WorldWideScience

Sample records for building internet accessible

  1. Building a Generation Knowledge Source using Internet-Accessible Newswire

    CERN Document Server

    Radev, D R; Radev, Dragomir R.; Keown, Kathleen R. Mc

    1997-01-01

    In this paper, we describe a method for automatic creation of a knowledge source for text generation using information extraction over the Internet. We present a prototype system called PROFILE which uses a client-server architecture to extract noun-phrase descriptions of entities such as people, places, and organizations. The system serves two purposes: as an information extraction tool, it allows users to search for textual descriptions of entities; as a utility to generate functional descriptions (FD), it is used in a functional-unification based generation system. We present an evaluation of the approach and its applications to natural language generation and summarization.

  2. Internet access to ionosondes

    Science.gov (United States)

    Galkin, I. A.; Kitrosser, D. F.; Kecic, Z.; Reinisch, B. W.

    1999-01-01

    Connecting ionosondes to the Internet gives easy access to real-time information on ionospheric conditions. Some of the ionosonde sites provide just the ionogram displays, others give in addition the scaled ionospheric characteristics directly usable for frequency management and HF channel assessment. Some sounders also store days or months of station data, which makes it possible remotely to evaluate the time history of geophysical events. The Internet link is also a convenient means for remote system maintenance and control. The paper addresses various aspects of the Internet ionosonde scenario, including data base support, WWW publishing, user interface, security, and data format. A list of Internet accessible ionosonde stations is provided with a brief description.

  3. Hybrid internet access

    Science.gov (United States)

    Arora, Vivek; Baras, John S.; Dillon, Douglas; Falk, Aaron; Suphasindhu, Narin

    1995-01-01

    Access to the Internet is either too slow (dial-up SLIP) or too expensive (switched 56 kbps, frame relay) for the home user or small enterprise. The Center for Satellite and Hybrid Communication Networks and Hughes Network Systems have collaborated using systems integration principles to develop a prototype of a low-cost hybrid (dial-up and satellite) newtork terminal which can deliver data from the Internet to the user at rates up to 160 kbps. An asymmetric TCP/IP connection is used breaking the network link into two physical channels: a terrestrial dial-up for carrying data from the terminal into the Internet and a receive-only satellite link carrying IP packets from the Internet to the user. With a goal of supporting bandwidth hungry Internet applications such as Mosaic, Gopher, and FTP, this system has been designed to support any Intel 80386/486 PC, any commercial TCP/IP package, any unmodified host on the Internet, and any of the routers, etc., within the Internet. The design exploits the following three observations: 1) satellites are able to offer high bandwidth connections to a large geographical area, 2) a receive-only VSAT is cheap to manufacture and easier to install than one which can also transmit, and 3) most computer users, especially those in a home environment, will want to consume much more information than they generate. IP encapsulation, or tunneling, issued to manipulate the TCP/IP protocols to route packets asymmetrically.

  4. Determinants of Internet access in Colombia

    OpenAIRE

    Botello Peñaloza, Héctor Alberto

    2016-01-01

    Objective: to identify the determinants of Internet access in Colombian homes during 2013.Methodology: Socioeconomic characteristics were incorporated within a discrete choice model in order to estimate the probability of Internet access in Colombian households. It was based on microdata from the quality of life survey conducted by DANE (The National Administrative Department of Statistics).Results: a marked increase in the use of Internet in Colombia was found: in 2007, 17% of Colombians had...

  5. Browsing for the Best Internet Access Provider?

    Science.gov (United States)

    Weil, Marty

    1996-01-01

    Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…

  6. The Internet accessible mathematical computation framework

    Institute of Scientific and Technical Information of China (English)

    Paul S. Wang; Simon Gray; Norbert Kajler; Dongdai Lin; Weidong Liao; Xiao Zou

    2004-01-01

    The Internet Accessible Mathematical Computation (IAMC) framework aims to make it easy to supply mathematical computing powers over the Internet/Web. The protocol-based IAMC framework enables developers to create interoperable clients and servers easily and independently. Presented are conceptual and experimental work on the IAMC framework architecture and major components: the Mathematical Computation Protocol (MCP), a client prototype (Dragonfly), a server prototype (Starfish), a mathematical encoding converter (XMEC), and an open mathematical compute engine interface (OMEI).

  7. Internet Access from CERN GSM subscriptions

    CERN Multimedia

    IT Department

    2008-01-01

    The data service on GSM subscriptions has been improved, allowing CERN users to access the Internet directly. A CERN GSM subscription with data option now allows you to connect to the Internet from a mobile phone or a PC equipped with a GSM modem. The previous access (CERN intranet) still exists. To get access to the new service, you will find all the information on configurations at: http://cern.ch/gprs The use of this service on the Sunrise network is charged on a flat-rate basis (no extra charge related to the volume of downloaded data). Depending on your CERN subscription type (standard or master), you can also connect to foreign GSM data networks (roaming), but this is strongly discouraged, except where absolutely necessary, due to international roaming charges. Telecom Section, IT/CS

  8. Internet access for everybody: The satellite solution

    Science.gov (United States)

    Wittig, Manfred

    2009-01-01

    The use of the Internet has been grown tremendously within the last decade to more than one billion subscribers. The other five billion people on Earth cannot enjoy the possibilities offered by the Internet. The digital divide is everywhere: in the developing as well as in the developed part of the world. In the developing countries basic communication needs (voice, IP access) need to be provided to a large population not living in cities. In the developed part of the world people residing outside the large cities, on the nice country side, have still difficulties to get broadband access. The reason being, that the investment to install the network infrastructure to this minority part of the population is a major part of the total investment for the network. The benefit for the telecom operators is marginal to get these customers on board. In this paper an analysis of the Internet and satellite development is being presented and based on these historical data a prediction of a possible evolution of satellite communications and broadband access is performed. One result is that the capacity of the GEO ring at the Ka-band alone would allow to provide to each individual on Earth in 2050 (assumed to be 10 billion people) a monthly capacity of about 1 Gbyte for a charge of 1$ per month.

  9. 78 FR 30226 - Accessibility Requirements for Internet Browsers

    Science.gov (United States)

    2013-05-22

    ...] Accessibility Requirements for Internet Browsers AGENCY: Federal Communications Commission. ACTION: Final rule... and Video Accessibility Act of 2010 (CVAA). Section 718 of the Act requires Internet browsers built..., the Commission also affirms that section 716 of the Act requires certain Internet browsers used...

  10. Technological advancements and Internet sexuality: does private access to the Internet influence online sexual behavior?

    Science.gov (United States)

    Daneback, Kristian; Månsson, Sven-Axel; Ross, Michael W

    2012-08-01

    The aim of this study was to investigate whether demographic characteristics and sexual behavior online and offline were associated with private, respectively, nonprivate access to the Internet in a Web sample of people who use the Internet for sexual purposes. A total of 1,913 respondents completed an online questionnaire about Internet sexuality, and 1,614 reported using the Internet for sexual purposes. The majority of these respondents reported having access to an Internet-connected computer no one else had access to (62 percent women and 70 percent men). The results showed that it is possible to differentiate between those who have access to an Internet-connected computer no one else has access to and those who have shared access to an Internet-connected computer. Not only did they differ in demographic characteristics, but also in the sexual activities they engaged in on the Internet. Different patterns were found for women and men. For example, men who had private access to Internet-connected computers were more likely than those who had shared access to seek information about sexual issues. Thus, having access to Internet computers no one else has access to may promote sexual knowledge and health for men. The results of this study along with the technological development implies that in future research, attention should be paid to where and how people access the Internet in relation to online behavior in general and online sexual behavior in particular.

  11. Towards universal access to all knowledge-Internet Archive

    Institute of Scientific and Technical Information of China (English)

    KAHLE Brewster

    2005-01-01

    Advances in computing and communications mean that we can cost-effectively store every book, sound recording,movie, software package, and public Web page ever created, and provide access to these collections via the Internet to students and adults all over the world. By mostly using existing institutions and funding sources, we can build this as well as compensate authors within the current worldwide library budget. We should take advantage of our new technologies and our open societies to make a Universal Library again, and go the next step and make all knowledge easily available to every man, woman and child around the world.

