  16. Instant SQL Server Analysis Services 2012 Cube Security

    CERN Document Server

    Jayanty, Satya SK

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Instant Microsoft SQL Server Analysis Services 2012 Cube Security is a practical, hands-on guide that provides a number of clear, step-by-step exercises for getting started with cube security.This book is aimed at Database Administrators, Data Architects, and Systems Administrators who are managing the SQL Server data platform. It is also beneficial for analysis services developers who already have some experience with the technology, but who want to go into more detail on advanced

  17. Security threats and their mitigation in infrastructure as a service

    Directory of Open Access Journals (Sweden)

    Bineet Kumar Joshi

    2016-09-01

    Full Text Available Cloud computing is a hot technology in the market. It permits user to use all IT resources as computing services on the basis of pay per use manner and access the applications remotely. Infrastructure as a service (IaaS is the basic requirement for all delivery models. Infrastructure as a service delivers all possible it resources (Network Components, Operating System, etc. as a service to users. From both users and providers point of view: integrity, privacy and other security issues in IaaS are the important concern. In this paper we studied in detail about the different types of security related issues in IaaS layer and methods to resolve them to maximize the performance and to maintain the highest level of security in IaaS.

  18. Security and Hyper-accurate Positioning Monitoring with Automatic Dependent Surveillance-Broadcast (ADS-B), Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Lightning Ridge Technologies, working in collaboration with The Innovation Laboratory, Inc., extend Automatic Dependent Surveillance Broadcast (ADS-B) into a safe,...

  19. Security and Hyper-accurate Positioning Monitoring with Automatic Dependent Surveillance-Broadcast (ADS-B), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Lightning Ridge Technologies, LLC, working in collaboration with The Innovation Laboratory, Inc., extend Automatic Dependent Surveillance -- Broadcast (ADS-B) into a...

  20. Analysis and Transceiver Design for the MIMO Broadcast Channel

    CERN Document Server

    Hunger, Raphael

    2013-01-01

    This book deals with the optimization-based joint design of the transmit and receive filters in   MIMO broadcast channel in which the user terminals may be equipped with several antenna elements. Furthermore, the maximum performance of the system in the high power regime as well as the set of all feasible quality-of-service requirements is analyzed. First, a fundamental duality is derived that holds between the MIMO broadcast channel and virtual MIMO multiple access channel. This duality construct allows for the efficient solution of problems originally posed in the broadcast channel in the dual domain where a possibly hidden convexity can often be revealed. On the basis of the established duality result, the gradient-projection algorithm is introduced as a tool to solve constrained optimization problems to global optimality under certain conditions. The gradient-projection tool is then applied to solving the weighted sum rate maximization problem which is a central optimization that arises in any network u...

  1. 78 FR 2934 - Promoting Diversification of Ownership in the Broadcasting Services

    Science.gov (United States)

    2013-01-15

    ... with fewer than 25 employees.'' I. Introduction 1. The Commission seeks comment on whether to collect... Commission determined that, in order to measure the extent of minority and female ownership of broadcast outlets and assess the need for and effectiveness of any policies designed to promote minority and female...

  2. VCC-SSF: Service-Oriented Security Framework for Vehicular Cloud Computing

    Directory of Open Access Journals (Sweden)

    Won Min Kang

    2015-02-01

    Full Text Available Recently, as vehicle computing technology has advanced, the paradigm of the vehicle has changed from a simple means of transportation to a smart vehicle for safety and convenience. In addition, the previous functions of the Intelligent Transportation System (ITS such as traffic accident prevention and providing traffic volume information have been combined with cloud computing. ITS services provide user-oriented broad services in the Vehicular Cloud Computing (VCC environment through efficient traffic management, traffic accident prevention, and convenience services. However, existing vehicle services focus on providing services using sensing information inside the vehicle and the system to provide the service through an interface with the external infrastructure is insufficient. In addition, because wireless networks are used in VCC environments, there is a risk of important information leakage from sensors inside the vehicle, such as driver personal identification and payment information at the time of goods purchase. We propose the VCC Service-oriented Security Framework (VCC-SSF to address the limitations and security threats of VCC-based services. The proposed framework considers security for convenient and efficient services of VCC and includes new user-oriented payment management and active accident management services. Furthermore, it provides authentication, encryption, access control, confidentiality, integrity, and privacy protection for user personal information and information inside the vehicle.

  3. Outsourcing as a Mean of Service for Security Provision

    Directory of Open Access Journals (Sweden)

    D.I. Persanov

    2012-03-01

    Full Text Available The article highlights the implementation of outsourcing as a mean of service for security provision. Analysis is performed to describe the current issues affecting the management decision in favor of outsourcing. Investigation covers the processes of physical, information and economical security. The main recommendations to use outsourcing for security provision are described in the conclusion.

  4. SAM: Secure Access of Media Independent Information Service with User Anonymity

    Directory of Open Access Journals (Sweden)

    Li Guangsong

    2010-01-01

    Full Text Available Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS and present a new access authentication scheme with user anonymity for MIIS. The protocol can be used to establish a secure channel between the mobile node and the information server. Security and performance of the protocol are also analyzed in this paper.

  5. Secure Electronic Cards in Public Services

    Directory of Open Access Journals (Sweden)

    Cristian TOMA

    2008-01-01

    Full Text Available The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patient’s medical history and payment for private medical services. The security issue is a very important one as the patient’s history is confidential and the payment has to be safe.

  6. 76 FR 5521 - Innovation in the Broadcast Television Bands

    Science.gov (United States)

    2011-02-01

    ... broadcasters serving minority, foreign language and niche interests that might have smaller audiences and lower... signals, including those not specifically raised in this NPRM. Improving Reception of VHF TV Service 34... band that can cause interference, and reception of VHF signals requires physically larger antennas that...

  7. Security encryption for video-on-radio devices

    Science.gov (United States)

    Perrone, Antonio L.; Basti, Gianfranco

    2002-03-01

    In this paper we present an encryption module included in the Subsidiary Communication Channel (SCC) System we are developing for video-on-FM radio broadcasting. This module is aimed to encrypt by symmetric key the video image archive and real-time database of the broadcaster, and by asymmetric key the video broadcasting to final users. The module includes our proprietary Techniteia Encryption Library (TEL), that is already successfully running and securing several e-commerce portals in Europe. TEL is written in C-ANSI language for its easy exportation onto all main platforms and it is optimized for real-time applications. It is based on the blowfish encryption algorithm and it is characterized by a physically separated sub-module for the automatic generation/recovering of the variable sub-keys of the blowfish algorithm. In this way, different parts of the database are encrypted by different keys, both in space and in time, for granting an optimal security.

  8. A new data collaboration service based on cloud computing security

    Science.gov (United States)

    Ying, Ren; Li, Hua-Wei; Wang, Li na

    2017-09-01

    With the rapid development of cloud computing, the storage and usage of data have undergone revolutionary changes. Data owners can store data in the cloud. While bringing convenience, it also brings many new challenges to cloud data security. A key issue is how to support a secure data collaboration service that supports access and updates to cloud data. This paper proposes a secure, efficient and extensible data collaboration service, which prevents data leaks in cloud storage, supports one to many encryption mechanisms, and also enables cloud data writing and fine-grained access control.

  9. Dutch National Security Reform Under Review : Sufficient Checks and Balances in the Intelligence and Security Services Act 2017?

    NARCIS (Netherlands)

    Quirine Eijkman; Nico van Eijk; Robert van Schaik

    2018-01-01

    In May 2018, the new Dutch Intelligence and Security Services Act 2017 (Wet op de Inlichtingen- en veiligheidsdiensten, Wiv) will enter into force. It replaces the previous 2002 Act and incorporates many reforms to the information gathering powers of the two intelligence and security services as

  10. Constructing RBAC based security model in u-healthcare service platform.

    Science.gov (United States)

    Shin, Moon Sun; Jeon, Heung Seok; Ju, Yong Wan; Lee, Bum Ju; Jeong, Seon-Phil

    2015-01-01

    In today's era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation's healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP) applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR), recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices.

  11. Constructing RBAC Based Security Model in u-Healthcare Service Platform

    Science.gov (United States)

    Shin, Moon Sun; Jeon, Heung Seok; Ju, Yong Wan; Lee, Bum Ju; Jeong, Seon-Phil

    2015-01-01

    In today's era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation's healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP) applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR), recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices. PMID:25695104

  12. A MAS-Based Cloud Service Brokering System to Respond Security Needs of Cloud Customers

    Directory of Open Access Journals (Sweden)

    Jamal Talbi

    2017-03-01

    Full Text Available Cloud computing is becoming a key factor in computer science and an important technology for many organizations to deliver different types of services. The companies which provide services to customers are called as cloud service providers. The cloud users (CUs increase and require secure, reliable and trustworthy cloud service providers (CSPs from the market. So, it’s a challenge for a new customer to choose the highly secure provider. This paper presents a cloud service brokering system in order to analyze and rank the secured cloud service provider among the available providers list. This model uses an autonomous and flexible agent in multi-agent system (MASs that have an intelligent behavior and suitable tools for helping the brokering system to assess the security risks for the group of cloud providers which make decision of the more secured provider and justify the business needs of users in terms of security and reliability.

  13. Broadcasting of inseparability

    International Nuclear Information System (INIS)

    Adhikari, Satyabrata; Choudhury, B S; Chakrabarty, Indranil

    2006-01-01

    Suppose we are given an entangled pair and asked how well we can produce two entangled pairs starting from a given entangled pair using only local operations. To respond to this question, we study broadcasting of entanglement using a state-dependent quantum cloning machine as a local copier. We show that the length of the interval for probability-amplitude-squared α 2 for broadcasting of entanglement using a state-dependent cloner can be made larger than the length of the interval for probability-amplitude-squared for broadcasting entanglement using a state-independent cloner. Further we show that there exists a local state-dependent cloner which gives better quality copy (in terms of average fidelity) of an entangled pair than the local universal cloner

  14. A Resource Curriculum in Broadcast Media. Bulletin No. 8025.

    Science.gov (United States)

    Herian, Roger; Moen, Mary

    A resource for teachers who design instructional programs in broadcast media, this curriculum guide consists of eight units which deal with the nature of broadcast media, broadcast programming and public interest, broadcast advertising, broadcast regulation, societal effects of broadcasting, broadcasting and future technology, radio broadcasting,…

  15. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t ... in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...

  16. Broadcast media and the dissemination of weather information

    Science.gov (United States)

    Byrnes, J.

    1973-01-01

    Although television is the public's most preferred source of weather information, it fails to provide weather reports to those groups who seek the information early in the day and during the day. The result is that many people most often use radio as a source of information, yet preferring the medium of television. The public actively seeks weather information from both radio and TV stations, usually seeking information on current conditions and short range forecasts. forecasts. Nearly all broadcast stations surveyed were eager to air severe weather bulletins quickly and often. Interest in Nowcasting was high among radio and TV broadcasters, with a significant portion indicating a willingness to pay something for the service. However, interest among TV stations in increasing the number of daily reports was small.

  17. 47 CFR 73.3572 - Processing of TV broadcast, Class A TV broadcast, low power TV, TV translators, and TV booster...

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Processing of TV broadcast, Class A TV broadcast, low power TV, TV translators, and TV booster applications. 73.3572 Section 73.3572... Rules Applicable to All Broadcast Stations § 73.3572 Processing of TV broadcast, Class A TV broadcast...

  18. 78 FR 5122 - NASA Security and Protective Services Enforcement

    Science.gov (United States)

    2013-01-24

    ... NATIONAL AERONAUTICS AND SPACE ADMINISTRATION 14 CFR Parts 1203a, 1203b, and 1204 [Docket No NASA-2012-0007] RIN 2700-AD89 NASA Security and Protective Services Enforcement AGENCY: National Aeronautics... nonsubstantive changes to NASA regulations to clarify the procedures for establishing controlled/ secure areas...

  19. Broadcast, Denial-of-Service, and Secure Communication

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2013-01-01

    unsolicited messages and lacking of expected communication. Moreover, standard cryptographic mechanisms can be implemented in the calculus via term rewriting. The modelling framework is complemented by an executable specification of the semantics of the calculus in Maude, thereby facilitating solving a number...

  20. Constructing RBAC Based Security Model in u-Healthcare Service Platform

    Directory of Open Access Journals (Sweden)

    Moon Sun Shin

    2015-01-01

    Full Text Available In today’s era of aging society, people want to handle personal health care by themselves in everyday life. In particular, the evolution of medical and IT convergence technology and mobile smart devices has made it possible for people to gather information on their health status anytime and anywhere easily using biometric information acquisition devices. Healthcare information systems can contribute to the improvement of the nation’s healthcare quality and the reduction of related cost. However, there are no perfect security models or mechanisms for healthcare service applications, and privacy information can therefore be leaked. In this paper, we examine security requirements related to privacy protection in u-healthcare service and propose an extended RBAC based security model. We propose and design u-healthcare service integration platform (u-HCSIP applying RBAC security model. The proposed u-HCSIP performs four main functions: storing and exchanging personal health records (PHR, recommending meals and exercise, buying/selling private health information or experience, and managing personal health data using smart devices.

  1. The Future of television is personalized : analysis of the internet streaming platform NRK on demand : a public broadcast study

    OpenAIRE

    Sørlie, Ida Elisabeth

    2014-01-01

    Portraying a public broadcasters’ digital challenge, the thesis presents an analysis of the new reality, which is disrupting the world of media, entertainment and news. Targeting the dilemmas of the Norwegian Broadcasting Corporation, NRK, it seeks to offer alternatives for maximizing their public service mandate through their On Demand platform. Discussing its strengths and weaknesses, this thesis presents a proposal for the next strategic step of public service broadcasters: ...

  2. The government as a client for security support services. A commercial security contractor's perspective

    International Nuclear Information System (INIS)

    Leith, H.M.

    1984-01-01

    This paper presents a look at the challenges confronting security management personnel contracting with the U.S. government to provide security and related support services. From the corporate decision to enter the ''Big Leagues'' via proposal submission, through commitments and required expertise necessary to achieve ''outstanding'' ratings, this paper is an overview of a broad spectrum of security related topics including: the proposal process, the first step; oral review boards and ''Catch-22'' dilemmas; contractual requirements vs. court orders; personnel, the human factor; the carousel approach to fiscal accountability; and avoiding communication barriers

  3. Contemporary women's secure psychiatric services in the United Kingdom: A qualitative analysis of staff views.

    Science.gov (United States)

    Walker, T; Edge, D; Shaw, J; Wilson, H; McNair, L; Mitchell, H; Gutridge, K; Senior, J; Sutton, M; Meacock, R; Abel, K

    2017-11-01

    WHAT IS KNOWN ON THE SUBJECT?: Three pilot UK-only Women's Enhanced Medium Secure Services (WEMSS) was opened in 2007 to support women's movement from high secure care and provide a bespoke, women-only service. Evidence suggests that women's secure services are particularly challenging environments to work in and staffing issues (e.g., high turnover) can cause difficulties in establishing a therapeutic environment. Research in this area has focused on the experiences of service users. Studies which have examined staff views have focused on their feelings towards women in their care and the emotional burden of working in women's secure services. No papers have made a direct comparison between staff working in different services. WHAT DOES THIS STUDY ADD TO EXISTING KNOWLEDGE?: This is the first study to explore the views and experiences of staff in the three UK WEMSS pilot services and contrast them with staff from women's medium secure services. Drawing upon data from eighteen semi-structured interviews (nine WEMSS, nine non-WEMSS), key themes cover staff perceptions of factors important for women's recovery and their views on operational aspects of services. This study extends our understanding of the experiences of staff working with women in secure care and bears relevance for staff working internationally, as well as in UK services. WHAT ARE THE IMPLICATIONS FOR PRACTICE?: The study reveals the importance of induction and training for bank and agency staff working in women's secure services. Further, regular clinical supervision should be mandatory for all staff so they are adequately supported. Introduction Women's Enhanced Medium Secure Services (WEMSS) is bespoke, gender-sensitive services which opened in the UK in 2007 at three pilot sites. This study is the first of its kind to explore the experiences of WEMSS staff, directly comparing them to staff in a standard medium secure service for women. The literature to date has focused on the experiences of

  4. Employment of security personnel of a security service company does not need approval by the works council

    International Nuclear Information System (INIS)

    Anon.

    1990-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-secion 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. The court decision was taken for settlement of court proceedings commenced by Institute of Plasma Physics in Garching. (Federal Labour Court, decision dated November 28, 1989 - 1 ABR 90/88). (orig./HP) [de

  5. A fast inter mode decision algorithm in H.264/AVC for IPTV broadcasting services

    Science.gov (United States)

    Kim, Geun-Yong; Yoon, Bin-Yeong; Ho, Yo-Sung

    2007-01-01

    The new video coding standard H.264/AVC employs the rate-distortion optimization (RDO) method for choosing the best coding mode. However, since it increases the encoder complexity tremendously, it is not suitable for real-time applications, such as IPTV broadcasting services. Therefore we need a fast mode decision algorithm to reduce its encoding time. In this paper, we propose a fast mode decision algorithm considering quantization parameter (QP) because we have noticed that the frequency of best modes depends on QP. In order to consider these characteristics, we use the coded block pattern (CBP) that has "0" value when all quantized discrete cosine transform (DCT) coefficients are zero. We also use both the early SKIP mode and early 16x16 mode decisions. Experimental results show that the proposed algorithm reduces the encoding time by 74.6% for the baseline profile and 72.8% for the main profile, compared to the H.264/AVC reference software.

  6. Broadcasting environmental knowledge: Open University & BBC collaborations serving massive global audiences

    Science.gov (United States)

    Brandon, M. A.; Smith, J.; Garrow, K. H.; Law, A.

    2013-12-01

    The UK Open University has a long history of working with broadcast media - indeed before it first formed over 40 years ago it was proposed to be a "University of the Air ". Originally the University made its own television programmes that were directly connected with teaching. They were usually recordings of academics giving lectures that were broadcast late at night. Over recent times we have moved into developing co-productions with mainstream broadcast media specifically designed to be of general educational interest to UK and worldwide audiences. These include both high impact one-off programmes such as Are we changing planet Earth?, multiple international award winning series such as Frozen Planet, and World Service radio such as Earth Reporters. These programmes have had global audiences; in some cases of tens of millions. Whilst we have only worked using clear scientific evidence and expertise, we have co-produced media which small sections of the general public could consider controversial. For example, in Are we changing planet Earth? the case was presented pre IPCC AR4 for anthropogenic climate change. The final episode of Frozen Planet "On thin ice" presented evidence of how the polar climate is changing and likely future global impacts. It created a large and occasionally hostile international media impact long before broadcast. This continued after broadcast in some media but we believe it stopped because the science presented was robust within the current literature. Based around broadcasting, we used a communication strategy based on our personal experience over the last decade along with our institutional experience going back 40 years. For example our outreach include social media, newspapers, radio and podcasts to speak about underpinning science. We use Twitter during actual broadcasts to circulate links to journal articles and provide context around the science presented on screen. Backed up by a large public outreach campaign at science fairs

  7. Spatial Air Index Based on Largest Empty Rectangles for Non-Flat Wireless Broadcast in Pervasive Computing

    Directory of Open Access Journals (Sweden)

    Jun-Hong Shen

    2016-11-01

    Full Text Available In pervasive computing, location-based services (LBSs are valuable for mobile clients based on their current locations. LBSs use spatial window queries to enable useful applications for mobile clients. Based on skewed access patterns of mobile clients, non-flat wireless broadcast has been shown to efficiently disseminate spatial objects to mobile clients. In this paper, we consider a scenario in which spatial objects are broadcast to mobile clients over a wireless channel in a non-flat broadcast manner to process window queries. For such a scenario, we propose an efficient spatial air index method to handle window query access in non-flat wireless broadcast environments. The concept of largest empty rectangles is used to avoid unnecessary examination of the broadcast content, thus reducing the processing time for window queries. Simulation results show that the proposed spatial air index method outperforms the existing methods under various settings.

  8. Security Threats on Wireless Sensor Network Protocols

    OpenAIRE

    H. Gorine; M. Ramadan Elmezughi

    2016-01-01

    In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...

  9. 47 CFR 73.801 - Broadcast regulations applicable to LPFM stations.

    Science.gov (United States)

    2010-10-01

    ....333Engineering charts. Section 73.503Licensing requirements and service. Section 73.508Standards of good... of taped, filmed, or recorded material. Section 73.1210TV/FM dual-language broadcasting in Puerto....3568Dismissal of applications. Section 73.3584Procedure for filing petitions to deny. Section 73.3587Procedure...

  10. Broadcast Coded Slotted ALOHA

    DEFF Research Database (Denmark)

    Ivanov, Mikhail; Brännström, Frederik; Graell i Amat, Alexandre

    2016-01-01

    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives ...

  11. External Service Providers to the National Security Technology Incubator: Formalization of Relationships

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-04-30

    This report documents the formalization of relationships with external service providers in the development of the National Security Technology Incubator (NSTI). The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report summarizes the process in developing and formalizing relationships with those service providers and includes a sample letter of cooperation executed with each provider.

  12. INFORMATION SECURITY RISKS OPTIMIZATION IN CLOUDY SERVICES ON THE BASIS OF LINEAR PROGRAMMING

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2013-01-01

    Full Text Available The paper discusses theoretical aspects of secure cloud services creation for information processing of various confidentiality degrees. A new approach to the reasoning of information security composition in distributed computing structures is suggested, presenting the problem of risk assessment as an extreme problem of decisionmaking. Linear programming method application is proved to minimize the risk of information security for given performance security in compliance with the economic balance for the maintenance of security facilities and cost of services. An example is given to illustrate the obtained theoretical results.

  13. Relation between 'no broadcasting' for noncommuting states and 'no local broadcasting' for quantum correlations

    International Nuclear Information System (INIS)

    Luo Shunlong; Li Nan; Cao Xuelian

    2009-01-01

    The no-broadcasting theorem, first established by Barnum et al. [Phys. Rev. Lett. 76, 2818 (1996)], states that a set of quantum states can be broadcast if and only if it constitutes a commuting family. Quite recently, Piani et al. [Phys. Rev. Lett. 100, 090502 (2008)] showed, by using an ingenious and sophisticated method, that the correlations in a single bipartite state can be locally broadcast if and only if the state is effectively a classical one (i.e., the correlations therein are classical). In this Brief Report, under the condition of nondegenerate spectrum, we provide an alternative and significantly simpler proof of the latter result based on the original no-broadcasting theorem and the monotonicity of the quantum relative entropy. This derivation motivates us to conjecture the equivalence between these two elegant yet formally different no-broadcasting theorems and indicates a subtle and fundamental issue concerning spectral degeneracy which also lies at the heart of the conflict between the von Neumann projection postulate and the Lueders ansatz for quantum measurements. This relation not only offers operational interpretations for commutativity and classicality but also illustrates the basic significance of noncommutativity in characterizing quantumness from the informational perspective.

  14. Broadcasting, Reacting, Engaging

    DEFF Research Database (Denmark)

    Etter, Michael

    2014-01-01

    Purpose - Symmetric communication and relationship building are core principles of public relations, which have been highlighted for CSR communication. In this paper three different communication strategies for CSR communication in Twitter are developed, of which each contributes differently...... to the ideals of symmetric communication and relationship building. The framework is then applied to analyze how companies use the micro-blogging service Twitter for CSR communication. Design/methodology/approach - Social network analysis is used to identify the 30 most central corporate accounts in a CSR...... Twitter-Network. From these accounts over 40´000 tweets are extracted and manually coded. Anova is applied to investigate differences in the weighting of CSR topics between the different strategies. Findings - The analysis reveals that corporations adhere to a broadcasting strategy or a reactive strategy...