  12. Internet Access by People with Intellectual Disabilities: Inequalities and Opportunities

    Directory of Open Access Journals (Sweden)

    Chris Fullwood

    2013-07-01

    Full Text Available This review gives an overview of the societal inequalities faced by people with intellectual disabilities, before focusing specifically on challenges people face accessing the Internet. Current access will be outlined along with the societal, support and attitudinal factors that can hinder access. Discussion of carer views of Internet use by people with intellectual disabilities will be covered incorporating consideration of the tension between protection, self-determination and lifestyle issues and gaining Internet access. We will address how impairment related factors may impede access and subsequently discuss how supports may be used to obfuscate impairments and facilitate access. We will move on from this to critically describe some of the potential benefits the Internet could provide to people with intellectual disabilities, including the potential for self-expression, advocacy and developing friendships. Finally, strategies to better include people with intellectual disabilities online will be given along with future research suggestions.

  13. Public Internet Access Points (PIAPs) and Their Social Impact: A Case Study from Turkey

    Science.gov (United States)

    Afacan, Gulgun; Er, Erkan; Arifoglu, Ali

    2013-01-01

    Building public Internet access points (PIAPs) is a significant contribution of governments towards achieving an information society. While many developing countries are investing great amounts to establish PIAPs today, people may not use PIAPs effectively. Yet, the successful implementation of PIAPs is the result of citizens' acceptance to use…

  14. Access to internet in rural and remote Canada.

    Science.gov (United States)

    Currie, Leanne M; Ronquillo, Charlene; Dick, Tania

    2014-01-01

    Canada is the second largest landmass country in the world, but has one of the lowest population densities. As of 2011, approximately 19% of the Canadian population lives in rural, or remote communities. The purpose of this study was to examine differences in rural and urban access to the Internet and device use in Canada, and to explore differences in access to broadband between Aboriginal and non-Aboriginal communities in Canada. In general rural-dwellers had lower levels of Internet access and despite efforts to increase access to high speed Internet, Aboriginal communities in some regions have limited access. Future research should explore computer and health literacy in the context of rural and remote communities in Canada.

  15. Preservice Teachers' Internet Addiction in Terms of Gender, Internet Access, Loneliness and Life Satisfaction

    Science.gov (United States)

    Demirer, Veysel; Bozoglan, Bahadir; Sahin, Ismail

    2013-01-01

    The aim of this study is to investigate pre-service teachers' Internet addiction in terms of gender, Internet accessibility, loneliness and life satisfaction. Statistical analyses were completed on the data by the 247 preservice teachers that filled the surveys completely. According to findings, pre-service teachers' level of loneliness and…

  16. Using Metadata to Build Geographic Information Sharing Environment on Internet

    Directory of Open Access Journals (Sweden)

    Chih-hong Sun

    1999-12-01

    Full Text Available Internet provides a convenient environment to share geographic information. Web GIS (Geographic Information System even provides users a direct access environment to geographic databases through Internet. However, the complexity of geographic data makes it difficult for users to understand the real content and the limitation of geographic information. In some cases, users may misuse the geographic data and make wrong decisions. Meanwhile, geographic data are distributed across various government agencies, academic institutes, and private organizations, which make it even more difficult for users to fully understand the content of these complex data. To overcome these difficulties, this research uses metadata as a guiding mechanism for users to fully understand the content and the limitation of geographic data. We introduce three metadata standards commonly used for geographic data and metadata authoring tools available in the US. We also review the current development of geographic metadata standard in Taiwan. Two metadata authoring tools are developed in this research, which will enable users to build their own geographic metadata easily.[Article content in Chinese

  17. Internet search engines - Fluctuations in document accessibility

    NARCIS (Netherlands)

    Mettrop, W.; Nieuwenhuysen, P.

    2001-01-01

    An empirical investigation of the consistency of retrieval through Internet search engines is reported. Thirteen engines are evaluated: AltaVista, EuroFerret, Excite, HotBot, InfoSeek, Lycos, MSN, NorthernLight, Snap, WebCrawler and three national Dutch engines: Ilse, Search.nl and Vindex. The focus

  18. Internet access to scanned paper documents

    NARCIS (Netherlands)

    Worring, M.; Smeulders, A.W.M.; Witten, I.; Akscyn, R.; Shipman, F.M.

    1998-01-01

    In this contribution we identify the different structures to encounterin a hyperdocument. Methods are described for deriving those structures from scanned paper originals. The content and structure of the document is then made available in a form suited for an Internet browser. It provides convenien

  19. Universal Access to Science Study via Internet.

    Science.gov (United States)

    Friedman, Edward A.; And Others

    1996-01-01

    Internet learning opportunities via the National Science Foundation-supported New Jersey Networking Infrastructure in Education project are described. Their data-centered approach to science and math skills instruction is illustrated by two examples from each of the three styles of activities: (1) collaboration; (2) using public domain databases;…

  20. Mobile access to the Internet: from personal bubble to satellites

    Science.gov (United States)

    Gerla, Mario

    2001-10-01

    Mobile, wireless access and networking has emerged in the last few years as one of the most important directions of Internet growth. The popularity of mobile, and, more generally, nomadic Internet access is due to many enabling factors including: (a) emergence of meaningful applications tailored to the individual on the move; (b) small form factor and long battery life; (c) efficient middleware designed to support mobility; and, (d) efficient wireless networking technologies. A key player in the mobile Internet access is the nomad, i.e. the individual equipped with various computing and I/O gadgets (cellular phone, earphones, GPS navigator, palm pilot, beeper, portable scanner, digital camera, etc.). These devices form his/her Personal Area Network or PAN or personal bubble. The connectivity within the bubble is wireless (using for example a low cost, low power wireless LAN such as Bluetooth). The bubble can expand and contract dynamically depending on needs. It may temporarily include sensors and actuators as the nomad walks into a new environment. In this paper, we identify the need for the interconnection of the PAN with other wireless networks in order to achieve costeffective mobile access to the Internet. We will overview some key networking technologies required to support the PAN (eg, Bluetooth). We will also discuss an emerging technology, Ad Hoc wireless networking which is the natural complement of the PAN in sparsely populated areas. Finally, we will identify the need for intelligent routers to assist the mobile user in the selection of the best Internet access strategy.

  1. Internet pharmacy: issues of access, quality, costs, and regulation.

    Science.gov (United States)

    Crawford, Stephanie Y

    2003-02-01

    Internet pharmacy has been the focus of heightened interest over the past 3 years since the first major Web site was introduced in the United States. This paper addresses issues pertaining to Internet pharmacies that sell prescriptions and other products to consumers at the retail level. The Internet pharmacy industry has shifted rapidly in the short time span. This paper begins with a summary of historical considerations and the shifting organization of Internet pharmacy. The advantages and disadvantages of online pharmacy practice are listed. Issues of access, quality, and cost are described. The challenges in regulation at the state and federal levels are presented. Advice to consumers is offered regarding the use of Internet pharmacy sites for purchasing prescription drug products.

  2. Cellular 5G Access for Massive Internet of Things

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Pratas, Nuno; Stefanovic, Cedomir

    2017-01-01

    The Internet of Things (IoT) refers to the paradigm of physical and virtual “things” that communicate and collaborate over the Internet, with minimal or no human intervention. There are multiple ways in which an IoT device can be connected to the Internet. Cellular technologies are seen as viable...... candidates in this respect, due to their maturity, worldwide availability and the use of reserved spectrum. However, current cellular systems are not well-equipped to efficiently and reliably support IoT traffic, particularly in the radio access part, as they are designed for low number of high...

  3. Building multiservice Internet protocol virtual private networks

    Science.gov (United States)

    Cheung, William

    1999-11-01

    Multiservice Internet Protocol-based Virtual Private Networks (MIP- VPNs) with Quality of Service (QoS) are becoming a reality due to the availability of new standards from the Internet Engineering Task Force (IETF). This paper describes how components including security models, IP tunneling protocols, and service differentiation schemes fit together in order to construct such a VPN. First, the concept and rationale of VPN is presented, followed by a discussion of its supporting components. A comparison is made among the various VPN technologies.

  4. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  5. An internet of things example: classrooms access control over near field communication.

    Science.gov (United States)

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  6. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Directory of Open Access Journals (Sweden)

    Daniel Palma

    2014-04-01

    Full Text Available The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  7. Quantum internet using code division multiple access

    Science.gov (United States)

    Zhang, Jing; Liu, Yu-xi; Özdemir, Şahin Kaya; Wu, Re-Bing; Gao, Feifei; Wang, Xiang-Bin; Yang, Lan; Nori, Franco

    2013-01-01

    A crucial open problem inS large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels. PMID:23860488

  8. Open Access And Openly Accessible: A Study Of Scientific Publications Shared Via The Internet

    National Research Council Canada - National Science Library

    Jonathan D. Wren

    2005-01-01

    ... of the article, and to what degree open access publications are shared on non-journal websites. Design The internet was searched using an application programming interface to Google, a popular and freely available search engine...

  9. Accessibility mapping in cultural public buildings

    Directory of Open Access Journals (Sweden)

    Luciene Gomes

    2016-07-01

    Full Text Available Objective: This study analyzed issues regarding accessibility in cultural facilities and aimed to analyze accessibility in the municipal cultural institutions and two districts of São Paulo state. Method: All cultural buildings were visited and, using a checklist based on the Brazilian Association of Technical Standards (NBR 9050, 2004, the public spaces were classed as adequate or inadequate with respect to their accessibility to people with a visual and physical disability. The data collected was subjected to descriptive analysis by scoring the most common accessibility resources, their adequacy as well as the resources not installed. Results: The results show that all the external and internal areas of the analyzed buildings need for adaptations, installations or the building of equipment that allows the physically or visually disabled to interact with the environment in the chosen cultural spaces. The work showed that the best evaluated item were the ramps and the worst was the tactile map, absent in all buildings. Conclusion: The data show the “state of the art” in the chosen city and discussed the difficulties in the implementation of Brazilian Association of Technical standards, both in construction and in the adaptations, pointing new accessibility concerns on the studied cities.

  10. An examination of the patterns of access and use of the internet by ...

    African Journals Online (AJOL)

    An examination of the patterns of access and use of the internet by youth: the ... as a communication and entertainment tool; the use of Internet for business and ... criminal networks and prostitution sites and that it leads to Internet addiction.

  11. Quantum internet using code division multiple access

    CERN Document Server

    Zhang, Jing; Ozdemir, Sahin Kaya; Wu, Re-Bing; Wang, Xiang-Bin; Nori, Franco

    2012-01-01

    Code division multiple access (CDMA) is a spread-spectrum technology, in which a code is used to spread the spectral content of information to achieve larger network capacity. It has been widely used in classical communication and wireless networks. Here, we extend CDMA to the quantum case, where many pairs of nodes can transmit quantum information through a shared channel. This can be achieved by chaotic encoding of quantum information to spread its spectral content and by chaos synchronization, to separate different sender-receiver pairs. The proposed method is robust to low-frequency noise, and achieves faithful transmission with fidelities of up to 0.99.

  12. [Differences in access to Internet and Internet-based information seeking according to the type of psychiatric disorder].

    Science.gov (United States)

    Brunault, P; Bray, A; Rerolle, C; Cognet, S; Gaillard, P; El-Hage, W

    2017-04-01

    Internet has become a major tool for patients to search for health-related information and to communicate on health. We currently lack data on how patients with psychiatric disorders access and use Internet to search for information on their mental health. This study aimed to assess, in patients followed for a psychiatric disorder (schizophrenia, bipolar disorder, mood and anxiety disorder, substance-related and addictive disorders and eating disorders), prevalence of Internet access and use, and patient expectations and needs regarding the use of Internet to search for mental-health information depending on the psychiatric disorder. We conducted this cross-sectional study between May 2013 and July 2013 in 648 patients receiving psychiatric care in 8 hospitals from the Region Centre, France. We used multivariate logistic regression adjusted for age, gender, socio-educational level and professional status to compare use, expectations and needs regarding Internet-based information about the patient's psychiatric disorder (65-items self-administered questionnaires) as a function of the psychiatric disorders. We identified patients clusters with multiple correspondence analysis and ascending hierarchical classification. Although 65.6% of our population accessed Internet at home, prevalence for Internet access varied depending on the type of psychiatric disorder and was much more related to limited access to a computer and low income than to a lack of interest in the Internet. Most of the patients who used Internet were interested in having access to reliable Internet-based information on their health (76.8%), and most used Internet to search for Internet based health-information about their psychiatric disorder (58.8%). We found important differences in terms of expectations and needs depending on the patient's psychiatric disorder (e.g., higher interest in Internet-based information among patients with bipolar disorder, substance-related and addictive disorders

  13. Intel Legend and CERN would build up high speed Internet

    CERN Multimedia

    2002-01-01

    Intel, Legend and China Education and Research Network jointly announced on the 25th of April that they will be cooperating with each other to build up the new generation high speed internet, over the next three years (1/2 page).

  14. Internet Based Open Access Crystallographic Databases

    Science.gov (United States)

    Upreti, Girish; Seipel, Bjoern; Harvey, Morgan; Garrick, Will; Moeck, Peter

    2006-05-01

    Two freely accessible crystallographic databases are discussed: the Crystallographic Open Database (COD, http://crystallography.net) which contains over 37,000 crystal structures, and the Nano-Crystallography Database (NCD, http://nanocrystallography.research.pdx.edu) which we recently started to support image-based nanocrystallography and (nano) materials science education. Both databases collect crystallographic relevant information in a standardized format; the Crystallographic Information File (CIF). CIF is the standard file format adopted by the International Union of Crystallography (http://iucr.org) for the archiving and distribution of crystallographic information. A subset of the COD, the Predicted Crystallographic Online Database, allows for 3D structural displays of structural polyhedra and wireframes of approximately 2,600 entries. Since electron microscopist are interested in simple, yet technologically important materials, the crystallographic information for those materials will be included in our database. At our NCD site, entries in the COD and the NCD can be visualized in three dimensions (3D) along with (2D) lattice fringe fingerprints plots. The latter supports the identification of unknown nanocrystal phases from high-resolution transmission electron microscopy (HRTEM) images. Morphological crystal information from the database ``Bestimmungstabellen f"ur Kristalle/ ???????????? ??????????,'' (A.K. Boldyrew and W.W. Doliwo-Dobrowolsky, Zentrales Wissenschaftlichers Institute der Geologie und Sch"urfung, Leningrad/ Moscow, 1937/1939) will also be included in the NCD to support image-based nanocrystallography in 3D.

  15. 40 CFR 1400.5 - Internet access to certain off-site consequence analysis data elements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Internet access to certain off-site... DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.5 Internet access to certain off... elements in the risk management plan database available on the Internet: (a) The concentration of...

  16. Study of intelligent building system based on the internet of things

    Science.gov (United States)

    Wan, Liyong; Xu, Renbo

    2017-03-01

    In accordance with the problem such as isolated subsystems, weak system linkage and expansibility of the bus type buildings management system, this paper based on the modern intelligent buildings has studied some related technologies of the intelligent buildings and internet of things, and designed system architecture of the intelligent buildings based on the Internet of Things. Meanwhile, this paper has also analyzed wireless networking modes, wireless communication protocol and wireless routing protocol of the intelligent buildings based on the Internet of Things.

  17. Household computer and Internet access: The digital divide in a pediatric clinic population.

    Science.gov (United States)

    Carroll, Aaron E; Rivara, Frederick P; Ebel, Beth; Zimmerman, Frederick J; Christakis, Dimitri A

    2005-01-01

    Past studies have noted a digital divide, or inequality in computer and Internet access related to socio-economic class. This study sought to measure how many households in a pediatric primary care outpatient clinic had household access to computers and the Internet, and whether this access differed by socio-economic status or other demographic information. We conducted a phone survey of a population-based sample of parents with children ages 0 to 11 years old. Analyses assessed predictors of having home access to a computer, the Internet, and high-speed Internet service. Overall, 88.9% of all households owned a personal computer, and 81.4% of all households had Internet access. Among households with Internet access, 48.3% had high speed Internet at home. There were significant associations between home computer ownership or Internet access and parental income or education. There was no relationship these factors and high speed Internet access. Over 60% of families with annual household income of $10,000-$25,000, and nearly 70% of families with only a high-school education had Internet access at home. While income and education remain significant predictors of household computer and internet access, many patients and families at all economic levels have access, and might benefit from health promotion interventions using these modalities.