  15. Random broadcast on random geometric graphs

    Energy Technology Data Exchange (ETDEWEB)

    Bradonjic, Milan [Los Alamos National Laboratory; Elsasser, Robert [UNIV OF PADERBORN; Friedrich, Tobias [ICSI/BERKELEY; Sauerwald, Tomas [ICSI/BERKELEY

    2009-01-01

    In this work, we consider the random broadcast time on random geometric graphs (RGGs). The classic random broadcast model, also known as push algorithm, is defined as: starting with one informed node, in each succeeding round every informed node chooses one of its neighbors uniformly at random and informs it. We consider the random broadcast time on RGGs, when with high probability: (i) RGG is connected, (ii) when there exists the giant component in RGG. We show that the random broadcast time is bounded by {Omicron}({radical} n + diam(component)), where diam(component) is a diameter of the entire graph, or the giant component, for the regimes (i), or (ii), respectively. In other words, for both regimes, we derive the broadcast time to be {Theta}(diam(G)), which is asymptotically optimal.

  16. Olympic Broadcast Rights

    OpenAIRE

    Žižka, Martin

    2014-01-01

    Title: Olympic Broadcast Rights Objectives: The main objective of this thesis is to analyse the revenue derived from the sale of the broadcasting rights to the Olympics by Olympic Movement. In the thesis are analysed the total sum of revenue, selected territory and compared the proportion that belongs to the International Olympic Committee and the Organizing Committee of the Olympic Games. The secondary objective is to adapt and calculation of the conversion mechanism for the transfer of amou...

  17. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

    Science.gov (United States)

    Huang, Qinlong; Yang, Yixian; Shi, Yuxiang

    2018-02-24

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.

  18. 47 CFR 73.667 - TV subsidiary communications services.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false TV subsidiary communications services. 73.667... RADIO BROADCAST SERVICES Television Broadcast Stations § 73.667 TV subsidiary communications services. (a) Subsidiary communications services are those transmitted within the TV aural baseband signal, but...

  19. Service oriented architecture governance tools within information security

    OpenAIRE

    2012-01-01

    M.Tech. Service Oriented Architecture has many advantages. For example, organisations can align business with Information Technology, reuse the developed functionality, reduce development and maintain cost for applications. Organisations adopt Service Oriented Architecture with the aim of automating and integrating business processes. However, it has information security vulnerabilities that should be considered. For example, applications exchange information across the Internet, where it ...

  20. On the analysis of human mobility model for content broadcasting in 5G networks

    KAUST Repository

    Lau, Chun Pong

    2018-02-15

    Today\\'s mobile service providers aim at ensuring end-to-end performance guarantees. Hence, ensuring an efficient content delivery to end users is highly required. Currently, transmitting popular contents in modern mobile networks rely on unicast transmission. This result into a huge underutilization of the wireless bandwidth. The urban scale mobility of users is beneficial for mobile networks to allocate radio resources spatially and temporally for broadcasting contents. In this paper, we conduct a comprehensive analysis on a human activity/mobility model and the content broadcasting system in 5G mobile networks. The objective of this work is to describe how human daily activities could improve the content broadcasting efficiency. We achieve the objective by analyzing the transition probabilities of a user traveling over several places according to the change of states of daily human activities. Using a reallife simulation, we demonstrate the relationship between the human mobility and the optimization objective of the content broadcasting system.

  1. Anthropologists and Broadcasting: Roles and Entry Strategies

    Science.gov (United States)

    Eiselein, E. B.; Topper, Martin

    1976-01-01

    The article describes some of the roles open to anthropologists in radio and television. Entry strategies for occupying these roles include taking the first step in approaching the broadcast station, learning about broadcasting, and communicating anthropology to the broadcasters. (Author/NQ)

  2. Safety message broadcast in vehicular networks

    CERN Document Server

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  3. 78 FR 41954 - TA-W-82,634, Prudential Global Business Technology Solutions Central Security Services Dresher...

    Science.gov (United States)

    2013-07-12

    ... Business Technology Solutions Central Security Services Iselin, New Jersey; TA-W-82,634B, Prudential Global Business Technology Solutions Central Security Services Plymouth, Minnesota; TA- W-82,634C, Prudential Global Business Technology Solutions Central Security Services Scottsdale, Arizona; TA-W-82,634D...

  4. Minimizing Broadcast Expenses in Clustered Ad-hoc Networks

    Directory of Open Access Journals (Sweden)

    S. Zeeshan Hussain

    2018-01-01

    Full Text Available One way to minimize the broadcast expenses of routing protocols is to cluster the network. In clustered ad-hoc networks, all resources can be managed easily by resolving scalability issues. However, blind query broadcast is a major issue that leads to the broadcast storm problem in clustered ad-hoc networks. This query broadcast is done to carry out the route-search task that leads to the unnecessary propagation of route-query even after route has been found. Hence, this query propagation poses the problem of congestion in the network. In particular this motivates us to propose a query-control technique in such networks which works based on broadcast repealing. A huge amount of work has been devoted to propose the query control broadcasting techniques. However, such techniques used in traditional broadcasting mechanisms need to be properly extended for use in the cluster based routing architecture. In this paper, query-control technique is proposed for cluster based routing technique to reduce the broadcast expenses. Finally, we report some experiments which compare the proposed technique to other commonly used techniques including standard one-class AODV that follows TTL-sequence based broadcasting technique.

  5. Global Broadcast Service Reach Back via Ultra High Frequency Demand Assigned Multiple Satellite Communications

    National Research Council Canada - National Science Library

    Arthur, Joseph

    1998-01-01

    .... An integral part of the user pull is the reach back channel. The reach back channel allows users to specify' the information they need broadcast and tailor the information to meet their mission needs...

  6. Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities

    Directory of Open Access Journals (Sweden)

    Qinlong Huang

    2017-01-01

    Full Text Available Mobile healthcare social networks (MHSN integrated with connected medical sensors and cloud-based health data storage provide preventive and curative health services in smart cities. The fusion of social data together with real-time health data facilitates a novel paradigm of healthcare big data analysis. However, the collaboration of healthcare and social network service providers may pose a series of security and privacy issues. In this paper, we propose a secure health and social data sharing and collaboration scheme in MHSN. To preserve the data privacy, we realize secure and fine-grained health data and social data sharing with attribute-based encryption and identity-based broadcast encryption techniques, respectively, which allows patients to share their private personal data securely. In order to achieve enhanced data collaboration, we allow the healthcare analyzers to access both the reencrypted health data and the social data with authorization from the data owner based on proxy reencryption. Specifically, most of the health data encryption and decryption computations are outsourced from resource-constrained mobile devices to a health cloud, and the decryption of the healthcare analyzer incurs a low cost. The security and performance analysis results show the security and efficiency of our scheme.

  7. 78 FR 6168 - Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract...

    Science.gov (United States)

    2013-01-29

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2013-0001] Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2012 Service Contract Inventories. SUMMARY: In accordance with...

  8. 77 FR 3836 - Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract...

    Science.gov (United States)

    2012-01-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0105] Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2011 Service Contract Inventories. SUMMARY: In accordance with...

  9. Security measures effect over performance in service provider network

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... Abstract—network security is defined as a set of policies and actions taken by a ... These threats are linked with the following factors that are ... typically smaller than those in the service provider space. ... Service providers cannot manage to provide ... e the DB performance effect ... r the business needs [10].

  10. Security infrastructure for dynamically provisioned cloud infrastructure services

    NARCIS (Netherlands)

    Demchenko, Y.; Ngo, C.; de Laat, C.; Lopez, D.R.; Morales, A.; García-Espín, J.A.; Pearson, S.; Yee, G.

    2013-01-01

    This chapter discusses conceptual issues, basic requirements and practical suggestions for designing dynamically configured security infrastructure provisioned on demand as part of the cloud-based infrastructure. This chapter describes general use cases for provisioning cloud infrastructure services

  11. A broadcast engineering tutorial for non-engineers

    CERN Document Server

    Pizzi, Skip

    2014-01-01

    A Broadcast Engineering Tutorial for Non-Engineers is the leading publication on the basics of broadcast technology. Whether you are new to the industry or do not have an engineering background, this book will give you a comprehensive primer of television, radio, and digital media relating to broadcast-it is your guide to understanding the technical world of radio and television broadcast engineering. It covers all the important topics such as DTV, IBOC, HD, standards, video servers, editing, electronic newsrooms, and more.

  12. Design of a Secure System Considering Quality of Service

    Directory of Open Access Journals (Sweden)

    Seondong Heo

    2014-11-01

    Full Text Available Improvements in networking technologies have provided users with useful information services. Such information services may bring convenience and efficiency, but might be accompanied by vulnerabilities to a variety of attacks. Therefore, a variety of research to enhance the security of the systems and get the services at the same time has been carried out. Especially, research on intrusion-tolerant systems (ITSs has been conducted in order to survive against every intrusion, rather than to detect and prevent them. In this paper, an ITS based on effective resource conversion (ERC is presented to achieve the goal of intrusion-tolerance. Instead of using the fixed number of virtual machines (VMs to process requests and recover as in conventional approaches, the ITS based on ERC can transform the assigned resources depending on the system status. This scheme is proved to maintain a certain level of quality of service (QoS and quality of security service (QoSS in threatening environments. The performance of ERC is compared with previous studies on ITS by CSIM 20, and it is verified that the proposed scheme is more effective in retaining a specific level of QoS and QoSS.

  13. On the secrecy capacity of the broadcast wiretap channel with imperfect channel state information

    KAUST Repository

    Hyadi, Amal

    2014-12-01

    In this paper, we consider secure broadcasting over fast fading channels. Assuming imperfect main channel state information (CSI) at the transmitter, we first provide an upper and a lower bounds on the ergodic secrecy capacity when a common message is broadcasted to multiple legitimate receivers in the presence of one eavesdropper. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link. Then, we present an expression for the achievable secrecy sum-rate when each legitimate receiver is interested in an independent message. The special cases of high SNR, perfect and no-main CSI are also analyzed. Numerical results are presented to illustrate the obtained results for the case of independent but not necessarily identically distributed Rayleigh fading channels.

  14. WHO OWNS THE BROADCASTING TELEVISION NETWORK BUSINESS IN INDONESIA?

    Directory of Open Access Journals (Sweden)

    Rendra WIDYATAMA

    2018-06-01

    Full Text Available Broadcasting TV occupies a significant position in the community. Therefore, all the countries in the world give attention to TV broadcasting business. In Indonesia, the government requires TV stations to broadcast locally, except through networking. In this state, there are 763 private TV companies broadcasting free to air. Of these, some companies have many TV stations and build various broadcasting networks. In this article, the author reveals the substantial TV stations that control the market, based on literature studies. From the data analysis, there are 14 substantial free to network broadcast private TV broadcasters but owns by eight companies; these include the MNC Group, EMTEK, Viva Media Asia, CTCorp, Media Indonesia, Rajawali Corpora, and Indigo Multimedia. All TV stations are from Jakarta, which broadcasts in 22 to 32 Indonesian provinces.

  15. Satellite Media Broadcasting with Adaptive Coding and Modulation

    Directory of Open Access Journals (Sweden)

    Georgios Gardikis

    2009-01-01

    Full Text Available Adaptive Coding and Modulation (ACM is a feature incorporated into the DVB-S2 satellite specification, allowing real-time adaptation of transmission parameters according to the link conditions. Although ACM was originally designed for optimizing unicast services, this article discusses the expansion of its usage to broadcasting streams as well. For this purpose, a general cross-layer adaptation approach is proposed, along with its realization into a fully functional experimental network, and test results are presented. Finally, two case studies are analysed, assessing the gain derived by ACM in a real large-scale deployment, involving HD services provision to two different geographical areas.

  16. A security modeling approach for web-service-based business processes

    DEFF Research Database (Denmark)

    Jensen, Meiko; Feja, Sven

    2009-01-01

    a transformation that automatically derives WS-SecurityPolicy-conformant security policies from the process model, which in conjunction with the generated WS-BPEL processes and WSDL documents provides the ability to deploy and run the complete security-enhanced process based on Web Service technology.......The rising need for security in SOA applications requires better support for management of non-functional properties in web-based business processes. Here, the model-driven approach may provide valuable benefits in terms of maintainability and deployment. Apart from modeling the pure functionality...... of a process, the consideration of security properties at the level of a process model is a promising approach. In this work-in-progress paper we present an extension to the ARIS SOA Architect that is capable of modeling security requirements as a separate security model view. Further we provide...

  17. Broadcasting and Telecommunications Industries in the Convergence Age: Toward a Sustainable Public-Centric Public Interest

    Directory of Open Access Journals (Sweden)

    Hwanho Choi

    2018-02-01

    Full Text Available The emergence of new digital technologies, such as the Internet and new business models such as over-the-top (OTT operators that utilize them, has transformed the media and broadcasting industries. As advanced technologies and business models are adopted, convergence between the broadcasting and telecommunication (“telecom” sectors has become a common business practice. Using the South Korean case study of a failed acquisition attempt of CJ HelloVision by SK Telecom, this research identifies the three essential features (economic, sociocultural, and industrial structure issues related to convergence in the broadcasting and media industries. Further, this study reveals the potential consequences of convergence to the public, industry, and society, and offers critical implications for future policy direction. Finally, this study suggests the need for a change in the policy direction in the age of convergence in the broadcasting and media industries. In addition, it calls for the importance of a public-centric public benefit. Social and consumer welfare, and not profit or industrial growth, should dictate the public interest orientation in the broadcasting and media industries. Therefore, the meaning of public interest in broadcasting and media should not be limited in the industrial context of media; rather, it should consider the access to service by the public, the condition of consumption, and its consequences in the perspective of social and consumer welfare.

  18. An authentication scheme for secure access to healthcare services.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  19. Secure Embedded Systems

    Science.gov (United States)

    2016-02-26

    enables each subsystem with a key management (KM) function and an Advanced Encryption Standard ( AES ) encryption and decryption function. Subsystem A...off, flies to its destination, and then collects video data. Video data containing target information are encrypted and broadcast to authorized ground...select these devices on the basis of their ability to encrypt and authenticate configuration bitstreams, incorporate security monitors to detect attacks

  20. Service task partition and distribution in star topology computer grid subject to data security constraints

    Energy Technology Data Exchange (ETDEWEB)

    Xiang Yanping [Collaborative Autonomic Computing Laboratory, School of Computer Science, University of Electronic Science and Technology of China (China); Levitin, Gregory, E-mail: levitin@iec.co.il [Collaborative Autonomic Computing Laboratory, School of Computer Science, University of Electronic Science and Technology of China (China); Israel electric corporation, P. O. Box 10, Haifa 31000 (Israel)

    2011-11-15

    The paper considers grid computing systems in which the resource management systems (RMS) can divide service tasks into execution blocks (EBs) and send these blocks to different resources. In order to provide a desired level of service reliability the RMS can assign the same blocks to several independent resources for parallel execution. The data security is a crucial issue in distributed computing that affects the execution policy. By the optimal service task partition into the EBs and their distribution among resources, one can achieve the greatest possible service reliability and/or expected performance subject to data security constraints. The paper suggests an algorithm for solving this optimization problem. The algorithm is based on the universal generating function technique and on the evolutionary optimization approach. Illustrative examples are presented. - Highlights: > Grid service with star topology is considered. > An algorithm for evaluating service reliability and data security is presented. > A tradeoff between the service reliability and data security is analyzed. > A procedure for optimal service task partition and distribution is suggested.

  1. Service task partition and distribution in star topology computer grid subject to data security constraints

    International Nuclear Information System (INIS)

    Xiang Yanping; Levitin, Gregory

    2011-01-01

    The paper considers grid computing systems in which the resource management systems (RMS) can divide service tasks into execution blocks (EBs) and send these blocks to different resources. In order to provide a desired level of service reliability the RMS can assign the same blocks to several independent resources for parallel execution. The data security is a crucial issue in distributed computing that affects the execution policy. By the optimal service task partition into the EBs and their distribution among resources, one can achieve the greatest possible service reliability and/or expected performance subject to data security constraints. The paper suggests an algorithm for solving this optimization problem. The algorithm is based on the universal generating function technique and on the evolutionary optimization approach. Illustrative examples are presented. - Highlights: → Grid service with star topology is considered. → An algorithm for evaluating service reliability and data security is presented. → A tradeoff between the service reliability and data security is analyzed. → A procedure for optimal service task partition and distribution is suggested.

  2. A security architecture for the ALICE grid services

    CERN Document Server

    Schreiner, Steffen; Buchmann, Johannes; Betev, Latchezar; Grigoras, Alina

    2012-01-01

    Globally distributed research cyberinfrastructures, like the ALICE Grid Services, need to provide traceability and accountability of operations and internal interactions. This document presents a new security architecture for the ALICE Grid Services, allowing to establish non-repudiation with respect to creatorship and ownership of Grid files and jobs. It is based on mutually authenticated and encrypted communication using X.509 Public Key Infrastructure and the Transport Layer Security (TLS) protocol. Introducing certified Grid file entries and signed Grid jobs by implementing a model of Mediated Definite Delegation it allows to establish long-term accountability concerning Grid jobs and files. Initial submissions as well as any alteration of Grid jobs are becoming verifiable and can be traced back to the originator. The architecture has been implemented as a prototype along with the development of a new central Grid middleware, called jAliEn.

  3. CAPITALISM VS BUSINESS ETHICS IN INDONESIA’S TELEVISION BROADCASTING

    Directory of Open Access Journals (Sweden)

    Rendra WIDYATAMA

    2018-05-01

    Full Text Available Generally, in every country, there is supervision of the television broadcasting system. In Indonesia, all television broadcasting is supervised by the Komisi Penyiaran Indonesia/KPI (Indonesian Broadcasting Commission. This commission oversees broadcast television, to ensure all TV broadcasts in Indonesia comply with government regulations. Often the KPI imposes sanctions, but frequent violations still occur. This article describes the results of research on the contradiction between business interests and ethics in the television industry in Indonesia. This study uses the method of evaluation research, where researchers analyze data, here in the form of sanctions documents released by broadcasting commissions. The results reveal that all national private television stations often violate regulations. They prioritize their business interests rather than follow broadcasting guidelines, especially since KPI does not have the full authority to grant and revoke a broadcasting license. The granting and revocation of permits remains under the authority of the government, where political lobbying plays a more significant role.

  4. Cyber security with radio frequency interferences mitigation study for satellite systems

    Science.gov (United States)

    Wang, Gang; Wei, Sixiao; Chen, Genshe; Tian, Xin; Shen, Dan; Pham, Khanh; Nguyen, Tien M.; Blasch, Erik

    2016-05-01

    Satellite systems including the Global Navigation Satellite System (GNSS) and the satellite communications (SATCOM) system provide great convenience and utility to human life including emergency response, wide area efficient communications, and effective transportation. Elements of satellite systems incorporate technologies such as navigation with the global positioning system (GPS), satellite digital video broadcasting, and information transmission with a very small aperture terminal (VSAT), etc. The satellite systems importance is growing in prominence with end users' requirement for globally high data rate transmissions; the cost reduction of launching satellites; development of smaller sized satellites including cubesat, nanosat, picosat, and femtosat; and integrating internet services with satellite networks. However, with the promising benefits, challenges remain to fully develop secure and robust satellite systems with pervasive computing and communications. In this paper, we investigate both cyber security and radio frequency (RF) interferences mitigation for satellite systems, and demonstrate that they are not isolated. The action space for both cyber security and RF interferences are firstly summarized for satellite systems, based on which the mitigation schemes for both cyber security and RF interferences are given. A multi-layered satellite systems structure is provided with cross-layer design considering multi-path routing and channel coding, to provide great security and diversity gains for secure and robust satellite systems.

  5. Telecommunications: Issues in Providing Cable and Satellite Television Services

    Science.gov (United States)

    2002-10-01

    This report provides information on (1) whether the availability of cable modem Internet access service appears to be affecting the competitiveness of direct broadcast satellite (DBS) companies in the provision of video services, (2) whether cable prices and DBS penetration rates appear to be affected in areas where the DBS companies offer local broadcast channels, and (3) whether the two individual DBS companies are technologically capable of expanding local broadcast channel services into all 210 television markets in the United States.

  6. Energy Efficient Probabilistic Broadcasting for Mobile Ad-Hoc Network

    Science.gov (United States)

    Kumar, Sumit; Mehfuz, Shabana

    2017-06-01

    In mobile ad-hoc network (MANETs) flooding method is used for broadcasting route request (RREQ) packet from one node to another node for route discovery. This is the simplest method of broadcasting of RREQ packets but it often results in broadcast storm problem, originating collisions and congestion of packets in the network. A probabilistic broadcasting is one of the widely used broadcasting scheme for route discovery in MANETs and provides solution for broadcasting storm problem. But it does not consider limited energy of the battery of the nodes. In this paper, a new energy efficient probabilistic broadcasting (EEPB) is proposed in which probability of broadcasting RREQs is calculated with respect to remaining energy of nodes. The analysis of simulation results clearly indicate that an EEPB route discovery scheme in ad-hoc on demand distance vector (AODV) can increase the network lifetime with a decrease in the average power consumption and RREQ packet overhead. It also decreases the number of dropped packets in the network, in comparison to other EEPB schemes like energy constraint gossip (ECG), energy aware gossip (EAG), energy based gossip (EBG) and network lifetime through energy efficient broadcast gossip (NEBG).

  7. Towards Formal Validation of Trust and Security of the Internet of Services

    DEFF Research Database (Denmark)

    Carbone, Roberto; Minea, Marius; Mödersheim, Sebastian Alexander

    2011-01-01

    Service designers and developers, while striving to meet the requirements posed by application scenarios, have a hard time to assess the trust and security impact of an option, a minor change, a combination of functionalities, etc., due to the subtle and unforeseeable situations and behaviors...... techniques to efficiently tackle industrial-size problems. The formal verification of trust and security of the Internet of Services will significantly boost its development and public acceptance....

  8. Denial-of-Service Security Attack in the Continuous-Time World

    DEFF Research Database (Denmark)

    Wang, Shuling; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    -of-service security attack, the expected information from the controllers is not received and as a consequence the physical systems may fail to behave as expected. This paper proposes a formal framework for expressing denial-of-service security attack in hybrid systems. As a virtue, a physical system is able to plan......Hybrid systems are integrations of discrete computation and continuous physical evolution. The physical components of such systems introduce safety requirements, the achievement of which asks for the correct monitoring and control from the discrete controllers. However, due to denial...... for reasonable behavior in case the ideal control fails due to unreliable communication, in such a way that the safety of the system upon denial-of-service is still guaranteed. In the context of the modeling language, we develop an inference system for verifying safety of hybrid systems, without putting any...

  9. Global Broadcast Service Reach Back Via Ultra High Frequency Demand Assigned Multiple Access Satellite Communications

    National Research Council Canada - National Science Library

    Arthur, Joseph

    1998-01-01

    .... An integral part of the user pull is the reach back channel. The reach back channel allows users to speciiy the information they need broadcast and tailor the information to meet their mission needs...

  10. Developments in the Regulation of Broadcasting Advertising

    OpenAIRE

    Morris, Yvonne; Randle, Paul

    2005-01-01

    This Intervention provides a review of developments in the regulation of broadcast advertising within the UK. The piece focuses on the implications of media convergence on broadcast advertising, and provides a brief history and analysis of the regulation of broadcast advertising within the UK. The piece also reviews Advertising Codes and provides an overview of regulatory bodies such as OFCOM and the ASA, and their respective roles.

  11. On the coexistence of primary and secondary users in spectrum-sharing broadcast channels

    KAUST Repository

    Yang, Yuli; Aï ssa, Sonia

    2013-01-01

    strategy in the light of dirty paper coding. In order to promise the PUs' quality of service (QoS) in the broadcasting, the base station chooses codewords for the users by taking into account that the codewords pertaining to SUs can be pre-subtracted from

  12. Quantum broadcast communication and authentication protocol with a quantum one-time pad

    International Nuclear Information System (INIS)

    Chang Yan; Xu Chun-Xiang; Zhang Shi-Bin; Yan Li-Li

    2014-01-01

    A quantum broadcast communication and authentication protocol with a quantum one-time pad based on the Greenberger—Horne—Zeilinger state is proposed. A binary string is used to express the identity of the receiver, which is encoded as a single sequence of photons. The encoded photon sequence acts as a detection sequence and implements authentication. An XOR operation serves as a one-time pad and is used to ensure the security of the protocol. The binary string is reused even in a noisy channel and proves to be unconditionally secure. In contrast with the protocols proposed by Wang et al. [Chin. Phys. 16 1868 (2007)] and Yang et al. [Chin. Phys. B 19 070304 (2010)], the protocol in this study implements the identity authentication with a reusable binary string; no hash function or local unitary operation is used. The protocol in this study is also easier to implement and highly efficient without losing security. (general)

  13. On the Efficiency of Secure Beaconing in VANETs

    NARCIS (Netherlands)

    Schoch, Elmar; Kargl, Frank

    Direct inter-vehicle communication enables numerous safety applications like intersection collision warning. Beacons - periodic one-hop link-layer broadcast messages containing, e.g., location, heading, and speed - are the basis for many such applications. For security, current work often requires

  14. Gossip-Based Broadcast

    Science.gov (United States)

    Leitão, João; Pereira, José; Rodrigues, Luís

    Gossip, or epidemic, protocols have emerged as a powerful strategy to implement highly scalable and resilient reliable broadcast primitives on large scale peer-to-peer networks. Epidemic protocols are scalable because they distribute the load among all nodes in the system and resilient because they have an intrinsic level of redundancy that masks node and network failures. This chapter provides an introduction to gossip-based broadcast on large-scale unstructured peer-to-peer overlay networks: it surveys the main results in the field, discusses techniques to build and maintain the overlays that support efficient dissemination strategies, and provides an in-depth discussion and experimental evaluation of two concrete protocols, named HyParView and Plumtree.