  18. Democracy and the Internet: Access, Engagement and Deliberation

    Directory of Open Access Journals (Sweden)

    Roman Gerodimos

    2005-12-01

    Full Text Available The internet has the capacity to facilitate the creation of new forms of civic engagement, but the realisation of these opportunities requires institutional and cultural reinforcement. The democratic character of e-citizenship and the equal distribution of online resources to the public require the fulfilment of four conditions: access, engagement (incorporating education, motivation and trust, meaningful deliberation and a link between civic input and public policy output. Furthermore, the gap between the main features of cyberspace and the inherent prerequisites of democracy, such as a finite space and a set of rules, create tensions that need to be negotiated politically. Although the empirical evidence available includes some encouraging signs regarding the future use of the internet for civic engagement, the existing limitations and obstacles mean that the new media will complement, rather than replace, the old media as a democratic public sphere.

  19. The Impacts of Free Public Internet Access on Public Library Patrons and Communities

    Science.gov (United States)

    Bertot, John Carlo; McClure, Charles R.; Jaeger, Paul T.

    2008-01-01

    Public libraries have evolved into a primary source of Internet access in many communities, generating wide-ranging impacts in the communities that public libraries serve. Based on the findings of the 2007 Public Libraries and the Internet study, this article examines the ways in which the Internet access delivered by public libraries affects…

  20. The Impacts of Free Public Internet Access on Public Library Patrons and Communities

    Science.gov (United States)

    Bertot, John Carlo; McClure, Charles R.; Jaeger, Paul T.

    2008-01-01

    Public libraries have evolved into a primary source of Internet access in many communities, generating wide-ranging impacts in the communities that public libraries serve. Based on the findings of the 2007 Public Libraries and the Internet study, this article examines the ways in which the Internet access delivered by public libraries affects…

  1. Evaluasi Pemanfaatan Wireless Internet Protocol Access System di Kota Malang

    Directory of Open Access Journals (Sweden)

    Ahmad Budi Setiawan

    2012-03-01

    Full Text Available WIPAS (Wireless Internet Protocol Accsess System adalah salah satu teknologi pita lebar (broadband yang terbaru. Teknologi tersebut dikembangkan berdasarkan model point-to-multipoint access system pada jaringan nirkabel tetap atau Fixed Wireless Access (FWA dengan memanfaatkan pita frekuensi 26-GHz. Dengan besarnya pita frekuensi yang digunakan, teknologi WIPAS dapat menampung kapasitas akses untuk lalu lintas jaringan yang sangat besar. Dalam penelitian ini akan dikaji dan dievaluasi efektifitas penggunaan teknologi WIPAS melalui kasus pemanfaatan teknologi WIPAS untuk pemberdayaan komunitas di kota Malang. Dalam penelitian ini juga akan dideskripsikan pemanfaatan teknologi WIPAS untuk melihat manfaat penggunaan teknologi tersebut. Penelitian ini dilakukan dengan metode kualitatif dengan melakukan evaluasi terhadap infrastruktur yang telah dibangun untuk melihat efektifitas pemanfaatan WIPAS. Hasil penelitian ini adalah sebuah kajian evaluatif tentang pemanfaatan WIPAS di kota Malang dan rekomendasi untuk implementasi lebih lanjut.

  2. Providing Internet Access to High-Resolution Lunar Images

    Science.gov (United States)

    Plesea, Lucian

    2008-01-01

    The OnMoon server is a computer program that provides Internet access to high-resolution Lunar images, maps, and elevation data, all suitable for use in geographical information system (GIS) software for generating images, maps, and computational models of the Moon. The OnMoon server implements the Open Geospatial Consortium (OGC) Web Map Service (WMS) server protocol and supports Moon-specific extensions. Unlike other Internet map servers that provide Lunar data using an Earth coordinate system, the OnMoon server supports encoding of data in Moon-specific coordinate systems. The OnMoon server offers access to most of the available high-resolution Lunar image and elevation data. This server can generate image and map files in the tagged image file format (TIFF) or the Joint Photographic Experts Group (JPEG), 8- or 16-bit Portable Network Graphics (PNG), or Keyhole Markup Language (KML) format. Image control is provided by use of the OGC Style Layer Descriptor (SLD) protocol. Full-precision spectral arithmetic processing is also available, by use of a custom SLD extension. This server can dynamically add shaded relief based on the Lunar elevation to any image layer. This server also implements tiled WMS protocol and super-overlay KML for high-performance client application programs.

  3. Providing Internet Access to High-Resolution Mars Images

    Science.gov (United States)

    Plesea, Lucian

    2008-01-01

    The OnMars server is a computer program that provides Internet access to high-resolution Mars images, maps, and elevation data, all suitable for use in geographical information system (GIS) software for generating images, maps, and computational models of Mars. The OnMars server is an implementation of the Open Geospatial Consortium (OGC) Web Map Service (WMS) server. Unlike other Mars Internet map servers that provide Martian data using an Earth coordinate system, the OnMars WMS server supports encoding of data in Mars-specific coordinate systems. The OnMars server offers access to most of the available high-resolution Martian image and elevation data, including an 8-meter-per-pixel uncontrolled mosaic of most of the Mars Global Surveyor (MGS) Mars Observer Camera Narrow Angle (MOCNA) image collection, which is not available elsewhere. This server can generate image and map files in the tagged image file format (TIFF), Joint Photographic Experts Group (JPEG), 8- or 16-bit Portable Network Graphics (PNG), or Keyhole Markup Language (KML) format. Image control is provided by use of the OGC Style Layer Descriptor (SLD) protocol. The OnMars server also implements tiled WMS protocol and super-overlay KML for high-performance client application programs.

  4. How Much Is Too Much to Pay for Internet Access? A Behavioral Economic Analysis of Internet Use.

    Science.gov (United States)

    Broadbent, Julie; Dakki, Michelle A

    2015-08-01

    The popularity of online recreational activities, such as social networking, has dramatically increased the amount of time spent on the Internet. Excessive or inappropriate use of the Internet can result in serious adverse consequences. The current study used a behavioral economic task to determine if the amount of time spent online by problematic and nonproblematic users can be modified by price. The Internet Purchase Task was used to determine how much time undergraduate students (N=233) would spend online at 13 different prices. Despite high demand for Internet access when access was free, time spent online by both problematic and nonproblematic users decreased dramatically, even at low prices. These results suggest that the amount of time spent online may be modified by having a tangible cost associated with use, whereas having free access to the Internet may encourage excessive, problematic use.

  5. Access to and Use of the Internet by Veterans with Serious Mental Illness.

    Science.gov (United States)

    Record, Elizabeth J; Medoff, Deborah R; Dixon, Lisa B; Klingaman, Elizabeth A; Park, Stephanie G; Hack, Samantha; Brown, Clayton H; Fang, Li Juan; Kreyenbuhl, Julie

    2016-02-01

    This study evaluated internet use among 239 veterans with serious mental illness who completed questionnaires assessing demographics and internet use in 2010-2011. The majority of individuals (70 %) reported having accessed the internet and among those, 79 % had accessed it within the previous 30 days. Those who were younger and more educated were more likely to have accessed the internet, as were those with a schizophrenia spectrum disorder, bipolar disorder, or major depressive disorder, compared to individuals with PTSD. Veterans with serious mental illness commonly use the internet, including to obtain health information, though use varies across demographic characteristics and clinical diagnosis.

  6. Internet of Things building blocks and business models

    CERN Document Server

    Hussain, Fatima

    2017-01-01

    This book describes the building blocks and introductory business models for Internet of Things (IoT). The author provide an overview of the entire IoT architecture and constituent layers, followed by detail description of each block . Various inter-connecting technologies and sensors are discussed in context of IoT networks. In addition to this, concepts of Big Data and Fog Computing are presented and characterized as per data generated by versatile IoT applications . Smart parking system and context aware services are presented as an hybrid model of cloud and Fog Afterwards, various IoT applications and respective business models are discussed. Finally, author summarizes the IoT building blocks and identify research issues in each, and suggest potential research projects worthy of pursuing. .

  7. Strategic Approach to Build Customers Trust in Adoption of Internet Banking in Nigeria

    OpenAIRE

    NAIMOT FOLAKE POPOOLA; MD RAZIB BIN ARSHAD

    2015-01-01

    Trust plays a vital role in acceptance and usage of internet banking, hence applying appropriate strategies to build customers’ trust is essential for the service providers. The objective of this study is to investigate the strategies to build customers trust in acceptance and usage of internet banking in Nigerian. This study utilized interpretive research approach to understand the strategies used to build customers trust in internet banking in Nigerian banks. The data was primarily collecte...

  8. Patient access to complex chronic disease records on the Internet

    Directory of Open Access Journals (Sweden)

    Bartlett Cherry

    2012-08-01

    Full Text Available Abstract Background Access to medical records on the Internet has been reported to be acceptable and popular with patients, although most published evaluations have been of primary care or office-based practice. We tested the feasibility and acceptability of making unscreened results and data from a complex chronic disease pathway (renal medicine available to patients over the Internet in a project involving more than half of renal units in the UK. Methods Content and presentation of the Renal PatientView (RPV system was developed with patient groups. It was designed to receive information from multiple local information systems and to require minimal extra work in units. After piloting in 4 centres in 2005 it was made available more widely. Opinions were sought from both patients who enrolled and from those who did not in a paper survey, and from staff in an electronic survey. Anonymous data on enrolments and usage were extracted from the webserver. Results By mid 2011 over 17,000 patients from 47 of the 75 renal units in the UK had registered. Users had a wide age range (90 yrs but were younger and had more years of education than non-users. They were enthusiastic about the concept, found it easy to use, and 80% felt it gave them a better understanding of their disease. The most common reason for not enrolling was being unaware of the system. A minority of patients had security concerns, and these were reduced after enrolling. Staff responses were also strongly positive. They reported that it aided patient concordance and disease management, and increased the quality of consultations with a neutral effect on consultation length. Neither patient nor staff responses suggested that RPV led to an overall increase in patient anxiety or to an increased burden on renal units beyond the time required to enrol each patient. Conclusions Patient Internet access to secondary care records concerning a complex chronic disease is feasible and popular

  9. Answers at your fingertips: Access to the Internet influences willingness to answer questions.

    Science.gov (United States)

    Ferguson, Amanda M; McLean, David; Risko, Evan F

    2015-12-01

    Recent technological advances have given rise to an information-gathering tool unparalleled by any in human history-the Internet. Understanding how access to such a powerful informational tool influences how we think represents an important question for psychological science. In the present investigation we examined the impact of access to the Internet on the metacognitive processes that govern our decisions about what we "know" and "don't know." Results demonstrated that access to the Internet influenced individuals' willingness to volunteer answers, which led to fewer correct answers overall but greater accuracy when an answer was offered. Critically, access to the Internet also influenced feeling-of-knowing, and this accounted for some (but not all) of the effect on willingness to volunteer answers. These findings demonstrate that access to the Internet can influence metacognitive processes, and contribute novel insights into the operation of the transactive memory system formed by people and the Internet.

  10. Digital Divide: How Do Home Internet Access and Parental Support Affect Student Outcomes?

    Directory of Open Access Journals (Sweden)

    Jing Lei

    2012-03-01

    Full Text Available This study examined the relationship between home Internet access/parental support and student outcomes. Survey data were collected from 1,576 middle school students in China. Data were analyzed using descriptive analysis, independent-samples T-test, and regression analysis. Results indicate that students who had home Internet access reported higher scores than those without home Internet on all three dimensions: Computer and Internet self-efficacy, Attitudes towards technology and Developmental outcomes. Home Internet access and parental support were significantly positively associated with technology self-efficacy, interest in technology, perceived importance of the Internet, and perceived impact of the Internet on learning. Findings from this study have significant implications for research and practice on how to narrow down the digital divide.

  11. Enhancement of e-commerce via mobile accesses to the Internet

    OpenAIRE

    Sumita, Ushio; Yoshii, Jun

    2010-01-01

    The potential of the Internet has been expanded substantially by a new generation of mobile devices, opening the door for rapid growth of m-commerce. While the traditional PC access to the Internet continues to be vital for exploiting the advantages of the Internet, the mobile access appears to attract more people because of flexible accesses to the Internet in a ubiquitous manner. Accordingly, e-commerce is now in the process of being converted into m-commerce. The purpose of this paper is t...

  12. Internet Access in the European Union and in the United States.

    Science.gov (United States)

    Bauer, Johannes M.; Berne, Michel; Maitland, Carleen F.

    2002-01-01

    Examines the effects of public policies towards traditional communications infrastructures on Internet access in Europe and the United States. Discusses competitive strategies and describes the influence of regulatory policies affecting market entry and the pricing of services on Internet access, based on empirical findings. (Author/LRW)

  13. Essential, Desirable or Optional? Making Distance E-Learning Courses Available to Those without Internet Access

    Science.gov (United States)

    Hancock, Val

    2010-01-01

    The Open University, an open distance learning institution, is increasingly using a Virtual Learning Environment (VLE) that requires internet access. This paper investigates how the move to a VLE has affected one group of students who do not have internet access--offender learners studying in prison. Members of the armed forces and secure hospital…

  14. Internet access and online cancer information seeking among Latino immigrants from safety net clinics.

    Science.gov (United States)

    Selsky, Claire; Luta, George; Noone, Anne-Michelle; Huerta, Elmer E; Mandelblatt, Jeanne S

    2013-01-01

    Internet use is widespread, but little is known about Internet use for cancer information among Latinos, especially those who rely on safety net clinics. The authors investigated access to and intended use of the Internet for cancer information among low income, immigrant Latinos predominately from Central and South America. A cross-sectional study of 1,273 Latinos 21 years and older attending safety net clinics or health fairs was conducted from June 2007 to November 2008. The authors used logistic regression models to evaluate associations of age, acculturation, psychosocial factors and other covariates with Internet access and intended use of the Internet for cancer information among those with access. Of the sample, 44% reported Internet access. Higher information self-efficacy and greater trust in the Internet were independently associated with Internet access (p = .05 and p cancer help online if they needed information. Those with younger age and higher acculturation, education and self-efficacy had higher odds of intended Internet use for cancer information, considering covariates. In addition, those with high (vs. low) perceived risk of cancer (OR = 1.76; 95% CI [1.14, 2.73]; p = .01) and higher levels of trust in online health information (OR = 1.47 per one-point increase; 95% [CI 1.19, 1.82]; p = .0004) were more likely to intend to seek cancer information online. These findings that Internet access is fairly high in the immigrant Latino population and that the Internet is a trusted source of cancer information suggest that the Internet may be a channel for cancer control interventions.

  15. Internet Access Practices and Employee Attitudes toward Internet Usage Policy Implementation in Selected Philippines Financial Institutions

    National Research Council Canada - National Science Library

    Maria Sagrario R. Simbulan

    2004-01-01

    This study explores the employees’ concept of appropriate use of Internet facilities as well as their perception of the rights and liabilities, both of the individual and of the organization, associated with the grant of Internet...

  16. Accessibility and Utilization of Internet Service by Graduate Students in University of Lagos, Nigeria

    Directory of Open Access Journals (Sweden)

    Oyeronke Olufunmilola Ogunlade

    2012-07-01

    Full Text Available The major objective of the study was to examine the accessibility and utilization of Internet service by graduate students in university of Lagos, Nigeria. Specifically, the study made effort to determine the extent to which Internet service was accessible to staff and students of the university, how point of Internet access influenced its usage, factors motivating the use of Internet and what Internet was used for by graduate students in University of Lagos. The study adopted a descriptive survey design and data were collected by administering questionnaires to two hundred respondents randomly selected from faculty of Education in the University. Results of the findings revealed that students didn’t have as much access to Internet service as the staff (27.7 % and 62.4 % respectively. 47.9 % of respondents strongly agreed to visiting the cybercafé to access Internet. 53.1 % and 50.2 % of the respondents strongly agreed that proximity to cybercafé and valid information contained from the Internet were their major motivating factors for surfing the Internet. It also found that the respondents strongly agreed that the purposes for their surfing the Internet were to register courses, enroll for exams, gather information for literature review, send and receive mails, amongst others. Based on the findings, it is therefore recommended that since the Internet is being utilized in every sector such as Education, Banking, Medicine and others, the University should make Internet service assessible for students’ use. This study can further be conducted in other institutions in Nigeria.