  15. An end-to-end security auditing approach for service oriented architectures

    NARCIS (Netherlands)

    Azarmi, M.; Bhargava, B.; Angin, P.; Ranchal, R.; Ahmed, N.; Sinclair, A.; Linderman, M.; Ben Othmane, L.

    2012-01-01

    Service-Oriented Architecture (SOA) is becoming a major paradigm for distributed application development in the recent explosion of Internet services and cloud computing. However, SOA introduces new security challenges not present in the single-hop client-server architectures due to the involvement

  16. TV Recommendation and Personalization Systems: Integrating Broadcast and Video On demand Services

    Directory of Open Access Journals (Sweden)

    SOARES, M.

    2014-02-01

    Full Text Available The expansion of Digital Television and the convergence between conventional broadcasting and television over IP contributed to the gradual increase of the number of available channels and on demand video content. Moreover, the dissemination of the use of mobile devices like laptops, smartphones and tablets on everyday activities resulted in a shift of the traditional television viewing paradigm from the couch to everywhere, anytime from any device. Although this new scenario enables a great improvement in viewing experiences, it also brings new challenges given the overload of information that the viewer faces. Recommendation systems stand out as a possible solution to help a watcher on the selection of the content that best fits his/her preferences. This paper describes a web based system that helps the user navigating on broadcasted and online television content by implementing recommendations based on collaborative and content based filtering. The algorithms developed estimate the similarity between items and users and predict the rating that a user would assign to a particular item (television program, movie, etc.. To enable interoperability between different systems, programs? characteristics (title, genre, actors, etc. are stored according to the TV-Anytime standard. The set of recommendations produced are presented through a Web Application that allows the user to interact with the system based on the obtained recommendations.

  17. WPSS: watching people security services

    Science.gov (United States)

    Bouma, Henri; Baan, Jan; Borsboom, Sander; van Zon, Kasper; Luo, Xinghan; Loke, Ben; Stoeller, Bram; van Kuilenburg, Hans; Dijk, Judith

    2013-10-01

    To improve security, the number of surveillance cameras is rapidly increasing. However, the number of human operators remains limited and only a selection of the video streams are observed. Intelligent software services can help to find people quickly, evaluate their behavior and show the most relevant and deviant patterns. We present a software platform that contributes to the retrieval and observation of humans and to the analysis of their behavior. The platform consists of mono- and stereo-camera tracking, re-identification, behavioral feature computation, track analysis, behavior interpretation and visualization. This system is demonstrated in a busy shopping mall with multiple cameras and different lighting conditions.

  18. SECURE SERVICE DISCOVERY BASED ON PROBE PACKET MECHANISM FOR MANETS

    Directory of Open Access Journals (Sweden)

    S. Pariselvam

    2015-03-01

    Full Text Available In MANETs, Service discovery process is always considered to be crucial since they do not possess a centralized infrastructure for communication. Moreover, different services available through the network necessitate varying categories. Hence, a need arises for devising a secure probe based service discovery mechanism to reduce the complexity in providing the services to the network users. In this paper, we propose a Secure Service Discovery Based on Probe Packet Mechanism (SSDPPM for identifying the DoS attack in MANETs, which depicts a new approach for estimating the level of trust present in each and every routing path of a mobile ad hoc network by using probe packets. Probing based service discovery mechanisms mainly identifies a mobile node’s genuineness using a test packet called probe that travels the entire network for the sake of computing the degree of trust maintained between the mobile nodes and it’s attributed impact towards the network performance. The performance of SSDPPM is investigated through a wide range of network related parameters like packet delivery, throughput, Control overhead and total overhead using the version ns-2.26 network simulator. This mechanism SSDPPM, improves the performance of the network in an average by 23% and 19% in terms of packet delivery ratio and throughput than the existing service discovery mechanisms available in the literature.

  19. Broadcast Copywriting and Computer Assisted Instruction.

    Science.gov (United States)

    Hagerman, William L.

    The teaching of broadcast copywriting can be enhanced by computer assisted instruction, especially in screening students' writing for adherence to classic "formulas" or "rules" for broadcast writing. Such rules might include avoiding cliches or not beginning a sentence with a subordinate clause. Other rules the computer can…

  20. The Digital Dividend of Terrestrial Broadcasting

    CERN Document Server

    Beutler, Roland

    2012-01-01

    The “digital revolution” of the last two decades has pervaded innumerable aspects of our daily lives and changed our planet irreversibly. The shift from analog to digital broadcasting has facilitated a seemingly infinite variety of new applications—audience interactivity being but one example. The greater efficiency and compression of digital media have endowed broadcasters with a “digital dividend” of spare transmission capacity over and above the requirements of terrestrial broadcasting. The question is, who will use it, and how? Comparing the European experience with that of broadcasters elsewhere in the world, the author sketches the current status of international frequency management, quantifies the value of the “dividend” itself, analyzes the details of the analog-to-digital switchovers already completed, and posits what the future holds for the sector. As we grapple with new devices, inconceivable a mere generation ago, that allow us to access digital media instantly, anywhere and at any...

  1. Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAP

    Science.gov (United States)

    Laghi, Maria Chiara; Amoretti, Michele; Conte, Gianni

    The effective convergence of service-oriented architectures (SOA) and peer-to-peer (P2P) is an urgent task, with many important applications ranging from e-business to ambient intelligence. A considerable standardization effort is being carried out from both SOA and P2P communities, but a complete platform for the development of secure, distributed applications is still missing. In this context, the result of our research and development activity is JXTA-SOAP, an official extension for JXTA enabling Web Service sharing in peer-to-peer networks. Recently we focused on security aspects, providing JXTA-SOAP with a general security management system, and specialized policies that target both J2SE and J2ME versions of the component. Among others, we implemented a policy based on Multimedia Internet KEYing (MIKEY), which can be used to create a key pair and all the required parameters for encryption and decryption of service messages in consumer and provider peers running on resource-constrained devices.

  2. 76 FR 66940 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-004 Protection...

    Science.gov (United States)

    2011-10-28

    ... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2011-0083] Privacy Act of 1974; Department of Homeland Security/United States Secret Service--004 Protection Information System... Security (DHS)/United States Secret Service (USSS)-004 System name: DHS/USSS-004 Protection Information...

  3. 47 CFR 73.1217 - Broadcast hoaxes.

    Science.gov (United States)

    2010-10-01

    ... broadcast station shall broadcast false information concerning a crime or a catastrophe if: (a) The licensee... harm would occur. A “crime” is any act or omission that makes the offender subject to criminal punishment by law. A “catastrophe” is a disaster or imminent disaster involving violent or sudden event...

  4. Emergency department visits during an Olympic gold medal television broadcast.

    Science.gov (United States)

    Redelmeier, Donald A; Vermeulen, Marian J

    2011-01-01

    Practice pattern variations are often attributed to physician decision-making with no accounting for patient preferences. To test whether a mass media television broadcast unrelated to health was associated with changes in the rate and characteristics of visits for acute emergency care. Time-series analysis of emergency department visits for any reason. Population-based sample of all patients seeking emergency care in Ontario, Canada. The broadcast day was defined as the Olympic men's gold medal ice hockey game final. The control days were defined as the 6 Sundays before and after the broadcast day. A total of 99 447 visits occurred over the 7 Sundays, of which 13 990 occurred on the broadcast day. Comparing the broadcast day with control days, we found no significant difference in the hourly rate of visits before the broadcast (544 vs 537, p = 0.41) or after the broadcast (647 vs 639, p = 0.55). In contrast, we observed a significant reduction in hourly rate of visits during the broadcast (647 vs 783, p television broadcasts can influence patient preferences and thereby lead to a decrease in emergency department visits.

  5. Load control services in the management of power system security costs

    International Nuclear Information System (INIS)

    Jayantilal, A.; Strbac, G.

    1999-01-01

    The new climate of deregulation in the electricity industry is creating a need for a more transparent cost structure and within this framework the cost of system security has been a subject of considerable interest. Traditionally power system security has been supplied by out-of-merit generation, in the short term, and transmission reinforcement, in the long term. This paper presents a method of analysing the role of load-demand in the management of power system security costs by utilising load control services (LCS). It also proposes a competitive market to enable bidding from various participants within the electricity industry to supply system security. (author)

  6. Mass storage system by using broadcast technology

    International Nuclear Information System (INIS)

    Fujii, Hirofumi; Itoh, Ryosuke; Manabe, Atsushi; Miyamoto, Akiya; Morita, Youhei; Nozaki, Tadao; Sasaki, Takashi; Watase, Yoshiyuko; Yamasaki, Tokuyuki

    1996-01-01

    There are many similarities between data recording systems for high energy physics and broadcast systems; the data flow is almost one-way, requires real-time recording; requires large-scale automated libraries for 24-hours operation, etc. In addition to these functional similarities, the required data-transfer and data-recording speeds are also close to those for near future experiments. For these reasons, we have collaborated with SONY Broadcast Company to study the usability of broadcast devices for our data storage system. Our new data storage system consists of high-speed data recorders and tape-robots which are originally based on the digital video-tape recorder and the tape-robot for broadcast systems. We are also studying the possibility to use these technologies for the online data-recording system for B-physics experiment at KEK. (author)

  7. WiMAX security and quality of service an end-to-end perspective

    CERN Document Server

    Tang, Seok-Yee; Sharif, Hamid

    2010-01-01

    WiMAX is the first standard technology to deliver true broadband mobility at speeds that enable powerful multimedia applications such as Voice over Internet Protocol (VoIP), online gaming, mobile TV, and personalized infotainment. WiMAX Security and Quality of Service, focuses on the interdisciplinary subject of advanced Security and Quality of Service (QoS) in WiMAX wireless telecommunication systems including its models, standards, implementations, and applications. Split into 4 parts, Part A of the book is an end-to-end overview of the WiMAX architecture, protocol, and system requirements.

  8. Leveraging Service Oriented Architecture to Enhance Information Sharing for Surface Transportation Security

    Science.gov (United States)

    2008-09-01

    Fire and Emergency Management Services, Suffolk County Sheriff’s Department, the U.S. Attorney’s Office, the Bureau of Alcohol, Tobacco and Firearms...mass transit services. These include express and regular bus service, a downtown Skyway monorail , a trolley service and the Stadium Shuttle for various...safety related incidents rather than security, including transportation disruptions due to derailments, accidents, fires , hazardous materials spills

  9. Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection

    Science.gov (United States)

    Sepúlveda, Johanna; Pires, Ricardo; Strum, Marius; Chau, Wang Jiang

    Many of the current electronic systems embedded in a SoC (System-on-Chip) are used to capture, store, manipulate and access critical data, as well as to perform other key functions. In such a scenario, security is considered as an important issue. The Network-on-chip (NoC), as the foreseen communication structure of next-generation SoC devices, can be used to efficiently incorporate security. Our work proposes the implementation of QoSS (Quality of Security Service) to overcome present SoC vulnerabilities. QoSS is a novel concept for data protection that introduces security as a dimension of QoS. In this paper, we present the implementation of two security services (access control and authentication), that may be configured to assume one from several possible levels, the implementation of a technique to avoid denial-of-service (DoS) attacks, evaluate their effectiveness and estimate their impact on NoC performance.

  10. Broadcasting in America; Second Edition. A Survey of Television and Radio.

    Science.gov (United States)

    Head, Sydney W.

    The plan of this volume follows that of the first (1956) edition: a section on physical bases of broadcasting, one on the origin and growth of broadcasting, another on the economics of broadcasting, a fourth on the social control of broadcasting, and a final section for an assessment of the effects and influences of broadcasting. Special attention…

  11. INFORMATION SECURITY AND SECURE SEARCH OVER ENCRYPTED DATA IN CLOUD STORAGE SERVICES

    OpenAIRE

    Mr. A Mustagees Shaikh *; Prof. Nitin B. Raut

    2016-01-01

    Cloud computing is most widely used as the next generation architecture of IT enterprises, that provide convenient remote access to data storage and application services. This cloud storage can potentially bring great economical savings for data owners and users, but due to wide concerns of data owners that their private data may be exposed or handled by cloud providers. Hence end-to-end encryption techniques and fuzzy fingerprint technique have been used as solutions for secure cloud data st...

  12. Scheduling Broadcasts in a Network of Timelines

    KAUST Repository

    Manzoor, Emaad A.

    2015-05-12

    Broadcasts and timelines are the primary mechanism of information exchange in online social platforms today. Services like Facebook, Twitter and Instagram have enabled ordinary people to reach large audiences spanning cultures and countries, while their massive popularity has created increasingly competitive marketplaces of attention. Timing broadcasts to capture the attention of such geographically diverse audiences has sparked interest from many startups and social marketing gurus. However, formal study is lacking on both the timing and frequency problems. In this thesis, we introduce, motivate and solve the broadcast scheduling problem of specifying the timing and frequency of publishing content to maximise the attention received. We validate and quantify three interacting behavioural phenomena to parametrise social platform users: information overload, bursty circadian rhythms and monotony aversion, which is defined here for the first time. Our analysis of the influence of monotony refutes the common assumption that posts on social network timelines are consumed piecemeal independently. Instead, we reveal that posts are consumed in chunks, which has important consequences for any future work considering human behaviour over social network timelines. Our quantification of monotony aversion is also novel, and has applications to problems in various domains such as recommender list diversification, user satiation and variety-seeking consumer behaviour. Having studied the underlying behavioural phenomena, we link schedules, timelines, attention and behaviour by formalising a timeline information exchange process. Our formulation gives rise to a natural objective function that quantifies the expected collective attention an arrangement of posts on a timeline will receive. We apply this formulation as a case-study on real-data from Twitter, where we estimate behavioural parameters, calculate the attention potential for different scheduling strategies and, using the

  13. Service Innovations

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Nicolajsen, Hanne Westh

    2010-01-01

    This article discusses the challenges in relation to an ongoing project named converged advanced mobile media platform (CAMMP), where all the different stakeholders need to have a saying in the service development for the upcoming rich, mobile broadcasting services....

  14. Quality of Security Service Costing Demonstration for the MSHN Project

    National Research Council Canada - National Science Library

    Spyropoulou, Evdoxia

    2000-01-01

    .... Each service has two costs: an initialization cost and a run-time cost. The demonstration illustrates the costs incurred as network modes and security levels are changed. High level and detailed specifications are provided.

  15. SURVEI PENANGANAN BROADCAST STORM PROBLEM PADA PROTOKOL ROUTING AODV DI MANET

    Directory of Open Access Journals (Sweden)

    Indera Zainul Muttaqien

    2015-07-01

    Full Text Available Komunikasi multi-hop pada lingkungan MANET dapat melibatkan broadcast paket dalam proses route discovery. Protokol routing pada MANET akan melakukan broadcast paket RREQ dan menjalarkannya ke node tujuan secepat dan seefisien mungkin, dimana paket RREQ dari rute yang optimal adalah paket RREQ yang terlebih dahulu sampai ke tujuan. Aktifitas broadcast yang tidak terkontrol dapat menyebabkan suatu kondisi yang disebut broadcast storm problem. Broadcast storm problem dapat berdampak pada terganggunya kinerja dari protokol routing akibat adanya packet redundancy, contention, dan collision. Broadcast storm problem dapat ditangani dengan membatasi jumlah node yang dapat melakukan broadcast. Tujuan utama dari pembuatan makalah ini adalah merangkum beberapa mekanisme terbaru yang telah diakukan oleh para peneliti untuk menangani broadcast storm problem. Kami juga menyajikan perbandingan dari mekanisme tersebut berdasarkan karakteristik dari mekanisme ditinjau dari kesesuaian dengan beberapa skema penanganan broadcast storm problem yang diajukan oleh peneliti sebelumnya, kebutuhan informasi tertentu antar node, lingkungan uji coba dan apakah mekanisme ini dapat diterapkan pada protokol routing lainnya.

  16. 76 FR 66937 - Privacy Act of 1974; Department of Homeland Security/United States Secret Service-003 Non...

    Science.gov (United States)

    2011-10-28

    ... 1974; Department of Homeland Security/United States Secret Service--003 Non-Criminal Investigation... Security/United States Secret Service--003 Non-Criminal Investigation Information System.'' As a result of... Secret Service, 245 Murray Lane SW., Building T-5, Washington, DC 20223. For privacy issues please...

  17. Management Theories and Broadcasting: A Handbook.

    Science.gov (United States)

    Craig, J. Robert; Hindmarsh, Wayne A.

    Today's contemporary management and motivation theories, as applied to the business of broadcasting, are the focus of the first section of this paper. It deals with the kinds and reactions of employees in broadcasting stations in relation to 11 motivational theories: (1) Theories X and Y, (2) Immaturity-Maturity Theory, (3) V Theory, (4) Z Theory,…

  18. Flexible, Secure, and Reliable Data Sharing Service Based on Collaboration in Multicloud Environment

    Directory of Open Access Journals (Sweden)

    Qiang Wei

    2018-01-01

    Full Text Available Due to the abundant storage resources and high reliability data service of cloud computing, more individuals and enterprises are motivated to outsource their data to public cloud platform and enable legal data users to search and download what they need in the outsourced dataset. However, in “Paid Data Sharing” model, some valuable data should be encrypted before outsourcing for protecting owner’s economic benefits, which is an obstacle for flexible application. Specifically, if the owner does not know who (user will download which data files in advance and even does not know the attributes of user, he/she has to either remain online all the time or import a trusted third party (TTP to distribute the file decryption key to data user. Obviously, making the owner always remain online is too inflexible, and wholly depending on the security of TTP is a potential risk. In this paper, we propose a flexible, secure, and reliable data sharing scheme based on collaboration in multicloud environment. For securely and instantly providing data sharing service even if the owner is offline and without TTP, we distribute all encrypted split data/key blocks together to multiple cloud service providers (CSPs, respectively. An elaborate cryptographic protocol we designed helps the owner verify the correctness of data exchange bills, which is directly related to the owner’s economic benefits. Besides, in order to support reliable data service, the erasure-correcting code technic is exploited for tolerating multiple failures among CSPs, and we offer a secure keyword search mechanism that makes the system more close to reality. Extensive security analyses and experiments on real-world data show that our scheme is secure and efficient.

  19. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    Science.gov (United States)

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  20. Secure external access to CERN's services to replace VPN

    CERN Multimedia

    2005-01-01

    CERN has recently experienced several computer security incidents caused by people opening VPN connections and (unknown to them) allowing malicious software to enter CERN. VPN should be used to connect to CERN only in extreme and exceptional circumstances and it is formally discouraged as a general solution. If incidents continue, the availability of the service will need to be reviewed. Recommended methods of connecting to CERN from the Internet for common functionalities such as e-mail, access to CERN web or file servers and interactive sessions on CERN systems are described at http://cern.ch/security/vpn

  1. Enhancing Experiment Central Service Reliability: from delivery to security and virtualization

    CERN Document Server

    Donno, Flavia; Buzykaev, Alexey; Saiz Santos, Maria Dolores

    2011-01-01

    The four LHC experiments rely on experiment specific services running on machines mainly located at CERN. Some of these services have been rated by the experiments as very critical: any loss or degradation of performance has a major impact on the experiment's production and analysis activities. It is therefore important to provide a reliable and robust operational environment. In this work we describe the strategy based on service deployment, security and virtualization adopted to enhance the reliability of ATLAS and CMS central services.

  2. Obfuscatable multi-recipient re-encryption for secure privacy-preserving personal health record services.

    Science.gov (United States)

    Shi, Yang; Fan, Hongfei; Xiong, Guoyue

    2015-01-01

    With the rapid development of cloud computing techniques, it is attractive for personal health record (PHR) service providers to deploy their PHR applications and store the personal health data in the cloud. However, there could be a serious privacy leakage if the cloud-based system is intruded by attackers, which makes it necessary for the PHR service provider to encrypt all patients' health data on cloud servers. Existing techniques are insufficiently secure under circumstances where advanced threats are considered, or being inefficient when many recipients are involved. Therefore, the objectives of our solution are (1) providing a secure implementation of re-encryption in white-box attack contexts and (2) assuring the efficiency of the implementation even in multi-recipient cases. We designed the multi-recipient re-encryption functionality by randomness-reusing and protecting the implementation by obfuscation. The proposed solution is secure even in white-box attack contexts. Furthermore, a comparison with other related work shows that the computational cost of the proposed solution is lower. The proposed technique can serve as a building block for supporting secure, efficient and privacy-preserving personal health record service systems.

  3. Sense of security felt by the armed police with different service length and influential factors

    Directory of Open Access Journals (Sweden)

    Jing CHEN

    2011-02-01

    Full Text Available Objective To investigate the status of sense of security felt by the armed police and the influential factors thereof.Methods The sense of security,stress level,comprehension of social supports and the coping styles were measured and evaluated by use of Security Questionnaire(SQ,Psychological Stress Self-Evaluation Test(PSET,Perceived Social Support Scale(PSSS and Coping Style Scale(CSS in 725 armed police,and the differences were compared between the servicemen with different service length(1,2 and 3 years.The correlation between security sense(expressed as personal safety and determination of control and comprehension of social supports,coping styles and T score on stress level were analyzed.A stepwise regression analysis was done to screen the factors influencing the security sense of servicemen with the overall score of security sense as the dependent variable and the comprehension of social supports(expressed as inside-and outside-family support,coping styles(expressed as illusion,resignation,rationalization,self-condemned determinant,resort and problem-solving capacity and T score on stress level as the independent variables.Results Compared with the armed police with 1 year of military service,those with 2 or 3 years of military service got lower scores in personal safety,determination of control,inside-and outside-family support,and resort and problem-solving capacity(P 0.05.The two factors of comprehension of social supports(inside-and outside-family support,and the two factors of coping styles(resort and problem-solving capacity were positively correlated with the sense of security(personal safety and determination of control(P < 0.001;while the four factors of coping styles(illusion,resignation,rationalization and self-condemned determinant and the T score on stress level were negatively correlated with the sense of security(P < 0.001.It was proved by multivariate linear regression analysis that outside-family support

  4. Performance Analysis of Reuse Distance in Cooperative Broadcasting

    Directory of Open Access Journals (Sweden)

    Jimmi Grönkvist

    2016-01-01

    Full Text Available Cooperative broadcasting is a promising technique for robust broadcast with low overhead and delay in mobile ad hoc networks. The technique is attractive for mission-oriented mobile communication, where a majority of the traffic is of broadcast nature. In cooperative broadcasting, all nodes simultaneously retransmit packets. The receiver utilizes cooperative diversity in the simultaneously received signals. The retransmissions continue until all nodes are reached. After the packet has traveled a specific number of hops out from the source, denoted as reuse distance, the source node transmits a new broadcast packet in the time slot used for the previous broadcast packet. If the reuse distance is too small, interference causes packet loss in intermediate nodes. In the literature, a reuse distance of three is common. With an analysis based on a realistic interference model and real terrain data, we show that a reuse distance of at least four is necessary to avoid packet loss in sparsely connected networks, especially for high spectral efficiencies. For frequency hopping, widely used in military systems, we propose a novel method. This method almost eliminates interference for a reuse distance of three, increasing the throughput by 33% compared to systems with a reuse distance of four.