  17. Building Internet Search Engines Internet'te Tarama Sistemlerinin Kurulması

    Directory of Open Access Journals (Sweden)

    Mustafa Akgül

    1996-09-01

    Full Text Available Internet search engines are powerful tools to find electronics objects such as addresses of individuals and institutions, documents, statistics of all kinds, dictionaries, catalogs, product information etc. This paper explains how to build and run some verycommon search engines on Unix platforms, so as to serve documents through the Web. Internet üzerinde var olan çeşitli tarama mekanizmaları, kullanıcılara birey ve kurum adreslerinden doküman adreslerine, istatistiklerden sözlüklere, kitap kataloglarından ürün fiyatlarına kadar bir yelpazede elektronik nesnelerin aranıp bulunması ve sunulmas��nda yararlı olmaktadır. Hiyerarşik şekilde örgütlenen sanal kütüphanelerle birlikte, tarama mekanizmaları kullanıcıya bu çok büyük dağıtık kütüphane üzerinde yolunu bulmasına yardımcı olmaktadır. Bu makalede çok yaygın olarak kullanılan tarama motorlarının özellikle Unix ortamında kurulması ve çalıştırılması için yapılması gerekenler anlatılmaktadır.

  18. Medical students' knowledge, abilities and access characteristics to the internet at a peruvian university

    OpenAIRE

    Horna, Pedro; Facultad de Medicina Alberto Hurtado, Universidad Peruana Cayetano Heredia; Sociedad Científica de Estudiantes de Medicina Cayetano Heredia – SOCEMCH; Curioso, Walter; Facultad de Medicina Alberto Hurtado, Universidad Peruana Cayetano Heredia; Sociedad Científica de Estudiantes de Medicina Cayetano Heredia – SOCEMCH; Guillén, Carlos; Facultad de Medicina Alberto Hurtado, Universidad Peruana Cayetano Heredia; Sociedad Científica de Estudiantes de Medicina Cayetano Heredia – SOCEMCH; Torres, Carla; Facultad de Medicina Alberto Hurtado, Universidad Peruana Cayetano Heredia; Sociedad Científica de Estudiantes de Medicina Cayetano Heredia – SOCEMCH; Kawano, Jorge; Facultad de Medicina Alberto Hurtado, Universidad Peruana Cayetano Heredia; Sociedad Científica de Estudiantes de Medicina Cayetano Heredia – SOCEMCH

    2013-01-01

    Objectives: To study the knowledge abilities and access characteristics to the Internet in undergraduate medical students from a Peruvian University. Methods: Development and application of a questionnaire to medical students, report of the results and nested case-control analysis of data to identify variables related to the ability to surf the Internet. Results: The students enter the Internet mainly from home. The most visited websites were those from web mail services and entertainment sit...

  19. Internet Access and Use among Students of Physical Education: A Study of Kurukshetra University, Kurukshetra

    Directory of Open Access Journals (Sweden)

    Kumar, Rajender

    2014-06-01

    Full Text Available This paper depicts a study conducted on the behavior of physical education students towards Internet usage at Kurukshetra University, Kurukshetra. Specially, the study aims to know the purposes for use of Internet resources and services, frequency of use, places and means of use, student's satisfaction level toward the Internet, and problems faced while using the Internet. A survey was carried out with a sample of 100 physical education students of Kurukshetra University and the response rate was 88%. A well-designed questionnaire was distributed to the students' sample. Amazingly, the results of the study reveal that usage of the Internet in research and education was not favored, whereas email, chatting, and sports websites were commonly used among students. The study also found that too much information on the Internet, slow access speeds, and finding relevant information were the main problems in using the Internet.

  20. Perceptions of the Risks and Benefits of Internet Access and Use by People with Intellectual Disabilities

    Science.gov (United States)

    Chadwick, Darren D.; Quinn, Sally; Fullwood, Chris

    2017-01-01

    Background: Information and communication technologies, with the Internet at the forefront, have the potential to enhance the knowledge, service, employment, development and social interactional opportunities available to people with intellectual disabilities. Despite this, people with intellectual disabilities are not accessing the Internet to…

  1. Rural Health Care Information Access and the Use of the Internet: Opportunity for University Extension

    Science.gov (United States)

    Das, Biswa R.; Leatherman, John C.; Bressers, Bonnie M.

    2015-01-01

    The Internet has potential for improving health information delivery and strengthening connections between rural populations and local health service providers. An exploratory case study six rural health care markets in Kansas showed that about 70% of adults use the Internet, with substantial use for accessing health information. While there are…

  2. Internet Access and Usage in Improving Students' Self-Directed Learning in Indonesia Open University

    Science.gov (United States)

    Rahardjo, Djoko; Sumardjo; Lubis, Djuara P.; Harijati, Sri Ir.

    2016-01-01

    Internet is well known nowadays, however higher distance education students who live in remote rural areas still have not been able to take advantages of this medium optimally for their learning process. For accessing the internet the students have to be available with the minimum prerequisites: the existence of adequate devices and the sufficient…

  3. Research of Secure Intranet/Internet Access Platform Based on Ontology

    Directory of Open Access Journals (Sweden)

    Shigen Shen

    2009-12-01

    Full Text Available Faced with the general trend of centralization of information, the biggest challenge to enterprise is how to ensure that all fixed computers and different mobile devices anywhere can access securely and quickly enterprise's businesses. To solve this problem, an Ontology-based Secure intranet/Internet Access Platform (OSAP is presented. Ontology has been applied to the field of software resources sharing. Software resource ontology is defined for building the foundation of Software Resource Ontology Sharing Model (SROSM and the OSAP. The OSAP framework is presented by semantic modeling based on SROSM for providing users with better and higher QOS in sharing software resources. The OSAP is designed with OSAP Portal, Connection Module, Session Management Module, Security Module, RDP Module, and Bitmap Caching Module. The design ideas and functionalities of all modules are introduced. Based on the open Remote Desktop Protocol (RDP, the OSAP prototype is realized and key technologies including client display, data compression and security are described. To guarantee data transmission security and avoid access problem due to the firewall obstructing port 3389, the SSL protocol is employed to encapsulate RDP data packages between clients and OSAP as the RDP is used between OSAP and Terminal Services servers. Experimental results demonstrate that the OSAP has better performance involving response time, network usage, RAM usage and CPU usage.

  4. Gastric cancer-related information on the Internet: incomplete, poorly accessible, and overly commercial.

    LENUS (Irish Health Repository)

    Killeen, Shane

    2011-02-01

    Patients increasingly use the Internet for gastric cancer information. However, the quality of the information is questionable. We evaluated the accuracy, completeness, accessibility, reliability, and readability of gastric cancer websites.

  5. Web-oriented interface for remotely access the Kiev Internet-telescope

    Science.gov (United States)

    Kleshchonok, V.; Luk'yanyk, I.

    2017-06-01

    The partial revision of the Kiev internet-telescope was described in the article. The structure of the telescope and software and features its work. Methods of work with the telescope with help of remotely access were examined.

  6. Strategies for building a customer base on the internet: Symbiotic marketing

    OpenAIRE

    Lockett, A.; Blackman, ID

    2001-01-01

    The advent of the Internet is leading a re-evaluation of existing business practice as the methods employed in a non-virtual world may not necessarily be as effective in a virtual environment. The present paper examines the different strategic options facing organizations as they attempt to build a customer base on the Internet. The traditional site-centric approach of directing traffic to a central Internet site suffers from the problems of the increasing costs and decreasing effectiveness o...

  7. Backbone topology, access, and the commercial Internet, 1997 - 2000

    OpenAIRE

    Morton E O'Kelly; Grubesic, Tony H.

    2002-01-01

    As the Internet grows in popularity, telecommunications infrastructure in the United States continues to increase in capacity and geographic reach to meet market demand. Important components of this infrastructure include the commercial fiber-optic backbones used to transport digital information between locations. The spatial organization of commercial Internet backbones reflects an increasingly competitive privatized market for service provision, in which certain locations are more accessibl...

  8. FACTORS AFFECTING DEMAND FOR INTERNET ACCESS IN SAUDI ARABIA

    Directory of Open Access Journals (Sweden)

    Hisham Jameel Bardesi

    2016-07-01

    Full Text Available As internet use in Saudi Arabia are dramatically increasing, a powerful demand is being laid down on internet service purpose where this paper aims at identifying major factors that influence these demand pertaining to internet services. Within a selected theoretical model, such multiple factors are being conceptualized and interrelated. Using time series data, the Ordinary Least Square (OLS technique is employed to analyze the relationships. The results of the model indicated clearly that using the internet in Saudi Arabia is influenced most strongly by the number of educated people, the number of mobile subscribers, income, the number of fixed lines, and employment level. The results also suggest that demographic factors have a significant impact on the demand for internet, specifically, the number of educated people and levels of employment. This paper concludes with a recommendation on increasing the level of understanding of those the factors affecting practitioners who plan and promote new forms of internet services in the current competitive market.

  9. Strategic Approach to Build Customers Trust in Adoption of Internet Banking in Nigeria

    Directory of Open Access Journals (Sweden)

    NAIMOT FOLAKE POPOOLA

    2015-04-01

    Full Text Available Trust plays a vital role in acceptance and usage of internet banking, hence applying appropriate strategies to build customers’ trust is essential for the service providers. The objective of this study is to investigate the strategies to build customers trust in acceptance and usage of internet banking in Nigerian. This study utilized interpretive research approach to understand the strategies used to build customers trust in internet banking in Nigerian banks. The data was primarily collected through semi- structured interviews with bank managers and analysis of the websites and annual reports of the banks were used to complement data from primary source. Five findings which emerged from this research include customer orientation, information technology development, security strategy, institution based trust and viable marketing. These findings provided insight into the strategies used by Nigerian banks to build customers trust in acceptance and usage of internet banking.

  10. Internet accessibility and disability policy: lessons for digital inclusion and equality from Australia

    Directory of Open Access Journals (Sweden)

    Gerard Goggin

    2017-03-01

    Full Text Available In the fifth decade of the internet, accessibility for all, especially those with disabilities, is central to digital inclusion. Yet internationally, the score card on internet and accessibility remains mixed, at best; and woefully inadequate, at worst. Via an Australian case study, we argue that it is imperative to better understand how internet technology interacts with the life worlds and dynamics of disability, and we suggest how policy can be articulated and improved to put people with disabilities on an equal basis to others in digital societies.

  11. Internet Access on the Cheap: The Power of the Co-Op

    Directory of Open Access Journals (Sweden)

    Sorin Gudea

    2014-09-01

    Full Text Available Internet access in the former socialist block continues to lag behind more developed countries. Unequal access to Information Technology has produced uneven levels of participation in the networked economy and society. Internet access, which is important to maintaining a technologically competent labour force, is a staple in the developed countries. However, it continues to be limited in Romania. Would-be users are devising inventive solutions to the relatively costly access solutions in order to get on the Information Highway. A country case study of Internet access in Romania reveals the advent of self-established, co-operative networks providing shared Internet access - seemingly a unique and innovative approach. Several of the Internet access plans on the market are presented in this paper together with a discussion of cyber cafés and the home-grown, co-operative networks that seem to be popping up all over the country. Understanding the context within which these home-grown networks arise and prosper offers valuable lessons and ideas for transferring these approaches to other developing countries that, like Romania, are struggling to bridge the infamous digital divide.

  12. Internet-based reservation system (Internet-based control of timers for building technical services) - Final report; Internetbasiertes Reservationssystem (Internetbasierte Einstellung von Zeitsteuerungen haustechnischer Anlagen) - Schlussbericht

    Energy Technology Data Exchange (ETDEWEB)

    Huber, A.; Woodtli, M.

    2008-07-01

    A common measure to save energy in buildings is the adjustment of the operating time of the building service facilities to the busy time of the building (i.e. lowering period). For lack of better resources, the general lowering periods in irregularly occupied buildings often are reduced to a minimum or the adjustment of the operating time is completely missing. In order to adjust the operating time optimally to the actual busy time, an internet-based booking system has been developed, which allows users to register a room assignment online. This booking system is linked with the building service facilities. This ensure the optimal setting of the lowering periods and therefore allows saving energy. The technical implementation resulted from a programmable logic controller (PLC) that can be accessed via a web browser. Temperature offset boxes have been added as interface between the PLC and the existing facilities in order that the system is applicable in existing buildings too. The booking system has been installed in two test objects and has also been successfully tested with the responsible staff (caretaker, real estate management). The booking system may be contemplated online: http://www.hetag.ch. (author)

  13. Building an Internet of Samples: The Australian Contribution

    Science.gov (United States)

    Wyborn, Lesley; Klump, Jens; Bastrakova, Irina; Devaraju, Anusuriya; McInnes, Brent; Cox, Simon; Karssies, Linda; Martin, Julia; Ross, Shawn; Morrissey, John; Fraser, Ryan

    2017-04-01

    Physical samples are often the ground truth to research reported in the scientific literature across multiple domains. They are collected by many different entities (individual researchers, laboratories, government agencies, mining companies, citizens, museums, etc.). Samples must be curated over the long-term to ensure both that their existence is known, and to allow any data derived from them through laboratory and field tests to be linked to the physical samples. For example, having unique identifiers that link back ground truth data on the original sample helps calibrate large volumes of remotely sensed data. Access to catalogues of reliably identified samples from several collections promotes collaboration across all Earth Science disciplines. It also increases the cost effectiveness of research by reducing the need to re-collect samples in the field. The assignment of web identifiers to the digital representations of these physical objects allows us to link to data, literature, investigators and institutions, thus creating an "Internet of Samples". An Australian implementation of the "Internet of Samples" is using the IGSN (International Geo Sample Number, http://igsn.github.io) to identify samples in a globally unique and persistent way. IGSN was developed in the solid earth science community and is recommended for sample identification by the Coalition for Publishing Data in the Earth and Space Sciences (COPDESS). IGSN is interoperable with other persistent identifier systems such as DataCite. Furthermore, the basic IGSN description metadata schema is compatible with existing schemas such as OGC Observations and Measurements (O&M) and DataCite Metadata Schema which makes crosswalks to other metadata schemas easy. IGSN metadata is disseminated through the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH) allowing it to be aggregated in other applications such as portals (e.g. the Australian IGSN catalogue http://igsn2.csiro.au). The

  14. An easy-to-build remote laboratory with data transfer using the Internet School Experimental System

    Energy Technology Data Exchange (ETDEWEB)

    Schauer, Frantisek; Ozvoldova, Miroslava [Trnava University, Faculty of Pedagogy, Department of Physics, Trnava (Slovakia); Lustig, Frantisek; Dvorak, JirI [Charles University, Faculty of Mathematics and Physics, Department of Didactics of Physics, Prague (Czech Republic)], E-mail: fschauer@ft.utb.cz

    2008-07-15

    The present state of information communication technology makes it possible to devise and run computer-based e-laboratories accessible to any user with a connection to the Internet, equipped with very simple technical means and making full use of web services. Thus, the way is open for a new strategy of physics education with strongly global features, based on experiment and experimentation. We name this strategy integrated e-learning, and remote experiments across the Internet are the foundation for this strategy. We present both pedagogical and technical reasoning for the remote experiments and outline a simple system based on a server-client approach, and on web services and Java applets. We give here an outline of the prospective remote laboratory system with data transfer using the Internet School Experimental System (ISES) as hardware and ISES WEB Control kit as software. This approach enables the simple construction of remote experiments without building any hardware and virtually no programming, using a paste and copy approach with typical prebuilt blocks such as a camera view, controls, graphs, displays, etc. We have set up and operate at present seven experiments, running round the clock, with more than 12 000 connections since 2005. The experiments are widely used in practical teaching of both university and secondary level physics. The recording of the detailed steps the experimentor takes during the measurement enables detailed study of the psychological aspects of running the experiments. The system is ready for a network of universities to start covering the basic set of physics experiments. In conclusion we summarize the results achieved and experiences of using remote experiments built on the ISES hardware system.