  5. ITIL Based Service Level Management if SLAs Cover Security

    Directory of Open Access Journals (Sweden)

    Tomas Feglar

    2005-08-01

    Full Text Available Current level of information technology creates new perspectives for more IT service oriented market. Quality of these services requires slightly different approach then was applied for products including software. No IT services are delivered and supported in risk free environment. Risks would be considered consistently with IT services quality gaps from Service Level Management (SLM perspective. SLM is one of ITIL modules that are widely used within the IT service industry. We identified some weaknesses in how SLM is developed in ITIL environment if service level agreement (SLA has cover Security. We argue that in such cases Architecture modeling and risk assessment approach let us effectively control analytical effort that relates to risks identification and understanding. Risk driven countermeasures designed in a next step (Risk treatment have significant impact to the SLM especially from responsibility perspective. To demonstrate SLM's importance in real practice we analyze SLA synthesize process in CCI (Cyber Critical Infrastructure environment.

  6. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Directory of Open Access Journals (Sweden)

    Youngsook Lee

    2014-01-01

    Full Text Available An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1 it fails to provide user anonymity against any third party as well as the foreign agent, (2 it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3 it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.

  7. Reliability of Broadcast Communications Under Sparse Random Linear Network Coding

    OpenAIRE

    Brown, Suzie; Johnson, Oliver; Tassi, Andrea

    2018-01-01

    Ultra-reliable Point-to-Multipoint (PtM) communications are expected to become pivotal in networks offering future dependable services for smart cities. In this regard, sparse Random Linear Network Coding (RLNC) techniques have been widely employed to provide an efficient way to improve the reliability of broadcast and multicast data streams. This paper addresses the pressing concern of providing a tight approximation to the probability of a user recovering a data stream protected by this kin...

  8. Adaptive Probabilistic Broadcasting over Dense Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Victor Gau

    2010-01-01

    Full Text Available We propose an idle probability-based broadcasting method, iPro, which employs an adaptive probabilistic mechanism to improve performance of data broadcasting over dense wireless ad hoc networks. In multisource one-hop broadcast scenarios, the modeling and simulation results of the proposed iPro are shown to significantly outperform the standard IEEE 802.11 under saturated condition. Moreover, the results also show that without estimating the number of competing nodes and changing the contention window size, the performance of the proposed iPro can still approach the theoretical bound. We further apply iPro to multihop broadcasting scenarios, and the experiment results show that within the same elapsed time after the broadcasting, the proposed iPro has significantly higher Packet-Delivery Ratios (PDR than traditional methods.

  9. 20 CFR 404.1402 - When are railroad industry services by a non-vested worker covered under Social Security?

    Science.gov (United States)

    2010-04-01

    ...-vested worker covered under Social Security? 404.1402 Section 404.1402 Employees' Benefits SOCIAL... When are railroad industry services by a non-vested worker covered under Social Security? If you are a non-vested worker, we (the Social Security Administration) will consider your services in the railroad...

  10. Perceived Audio Quality Analysis in Digital Audio Broadcasting Plus System Based on PEAQ

    Directory of Open Access Journals (Sweden)

    K. Ulovec

    2018-04-01

    Full Text Available Broadcasters need to decide on bitrates of the services in the multiplex transmitted via Digital Audio Broadcasting Plus system. The bitrate should be set as low as possible for maximal number of services, but with high quality, not lower than in conventional analog systems. In this paper, the objective method Perceptual Evaluation of Audio Quality is used to analyze the perceived audio quality for appropriate codecs --- MP2 and AAC offering three profiles. The main aim is to determine dependencies on the type of signal --- music and speech, the number of channels --- stereo and mono, and the bitrate. Results indicate that only MP2 codec and AAC Low Complexity profile reach imperceptible quality loss. The MP2 codec needs higher bitrate than AAC Low Complexity profile for the same quality. For the both versions of AAC High-Efficiency profiles, the limit bitrates are determined above which less complex profiles outperform the more complex ones and higher bitrates above these limits are not worth using. It is shown that stereo music has worse quality than stereo speech generally, whereas for mono, the dependencies vary upon the codec/profile. Furthermore, numbers of services satisfying various quality criteria are presented.

  11. 47 CFR 74.789 - Broadcast regulations applicable to digital low power television and television translator stations.

    Science.gov (United States)

    2010-10-01

    ... power television and television translator stations. 74.789 Section 74.789 Telecommunication FEDERAL... AND OTHER PROGRAM DISTRIBUTIONAL SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.789 Broadcast regulations applicable to digital low power television and television translator...

  12. Digital terrestrial broadcasting receiver in the U.K; Eikoku chijoha digital hoso jushinki

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    Digital terrestrial broadcasting is broadcasted in parallel with existing UHF analog broadcasting, whereas each of allocated channel frequencies can transmit five to six programs simultaneously. Each home can receive a number of programs with the existing antenna without a need of installing a new satellite antenna or cable. Among the countries of the world running forward to digitization of broadcasting all at once, the U.K. develops advancing movements and leads the world by starting the digital terrestrial broadcasting. In addition to the digitized broadcasting of conventional analog broadcasting programs, the `Ondigitals` (broadcasting operators) have started newly the pay broadcasting. Toshiba has been selected as one of the six developers and manufacturers of digital terrestrial broadcasting receivers, and has developed the digital terrestrial broadcasting receiver DTB2000. For the modulation system, the orthogonal frequency division multiplex (OFDM) was chosen as a system being strong against ghost and most suitable for digital terrestrial broadcasting. In addition, the receiver is equipped with software download function by using the broadcasting waves, and the common interface being the communication specification specified in the DVB (digital video broadcasting) to provide future function expandability. (translated by NEDO)

  13. Long-term energy services security: What is it and how can it be measured and valued?

    International Nuclear Information System (INIS)

    Jansen, Jaap C.; Seebregts, Ad J.

    2010-01-01

    The paper reviews some recent approaches towards measuring the extent of long-term energy security and security externality valuation. It starts out to discuss the contextual connotations of notions of 'energy security' in medium to long-term time frames and reviews some indicators that have been proposed to quantify it. Special attention is paid to two of these approaches, which the authors helped to develop, i.e. diversity-based indices and the Supply/Demand Index. The paper takes issue with conventional welfare economic approaches that neglect: (i) the scope on the demand side for raising security and (ii) negative feedback mechanisms of socio-political impacts of international rent transfers in fossil fuels exporting countries. The concept of energy services security is proposed with a demand-side focus. This enables application of an integrated approach to gauge the resilience of a society to meet the needs of its population for energy services over longer timescales ahead from various interrelated perspectives. Propositions are made on the attribution of security externalities to the use of fossil fuels, policies, and suggestions for further improvements of measures for energy services security.

  14. Beyond the Anchor: Students and Broadcasting Opportunities.

    Science.gov (United States)

    Marks, Rick

    1999-01-01

    Describes how the author taught a class (called "Editing for Broadcasting") for 19 neophyte newspeople through total immersion: students learned how to run a newsroom while operating one. Notes that students learned the principles and fundamentals of broadcast journalism, including news judgment, writing, editing, reporting, and…

  15. Perceptions of Advertising Influence on Broadcast News.

    Science.gov (United States)

    Brown, Hubert W.; Barnes, Beth E.

    2001-01-01

    Finds that while students (studying broadcast journalism or advertising) and practitioners (station news directors and agency media directors) were in agreement on the majority of opinion statements discussing advertising's influence on broadcast news content, except students were less bothered by advertising's influence on news content than were…

  16. Applying a Space-Based Security Recovery Scheme for Critical Homeland Security Cyberinfrastructure Utilizing the NASA Tracking and Data Relay (TDRS) Based Space Network

    Science.gov (United States)

    Shaw, Harry C.; McLaughlin, Brian; Stocklin, Frank; Fortin, Andre; Israel, David; Dissanayake, Asoka; Gilliand, Denise; LaFontaine, Richard; Broomandan, Richard; Hyunh, Nancy

    2015-01-01

    Protection of the national infrastructure is a high priority for cybersecurity of the homeland. Critical infrastructure such as the national power grid, commercial financial networks, and communications networks have been successfully invaded and re-invaded from foreign and domestic attackers. The ability to re-establish authentication and confidentiality of the network participants via secure channels that have not been compromised would be an important countermeasure to compromise of our critical network infrastructure. This paper describes a concept of operations by which the NASA Tracking and Data Relay (TDRS) constellation of spacecraft in conjunction with the White Sands Complex (WSC) Ground Station host a security recovery system for re-establishing secure network communications in the event of a national or regional cyberattack. Users would perform security and network restoral functions via a Broadcast Satellite Service (BSS) from the TDRS constellation. The BSS enrollment only requires that each network location have a receive antenna and satellite receiver. This would be no more complex than setting up a DIRECTTV-like receiver at each network location with separate network connectivity. A GEO BSS would allow a mass re-enrollment of network nodes (up to nationwide) simultaneously depending upon downlink characteristics. This paper details the spectrum requirements, link budget, notional assets and communications requirements for the scheme. It describes the architecture of such a system and the manner in which it leverages off of the existing secure infrastructure which is already in place and managed by the NASAGSFC Space Network Project.

  17. 47 CFR 73.297 - FM stereophonic sound broadcasting.

    Science.gov (United States)

    2010-10-01

    ... broadcast station may, without specific authority from the FCC, transmit stereophonic (biphonic... broadcasting must measure the pilot subcarrier frequency as often as necessary to ensure that it is kept at all...

  18. Public service i netværkssamfundet

    DEFF Research Database (Denmark)

    Mortensen, Frands

    Analyser af digitaliseringens betydning for radio, TV og Internet, og især for konsekvenserne for levering af Public Service Broadcasting. En særlig del omhandler EU's betydning for udviklingen af statsstøtte til PSB.......Analyser af digitaliseringens betydning for radio, TV og Internet, og især for konsekvenserne for levering af Public Service Broadcasting. En særlig del omhandler EU's betydning for udviklingen af statsstøtte til PSB....

  19. TV Broadcast Efficiency in 5G Networks from Subscriber Prospective

    KAUST Repository

    Lau, Chun Pong

    2015-12-06

    The flexibility of radio access network facilitated by 5G networks opens the gateway of deploying dynamic strategies for broadcasting TV channels in an efficient way. Currently, spectrum efficiency and bandwidth efficiency are the two common metrics measuring the efficiency of a system. These metrics assess the net bitrate for a unit of spectrum bandwidth. However, there is a lack of measurement, quantifying the effectiveness of a broadcasting strategy from the user perspective. In this paper, we introduce a novel measurement approach, called broadcast efficiency which considers the mobile user as a main reference. Broadcast efficiency is calculated as the number of served audiences per unit of radio resource. From numerical analysis, we show that broadcasting unpopular TV channels dramatically decreases the broadcast efficiency. This finding is evaluated by employing multiple distributions on the size of audience among TV channels. Furthermore, by conducting a real-life simulation, we discover that a high broadcast efficiency may result in a low percentage of served audiences if the audiences of TV channels are quite evenly distributed.

  20. Equilibrium in a random viewer model of television broadcasting

    DEFF Research Database (Denmark)

    Hansen, Bodil Olai; Keiding, Hans

    2014-01-01

    The authors considered a model of commercial television market with advertising with probabilistic viewer choice of channel, where private broadcasters may coexist with a public television broadcaster. The broadcasters influence the probability of getting viewer attention through the amount...... number of channels. The authors derive properties of equilibrium in an oligopolistic market with private broadcasters and show that the number of firms has a negative effect on overall advertising and viewer satisfaction. If there is a public channel that also sells advertisements but does not maximize...... profits, this will have a positive effect on advertiser and viewer satisfaction....

  1. How to securely replicate services (preliminary version)

    Science.gov (United States)

    Reiter, Michael; Birman, Kenneth

    1992-01-01

    A method is presented for constructing replicated services that retain their availability and integrity despite several servers and clients being corrupted by an intruder, in addition to others failing benignly. More precisely, a service is replicated by 'n' servers in such a way that a correct client will accept a correct server's response if, for some prespecified parameter, k, at least k servers are correct and fewer than k servers are correct. The issue of maintaining causality among client requests is also addressed. A security breach resulting from an intruder's ability to effect a violation of causality in the sequence of requests processed by the service is illustrated. An approach to counter this problem is proposed that requires that fewer than k servers are corrupt and, to ensure liveness, that k is less than or = n - 2t, where t is the assumed maximum total number of both corruptions and benign failures suffered by servers in any system run. An important and novel feature of these schemes is that the client need not be able to identify or authenticate even a single server. Instead, the client is required only to possess at most two public keys for the service.

  2. Method and apparatus for scheduling broadcasts in social networks

    KAUST Repository

    Manzoor, Emaad Ahmed

    2016-08-25

    A method, apparatus, and computer readable medium are provided for maximizing consumption of broadcasts by a producer. An example method includes receiving selection of a total number of time slots to use for scheduling broadcasts, and receiving information regarding the producer\\'s followers. The example method further 5 includes identifying, by a processor and based on the received information, discount factors associated with the producer\\'s followers, and calculating, by the processor and based on the received information, a predicted number of competitor broadcasts during each time slot of the total number of time slots. Finally, the example method includes determining, by the processor and based on the discount factors and the predicted 10 number of competitor broadcasts during each time slot, a number of broadcasts for the producer to transmit in each time slot of the total number of time slots.

  3. OpenID connect as a security service in Cloud-based diagnostic imaging systems

    Science.gov (United States)

    Ma, Weina; Sartipi, Kamran; Sharghi, Hassan; Koff, David; Bak, Peter

    2015-03-01

    The evolution of cloud computing is driving the next generation of diagnostic imaging (DI) systems. Cloud-based DI systems are able to deliver better services to patients without constraining to their own physical facilities. However, privacy and security concerns have been consistently regarded as the major obstacle for adoption of cloud computing by healthcare domains. Furthermore, traditional computing models and interfaces employed by DI systems are not ready for accessing diagnostic images through mobile devices. RESTful is an ideal technology for provisioning both mobile services and cloud computing. OpenID Connect, combining OpenID and OAuth together, is an emerging REST-based federated identity solution. It is one of the most perspective open standards to potentially become the de-facto standard for securing cloud computing and mobile applications, which has ever been regarded as "Kerberos of Cloud". We introduce OpenID Connect as an identity and authentication service in cloud-based DI systems and propose enhancements that allow for incorporating this technology within distributed enterprise environment. The objective of this study is to offer solutions for secure radiology image sharing among DI-r (Diagnostic Imaging Repository) and heterogeneous PACS (Picture Archiving and Communication Systems) as well as mobile clients in the cloud ecosystem. Through using OpenID Connect as an open-source identity and authentication service, deploying DI-r and PACS to private or community clouds should obtain equivalent security level to traditional computing model.

  4. 77 FR 33098 - Unlicensed Operation in the TV Broadcast Band

    Science.gov (United States)

    2012-06-05

    ...] Unlicensed Operation in the TV Broadcast Band AGENCY: Federal Communications Commission. ACTION: Correcting... matter of ``Unlicensed Operation in the TV Broadcast Band Approval.'' This document contains corrections... of this correction relate to ``Unlicensed Operation in the TV Broadcast Band Approval'' under Sec. 15...

  5. PKI-based secure mobile access to electronic health services and data.

    Science.gov (United States)

    Kambourakis, G; Maglogiannis, I; Rouskas, A

    2005-01-01

    Recent research works examine the potential employment of public-key cryptography schemes in e-health environments. In such systems, where a Public Key Infrastructure (PKI) is established beforehand, Attribute Certificates (ACs) and public key enabled protocols like TLS, can provide the appropriate mechanisms to effectively support authentication, authorization and confidentiality services. In other words, mutual trust and secure communications between all the stakeholders, namely physicians, patients and e-health service providers, can be successfully established and maintained. Furthermore, as the recently introduced mobile devices with access to computer-based patient record systems are expanding, the need of physicians and nurses to interact increasingly with such systems arises. Considering public key infrastructure requirements for mobile online health networks, this paper discusses the potential use of Attribute Certificates (ACs) in an anticipated trust model. Typical trust interactions among doctors, patients and e-health providers are presented, indicating that resourceful security mechanisms and trust control can be obtained and implemented. The application of attribute certificates to support medical mobile service provision along with the utilization of the de-facto TLS protocol to offer competent confidentiality and authorization services is also presented and evaluated through experimentation, using both the 802.11 WLAN and General Packet Radio Service (GPRS) networks.

  6. Practical Aspects of Outsourcing as a Mean of Security Service Provision

    Directory of Open Access Journals (Sweden)

    D.B. Frolov

    2012-06-01

    Full Text Available The article highlights the implementation of outsourcing as a mean of service for security provision. Analysis is performed to describe the current issues affecting the management decision in favor of outsourcing. Investigation covers the processes of physical, information and economical security. The main recommendations to use outsourcing for security provision are described in the conclusion. With the development of mobile technology protecting of user data becomes more and more important. The article is dedicated to the vulnerability of devices running on the iOS platform, potentially allowing an attacker to obtain information about the movements of their owners, and suggests ways to protect against these attacks.

  7. A Tree Based Broadcast Scheme for (m, k)-firm Real-Time Stream in Wireless Sensor Networks.

    Science.gov (United States)

    Park, HoSung; Kim, Beom-Su; Kim, Kyong Hoon; Shah, Babar; Kim, Ki-Il

    2017-11-09

    Recently, various unicast routing protocols have been proposed to deliver measured data from the sensor node to the sink node within the predetermined deadline in wireless sensor networks. In parallel with their approaches, some applications demand the specific service, which is based on broadcast to all nodes within the deadline, the feasible real-time traffic model and improvements in energy efficiency. However, current protocols based on either flooding or one-to-one unicast cannot meet the above requirements entirely. Moreover, as far as the authors know, there is no study for the real-time broadcast protocol to support the application-specific traffic model in WSN yet. Based on the above analysis, in this paper, we propose a new ( m , k )-firm-based Real-time Broadcast Protocol (FRBP) by constructing a broadcast tree to satisfy the ( m , k )-firm, which is applicable to the real-time model in resource-constrained WSNs. The broadcast tree in FRBP is constructed by the distance-based priority scheme, whereas energy efficiency is improved by selecting as few as nodes on a tree possible. To overcome the unstable network environment, the recovery scheme invokes rapid partial tree reconstruction in order to designate another node as the parent on a tree according to the measured ( m , k )-firm real-time condition and local states monitoring. Finally, simulation results are given to demonstrate the superiority of FRBP compared to the existing schemes in terms of average deadline missing ratio, average throughput and energy consumption.

  8. Security in Cloud Computing For Service Delivery Models: Challenges and Solutions

    OpenAIRE

    Preeti Barrow; Runni Kumari; Prof. Manjula R

    2016-01-01

    Cloud computing, undoubtedly, is a path to expand the limits or add powerful capabilities on-demand with almost no investment in new framework, training new staff, or authorizing new software. Though today everyone is talking about cloud but, organizations are still in dilemma whether it’s safe to deploy their business on cloud. The reason behind it; is nothing but Security. No cloud service provider provides 100% security assurance to its customers and therefore, businesses are h...

  9. Information Behavior on Social Live Streaming Services

    Directory of Open Access Journals (Sweden)

    Scheibe, Katrin

    2016-06-01

    Full Text Available In the last few years, a new type of synchronous social networking services (SNSs has emerged—social live streaming services (SLSSs. Studying SLSSs is a new and exciting research field in information science. What information behaviors do users of live streaming platforms exhibit? In our empirical study we analyzed information production behavior (i.e., broadcasting as well as information reception behavior (watching streams and commenting on them. We conducted two quantitative investigations, namely an online survey with YouNow users (N = 123 and observations of live streams on YouNow (N = 434. YouNow is a service with video streams mostly made by adolescents for adolescents. YouNow users like to watch streams, to chat while watching, and to reward performers by using emoticons. While broadcasting, there is no anonymity (as in nearly all other WWW services. Synchronous SNSs remind us of the film The Truman Show, as anyone has the chance to consciously broadcast his or her own life real-time.

  10. A Framework for Smart Home Services with Secure and QoS-aware Communications

    Directory of Open Access Journals (Sweden)

    Markus Hager

    2013-01-01

    Full Text Available The scenario of smart home services will be discussed with regard to two important aspects: the quality of service problem for the in-house communication and the need for a security scheme for the whole system. We focus on an installation with smart computers in each flat interconnected using a switched Ethernet network. These smart devices are responsible for performing local services, user control and operate as a gateway for the different types of sensor and actor networks installed at each flat. We propose a QoS scheme to prevent congestion situation for the Ethernet network which is applicable to currently available cost-sensitive hardware. Furthermore, the whole system, all communication channels, user data and the access to the framework are secured by our proposed security architecture. Finally, we will present the latest improvements on Ethernet network standards, the ongoing work on this topics and our next steps for future work.

  11. Water vapor estimation using digital terrestrial broadcasting waves

    Science.gov (United States)

    Kawamura, S.; Ohta, H.; Hanado, H.; Yamamoto, M. K.; Shiga, N.; Kido, K.; Yasuda, S.; Goto, T.; Ichikawa, R.; Amagai, J.; Imamura, K.; Fujieda, M.; Iwai, H.; Sugitani, S.; Iguchi, T.

    2017-03-01

    A method of estimating water vapor (propagation delay due to water vapor) using digital terrestrial broadcasting waves is proposed. Our target is to improve the accuracy of numerical weather forecast for severe weather phenomena such as localized heavy rainstorms in urban areas through data assimilation. In this method, we estimate water vapor near a ground surface from the propagation delay of digital terrestrial broadcasting waves. A real-time delay measurement system with a software-defined radio technique is developed and tested. The data obtained using digital terrestrial broadcasting waves show good agreement with those obtained by ground-based meteorological observation. The main features of this observation are, no need for transmitters (receiving only), applicable wherever digital terrestrial broadcasting is available and its high time resolution. This study shows a possibility to estimate water vapor using digital terrestrial broadcasting waves. In the future, we will investigate the impact of these data toward numerical weather forecast through data assimilation. Developing a system that monitors water vapor near the ground surface with time and space resolutions of 30 s and several kilometers would improve the accuracy of the numerical weather forecast of localized severe weather phenomena.

  12. Enforcement of Security and Privacy in a Service-Oriented Smart Grid

    DEFF Research Database (Denmark)

    Mikkelsen, Søren Aagaard

    inhabitants. With the vision, it is therefore necessity to enforce privacy and security of the data in all phases of its life cycle. The life cycle starts from acquiring the data to it is stored. Therefore, this dissertation follows a system-level and application-level approach to manage data with respect...... to privacy and security. This includes first a design of a service-oriented architecture that allows for the deployment of home-oriented and grid-oriented IASs on a Home Energy Management System (HEMS) and in the cloud, respectively. Privacy and security of electricity data are addressed by letting...... the residential consumer control data dissemination in a two-stage process: first from the HEMS to the cloud and from the cloud to the IASs. Then the dissertation focuses on the critical phases in securing the residential home as well as securing the cloud. It presents a system-level threat model of the HEMS...

  13. 47 CFR 74.601 - Classes of TV broadcast auxiliary stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Classes of TV broadcast auxiliary stations. 74... Television Broadcast Auxiliary Stations § 74.601 Classes of TV broadcast auxiliary stations. (a) TV pickup stations. A land mobile station used for the transmission of TV program material and related communications...

  14. 75 FR 52185 - Use of Microwave for Wireless Backhaul; Provision for Additional Flexibility To Broadcast...

    Science.gov (United States)

    2010-08-24

    ...) link in the chain of distribution of the program material to broadcast stations. In light of recent.... These requirements serve to ensure productive use of the spectrum and to prevent noneconomic overuse. 9... completely out of service, so long as the values mandated by the rules were maintained both in normal...

  15. Nation Binding: How Public Service Broadcasting Mitigates Political Selective Exposure

    Science.gov (United States)

    Kruikemeier, Sanne; de Vreese, Claes

    2016-01-01

    Recent research suggests that more and more citizens select news and information that is congruent with their existing political preferences. This increase in political selective exposure (PSE) has allegedly led to an increase in polarization. The vast majority of studies stem from the US case with a particular media and political system. We contend that there are good reasons to believe PSE is less prevalent in other systems. We test this using latent profile analysis with national survey data from the Netherlands (n = 2,833). We identify four types of media use profiles and indeed only find partial evidence of PSE. In particular, we find that public broadcasting news cross-cuts all cleavages. This research note offers an important antidote in what is considered a universal phenomenon. We do find, however, a relatively large segment of citizens opting out of news consumption despite the readily available news in today’s media landscape. PMID:27218659

  16. The representation of health care services in Mexican television: potential consequences for health subjectivities

    Directory of Open Access Journals (Sweden)

    Soledad Rojas Rajs

    2016-06-01

    Full Text Available The objective of this paper is to analyze the representation of health services in Mexican television, considering that television plays an important role in the production and reproduction of the social meanings of health. A descriptive study analyzed the contents of 672 hours of continuous television (media flows broadcast in Mexico in 2011, examining advertising, television shows and newscasts. The analysis of all these messages shows that the representation of private care services predominates. When public care services are mentioned, the communication is mainly regarding the Seguro Popular de Salud [Popular Health Insurance, for those with low incomes], while the social security model of care is underrepresented. We therefore conclude that television favors the two first models of health care. This kind of representation could hold potential consequences for health subjectivities.

  17. Secure Service Oriented Architectures (SOA) Supporting NEC [Architecture orientée service (SOA) gérant la NEC

    NARCIS (Netherlands)

    Meiler, P.P.; Schmeing, M.

    2009-01-01

    Combined scenario ; Data management ; Data processing ; Demonstrator ; Information systems ; Integrated systems ; Interoperability ; Joint scenario ; Network Enabled Capability (NEC) ; Operational effectiveness ; Operations research ; Scenarios ; Secure communication ; Service Oriented Architecture

  18. Influence of Security Mechanisms on the Quality of Service of VoIP

    Science.gov (United States)

    Backs, Peter; Pohlmann, Norbert

    While Voice over IP (VoIP) is advancing rapidly in the telecommunications market, the interest to protect the data transmitted by this new service is also rising. However, in contrast to other internet services such as email or HTTP, VoIP is real-time media, and therefore must meet a special requirement referred to as Quality-of-Service to provide a comfortable flow of speech. Speech quality is worsened when transmitted over the network due to delays in transmission or loss of packets. Often, voice quality is at a level that even prevents comprehensive dialog. Therefore, an administrator who is to setup a VoIP infrastructure might consider avoiding additional decreases in voice quality resulting from security mechanisms, and might leave internet telephony unprotected as a result. The inspiration for this paper is to illustrate that security mechanisms have negligible impact on speech quality and should in fact be encouraged.

  19. TELECOMMUNICATIONS AND BROADCASTING: A QUESTION OF REGULATORY DISSOCIATION

    Directory of Open Access Journals (Sweden)

    Chalini Torquato Gonçalves de Barros

    2009-08-01

    Full Text Available The legislation governing the communication in Brazil is marked by significant normative paradox between the telecommunication and broadcasting services, from the privatization of the sector at the time of President Fernando Henrique Cardoso. Among the factors that contribute to the establishment of such situation are practices of patronage, inherent in the Brazilian political culture. In the same manner, the communication sector of Brazil follows an opposite direction to the worldwide trend of technological and legislative convergence besides weakening the State with regard to the compliance of its regulatory role, especially because it is vulnerable to pressures from more influential sector actors.

  20. Public and Private Activity in Commercial TV Broadcasting

    DEFF Research Database (Denmark)

    Olai Hansen, Bodil; Keiding, Hans

    2006-01-01

    We consider a model of commercial television market, where private broadcasters coexist with a public television broadcaster. Assuming that the public TV station follows a policy of Ramsey pricing whereas the private stations are profit maximizers, we consider the equilibria in this market...

  1. CERN alerter-RSS based system for information broadcast to all CERN offices

    International Nuclear Information System (INIS)

    Otto, R

    2008-01-01

    Nearly every large organization uses a tool to broadcast messages and information across the internal campus (messages like alerts announcing interruption in services or just information about upcoming events). These tools typically allow administrators (operators) to send 'targeted' messages which are sent only to specific groups of users or computers, e/g only those located in a specified building or connected to a particular computing service. CERN has a long history of such tools: CERNVMS's SPM q uotMESSAGE command, Zephyr [2] and the most recent the NICE Alerter based on the NNTP protocol. The NICE Alerter used on all Windows-based computers had to be phased out as a consequence of phasing out NNTP at CERN. The new solution to broadcast information messages on the CERN campus continues to provide the service based on cross-platform technologies, hence minimizing custom developments and relying on commercial software as much as possible. The new system, called CERN Alerter, is based on RSS (Really Simple Syndication) [9] for the transport protocol and uses Microsoft SharePoint as the backend for database and posting interface. The windows-based client relies on Internet Explorer 7.0 with custom code to trigger the window pop-ups and the notifications for new events. Linux and Mac OS X clients could also rely on any RSS readers to subscribe to targeted notifications. The paper covers the architecture and implementation aspects of the new system

  2. Middleware and Web Services for the Collaborative Information Portal of NASA's Mars Exploration Rovers Mission

    Science.gov (United States)

    Sinderson, Elias; Magapu, Vish; Mak, Ronald

    2004-01-01

    We describe the design and deployment of the middleware for the Collaborative Information Portal (CIP), a mission critical J2EE application developed for NASA's 2003 Mars Exploration Rover mission. CIP enabled mission personnel to access data and images sent back from Mars, staff and event schedules, broadcast messages and clocks displaying various Earth and Mars time zones. We developed the CIP middleware in less than two years time usins cutting-edge technologies, including EJBs, servlets, JDBC, JNDI and JMS. The middleware was designed as a collection of independent, hot-deployable web services, providing secure access to back end file systems and databases. Throughout the middleware we enabled crosscutting capabilities such as runtime service configuration, security, logging and remote monitoring. This paper presents our approach to mitigating the challenges we faced, concluding with a review of the lessons we learned from this project and noting what we'd do differently and why.

  3. A content analysis of health-related advertisements in Islamic Republic of Iran broadcasting (IRIB)

    Science.gov (United States)

    Etemad, Koorosh; Ebrahimi, Parvin; Azimi, Hassan; Lotfi, Mansoureh; Nojomi, Marzieh

    2016-01-01

    Background: Media advertisements especially radio and TV are one of the most important and effective ways for health promotion and consumption of healthy productions worldwide. Ministry of Health and some other ministries in Iran agreed to control and restrict the advertising of unhealthy products and services. Therefore, adequate supervision and monitoring should be done in this field. A content analysis of Health-related Advertisements was done in Islamic Republic of Iran Broadcasting (IRIB) Methods: This study was a cross-sectional research and collecting of data was carried out in 2012. Ten selected TV and radio channels were recorded from 6 a.m. to 12 p.m. for two successive months in the special weekdays. Broadcasted advertisements data were extracted by the trained observers according to a checklist and analyzed using SPSS 18 software and described with descriptive statistics. Results: The percentage of different types of advertising were including 73.9% unrelated to health, 21.9% harmless health related, 2.9% less healthy, 1.3% harmful or harmful with a probability of abuse. Non-harmful to health advertisements included 95.86% of total advertisements out of ten TV and radio channels; and the remained advertisements (4.14%) were related to the harmful, less healthy foodstuff and detrimental services and products. Also, 0.8% of the advertisements were shown during children programs. Conclusion: The main findings of the current study revealed that majority of the advertisements of Islamic Republic Broadcasting were unrelated to health. It seems advertising of harmful for health in IRIB was less than 5%, and the levels of these type ads were less than the other countries. Even so, the policymakers need to pass and enforce some executive and governing law for the prevention of broadcasting unhealthy advertisements to increase the society health level and prevent the diseases resulted from unhealthy products causing the considerable damages in a long time. PMID

  4. Static analysis of topology-dependent broadcast networks

    DEFF Research Database (Denmark)

    Nanz, Sebastian; Nielson, Flemming; Nielson, Hanne Riis

    2010-01-01

    changing network topology is a crucial ingredient. In this paper, we develop a static analysis that automatically constructs an abstract transition system, labelled by actions and connectivity information, to yield a mobility-preserving finite abstraction of the behaviour of a network expressed......Broadcast semantics poses significant challenges over point-to-point communication when it comes to formal modelling and analysis. Current approaches to analysing broadcast networks have focused on fixed connectivities, but this is unsuitable in the case of wireless networks where the dynamically...... in a process calculus with asynchronous local broadcast. Furthermore, we use model checking based on a 3-valued temporal logic to distinguish network behaviour which differs under changing connectivity patterns. (C) 2009 Elsevier Inc. All rights reserved....

  5. Broadcast Expenses Controlling Techniques in Mobile Ad-hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Naeem Ahmad

    2016-07-01

    Full Text Available The blind flooding of query packets in route discovery more often characterizes the broadcast storm problem, exponentially increases energy consumption of intermediate nodes and congests the entire network. In such a congested network, the task of establishing the path between resources may become very complex and unwieldy. An extensive research work has been done in this area to improve the route discovery phase of routing protocols by reducing broadcast expenses. The purpose of this study is to provide a comparative analysis of existing broadcasting techniques for the route discovery phase, in order to bring about an efficient broadcasting technique for determining the route with minimum conveying nodes in ad-hoc networks. The study is designed to highlight the collective merits and demerits of such broadcasting techniques along with certain conclusions that would contribute to the choice of broadcasting techniques.

  6. 76 FR 22160 - Fifty-Fourth Meeting: RTCA Special Committee 186: Automatic Dependent Surveillance-Broadcast (ADS-B)

    Science.gov (United States)

    2011-04-20

    ... Rooms, 1828 L Street, NW., Suite 805, Washington, DC 20036. FOR FURTHER INFORMATION CONTACT: RTCA Secretariat, 1828 L Street, NW., Suite 805, Washington, DC, 20036, (202) 833-9339; fax (202) 833-9434; Web.... 035-11/SC186-307 FAA Surveillance and Broadcast Services (SBS) Program Status Traffic Situation...

  7. Local television news coverage of President Clinton's introduction of the Health Security Act.

    Science.gov (United States)

    Dorfman, L; Schauffler, H H; Wilkerson, J; Feinson, J

    1996-04-17

    To investigate how local television news reported on health system reform during the week President Clinton presented his health system reform bill. Retrospective content analysis of the 1342-page Health Security Act of 1993, the printed text of President Clinton's speech before Congress on September 22, 1993, and a sample of local television news stories on health system reform broadcast during the week of September 19 through 25, 1993. The state of California. During the week, 316 television news stories on health system reform were aired during the 166 local news broadcasts sampled. Health system reform was the second most frequently reported topic, second to stories on violent crime. News stories on health system reform averaged 1 minute 38 seconds in length, compared with 57 seconds for violent crime. Fifty-seven percent of the local news stories focused on interest group politics. Compared with the content of the Health Security Act, local news broadcasts devoted a significantly greater portion of their stories to financing, eligibility, and preventive services. Local news stories gave significantly less attention to cost-saving mechanisms, long-term care benefits, and changes in Medicare and Medicaid, and less than 2% of stories mentioned quality assurance mechanisms, malpractice reform, or new public health initiatives. Of the 316 televised news stories, 53 reported on the president's speech, covering many of the same topics emphasized in the speech (financing, organization and administration, and eligibility) and de-emphasizing many of the same topics (Medicare and Medicaid, quality assurance, and malpractice reform). Two percent of the president's speech covered partisan politics; 45% of the local news stories on the speech featured challenges from partisan politicians. Although health system reform was the focus of a large number of local television news stories during the week, in-depth explanation was scarce. In general, the news stories provided

  8. Stochastic dynamics of genetic broadcasting networks

    Science.gov (United States)

    Potoyan, Davit A.; Wolynes, Peter G.

    2017-11-01

    The complex genetic programs of eukaryotic cells are often regulated by key transcription factors occupying or clearing out of a large number of genomic locations. Orchestrating the residence times of these factors is therefore important for the well organized functioning of a large network. The classic models of genetic switches sidestep this timing issue by assuming the binding of transcription factors to be governed entirely by thermodynamic protein-DNA affinities. Here we show that relying on passive thermodynamics and random release times can lead to a "time-scale crisis" for master genes that broadcast their signals to a large number of binding sites. We demonstrate that this time-scale crisis for clearance in a large broadcasting network can be resolved by actively regulating residence times through molecular stripping. We illustrate these ideas by studying a model of the stochastic dynamics of the genetic network of the central eukaryotic master regulator NFκ B which broadcasts its signals to many downstream genes that regulate immune response, apoptosis, etc.

  9. A Tree Based Broadcast Scheme for (m, k-firm Real-Time Stream in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    HoSung Park

    2017-11-01

    Full Text Available Recently, various unicast routing protocols have been proposed to deliver measured data from the sensor node to the sink node within the predetermined deadline in wireless sensor networks. In parallel with their approaches, some applications demand the specific service, which is based on broadcast to all nodes within the deadline, the feasible real-time traffic model and improvements in energy efficiency. However, current protocols based on either flooding or one-to-one unicast cannot meet the above requirements entirely. Moreover, as far as the authors know, there is no study for the real-time broadcast protocol to support the application-specific traffic model in WSN yet. Based on the above analysis, in this paper, we propose a new (m, k-firm-based Real-time Broadcast Protocol (FRBP by constructing a broadcast tree to satisfy the (m, k-firm, which is applicable to the real-time model in resource-constrained WSNs. The broadcast tree in FRBP is constructed by the distance-based priority scheme, whereas energy efficiency is improved by selecting as few as nodes on a tree possible. To overcome the unstable network environment, the recovery scheme invokes rapid partial tree reconstruction in order to designate another node as the parent on a tree according to the measured (m, k-firm real-time condition and local states monitoring. Finally, simulation results are given to demonstrate the superiority of FRBP compared to the existing schemes in terms of average deadline missing ratio, average throughput and energy consumption.

  10. Scalable Security and Accounting Services for Content-Based Publish/Subscribe Systems

    OpenAIRE

    Himanshu Khurana; Radostina K. Koleva

    2006-01-01

    Content-based publish/subscribe systems offer an interaction scheme that is appropriate for a variety of large-scale dynamic applications. However, widespread use of these systems is hindered by a lack of suitable security services. In this paper, we present scalable solutions for confidentiality, integrity, and authentication for these systems. We also provide verifiable usage-based accounting services, which are required for e-commerce and e-business applications that use publish/subscribe ...

  11. Wireless Physical Layer Security with CSIT Uncertainty

    KAUST Repository

    Hyadi, Amal

    2017-09-01

    Recent years have been marked by an enormous growth of wireless communication networks and an extensive use of wireless applications. In return, this phenomenal expansion induced more concerns about the privacy and the security of the users. Physical layer security is one of the most promising solutions that were proposed to enhance the security of next generation wireless systems. The fundamental idea behind this technique is to exploit the randomness and the fluctuations of the wireless channel to achieve security without conditional assumptions on the computational capabilities of the eavesdropper. In fact, while these elements have traditionally been associated with signal deterioration, physical layer security uses them to ensure the confidentiality of the users. Nevertheless, these technical virtues rely heavily on perhaps idealistic channel state information assumptions. In that regard, the aim of this thesis is to look at the physical layer security paradigm from the channel uncertainty perspective. In particular, we discuss the ergodic secrecy capacity of different wiretap channels when the transmitter is hampered by the imperfect knowledge of the channel state information (CSI). We consider two prevalent causes of uncertainty for the CSI at transmitter (CSIT); either an error of estimation occurs at the transmitter and he can only base his coding and the transmission strategies on a noisy version of the CSI, or the CSI feedback link has a limited capacity and the legitimate receivers can only inform the transmitter about the quantized CSI. We investigate both the single-user multiple-input multiple-output (MIMO) wiretap channel and the multi-user broadcast wiretap channel. In the latter scenario, we distinguish between two situations: multiple messages transmission and common message transmission. We also discuss the broadcast channel with confidential messages (BCCM) where the transmitter has one common message to be transmitted to two users and one

  12. Water Security and Services in the Caribbean

    Directory of Open Access Journals (Sweden)

    Adrian Cashman

    2014-05-01

    Full Text Available The efficient management of water resources and services continues to be a concern in many of the small island states of the Caribbean. There are growing concerns over the ability of governments in the region to ensure the good management and provision of water without jeopardizing economic growth and the maintenance of social well-being. This paper provides an overview of the major factors influencing the water security facing the Caribbean Region and how the emerging concerns are being addressed. The key challenges and vulnerabilities may be summarized as lack of data and barriers to making available what information there is. Forward planning has been largely neglected and is symptomatic of a lack of appreciation of the need for having national water policies. In this respect Jamaica’s development of a national master water plan serves as a good example of what is needed. Water service providers have to be efficient, well managed and allowed to do their job. This means that they have to be on a sound financial footing. The challenge is to find the balance between appropriate political and regulatory oversight and the autonomy of water managers and service providers.

  13. Secure positioning technique based on encrypted visible light map for smart indoor service

    Science.gov (United States)

    Lee, Yong Up; Jung, Gillyoung

    2018-03-01

    Indoor visible light (VL) positioning systems for smart indoor services are negatively affected by both cochannel interference from adjacent light sources and VL reception position irregularity in the three-dimensional (3-D) VL channel. A secure positioning methodology based on a two-dimensional (2-D) encrypted VL map is proposed, implemented in prototypes of the specific positioning system, and analyzed based on performance tests. The proposed positioning technique enhances the positioning performance by more than 21.7% compared to the conventional method in real VL positioning tests. Further, the pseudonoise code is found to be the optimal encryption key for secure VL positioning for this smart indoor service.

  14. Practical Secure Transaction for Privacy-Preserving Ride-Hailing Services

    Directory of Open Access Journals (Sweden)

    Chenglong Cao

    2018-01-01

    Full Text Available Ride-hailing service solves the issue of taking a taxi difficultly in rush hours. It is changing the way people travel and has had a rapid development in recent years. Since the service is offered over the Internet, there is a great deal of uncertainty about security and privacy. Focusing on the issue, we changed payment pattern of existing systems and designed a privacy protection ride-hailing scheme. E-cash was generated by a new partially blind signature protocol that achieves e-cash unforgeability and passenger privacy. Particularly, in the face of a service platform and a payment platform, a passenger is still anonymous. Additionally, a lightweight hash chain was constructed to keep e-cash divisible and reusable, which increases practicability of transaction systems. The analysis shows that the scheme has small communication and computation costs, and it can be effectively applied in the ride-hailing service with privacy protection.

  15. Secure Cloud-Based Solutions for Different eHealth Services in Spanish Rural Health Centers.

    Science.gov (United States)

    de la Torre-Díez, Isabel; Lopez-Coronado, Miguel; Garcia-Zapirain Soto, Begonya; Mendez-Zorrilla, Amaia

    2015-07-27

    The combination of eHealth applications and/or services with cloud technology provides health care staff—with sufficient mobility and accessibility for them—to be able to transparently check any data they may need without having to worry about its physical location. The main aim of this paper is to put forward secure cloud-based solutions for a range of eHealth services such as electronic health records (EHRs), telecardiology, teleconsultation, and telediagnosis. The scenario chosen for introducing the services is a set of four rural health centers located within the same Spanish region. iCanCloud software was used to perform simulations in the proposed scenario. We chose online traffic and the cost per unit in terms of time as the parameters for choosing the secure solution on the most optimum cloud for each service. We suggest that load balancers always be fitted for all solutions in communication together with several Internet service providers and that smartcards be used to maintain identity to an appropriate extent. The solutions offered via private cloud for EHRs, teleconsultation, and telediagnosis services require a volume of online traffic calculated at being able to reach 2 Gbps per consultation. This may entail an average cost of €500/month. The security solutions put forward for each eHealth service constitute an attempt to centralize all information on the cloud, thus offering greater accessibility to medical information in the case of EHRs alongside more reliable diagnoses and treatment for telecardiology, telediagnosis, and teleconsultation services. Therefore, better health care for the rural patient can be obtained at a reasonable cost.

  16. Secure Cloud-Based Solutions for Different eHealth Services in Spanish Rural Health Centers

    Science.gov (United States)

    2015-01-01

    Background The combination of eHealth applications and/or services with cloud technology provides health care staff—with sufficient mobility and accessibility for them—to be able to transparently check any data they may need without having to worry about its physical location. Objective The main aim of this paper is to put forward secure cloud-based solutions for a range of eHealth services such as electronic health records (EHRs), telecardiology, teleconsultation, and telediagnosis. Methods The scenario chosen for introducing the services is a set of four rural health centers located within the same Spanish region. iCanCloud software was used to perform simulations in the proposed scenario. We chose online traffic and the cost per unit in terms of time as the parameters for choosing the secure solution on the most optimum cloud for each service. Results We suggest that load balancers always be fitted for all solutions in communication together with several Internet service providers and that smartcards be used to maintain identity to an appropriate extent. The solutions offered via private cloud for EHRs, teleconsultation, and telediagnosis services require a volume of online traffic calculated at being able to reach 2 Gbps per consultation. This may entail an average cost of €500/month. Conclusions The security solutions put forward for each eHealth service constitute an attempt to centralize all information on the cloud, thus offering greater accessibility to medical information in the case of EHRs alongside more reliable diagnoses and treatment for telecardiology, telediagnosis, and teleconsultation services. Therefore, better health care for the rural patient can be obtained at a reasonable cost. PMID:26215155

  17. Security Risks of Cloud Computing and Its Emergence as 5th Utility Service

    Science.gov (United States)

    Ahmad, Mushtaq

    Cloud Computing is being projected by the major cloud services provider IT companies such as IBM, Google, Yahoo, Amazon and others as fifth utility where clients will have access for processing those applications and or software projects which need very high processing speed for compute intensive and huge data capacity for scientific, engineering research problems and also e- business and data content network applications. These services for different types of clients are provided under DASM-Direct Access Service Management based on virtualization of hardware, software and very high bandwidth Internet (Web 2.0) communication. The paper reviews these developments for Cloud Computing and Hardware/Software configuration of the cloud paradigm. The paper also examines the vital aspects of security risks projected by IT Industry experts, cloud clients. The paper also highlights the cloud provider's response to cloud security risks.

  18. 47 CFR 74.1205 - Protection of channel 6 TV broadcast stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Protection of channel 6 TV broadcast stations... 6 TV broadcast stations. The provisions of this section apply to all applications for construction... applicant and each affected TV Channel 6 broadcast station licensee or permittee concurring with the...

  19. Tearing the Fabric of Canada: The Broadcast Media and Canadian Identity.

    Science.gov (United States)

    Weiss, Elaine F.

    This paper explores the perceived threat of American cultural "imperialism" in Canada, the effect of constant exposure to American broadcasting on the Canadian national identity, the role broadcasting plays in shaping Canadian identity, and the efforts by the Canadian government to "Canadianize" its broadcasting. A brief…

  20. Wireless-Delimited Secure Zones with Encrypted Attribute-Based Broadcast for Safe Firearms

    OpenAIRE

    Portnoi, Marcos; Shen, Chien-Chung

    2014-01-01

    This work presents an application of the highly expressive Attribute-Based Encryption to implement wireless-delimited Secure Zones for firearms. Within these zones, radio-transmitted local policies based on attributes of the consumer and the firearm are received by embedded hardware in the firearms, which then advises the consumer about safe operations. The Secure Zones utilize Attribute-Based Encryption to encode the policies and consumer or user attributes, and providing privacy and securit...

  1. Obstacles to broadcasting for national integration in Nigeria.

    Science.gov (United States)

    Amienyi, O P

    1989-01-01

    In Nigeria, the media is the major government vehicle to achieve national integration. The problems arise from the approximately 250 ethnic groups speaking many languages. Television and radio have caused disintegration by emphasizing alienation and polarization rather than unity. With more than 178 languages there are major problems for radio and television. The government leaders have promoted a strong interest in creating a unified society through broadcasting, but at the same time have allowed media managers to operate towards goals of ethnic protection. Religion is also a factor that hinders broadcasting for national unity, since there are Hausa and Muslim in the north, Catholic in the south-east, and in the south-west there are many African ethnic religions. More than 60% of the local programming on television is keyed to local religious subjects. Illiteracy is also a problem in the use of broadcasting in the goal of national integration. Only through education of a socially conscious people can the religious fanaticism, ethnocentrism, and tribalism be overcome to form a united nation. Broadcasting can play an important role consistent with the needs of society as a whole. Managers in broadcasting must be well educated, well trained and understand the needs and ambitions of society. They need to support these needs and ambitions, and be constructively critical when necessary for the betterment of society.

  2. Cryptanalysis and improvement of quantum broadcast communication and authentication protocol with a quantum one-time pad

    International Nuclear Information System (INIS)

    Liu Zhi-Hao; Chen Han-Wu

    2016-01-01

    The security of quantum broadcast communication (QBC) and authentication protocol based on Greenberger–Horne–Zeilinger (GHZ) state and quantum one-time pad is analyzed. It is shown that there are some security issues in this protocol. Firstly, an external eavesdropper can take the intercept–measure–resend attack strategy to eavesdrop on 0.369 bit of every bit of the identity string of each receiver without being detected. Meanwhile, 0.524 bit of every bit of the secret message can be eavesdropped on without being detected. Secondly, an inner receiver can take the intercept–measure–resend attack strategy to eavesdrop on half of the identity string of the other’s definitely without being checked. In addition, an alternative attack called the CNOT-operation attack is discussed. As for the multi-party QBC protocol, the attack efficiency increases with the increase of the number of users. Finally, the QBC protocol is improved to a secure one. (paper)

  3. TV FOR CHILDREN : How the Swedish Public Service Television Imagines a Child Audience

    OpenAIRE

    Pettersson, Åsa

    2013-01-01

    The study explores how the Swedish public service TV institution imagines a child audience in a societal context where the broadcasting landscape hastransformed greatly over the past thirty years and where TV is seen to  constitute both risks and benefits for children. The concept of TV for children is established to broaden the scope for studying what has been broadcast for a child audience on public service TV. The empirical material consists of both broadcasting policy documents and an ext...

  4. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  5. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  6. Language Policy, Tacit Knowledge, and Institutional Learning: The Case of the Swiss Public Service Broadcaster SRG SSR

    Science.gov (United States)

    Perrin, Daniel

    2011-01-01

    "Promoting public understanding" is what the programming mandate asks the Swiss public broadcasting company SRG SSR to do. From a sociolinguistic perspective, this means linking speech communities with other speech communities, both between and within the German-, French-, Italian-, and Romansh-speaking parts of Switzerland. In the…

  7. Information Security of PHY Layer in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Weidong Fang

    2016-01-01

    Full Text Available Since the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. In this paper, we firstly identify and summarize the threats and vulnerabilities in PHY layer of wireless networks. Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. Along the way, we analyze the pros and cons of current secure technologies in each category. In addition, we also conclude the techniques and methods used in these categories and point out the open research issues and directions in this area.

  8. Broadcasting a message in a parallel computer

    Science.gov (United States)

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  9. Optimizing Energy and Modulation Selection in Multi-Resolution Modulation For Wireless Video Broadcast/Multicast

    KAUST Repository

    She, James

    2009-11-01

    Emerging technologies in Broadband Wireless Access (BWA) networks and video coding have enabled high-quality wireless video broadcast/multicast services in metropolitan areas. Joint source-channel coded wireless transmission, especially using hierarchical/superposition coded modulation at the channel, is recognized as an effective and scalable approach to increase the system scalability while tackling the multi-user channel diversity problem. The power allocation and modulation selection problem, however, is subject to a high computational complexity due to the nonlinear formulation and huge solution space. This paper introduces a dynamic programming framework with conditioned parsing, which significantly reduces the search space. The optimized result is further verified with experiments using real video content. The proposed approach effectively serves as a generalized and practical optimization framework that can gauge and optimize a scalable wireless video broadcast/multicast based on multi-resolution modulation in any BWA network.

  10. Optimizing Energy and Modulation Selection in Multi-Resolution Modulation For Wireless Video Broadcast/Multicast

    KAUST Repository

    She, James; Ho, Pin-Han; Shihada, Basem

    2009-01-01

    Emerging technologies in Broadband Wireless Access (BWA) networks and video coding have enabled high-quality wireless video broadcast/multicast services in metropolitan areas. Joint source-channel coded wireless transmission, especially using hierarchical/superposition coded modulation at the channel, is recognized as an effective and scalable approach to increase the system scalability while tackling the multi-user channel diversity problem. The power allocation and modulation selection problem, however, is subject to a high computational complexity due to the nonlinear formulation and huge solution space. This paper introduces a dynamic programming framework with conditioned parsing, which significantly reduces the search space. The optimized result is further verified with experiments using real video content. The proposed approach effectively serves as a generalized and practical optimization framework that can gauge and optimize a scalable wireless video broadcast/multicast based on multi-resolution modulation in any BWA network.

  11. Interference mitigation for broadcast in hierarchical cell structure networks: Transmission strategy and area spectral efficiency

    KAUST Repository

    Yang, Yuli

    2014-10-01

    In this paper, a hierarchical cell structure (HCS) is considered, where an access point (AP) broadcasts to local nodes (LNs) over orthogonal frequency subbands within a local cell located in a macrocell. Since the local cell shares the spectrum licensed to the macrocell, a given LN is interfered with by the macrocell user (MU)\\'s transmissions over the same subband. To improve the performance of the AP\\'s broadcast service, a novel transmission strategy is proposed to mitigate the interference from the MU to the LN while achieving diversity gain. For the purpose of performance evaluation, the ergodic capacity of the proposed scheme is quantified, and the corresponding closed-form expression is obtained. By comparing with the traditional transmission scheme, which suffers from MU\\'s interference, illustrative numerical results substantiate that the proposed scheme achieves better performance than the traditional scheme as the MU-LN mean channel power gain is larger than half of the AP-LN mean channel power gain. Subsequently, we develop an optimized network design by maximizing the area spectral efficiency (ASE) of the AP\\'s broadcast in the local cell.

  12. Proof of Concept Integration of a Single-Level Service-Oriented Architecture into a Multi-Domain Secure Environment

    National Research Council Canada - National Science Library

    Gilkey, Craig M

    2008-01-01

    .... Such web services operating across multiple security domains would provide additional advantages, including improved intelligence aggregation, and real-time collaboration between users in different security domains...

  13. Employment of personnel of a security service company does not require the consent of the works council

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    If a company or institution hires personnel of a security service company to protect its premises, this kind of employment does not mean the company carries on temporary employment business. Within the purview of section 99, sub-section 1 of the BetrVG (Works Constitution Act), the security service personnel is not 'employed' in the proper sense even if the security tasks fulfilled by them are done at other times by regular employees of the company or institution. The court decision also decided that the Works Council need not give consent to employment of foreign security personnel. Federal Labour Court, decision dated May 5, 1992 - 1 ABR 78/91. (orig./HP) [de

  14. 78 FR 56266 - Consent Based Social Security Number Verification (CBSV) Service

    Science.gov (United States)

    2013-09-12

    ... developed CBSV as a user- friendly, internet-based application with safeguards that protect the public's information. In addition to the benefit of providing high volume, centralized SSN verification services to users in a secure manner, CBSV provides us with cost and workload management benefits. New Information...

  15. 17 CFR 240.15Ca2-5 - Consent to service of process to be furnished by non-resident government securities brokers or...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Consent to service of process... Government Securities Dealers § 240.15Ca2-5 Consent to service of process to be furnished by non-resident... government securities dealer by the service of process upon the Commission and the forwarding of a copy...

  16. Behavioral analysis of use personal service e-balance Indonesian social security

    Science.gov (United States)

    Wang, Gunawan; Fitriani, Novi; Nurul Fajar, Ahmad

    2017-09-01

    Indonesian Social Security is the one of the government agencies that is trusted to organize social security. With help of Information technology that growing these day, Indonesian Social Security is also developing E-Balance application, where previously all activities for checking balance is done by giving their slip details through the nearest branch to be distributed to each company. So far there is no research that reviewing e-Balance. Hence, the authors is interested to do research related factors that influence the behavior of the use of E-Balance Indonesian Social Security in the Jakarta area and model that can describe those factors Authors distributing questioners to 193 respondents and perform data processing. The result of this study is to know the factors that influence the behavior of use Personal Service E-Balance Indonesian Social Security and model that can describe those factors. The result shows that UTAUT 2 model is not match with this research and need to be enhanced. After enhancement, there are 3 factors that being significant. Such as Behavioral Intention, Effort Expectancy and Social Influence while the others are not supported and need to be customize.

  17. Canal + Spain & Live Football Broadcasts: A Whole Different Game

    NARCIS (Netherlands)

    Rodríguez Ortega, Vicente; Romero Santos, Rubén

    2017-01-01

    textabstractIn 1988 the Law for Private Television Broadcasting was approved by Spanish parliament. Three licenses were initially awarded. Soon thereafter, in 1990, three channels started broadcasting: Antena 3, Berlusconi-related Tele 5 and, against all odds, a pay channel, Canal + Spain. This

  18. Airborne evaluation/verification of antenna patterns of broadcasting stations

    NARCIS (Netherlands)

    Witvliet, Ben

    2006-01-01

    This paper describes a method for airborne evaluation and verification of the antenna patterns of broadcasting stations. Although it is intended for governmental institutions and broadcasters it may be also of interest to anyone who wants to evaluate large radiating structures. An airborne

  19. 47 CFR 74.793 - Digital low power TV and TV translator station protection of broadcast stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital low power TV and TV translator station... DISTRIBUTIONAL SERVICES Low Power TV, TV Translator, and TV Booster Stations § 74.793 Digital low power TV and TV translator station protection of broadcast stations. (a) An application to construct a new digital low power...

  20. The Use of Format Adaptation in Danish Public Service Programming

    DEFF Research Database (Denmark)

    Jensen, Pia Majbritt

    2013-01-01

    The article investigates Danish public service broadcasters’ use of format adaptations over a 12-year period in order to examine claims that formats constitute a potential threat to public service broadcasting and the national Danish television industry and culture. The article’s findings, howeve...... service orientation. Instead the article argues, following German sociologist Ulrich Beck, that format adaptation can represent a form of ‘banal transnationalism’, pointing to the fact that the world is no longer exclusively defined by national boundaries.......The article investigates Danish public service broadcasters’ use of format adaptations over a 12-year period in order to examine claims that formats constitute a potential threat to public service broadcasting and the national Danish television industry and culture. The article’s findings, however......, bear little evidence to support these claims. The practice of format adaptation constitutes a comparatively small proportion of the overall production of Danish public service content, and, more importantly, most of the formats adapted by the public broadcasters have a comparatively solid public...

  1. Securing services in the cloud: an investigation of the threats and the mitigations

    Science.gov (United States)

    Farroha, Bassam S.; Farroha, Deborah L.

    2012-05-01

    The stakeholder's security concerns over data in the clouds (Voice, Video and Text) are a real concern to DoD, the IC and private sector. This is primarily due to the lack of physical isolation of data when migrating to shared infrastructure platforms. The security concerns are related to privacy and regulatory compliance required in many industries (healthcare, financial, law enforcement, DoD, etc) and the corporate knowledge databases. The new paradigm depends on the service provider to ensure that the customer's information is continuously monitored and is kept available, secure, access controlled and isolated from potential adversaries.

  2. 47 CFR 76.972 - Customer service standards.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Customer service standards. 76.972 Section 76.972 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Cable Rate Regulation § 76.972 Customer service standards. (a...

  3. 47 CFR 76.1209 - Theft of service.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Theft of service. 76.1209 Section 76.1209 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Competitive Availability of Navigation Devices § 76.1209 Theft of service...

  4. Restricted broadcast process theory

    NARCIS (Netherlands)

    F. Ghassemi; W.J. Fokkink (Wan); A. Movaghar; A. Cerone; S. Gruner

    2008-01-01

    htmlabstractWe present a process algebra for modeling and reasoning about Mobile Ad hoc Networks (MANETs) and their protocols. In our algebra we model the essential modeling concepts of ad hoc networks, i.e. local broadcast, connectivity of nodes and connectivity changes. Connectivity and

  5. Religious Broadcasting in the Middle East : Content Analysis of ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Over the past decade, television broadcasting has become central in shaping public attitudes in the Middle East. Against a backdrop of authoritarian governments, political instability, war and pervasive foreign military intervention, broadcasting has emerged as a platform for expressing views and opinions that might ...

  6. 76 FR 60112 - Consent Based Social Security Number Verification (CBSV) Service

    Science.gov (United States)

    2011-09-28

    ... protect the public's information. In addition to the benefit of providing high volume, centralized SSN verification services to the business community in a secure manner, CBSV provides us with cost and workload management benefits. New Information: To use CBSV, interested parties must pay a one- time non-refundable...

  7. Effect Through Broadcasting System Access Point For Video Transmission

    Directory of Open Access Journals (Sweden)

    Leni Marlina

    2015-08-01

    Full Text Available Most universities are already implementing wired and wireless network that is used to access integrated information systems and the Internet. At present it is important to do research on the influence of the broadcasting system through the access point for video transmitter learning in the university area. At every university computer network through the access point must also use the cable in its implementation. These networks require cables that will connect and transmit data from one computer to another computer. While wireless networks of computers connected through radio waves. This research will be a test or assessment of how the influence of the network using the WLAN access point for video broadcasting means learning from the server to the client. Instructional video broadcasting from the server to the client via the access point will be used for video broadcasting means of learning. This study aims to understand how to build a wireless network by using an access point. It also builds a computer server as instructional videos supporting software that can be used for video server that will be emitted by broadcasting via the access point and establish a system of transmitting video from the server to the client via the access point.

  8. GPS Ephemeris Message Broadcast Simulation

    National Research Council Canada - National Science Library

    Browne, Nathan J; Light, James J

    2005-01-01

    The warfighter constantly needs increased accuracy from GPS and a means to increasing this accuracy to the decimeter level is a broadcast ephemeris message containing GPS satellite orbit and clock corrections...

  9. OpenID Connect as a security service in cloud-based medical imaging systems.

    Science.gov (United States)

    Ma, Weina; Sartipi, Kamran; Sharghigoorabi, Hassan; Koff, David; Bak, Peter

    2016-04-01

    The evolution of cloud computing is driving the next generation of medical imaging systems. However, privacy and security concerns have been consistently regarded as the major obstacles for adoption of cloud computing by healthcare domains. OpenID Connect, combining OpenID and OAuth together, is an emerging representational state transfer-based federated identity solution. It is one of the most adopted open standards to potentially become the de facto standard for securing cloud computing and mobile applications, which is also regarded as "Kerberos of cloud." We introduce OpenID Connect as an authentication and authorization service in cloud-based diagnostic imaging (DI) systems, and propose enhancements that allow for incorporating this technology within distributed enterprise environments. The objective of this study is to offer solutions for secure sharing of medical images among diagnostic imaging repository (DI-r) and heterogeneous picture archiving and communication systems (PACS) as well as Web-based and mobile clients in the cloud ecosystem. The main objective is to use OpenID Connect open-source single sign-on and authorization service and in a user-centric manner, while deploying DI-r and PACS to private or community clouds should provide equivalent security levels to traditional computing model.

  10. 48 CFR 252.239-7016 - Telecommunications security equipment, devices, techniques, and services.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Telecommunications... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions And Clauses 252.239-7016 Telecommunications... clause: Telecommunications Security Equipment, Devices, Techniques, and Services (DEC 1991) (a...

  11. Energy-Efficient Broadcasting Scheme for Smart Industrial Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhuangbin Chen

    2017-01-01

    Full Text Available In smart Industrial Wireless Sensor Networks (IWSNs, sensor nodes usually adopt a programmable technology. These smart devices can obtain new or special functions by reprogramming: they upgrade their soft systems through receiving new version of program codes. If sensor nodes need to be upgraded, the sink node will propagate program code packets to them through “one-to-many” broadcasting, and therefore new capabilities can be obtained, forming the so-called Software Defined Network (SDN. However, due to the high volume of code packet, the constraint energy of sensor node, and the unreliable link quality of wireless network, rapidly broadcasting the code packets to all nodes in network can be a challenge issue. In this paper, a novel Energy-efficient Broadcast scheme with adjustable broadcasting radius is proposed aiming to improve the performance of network upgrade. In our scheme, the nonhotspots sensor nodes take full advantage of their residual energy caused in data collection period to improve the packet reception probability and reduce the broadcasting delay of code packet transmission by enlarging the broadcasting radius, that is, the transmitting power. The theoretical analyses and experimental results show that, compared with previous work, our approach can averagely reduce the Network Upgrade Delay (NUD by 14.8%–45.2% and simultaneously increase the reliability without harming the lifetime of network.

  12. Virtue Broadcasting - directorate change

    CERN Multimedia

    2003-01-01

    The Board of Virtue Broadcasting Plc ("Virtue") have announced the appointment of Mr. Klaus Ackerstaff as the CEO of the main Board. He began his professional career at CERN, where he was responsible for the IT infrastructure of the OPAL (particle physics) project (1/2 page).

  13. THE ROLE OF BROADCASTING AGENCY TO BUILD THE LEGAL COMPLIANCE OF SOCIETY

    Directory of Open Access Journals (Sweden)

    Lilik Rukitasari

    2016-06-01

    Full Text Available Abstract Broadcasting has become part of peoples’ lives needs for information, entertainment and education. Broadcasting agency as mass communication media play a role to shape the behavior of political, social, and economic in every society, in order to establish the public legal compliance through broadcasting activities that are counseling and law clarification, it takes effective communication media so that the target is expected to be achieved through increased the quality broadcast programs and attractive containing understanding and knowledge about the law will be able to increase publics’ consciousness and legal compliance. This study using sociological-juridical approach by analyzing the empirical data in order to understand the social and legal responsibilities and functions of broadcasting as a mass communication media is effective in disseminating the law and the formation of values, the result of study drawn through the broadcast media were able to create a culture norms, it means the function of media is not only as a transmitter of information to disseminate the law to the public but also it can have the effect of influencing and encouraging the change of behavior towards the law-abiding. Keywords: Broadcasting Agency, Law Compliance, Society

  14. 17 CFR 249.250 - Form F-X, for appointment of agent for service of process by issuers registering securities on...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form F-X, for appointment of agent for service of process by issuers registering securities on Form F-8, F-9, F-10 or F-80 (§ 239.38... F-X, for appointment of agent for service of process by issuers registering securities on Form F-8...

  15. Satellite broadcasting - The European experience and perspective

    Science.gov (United States)

    Watson, Alan

    1991-11-01

    The use of satellites is considered as a means for developing a European transnational broadcasting system with attention given to the control of technology. A tension is described between maintaining technology as the property of one nation when the DBSs are developed for multinational program broadcasting. The simultaneous development of satellite systems is theorized to lead eventually to a single merged program for a particular nation, and the effect is considered of the regulation of cross-holding and cross-selling systems by investors.

  16. Using secure web services to visualize poison center data for nationwide biosurveillance: a case study.

    Science.gov (United States)

    Savel, Thomas G; Bronstein, Alvin; Duck, William; Rhodes, M Barry; Lee, Brian; Stinn, John; Worthen, Katherine

    2010-01-01

    Real-time surveillance systems are valuable for timely response to public health emergencies. It has been challenging to leverage existing surveillance systems in state and local communities, and, using a centralized architecture, add new data sources and analytical capacity. Because this centralized model has proven to be difficult to maintain and enhance, the US Centers for Disease Control and Prevention (CDC) has been examining the ability to use a federated model based on secure web services architecture, with data stewardship remaining with the data provider. As a case study for this approach, the American Association of Poison Control Centers and the CDC extended an existing data warehouse via a secure web service, and shared aggregate clinical effects and case counts data by geographic region and time period. To visualize these data, CDC developed a web browser-based interface, Quicksilver, which leveraged the Google Maps API and Flot, a javascript plotting library. Two iterations of the NPDS web service were completed in 12 weeks. The visualization client, Quicksilver, was developed in four months. This implementation of web services combined with a visualization client represents incremental positive progress in transitioning national data sources like BioSense and NPDS to a federated data exchange model. Quicksilver effectively demonstrates how the use of secure web services in conjunction with a lightweight, rapidly deployed visualization client can easily integrate isolated data sources for biosurveillance.

  17. Retrieving Radio News Broadcasts in Danish: Accuracy and Categorization of Unrecognized Words

    DEFF Research Database (Denmark)

    Hertzum, Morten; Lund, Haakon; Troelsgaard, Rasmus

    2016-01-01

    Digital archives of radio news broadcasts can possibly be made searchable by combining speech recognition with information retrieval. We explore this possibility for the retrieval of news broadcasts in Danish. An average of 84% of the words in the broadcasts was recognized. Most of the unrecogniz...

  18. Security and privacy in billing services in cloud computing

    OpenAIRE

    Μακρή, Ελένη - Λασκαρίνα

    2013-01-01

    The purpose of this master thesis is to define cloud computing and to introduce its basic principles. Firstly, the history of cloud computing will be briefly discussed, starting from the past and ending up to the current and future situation. Furthermore, the most important characteristics of cloud computing, such as security, privacy and cost, will be analyzed. Moreover the three service and three deployment models of cloud computing will be defined and analyzed with examples. Finally, the a...

  19. Loops of Spoken Language i Danish Broadcasting Corporation News

    DEFF Research Database (Denmark)

    le Fevre Jakobsen, Bjarne

    2012-01-01

    The tempo of Danish television news broadcasts has changed markedly over the past 40 years, while the language has essentially always been conservative, and remains so today. The development in the tempo of the broadcasts has gone through a number of phases from a newsreader in a rigid structure...

  20. From Broadcast to Podcast

    DEFF Research Database (Denmark)

    Fibiger, Bo

    2007-01-01

    This paper will present the development from broadcasted educational television up to the actual use of streaming video and mobile units in eLearning. The paper will discuss the following topics: what can we learn from history? – and what are the new challenges and possibilities in mobile...

  1. 47 CFR 73.1210 - TV/FM dual-language broadcasting in Puerto Rico.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false TV/FM dual-language broadcasting in Puerto Rico...-language broadcasting in Puerto Rico. (a) For the purpose of this section, dual-language broadcasting shall... a different language. (b) Television and Class A television licensees in Puerto Rico may enter into...

  2. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    Science.gov (United States)

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  3. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    Science.gov (United States)

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  4. T-Check in Technologies for Interoperability: Web Services and Security--Single Sign-On

    National Research Council Canada - National Science Library

    Wrage, Lutz; Simanta, Soumya; Lewis, Grace A; Jaspan, Saul

    2007-01-01

    .... This technical note presents the results of applying the T-Check approach in an initial investigation of two Web services standards, WS-Security and SAML, to create an SSO solution that works inside...

  5. Oral health service utilization by elderly beneficiaries of the Mexican Institute of Social Security in México city

    Directory of Open Access Journals (Sweden)

    Solórzano-Santos Fortino

    2007-12-01

    Full Text Available Abstract Background The aging population poses a challenge to Mexican health services. The aim of this study is to describe recent oral health services utilization and its association with socio-demographic characteristics and co-morbidity in Mexican Social Security beneficiaries 60 years and older. Methods A sample of 700 individuals aged 60+ years was randomly chosen from the databases of the Mexican Institute of Social Security (IMSS. These participants resided in the southwest of Mexico City and made up the final sample of a cohort study for identifying risk factors for root caries in elderly patients. Sociodemographic variables, presence of cognitive decline, depression, morbidity, medication consumption, and utilization of as well as reasons for seeking oral health services within the past 12 months were collected through a questionnaire. Clinical oral assessments were carried out to determine coronal and root caries experience. Results The sample consisted of 698 individuals aged 71.6 years on average, of whom 68.3% were women. 374 participants (53.6% had made use of oral health services within the past 12 months. 81% of those who used oral health services sought private medical care, 12.8% sought social security services, and 6.2% public health services. 99.7% had experienced coronal caries and 44.0% root caries. Female sex (OR = 2.0, 6 years' schooling or less (OR = 1.4, and caries experience in more than 22 teeth (OR = 0.6 are factors associated with the utilization of these services. Conclusion About half the elderly beneficiaries of social security have made use of oral health services within the past 12 months, and many of them have to use private services. Being a woman, having little schooling, and low caries experience are factors associated with the use of these services.

  6. The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures

    DEFF Research Database (Denmark)

    Armando, Alessandro; Arsac, Wihem; Avanesov, Tigran

    2012-01-01

    The AVANTSSAR Platform is an integrated toolset for the formal specification and automated validation of trust and security of service-oriented architectures and other applications in the Internet of Services. The platform supports application-level specification languages (such as BPMN and our...

  7. CATV and the Broadcasters.

    Science.gov (United States)

    Flanagan, Bill

    Competition between cable television systems (CATV) and regular broadcast stations concerns pay-TV and distant signal importation. The pay-TV that CATV provides competes with the networks by "siphoning" away sports and feature films, while the distant signals that CATV imports to a local market "fragment" the local audience and…

  8. Collective Security in Europe and Asia

    Science.gov (United States)

    1992-03-02

    Minister Hisashi Owada carried by Kyodo, November 18, 1991, in Foreign Broadcast Information Service, (FBIS), Daily Report-East Asia, November 18, 1991...Report-Soviet Union, December 5, 1991, p. 54. For a Japanese view, see Hiroshi Kimura , "Gorbachev’s Japan Policy: The Northern Territories Issue

  9. The Market Value of Information System (IS) Security: An Event Study of E-Banking Service Providers

    Science.gov (United States)

    Brock, Linda

    2012-01-01

    Understanding the financial value resulting from IS security investments is critically important to organizations focused on protecting service confidentiality, integrity, and availability in order to preserve firm revenues and reputations. Quantifying the financial effect from IS security investments is difficult to derive. This study…

  10. Public Service Broadcasters and User Profiles

    DEFF Research Database (Denmark)

    Sørensen, Jannick Kirk

    2007-01-01

    as ‘recommender services’, and embedded in the overarching concept of ‘Customer Relation Management’ (CRM). On the other hand it is often stressed that it is the duty of PSB to serve the whole society, not only a few ‘star customers’ – as expressed in PSB remits and in so called ‘public service contracts...

  11. 47 CFR 73.4082 - Comparative broadcast hearings-specialized programming formats.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Comparative broadcast hearings-specialized programming formats. 73.4082 Section 73.4082 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED... Comparative broadcast hearings—specialized programming formats. (a) See Memorandum Opinion and Order, FCC 80...

  12. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  13. IPTV Service Framework Based on Secure Authentication and Lightweight Content Encryption for Screen-Migration in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Aymen Abdullah Alsaffar

    2015-01-01

    Full Text Available These days, the advancing of smart devices (e.g. smart phones, tablets, PC, etc. capabilities and the increase of internet bandwidth enables IPTV service provider to extend their services to smart mobile devices. User can just receive their IPTV service using any smart devices by accessing the internet via wireless network from anywhere anytime in the world which is convenience for users. However, wireless network communication has well a known critical security threats and vulnerabilities to user smart devices and IPTV service such as user identity theft, reply attack, MIM attack, and so forth. A secure authentication for user devices and multimedia protection mechanism is necessary to protect both user devices and IPTV services. As result, we proposed framework of IPTV service based on secure authentication mechanism and lightweight content encryption method for screen-migration in Cloud computing. We used cryptographic nonce combined with user ID and password to authenticate user device in any mobile terminal they passes by. In addition we used Lightweight content encryption to protect and reduce the content decode overload at mobile terminals. Our proposed authentication mechanism reduces the computational processing by 30% comparing to other authentication mechanism and our lightweight content encryption reduces encryption delay to 0.259 second.

  14. Unequal Error Protected JPEG 2000 Broadcast Scheme with Progressive Fountain Codes

    OpenAIRE

    Chen, Zhao; Xu, Mai; Yin, Luiguo; Lu, Jianhua

    2012-01-01

    This paper proposes a novel scheme, based on progressive fountain codes, for broadcasting JPEG 2000 multimedia. In such a broadcast scheme, progressive resolution levels of images/video have been unequally protected when transmitted using the proposed progressive fountain codes. With progressive fountain codes applied in the broadcast scheme, the resolutions of images (JPEG 2000) or videos (MJPEG 2000) received by different users can be automatically adaptive to their channel qualities, i.e. ...

  15. An Adaption Broadcast Radius-Based Code Dissemination Scheme for Low Energy Wireless Sensor Networks.

    Science.gov (United States)

    Yu, Shidi; Liu, Xiao; Liu, Anfeng; Xiong, Naixue; Cai, Zhiping; Wang, Tian

    2018-05-10

    Due to the Software Defined Network (SDN) technology, Wireless Sensor Networks (WSNs) are getting wider application prospects for sensor nodes that can get new functions after updating program codes. The issue of disseminating program codes to every node in the network with minimum delay and energy consumption have been formulated and investigated in the literature. The minimum-transmission broadcast (MTB) problem, which aims to reduce broadcast redundancy, has been well studied in WSNs where the broadcast radius is assumed to be fixed in the whole network. In this paper, an Adaption Broadcast Radius-based Code Dissemination (ABRCD) scheme is proposed to reduce delay and improve energy efficiency in duty cycle-based WSNs. In the ABCRD scheme, a larger broadcast radius is set in areas with more energy left, generating more optimized performance than previous schemes. Thus: (1) with a larger broadcast radius, program codes can reach the edge of network from the source in fewer hops, decreasing the number of broadcasts and at the same time, delay. (2) As the ABRCD scheme adopts a larger broadcast radius for some nodes, program codes can be transmitted to more nodes in one broadcast transmission, diminishing the number of broadcasts. (3) The larger radius in the ABRCD scheme causes more energy consumption of some transmitting nodes, but radius enlarging is only conducted in areas with an energy surplus, and energy consumption in the hot-spots can be reduced instead due to some nodes transmitting data directly to sink without forwarding by nodes in the original hot-spot, thus energy consumption can almost reach a balance and network lifetime can be prolonged. The proposed ABRCD scheme first assigns a broadcast radius, which doesn’t affect the network lifetime, to nodes having different distance to the code source, then provides an algorithm to construct a broadcast backbone. In the end, a comprehensive performance analysis and simulation result shows that the proposed

  16. An Adaption Broadcast Radius-Based Code Dissemination Scheme for Low Energy Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shidi Yu

    2018-05-01

    Full Text Available Due to the Software Defined Network (SDN technology, Wireless Sensor Networks (WSNs are getting wider application prospects for sensor nodes that can get new functions after updating program codes. The issue of disseminating program codes to every node in the network with minimum delay and energy consumption have been formulated and investigated in the literature. The minimum-transmission broadcast (MTB problem, which aims to reduce broadcast redundancy, has been well studied in WSNs where the broadcast radius is assumed to be fixed in the whole network. In this paper, an Adaption Broadcast Radius-based Code Dissemination (ABRCD scheme is proposed to reduce delay and improve energy efficiency in duty cycle-based WSNs. In the ABCRD scheme, a larger broadcast radius is set in areas with more energy left, generating more optimized performance than previous schemes. Thus: (1 with a larger broadcast radius, program codes can reach the edge of network from the source in fewer hops, decreasing the number of broadcasts and at the same time, delay. (2 As the ABRCD scheme adopts a larger broadcast radius for some nodes, program codes can be transmitted to more nodes in one broadcast transmission, diminishing the number of broadcasts. (3 The larger radius in the ABRCD scheme causes more energy consumption of some transmitting nodes, but radius enlarging is only conducted in areas with an energy surplus, and energy consumption in the hot-spots can be reduced instead due to some nodes transmitting data directly to sink without forwarding by nodes in the original hot-spot, thus energy consumption can almost reach a balance and network lifetime can be prolonged. The proposed ABRCD scheme first assigns a broadcast radius, which doesn’t affect the network lifetime, to nodes having different distance to the code source, then provides an algorithm to construct a broadcast backbone. In the end, a comprehensive performance analysis and simulation result shows that

  17. Buryat Ethnic Mentality and National Broadcasting

    Directory of Open Access Journals (Sweden)

    Dagbaev E.D.

    2016-01-01

    Full Text Available The article focuses on ways the national (in a regional aspect broadcasting impacts ethnic mind formation and its further development, the latter issues being under a main focus of Buryat State University scholars as well. They set an objective to investigate the issue from different angles, for this reason gathering within scientific projects into scholars’groups took place. In this case the group of educators, philologists and sociologists have focused on media which construct ethnic mind via interiorizing and cultivating ethnic-related ideas and images for five years. Providing a general outlook of the world, National Broadcasting (NB is a proper institutional mechanism that helps a person identify himself / herself among different ethnic groups. Ethnic identity and self-consciousness are manifested in various social and intercultural communications. This allows a person to become aware of the peculiarities of his / her and others’ ethnic communities. The outcomes of a sociological research held by the authors verify the significance of both the posed problems and the TV role. One may find theoretical and empirical data in Zandeeva, S.K. (2012, Dagbaeva, N.Zh.(2012, Dagbaev (2014, Dashinimaeva, P.P., et al (2015. Generally, national programs do contribute to integrating people of the same ethnicity into a common community, to shaping such moral qualities as humanity, love to motherland, respect for the elders and other ethnic nationalities. All these characteristics form proper rules of living in a tolerant community. At the same time, they contribute to strengthening of the feeling of ethnic unity. Beyond any doubt, NB needs a relevant assessment and interest to promote and advance its function in a modern society. On the one hand, telecommunications markets liberalize. On the other hand, broadcasting technologies have developed to a highest extent, leading to the increase of international competition [14]. Anyway, both directions force

  18. Parliamentary control of security information agency in terms of security culture: State and problems

    Directory of Open Access Journals (Sweden)

    Radivojević Nenad

    2013-01-01

    Full Text Available Even though security services have the same function as before, today they have different tasks and significantly more work than before. Modern security problems of the late 20th and early 21st century require states to reorganize their security services, adapting them to the new changes. The reorganization involves, among other things, giving wider powers of the security services, in order to effectively counter the growing and sophisticated security threats, which may also lead to violations of human rights and freedoms. It is therefore necessary to define the right competence, organization, authority and control of these services. In democratic countries, there are several institutions with different levels of control of security services. Parliament is certainly one of the most important institutions in that control, both in the world and in our country. Powers, finance, the use of special measures and the nature and scope of work of the Security Information Agency are certainly object of the control of the National Assembly. What seems to be the problem is achieving a balance between the need for control of security services and security services to have effective methods for combating modern security problems. This paper presents the legal framework related to the National Assembly control of the Security Intelligence Agency, as well as the practical problems associated with this type of control. We analyzed the role of security culture as one of the factors of that control. In this regard, it provides guidance for the practical work of the members of parliament who control the Security Intelligence Agency, noting in particular the importance of and the need for continuous improvement of security culture representatives.

  19. When public service drama travels

    DEFF Research Database (Denmark)

    Jensen, Pia Majbritt; Nielsen, Jakob Isak; Waade, Anne Marit

    2016-01-01

    the last 15 years, our empirical data also show significant new patterns in production culture and international market orientation within DR. Interestingly, however, our study demonstrates the distinctive contribution that precisely DR’s public service remit has made to the quality of its drama......This article provides a detailed analysis of how the Danish public service broadcaster DR employs external funding for its drama productions. This investigation is carried out in order to discuss the schisms involved when a public service broadcaster – whose traditional obligations arguably pertain...... to the national sphere – becomes a player in the international market for television content and, as a consequence, becomes partly reliant on international funding. Our article examines five different forms of external funding (i.e. funding from sources other than DR’s licence fee income): (1) co...

  20. Counter-Based Broadcast Scheme Considering Reachability, Network Density, and Energy Efficiency for Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Ji-Young; Seo, Dong-Yoon; Lee, Jung-Ryun

    2018-01-04

    A wireless sensor network (WSN) is emerging as an innovative method for gathering information that will significantly improve the reliability and efficiency of infrastructure systems. Broadcast is a common method to disseminate information in WSNs. A variety of counter-based broadcast schemes have been proposed to mitigate the broadcast-storm problems, using the count threshold value and a random access delay. However, because of the limited propagation of the broadcast-message, there exists a trade-off in a sense that redundant retransmissions of the broadcast-message become low and energy efficiency of a node is enhanced, but reachability become low. Therefore, it is necessary to study an efficient counter-based broadcast scheme that can dynamically adjust the random access delay and count threshold value to ensure high reachability, low redundant of broadcast-messages, and low energy consumption of nodes. Thus, in this paper, we first measure the additional coverage provided by a node that receives the same broadcast-message from two neighbor nodes, in order to achieve high reachability with low redundant retransmissions of broadcast-messages. Second, we propose a new counter-based broadcast scheme considering the size of the additional coverage area, distance between the node and the broadcasting node, remaining battery of the node, and variations of the node density. Finally, we evaluate performance of the proposed scheme compared with the existing counter-based broadcast schemes. Simulation results show that the proposed scheme outperforms the existing schemes in terms of saved rebroadcasts, reachability, and total energy consumption.

  1. 77 FR 22720 - Service Rules for Advanced Wireless Services in the 2000-2020 MHz and 2180-2200 MHz Bands, etc.

    Science.gov (United States)

    2012-04-17

    ... operations in 1930-1995 MHz and uplink operations in 2000-2020 MHz. To address this apparent tension, we seek... includes broadcast auxiliary service (BAS) and cable television service (CARS) operations, as well as...

  2. 75 FR 76731 - Request for Comment for Report on In-State Broadcast Programming

    Science.gov (United States)

    2010-12-09

    ... Report on In-State Broadcast Programming AGENCY: Federal Communications Commission. ACTION: Notice... to submit a report on in- state broadcast programming to the appropriate Congressional committees no.... REPORT ON IN-STATE BROADCAST PROGRAMMING. Not later than 18 months after the date of the enactment of...

  3. 47 CFR 73.674 - Digital television transition notices by broadcasters.

    Science.gov (United States)

    2010-10-01

    ... broadcasters. 73.674 Section 73.674 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST... of the following per day: (i) Graphic display. A graphic super-imposed during programming content... least five (5) seconds. (ii) Animated graphic. A moving or animated graphic that ends up as a countdown...

  4. Communications and media services

    Science.gov (United States)

    Mcculla, James W.; Kukowski, James F.

    1990-01-01

    NASA's internal and external communication methods are reviewed. NASA information services for the media, for the public, and for employees are discussed. Consideration is given to electron information distribution, the NASA TV-audio system, the NASA broadcast news service, astronaut appearances, technology and information exhibits, speaker services, and NASA news reports for internal communications. Also, the NASA worldwide electronic mail network is described and trends for future NASA communications and media services are outlined.

  5. Public Key Infrastructure (PKI) Interoperability: A Security Services Approach to Support Transfer of Trust

    National Research Council Canada - National Science Library

    Hansen, Anthony

    1999-01-01

    .... This thesis defines interoperability as the capacity to support trust through retention of security services across PKI domains at a defined level of assurance and examines the elements of PKI...

  6. Energy-efficient algorithm for broadcasting in ad hoc wireless sensor networks.

    Science.gov (United States)

    Xiong, Naixue; Huang, Xingbo; Cheng, Hongju; Wan, Zheng

    2013-04-12

    Broadcasting is a common and basic operation used to support various network protocols in wireless networks. To achieve energy-efficient broadcasting is especially important for ad hoc wireless sensor networks because sensors are generally powered by batteries with limited lifetimes. Energy consumption for broadcast operations can be reduced by minimizing the number of relay nodes based on the observation that data transmission processes consume more energy than data reception processes in the sensor nodes, and how to improve the network lifetime is always an interesting issue in sensor network research. The minimum-energy broadcast problem is then equivalent to the problem of finding the minimum Connected Dominating Set (CDS) for a connected graph that is proved NP-complete. In this paper, we introduce an Efficient Minimum CDS algorithm (EMCDS) with help of a proposed ordered sequence list. EMCDS does not concern itself with node energy and broadcast operations might fail if relay nodes are out of energy. Next we have proposed a Minimum Energy-consumption Broadcast Scheme (MEBS) with a modified version of EMCDS, and aimed at providing an efficient scheduling scheme with maximized network lifetime. The simulation results show that the proposed EMCDS algorithm can find smaller CDS compared with related works, and the MEBS can help to increase the network lifetime by efficiently balancing energy among nodes in the networks.

  7. Picture-Quality Optimization for the High Definition TV Broadcast Chain

    NARCIS (Netherlands)

    Dimou, A.; Van der Vleuten, R.J.; De Haan, G.

    2007-01-01

    The High Definition scene is constantly changing. The arrival of Full HD flat panel displays, the constant improvement of the AVC encoder, and the trend towards 1920x1080 progressive broadcasting have changed the balances of the High Definition broadcasting chain. It is, therefore, required to

  8. On the Performance of Counter-Based Broadcast Scheme for Mobile ...

    African Journals Online (AJOL)

    Despite its simplicity, it can result in high redundant retransmission, contention and collision, a phenomenon collectively referred to as the broadcast storm problem. Counter-based broadcast scheme has been proposed to mitigate this inherent problem and it relies on counter threshold value for rebroadcast decision. Thus ...

  9. An interference cancellation strategy for broadcast in hierarchical cell structure

    KAUST Repository

    Yang, Yuli; Aï ssa, Sonia; Eltawil, Ahmed M.; Salama, Khaled N.

    2014-01-01

    In this paper, a hierarchical cell structure is considered, where public safety broadcasting is fulfilled in a femtocell located within a macrocell. In the femtocell, also known as local cell, an access point broadcasts to each local node (LN) over an orthogonal frequency sub-band independently. Since the local cell shares the spectrum licensed to the macrocell, a given LN is interfered by transmissions of the macrocell user (MU) in the same sub-band. To improve the broadcast performance in the local cell, a novel scheme is proposed to mitigate the interference from the MU to the LN while achieving diversity gain. For the sake of performance evaluation, ergodic capacity of the proposed scheme is quantified and a corresponding closed-form expression is obtained. By comparing with the traditional scheme that suffers from the MU's interference, numerical results substantiate the advantage of the proposed scheme and provide a useful tool for the broadcast design in hierarchical cell systems.

  10. Using the interactive distance learning broadcast format for international audiences

    International Nuclear Information System (INIS)

    Callan, C.; Hylko, J.M.

    1997-01-01

    Since 1989, the National Environmental Technology Network (NETN) has been broadcasting interactive presentations on topics of national and international concern. Each interactive presentation covers such topics as decommissioning, environmental risk management, radioactive waste management, waste minimization, and total quality management. Course materials are provided to the attendees which feature case studies, legal and regulatory issues, and the application of existing and new technologies. The interactive presentations are broadcast by satellite and videotaped, allowing employees to participate who do not have convenient access to traditional classroom training resources. Over 8,000 professionals and students in the United States and several foreign countries have participated in the distance learning broadcast format, thus providing a proven and cost-effective method for managing educational and facility resources effectively. A case study is presented depicting why training, if neglected, can result in costly errors, and how the distance learning broadcast format can be expanded to assist regulatory officials, and even the local populace, in making cost-effective decisions. (author)

  11. An interference cancellation strategy for broadcast in hierarchical cell structure

    KAUST Repository

    Yang, Yuli

    2014-12-01

    In this paper, a hierarchical cell structure is considered, where public safety broadcasting is fulfilled in a femtocell located within a macrocell. In the femtocell, also known as local cell, an access point broadcasts to each local node (LN) over an orthogonal frequency sub-band independently. Since the local cell shares the spectrum licensed to the macrocell, a given LN is interfered by transmissions of the macrocell user (MU) in the same sub-band. To improve the broadcast performance in the local cell, a novel scheme is proposed to mitigate the interference from the MU to the LN while achieving diversity gain. For the sake of performance evaluation, ergodic capacity of the proposed scheme is quantified and a corresponding closed-form expression is obtained. By comparing with the traditional scheme that suffers from the MU\\'s interference, numerical results substantiate the advantage of the proposed scheme and provide a useful tool for the broadcast design in hierarchical cell systems.

  12. Direct broadcast satellite-radio market, legal, regulatory, and business considerations

    Science.gov (United States)

    Sood, Des R.

    1991-01-01

    A Direct Broadcast Satellite-Radio (DBS-R) System offers the prospect of delivering high quality audio broadcasts to large audiences at costs lower than or comparable to those incurred using the current means of broadcasting. The maturation of mobile communications technologies, and advances in microelectronics and digital signal processing now make it possible to bring this technology to the marketplace. Heightened consumer interest in improved audio quality coupled with the technological and economic feasibility of meeting this demand via DBS-R make it opportune to start planning for implementation of DBS-R Systems. NASA-Lewis and the Voice of America as part of their on-going efforts to improve the quality of international audio broadcasts, have undertaken a number of tasks to more clearly define the technical, marketing, organizational, legal, and regulatory issues underlying implementation of DBS-R Systems. The results and an assessment is presented of the business considerations underlying the construction, launch, and operation of DBS-R Systems.

  13. Direct broadcast satellite-radio market, legal, regulatory, and business considerations

    Science.gov (United States)

    Sood, Des R.

    1991-03-01

    A Direct Broadcast Satellite-Radio (DBS-R) System offers the prospect of delivering high quality audio broadcasts to large audiences at costs lower than or comparable to those incurred using the current means of broadcasting. The maturation of mobile communications technologies, and advances in microelectronics and digital signal processing now make it possible to bring this technology to the marketplace. Heightened consumer interest in improved audio quality coupled with the technological and economic feasibility of meeting this demand via DBS-R make it opportune to start planning for implementation of DBS-R Systems. NASA-Lewis and the Voice of America as part of their on-going efforts to improve the quality of international audio broadcasts, have undertaken a number of tasks to more clearly define the technical, marketing, organizational, legal, and regulatory issues underlying implementation of DBS-R Systems. The results and an assessment is presented of the business considerations underlying the construction, launch, and operation of DBS-R Systems.

  14. Watershed Education for Broadcast Meteorologists

    Science.gov (United States)

    Lamos, J. P.; Sliter, D.; Espinoza, S.; Spangler, T. C.

    2006-12-01

    The National Environmental Education and Training Organization (NEETF) published a report in 2005 that summarized the findings of ten years of NEETF and Roper Research. The report stated, "Our years of data from Roper surveys show a persistent pattern of environmental ignorance even among the most educated and influential members of society." Market research has also shown that 80% of television viewers list the weather as the primary reason for watching the local news. Broadcast meteorologists, with a broader understanding of environmental and related sciences have an opportunity to use their weathercasts to inform the public about the environment and the factors that influence environmental health. As "station scientists," broadcast meteorologists can use the weather, and people's connection to it, to broaden their understanding of the environment they live in. Weather and watershed conditions associated with flooding and drought have major human and environmental impacts. Increasing the awareness of the general public about basic aspects of the hydrologic landscape can be an important part of mitigating the adverse effects of too much or too little precipitation, and of protecting the environment as well. The concept of a watershed as a person's natural neighborhood is a very important one for understanding hydrologic and environmental issues. Everyone lives in a watershed, and the health of a watershed is the result of the interplay between weather and human activity. This paper describes an online course to give broadcast meteorologists a basic understanding of watersheds and how watersheds are impacted by weather. It discusses how to convey watershed science to a media- savvy audience as well as how to model the communication of watershed and hydrologic concepts to the public. The course uses a narrative, story-like style to present its content. It is organized into six short units of instruction, each approximately 20 minutes in duration. Each unit is

  15. ENTREPRENEURSHIP ECONOMIC SAFETY AND DEVELOPMENT OF SECURITY SERVICES

    Directory of Open Access Journals (Sweden)

    G. V. Goudkov

    2011-01-01

    Full Text Available Successful functioning of the industry that provides for safety of organizations and physical entities exercises strategic impacts on development of society and economics of any state including Russia. Economic safety of Russia is directly linked with economic and information safety of itsbusiness structures. Extension of the scope and use of services offered by experienced state and private security enterprises including licensed individuals is one of most important directions of business safety perfection. Further improvement of Russian legislation on non-governmentalsecurity structures and coordination of their activities with those of state law enforcement bodies is obligatory condition of attaining higherpublic and economic safety levels.

  16. On the coexistence of primary and secondary users in spectrum-sharing broadcast channels

    KAUST Repository

    Yang, Yuli

    2013-06-01

    In this paper, we consider a broadcast channel in spectrum-sharing networks, where the base station schedules licensed primary users (PUs) and cognitive secondary users (SUs) simultaneously. Based on such a framework, we present a transmission strategy in the light of dirty paper coding. In order to promise the PUs\\' quality of service (QoS) in the broadcasting, the base station chooses codewords for the users by taking into account that the codewords pertaining to SUs can be pre-subtracted from those pertaining to PUs as if there were no interference from the secondary\\'s data to the primary\\'s data. For the purpose of performance evaluation, by taking capacity behavior and bit error rate (BER) as metrics, we study the achievable data rate regions for both types of users with the introduced design, and analyze the BER performance in corresponding systems implemented with hierarchical modulation. Numerical results substantiate that with flexible management of the spectrum resources, our proposed scheme provides more communication opportunities for SUs while maintaining PUs\\' QoS at an acceptable level. © 2013 IEEE.

  17. Internet of people, things and services - the convergence of security, trust and privacy

    CSIR Research Space (South Africa)

    Eloff, JHP

    2009-12-01

    Full Text Available The Future Internet will consist of billions of people, things and services having the potential to interact with each other and their environment. This highly interconnected global network structure presents new types of challenges from a security...

  18. Overview of the Anik C satellites and services

    Science.gov (United States)

    Smart, F. H.

    An overview of the important technical characteristics of the Anik C series of Canadian communications satellites is presented. The system was launched as part of the Telesat Communications payload of the Space Shuttle in 1982. Among the services the system will in the near future provide are: a 27 MHz channel bandwidth television service for pay-TV distribution in Canada; two TV channels for hockey broadcasts and a transportable TV system; a heavy-voice route telephone service for five major Canadian cities; and a telephone system for business voice and data communications. Services anticipated for Anik-C satellites later in the decade include a Single Channel Per Carrier (SCPC) voice and data communications system for British Columbia and the Maritime Provinces, and a direct-to-home broadcast service to be sold to television markets in the United States.

  19. 22 CFR 510.1 - Service of process.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Service of process. 510.1 Section 510.1 Foreign Relations BROADCASTING BOARD OF GOVERNORS SERVICE OF PROCESS § 510.1 Service of process. (a) The General... accepting service of process for an employee in his/her official capacity, the General Counsel or his/her...

  20. 75 FR 27200 - Amateur Service Rules

    Science.gov (United States)

    2010-05-14

    ... from, stations authorized by other nations in the fixed, mobile except aeronautical mobile, and... service; and (2) Other nations in the mobile except aeronautical mobile service. (i) Amateur stations... from, international broadcast stations whose programming is intended for use within Region 1 or Region...

  1. Broadcast Abstraction in a Stochastic Calculus for Mobile Networks

    DEFF Research Database (Denmark)

    Song, Lei; Godskesen, Jens Christian

    2012-01-01

    topology constraint. We allow continuous time stochastic behavior of processes running at network nodes, e.g. in order to be able to model randomized protocols. The introduction of group broadcast and an operator to help avoid flooding allows us to define a novel notion of broadcast abstraction. Finally......, we define a weak bisimulation congruence and apply our theory on an example of a leader election protocol....

  2. 47 CFR 76.1604 - Charges for customer service changes.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Charges for customer service changes. 76.1604 Section 76.1604 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Notices § 76.1604 Charges for customer service changes. If a...

  3. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  4. Privacy and security in teleradiology

    International Nuclear Information System (INIS)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  5. Privacy and security in teleradiology

    Energy Technology Data Exchange (ETDEWEB)

    Ruotsalainen, Pekka [National Institute for Health and Welfare, Helsinki (Finland)], E-mail: pekka.ruotsalainen@THL.fi

    2010-01-15

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  6. Public Key Infrastructure (PKI) Interoperability: A Security Services Approach to Support Transfer of Trust

    National Research Council Canada - National Science Library

    Hansen, Anthony

    1999-01-01

    Public key infrastructure (PKI) technology is at a primitive stage characterized by deployment of PKIs that are engineered to support the provision of security services within individual enterprises, and are not able to support...

  7. All-optical broadcast and multicast technologies based on PPLN waveguide

    DEFF Research Database (Denmark)

    Ye, Lingyun; Wang, Ju; Hu, Hao

    2013-01-01

    All-optical 1×4 broadcast and 1×3 multicast experiments of a 40-Gb/s return-to-zero on-off keying (RZ-OOK) signal based on a periodically poled lithium niobate (PPLN) waveguide are demonstrated in this letter. Clear opened eye diagrams and error-free performance are achieved for the broadcast...

  8. A Framework for Security Analysis of Mobile Wireless Networks

    DEFF Research Database (Denmark)

    Nanz, Sebastian; Hankin, Chris

    2006-01-01

    processes and the network's connectivity graph, which may change independently from protocol actions. We identify a property characterising an important aspect of security in this setting and express it using behavioural equivalences of the calculus. We complement this approach with a control flow analysis......We present a framework for specification and security analysis of communication protocols for mobile wireless networks. This setting introduces new challenges which are not being addressed by classical protocol analysis techniques. The main complication stems from the fact that the actions...... of intermediate nodes and their connectivity can no longer be abstracted into a single unstructured adversarial environment as they form an inherent part of the system's security. In order to model this scenario faithfully, we present a broadcast calculus which makes a clear distinction between the protocol...

  9. A Secure Framework for Location Verification in Pervasive Computing

    Science.gov (United States)

    Liu, Dawei; Lee, Moon-Chuen; Wu, Dan

    The way people use computing devices has been changed in some way by the relatively new pervasive computing paradigm. For example, a person can use a mobile device to obtain its location information at anytime and anywhere. There are several security issues concerning whether this information is reliable in a pervasive environment. For example, a malicious user may disable the localization system by broadcasting a forged location, and it may impersonate other users by eavesdropping their locations. In this paper, we address the verification of location information in a secure manner. We first present the design challenges for location verification, and then propose a two-layer framework VerPer for secure location verification in a pervasive computing environment. Real world GPS-based wireless sensor network experiments confirm the effectiveness of the proposed framework.

  10. 75 FR 8070 - Closed Auction of Broadcast Construction Permits Scheduled for July 20, 2010; Auction 88...

    Science.gov (United States)

    2010-02-23

    ... to support their claims with valuation analyses and suggested amounts or formulas for reserve prices... seek comment on factors that could reasonably have an impact on valuation of the broadcast spectrum..., Inc. Arkansas Valley Broadcasting, LLC BBK Broadcasting Big Sky Company Birach Broadcasting...

  11. Analyzing Comprehensive QoS with Security Constraints for Services Composition Applications in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Naixue Xiong

    2014-12-01

    Full Text Available Services composition is fundamental to software development in multi-service wireless sensor networks (WSNs. The quality of service (QoS of services composition applications (SCAs are confronted with severe challenges due to the open, dynamic, and complex natures of WSNs. Most previous research separated various QoS indices into different fields and studied them individually due to the computational complexity. This approach ignores the mutual influence between these QoS indices, and leads to a non-comprehensive and inaccurate analysis result. The universal generating function (UGF shows the speediness and precision in QoS analysis. However, only one QoS index at a time can be analyzed by the classic UGF. In order to efficiently analyze the comprehensive QoS of SCAs, this paper proposes an improved UGF technique—vector universal generating function (VUGF—which considers the relationship between multiple QoS indices, including security, and can simultaneously analyze multiple QoS indices. The numerical examples demonstrate that it can be used for the evaluation of the comprehensive QoS of SCAs subjected to the security constraint in WSNs. Therefore, it can be effectively applied to the optimal design of multi-service WSNs.

  12. Analyzing comprehensive QoS with security constraints for services composition applications in wireless sensor networks.

    Science.gov (United States)

    Xiong, Naixue; Wu, Zhao; Huang, Yannong; Xu, Degang

    2014-12-01

    Services composition is fundamental to software development in multi-service wireless sensor networks (WSNs). The quality of service (QoS) of services composition applications (SCAs) are confronted with severe challenges due to the open, dynamic, and complex natures of WSNs. Most previous research separated various QoS indices into different fields and studied them individually due to the computational complexity. This approach ignores the mutual influence between these QoS indices, and leads to a non-comprehensive and inaccurate analysis result. The universal generating function (UGF) shows the speediness and precision in QoS analysis. However, only one QoS index at a time can be analyzed by the classic UGF. In order to efficiently analyze the comprehensive QoS of SCAs, this paper proposes an improved UGF technique-vector universal generating function (VUGF)-which considers the relationship between multiple QoS indices, including security, and can simultaneously analyze multiple QoS indices. The numerical examples demonstrate that it can be used for the evaluation of the comprehensive QoS of SCAs subjected to the security constraint in WSNs. Therefore, it can be effectively applied to the optimal design of multi-service WSNs.

  13. Broadcast sound technology

    CERN Document Server

    Talbot-Smith, Michael

    1990-01-01

    Broadcast Sound Technology provides an explanation of the underlying principles of modern audio technology. Organized into 21 chapters, the book first describes the basic sound; behavior of sound waves; aspects of hearing, harming, and charming the ear; room acoustics; reverberation; microphones; phantom power; loudspeakers; basic stereo; and monitoring of audio signal. Subsequent chapters explore the processing of audio signal, sockets, sound desks, and digital audio. Analogue and digital tape recording and reproduction, as well as noise reduction, are also explained.

  14. Comparison of effectiveness of advertising expenses during broadcasts of main hockey events

    OpenAIRE

    Kozlová, Natálie

    2017-01-01

    Title: Comparison of effectiveness of advertising expenses during broadcasts of main hockey events Objectives: The main goal of this dissertation is to compare the amount of money invested into the commercial advertisement during sport broadcasts at the ČT sport channel with viewer ratings. The used metric is a coefficient computed as a ratio between the viewer rating of the particular broadcast and the corresponding advertisement cost, normalized using Cost per Thousand method. Another goal ...

  15. CLOUD SECURITY AND COMPLIANCE - A SEMANTIC APPROACH IN END TO END SECURITY

    OpenAIRE

    Kalaiprasath, R.; Elankavi, R.; Udayakumar, R.

    2017-01-01

    The Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users' data remains confidential and secure. Though there are some ongoing efforts on developing cloud security standards, most cloud providers are implementing a mish-mash of security and privacy controls. This has led to confusion among cloud consumers as to what security measures they should expect from the cloud services, and whether thes...

  16. Live broadcast from the Globe

    CERN Multimedia

    La tête au carréTuesday, 17 June 2008 between 2.00 and 3.00 p.m.“La tête au carré”, a France Inter radio programme devoted to science, will set up its sound booth at CERN for a special broadcast on the LHC.The journalist Mathieu Vidard will interview the following guests: - Pierre Van Hove, an experimental physicist working on CMS. He is a CNRS research scientist from the Institut Hubert Curien in Strasbourg, France.- Abdelhak Djouadi is a theoretical physicist. He is a research director at the CNRS’s Laboratoire de physique théorique at Orsay, France and holder of the CNRS silver medal.- Magali Gruwe, one of the engineers in charge of LHC operations at CERN.» To take part in this live broadcast, which is open to the public, come to the Globe at 1:30 p.m. The number of places is limited.» No specialist knowledge required.» See the programme's homepage

  17. Transmission Quality Measurements in DAB+ Broadcast System

    Directory of Open Access Journals (Sweden)

    Gilski Przemysław

    2017-12-01

    Full Text Available In the age of digital media, delivering broadcast content to customers at an acceptable level of quality is one of the most challenging tasks. The most important factor is the efficient use of available resources, including bandwidth. An appropriate way of managing the digital multiplex is essential for both the economic and technical issues. In this paper we describe transmission quality measurements in the DAB+ broadcast system. We provide a methodology for analysing parameters and factors related with the efficiency and reliability of a digital radio link. We describe a laboratory stand that can be used for transmission quality assessment on a regional and national level.

  18. The Use of Computer Simulation Gaming in Teaching Broadcast Economics.

    Science.gov (United States)

    Mancuso, Louis C.

    The purpose of this study was to develop a broadcast economic computer simulation and to ascertain how a lecture-computer simulation game compared as a teaching method with a more traditional lecture and case study instructional methods. In each of three sections of a broadcast economics course, a different teaching methodology was employed: (1)…

  19. ORDER SECURITY – NATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  20. Time coded distribution via broadcasting stations

    Science.gov (United States)

    Leschiutta, S.; Pettiti, V.; Detoma, E.

    1979-01-01

    The distribution of standard time signals via AM and FM broadcasting stations presents the distinct advantages to offer a wide area coverage and to allow the use of inexpensive receivers, but the signals are radiated a limited number of times per day, are not usually available during the night, and no full and automatic synchronization of a remote clock is possible. As an attempt to overcome some of these problems, a time coded signal with a complete date information is diffused by the IEN via the national broadcasting networks in Italy. These signals are radiated by some 120 AM and about 3000 FM and TV transmitters around the country. In such a way, a time ordered system with an accuracy of a couple of milliseconds is easily achieved.

  1. Direct broadcast of a sporting event as televisual cultural form

    Directory of Open Access Journals (Sweden)

    Jože Vogrinc

    2012-07-01

    Full Text Available Direct TV broadcasting of sport events is undoubtedly the focal point of interest of sport fans in sports media as well as of sponsors and investors responsible for the global mediatisation of popular sports. In this article, the centrality of direct TV broadcasts in the televisual coverage of sports, as well as in the presence of sports in new media in general is explained in the context of the impact of the mediatisation of sports upon cultural forms of TV coverage of sports. The complexity of these forms and its main features (the role of the commentator, the rules of editing, dramatisation and narrativisation in direct broadcasts are analysed.

  2. Privacy and security in teleradiology.

    Science.gov (United States)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  3. The Accuracy and Correction of Fuel Consumption from Controller Area Network Broadcast

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Lijuan [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Gonder, Jeffrey D [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Wood, Eric W [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Ragatz, Adam C [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2017-10-13

    Fuel consumption (FC) has always been an important factor in vehicle cost. With the advent of electronically controlled engines, the controller area network (CAN) broadcasts information about engine and vehicle performance, including fuel use. However, the accuracy of the FC estimates is uncertain. In this study, the researchers first compared CAN-broadcasted FC against physically measured fuel use for three different types of trucks, which revealed the inaccuracies of CAN-broadcast fueling estimates. To match precise gravimetric fuel-scale measurements, polynomial models were developed to correct the CAN-broadcasted FC. Lastly, the robustness testing of the correction models was performed. The training cycles in this section included a variety of drive characteristics, such as high speed, acceleration, idling, and deceleration. The mean relative differences were reduced noticeably.

  4. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  5. The broadcast of shared attention and its impact on political persuasion.

    Science.gov (United States)

    Shteynberg, Garriy; Bramlett, James M; Fles, Elizabeth H; Cameron, Jaclyn

    2016-11-01

    In democracies where multitudes yield political influence, so does broadcast media that reaches those multitudes. However, broadcast media may not be powerful simply because it reaches a certain audience, but because each of the recipients is aware of that fact. That is, watching broadcast media can evoke a state of shared attention, or the perception of simultaneous coattention with others. Whereas past research has investigated the effects of shared attention with a few socially close others (i.e., friends, acquaintances, minimal ingroup members), we examine the impact of shared attention with a multitude of unfamiliar others in the context of televised broadcasting. In this paper, we explore whether shared attention increases the psychological impact of televised political speeches, and whether fewer numbers of coattending others diminishes this effect. Five studies investigate whether the perception of simultaneous coattention, or shared attention, on a mass broadcasted political speech leads to more extreme judgments. The results indicate that the perception of synchronous coattention (as compared with coattending asynchronously and attending alone) renders persuasive speeches more persuasive, and unpersuasive speeches more unpersuasive. We also find that recall memory for the content of the speech mediates the effect of shared attention on political persuasion. The results are consistent with the notion that shared attention on mass broadcasted information results in deeper processing of the content, rendering judgments more extreme. In all, our findings imply that shared attention is a cognitive capacity that supports large-scale social coordination, where multitudes of people can cognitively prioritize simultaneously coattended information. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  6. An Efficient Periodic Broadcasting with Small Latency and Buffer Demand for Near Video on Demand

    Directory of Open Access Journals (Sweden)

    Ying-Nan Chen

    2012-01-01

    Full Text Available Broadcasting Protocols can efficiently transmit videos that simultaneously shared by clients with partitioning the videos into segments. Many studies focus on decreasing clients' waiting time, such as the fixed-delay pagoda broadcasting (FDPB and the harmonic broadcasting schemes. However, limited-capability client devices such as PDAs and set-top boxes (STBs suffer from storing a significant fraction of each video while it is being watched. How to reduce clients' buffer demands is thus an important issue. Related works include the staircase broadcasting (SB, the reverse fast broadcasting (RFB, and the hybrid broadcasting (HyB schemes. This work improves FDPB to save client buffering space as well as waiting time. In comparison with SB, RFB, and HyB, the improved FDPB scheme can yield the smallest waiting time under the same buffer requirements.

  7. 47 CFR 73.6016 - Digital Class A TV station protection of TV broadcast stations.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital Class A TV station protection of TV... Class A TV station protection of TV broadcast stations. Digital Class A TV stations must protect authorized TV broadcast stations, applications for minor changes in authorized TV broadcast stations filed on...

  8. Broadcast and Aggregation in BBC

    DEFF Research Database (Denmark)

    Hüttel, Hans; Kiilerich Pratas, Nuno

    2015-01-01

    In this paper we introduce a process calculus BBC that has both forms of communication. For both many-to-one and one-to-many communication, it is often a natural assumption that communication is bounded; this reflects two distinct aspects of the limitations of a medium. In the case of broadcast, ...

  9. Impacts of Vehicle (In)Security

    Energy Technology Data Exchange (ETDEWEB)

    Chugg, J.; Rohde, K.

    2015-05-01

    Nuclear and radioactive material is routinely transported worldwide every day. Since 2010, the complexity of the transport vehicle to support such activities has grown exponentially. Many core functions of a vehicle are now handled by small embedded computer modules with more being added each year to enhance the owner’s experience and convenience. With a system as complex as today’s automobile, the potential for cyber security issues is certain. Hackers have begun exploring this new domain with public information increasingly disseminated. Because vehicles are allowed into and around secure nuclear facilities, the potential for using a vehicle as a new cyber entry point or vector into the facility is now plausible and must be mitigated. In addition, compromising such a vehicle could aide in illicit removal of nuclear material, putting sensitive cargo at risk. Because cyber attacks can now be introduced using vehicles, cyber security, needs to be integrated into an organization’s design basis threat document. Essentially, a vehicle now extends the perimeter for which security professionals are responsible.Electronic Control Units (ECU) responsible for handling all core and ancillary vehicle functions are interconnected using the controller area network (CAN) bus. A typical CAN network in a modern automobile contains 50 or more ECUs. The CAN protocol now supports a wide variety of areas, including automotive, road transportation, rail transportation, industrial automation, power generation, maritime, military vehicles, aviation, and medical devices. In many ways, the nuclear industry is employing the CAN bus protocol or other similar broadcast serial networks. This paper will provide an overview of the current state of automobile and CAN Bus security, as well as an overview of what has been publicly disclosed by many research organizations. It will then present several hypotheses of how vehicle security issues may impact nuclear activities. An initial

  10. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  11. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  12. An Analysis of Televised Public Service Advertising. Drug Abuse Information Research Project.

    Science.gov (United States)

    Hanneman, Gerhard J.; And Others

    Government regulations state that broadcasters are obligated to allot program time to matters of public interest, but neither law nor precedent have determined their commitment to present messages on social problems. To determine the amount of public service advertising (PSA) that is broadcast, particularly anti-drug appeals, a content analysis…

  13. Productivity and its Decomposition in the Japanese Broadcasting Market

    OpenAIRE

    Asai, Sumiko

    2005-01-01

    The purpose of this paper is to calculate the total factor productivity (TFP) as well as scale economies of Japanese terrestrial broadcasters and examine the industry’s characteristics through the decomposition of TFP growth. In order to calculate TFP growth rate, a variable cost function is estimated using data on twenty-five broadcasters for the period 1997–2002, and the TFP growth rate is decomposed into three sources: output effect, capital adjustment and technical change. Calculation rev...

  14. Health Education by Open Broadcast.

    Science.gov (United States)

    ICIT Report, 1976

    1976-01-01

    This issue focuses on uses and techniques of radio for educational purposes in developing nations. Two health education projects are described which are utilizing open broadcasting to attract a mass audience of listeners not committed to a structured radio education program. Kenya's Swahili language radio serial, "Giving Birth and Caring for your…

  15. Service Oriented Architecture in Network Security - a novel Organisation in Security Systems

    OpenAIRE

    Hilker, Michael; Schommer, Christoph

    2008-01-01

    Current network security systems are a collection of various security components, which are directly installed in the operating system. These check the whole node for suspicious behaviour. Armouring intrusions e.g. have the ability to hide themselves from being checked. We present in this paper an alternative organisation of security systems. The node is completely virtualized with current virtualization systems so that the operating system with applications and the security system is disting...

  16. Hard Content, Fab Front-End : Archiving Websites of Dutch Public Broadcasters

    NARCIS (Netherlands)

    Baltussen, L; Blom, J; Medjoune, L; Pop, R; van Gorp, Jasmijn; Huurdeman, H; Haaijer, L

    2014-01-01

    Although there are a great variety of web archiving projects around the world, there are not many that focus explicitly on websites of broadcasters. The reason is that funds are often lacking to do this, and that broadcaster websites are difficult to archive, due to their dynamic and audiovisual

  17. Specifying Information Security Needs for the Delivery of High Quality Security Services

    NARCIS (Netherlands)

    Su, X.; Bolzoni, D.; van Eck, Pascal

    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. We propose to explicitly link security requirements with the organizations' business vision, i.e. to provide business rationale for security requirements. The rationale is then

  18. Process Control/SCADA system vendor security awareness and security posture.

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Lüders, S.

    2009-01-01

    A starting point for the adequate security of process control/SCADA systems is the security awareness and security posture by the manufacturers, vendors, system integrators, and service organisations. The results of a short set of questions indicate that major security improvements are required in

  19. Analyzing e-service quality in service-based website by E-SERVQUAL

    Directory of Open Access Journals (Sweden)

    Babak Nemati

    2012-04-01

    Full Text Available Over the past two decades, two-way communication via web-based exchanges has been a popular method for different activities such as electronic transaction, publication, broadcasting, and other service applications. However, it is always necessary to measure the performance quality of web services using different technique such as e-SERVQUAL model. The proposed study of this paper uses this technique for measuring the quality of Iranian university e-services. The proposed study distributes a standard questionnaire among students who use this service through internet. The results indicate that only efficiency and online service quality in the e-service system are desirable. Managerial implications are represented.

  20. Legal and regulatory aspects of optimization comprehensive support service and combat activity of the Security service of Ukraine and the National guard of Ukraine emergency social situation

    Directory of Open Access Journals (Sweden)

    В. В. Мацюк

    2015-05-01

    Full Text Available Problem setting. The status of comprehensive support of military units in the world’s leading powers is considered to be one of the key factors which defines the success of the social emergency settling operations. The experience of service and military application of the National Guard of Ukraine in the anti-terrorist operation zone on the South-East of Ukraine shows that emergency response tasks are generally carried out in cooperation with other Ukrainian security sector authorities, mostly with the Security Service of Ukraine. However, the forces joint managing authority chiefs usually do not cover the matter of such activities’ comprehensive support, which forces the commanders of the military units to rely on themselves in this question. Recent research and publications analysis. The analysis of research of status and development prospects of the comprehensive support of the Armed Forces of Ukraine, other security authorities, armies of the world’s leading powers, peculiarities of creation and functioning of such systems, application of their means and powers, scientific thought on the problems of service and military application of the National Guard units has shown the problematic tasks of the joint unit comprehensive support system optimization. Therefore, the question of regulatory and legal support of this process is of current importance. Paper objective. The objective of this paper is to define regulatory and legal aspects of comprehensive support optimization of the Security Service of Ukraine and the National Guard of Ukraine service and combat activities during social emergencies. Paper main body. According to the current legislation, comprehensive support comprises of the following types of support: operative (also called military, moral and psychological, materiel (logistical. All other types of support are parts of these three basic ones. Their examination is necessary due to the fact, that there is confusion in the