  15. An easy-to-build remote laboratory with data transfer using the Internet School Experimental System

    Science.gov (United States)

    Schauer, František; Lustig, František; Dvořák, Jiří; Ožvoldová, Miroslava

    2008-07-01

    The present state of information communication technology makes it possible to devise and run computer-based e-laboratories accessible to any user with a connection to the Internet, equipped with very simple technical means and making full use of web services. Thus, the way is open for a new strategy of physics education with strongly global features, based on experiment and experimentation. We name this strategy integrated e-learning, and remote experiments across the Internet are the foundation for this strategy. We present both pedagogical and technical reasoning for the remote experiments and outline a simple system based on a server-client approach, and on web services and Java applets. We give here an outline of the prospective remote laboratory system with data transfer using the Internet School Experimental System (ISES) as hardware and ISES WEB Control kit as software. This approach enables the simple construction of remote experiments without building any hardware and virtually no programming, using a paste and copy approach with typical prebuilt blocks such as a camera view, controls, graphs, displays, etc. We have set up and operate at present seven experiments, running round the clock, with more than 12 000 connections since 2005. The experiments are widely used in practical teaching of both university and secondary level physics. The recording of the detailed steps the experimentor takes during the measurement enables detailed study of the psychological aspects of running the experiments. The system is ready for a network of universities to start covering the basic set of physics experiments. In conclusion we summarize the results achieved and experiences of using remote experiments built on the ISES hardware system.

  16. The Association Between Internet and Television Access and Disordered Eating in a Chinese Sample

    Science.gov (United States)

    Peat, Christine M.; Von Holle, Ann; Watson, Hunna; Huang, Lu; Thornton, Laura M.; Zhang, Bing; Du, Shufa; Kleiman, Susan C.; Bulik, Cynthia M.

    2014-01-01

    Objective China has historically reported a low prevalence of eating disorders. However, the rapid social and economic development of this country as well as Western ideals widely disseminated by television and the Internet have led to distinct patterns of behavioral choices that could affect eating disorder risk. Thus, the current study explored the relation between disordered eating and media use. Method Participants were females from the 2009 wave of the China Health and Nutrition Survey (N = 1,053). Descriptive statistics were obtained and logistic regression models, stratified by age (adolescents ages 12-17 and adults ages 18-35), were used to evaluate the association of media use with disordered eating. Results In adolescents, 46.8% had access to the Internet and those with access averaged one hour per day each of Internet and television use. In adults, 41.4% had access to the Internet, and those with access averaged one hour per day of Internet use and two hours per day of television use. Internet access was significantly associated with a subjective belief of fatness (OR = 2.8, 95% CI: 1.6, 4.9) and worry over losing control over eating (OR = 4.8, 95% CI: 2.3, 9.8) only in adults. Discussion These findings help characterize the overall pattern of media use and report of eating disorder symptoms in a large sample of female Chinese adolescents and adults. That Internet access in adults was significantly associated with disordered eating cognitions might suggest that media access negatively influences these domains;however,more granular investigations are warranted. PMID:25346164

  17. Internet access and utilization for health information among university students in Islamabad.

    Science.gov (United States)

    Shaikh, Irshad Ali; Shaikh, Masood Ali; Kamal, Anila; Masood, Sobia

    2008-01-01

    Internet has changed the way we live and work. Advent of this technology has fundamentally transformed our lives the way invention of automobile changed how our lives and cities looked and worked before. Practically no information is available on the use of Internet for health by the people of Pakistan. The Objectives of the study were to assess the access and utilization pattern of Internet by university students in Islamabad, with emphasis on the healthcare information seeking. An anonymous, self-administered, and pre-tested questionnaire with questions on the access, and usage pattern of Internet, seeking health care information online, and belief about reliability of such information; was distributed to only those students who were enrolled in masters or higher degree programs. A total of 600 students were approached and 598 (99.7%) completed the questionnaires. The mean age of students was 23.5 years (range 19-40). The majority of students (423) were enrolled in masters program. Four hundred and sixty-eight students (78.26%) students had access to the computer either at home or at their university hostel. While 304 (50.84%) students had Internet access at home or in their university hostel. Out of 304 students who reported having access to Internet in the past three months, one hundred and thirty-nine (43.4%) students replied affirmatively to the question of having used Internet for seeking health care information. And 109 (78.4%) thought that such information was reliable. Out of 139 students who had used Internet for seeking health information, 35 (25.2%) students replied affirmatively to the question of having discussed health information obtained from Internet with their doctor/physician whom they visited for any illness/treatment. Majority of Islamabad university students in this study had access to computer and Internet. Young and healthy state of this educated age group perhaps accounts for limited use of Internet for seeking healthcare related

  18. Providing Internet Access to the Ohio Career Information System for All Residents: A Feasibility Study.

    Science.gov (United States)

    Lewis, Morgan V.

    Expanded Internet access to the Ohio Career Information System (OCIS) would provide adults in Ohio who need to or wish to make career changes with the best available information about occupations, education and training programs, and financial aid. In order to determine the feasibility of improving access without cost to users, an advisory group,…

  19. Impact of the Digital Divide on Computer Use and Internet Access on the Poor in Nigeria

    Science.gov (United States)

    Tayo, Omolara; Thompson, Randall; Thompson, Elizabeth

    2016-01-01

    We recruited 20 community members in Ido Local Government Area, Oyo state and Yewa Local Government Area, Ogun state in Nigeria to explore experiences and perceptions of Internet access and computer use. Face-to-face interviews were conducted using open-ended questions to collect qualitative data regarding accessibility of information and…

  20. Adaptive Hybrid Mobile Agent Protocol for Wireless Multihop Internet Access

    Directory of Open Access Journals (Sweden)

    A. Velmurugan

    2006-01-01

    Full Text Available Internet-based Mobile Ad Hoc Networking (MANET is an emerging technology that supports self-organizing mobile networking infrastructures. This is expected to be of great use in commercial applications for the next generation Internet users. A number of technical challenges are faced today due to the heterogeneous, dynamic nature of this hybrid MANET. A new hybrid routing scheme AODV_ALMA is proposed, which act simultaneously combining mobile agents to find path to the gateway to establish connection with Internet host and on-demand distance vector approach to find path in local MANET is one of the unique solution. An adaptive gateway discovery mechanism based on mobile agents making use of pheromone value, pheromone decay time and balance index is used to estimate the path and next hop to the gateway. The mobile nodes automatically configure the address using mobile agents first selecting the gateway and then using the gateway prefix address. The mobile agents are also used to track changes in topology enabling high network connectivity with reduced delay in packet transmission to Internet. The performance tradeoffs and limitations with existing solutions for various mobility conditions are evaluated using simulation."

  1. Quick Access: Find Statistical Data on the Internet.

    Science.gov (United States)

    Su, Di

    1999-01-01

    Provides an annotated list of Internet sources (World Wide Web, ftp, and gopher sites) for current and historical statistical business data, including selected interest rates, the Consumer Price Index, the Producer Price Index, foreign currency exchange rates, noon buying rates, per diem rates, the special drawing right, stock quotes, and mutual…

  2. Human Right and Internet Access : A philosophical investigation

    NARCIS (Netherlands)

    Wang, Xiaowei

    2016-01-01

    As of December 2014, there are three billion Internet users worldwide, of which 649 million are Chinese. This number will grow in the years to come. This technology, of course, possesses immense significance in our everyday life. What is currently new in international human rights practice is the tr

  3. Easing Internet access of health information for elderly users

    NARCIS (Netherlands)

    Alpay, L.L.; Toussaint, P.J.; Ezendam, N.P.M.; Rövekamp, T.A.J.M.; Graafmans, W.C.; Westendorp, R.G.J.

    2004-01-01

    Elderly users are increasingly becoming active consumers of Internet technologies. Developing websites dedicated to this user group presents several design issues (such as that of 'design for all', participatory design, patient empowerment and cognitive usability assessment methods). SeniorGezond is

  4. Progress on Broadband Access to the Internet and Use of Mobile Devices in the United States.

    Science.gov (United States)

    Serrano, Katrina J; Thai, Chan L; Greenberg, Alexandra J; Blake, Kelly D; Moser, Richard P; Hesse, Bradford W

    Healthy People 2020 (HP2020) aims to improve population health outcomes through several objectives, including health communication and health information technology. We used 7 administrations of the Health Information National Trends Survey to examine HP2020 goals toward access to the Internet through broadband and mobile devices (N = 34 080). We conducted descriptive analyses and obtained predicted marginals, also known as model-adjusted risks, to estimate the association between demographic characteristics and use of mobile devices. The HP2020 target (7.7% of the US population) for accessing the Internet through a cellular network was surpassed in 2014 (59.7%), but the HP2020 target (83.2%) for broadband access fell short (63.8%). Sex and age were associated with accessing the Internet through a cellular network throughout the years (Wald F test, P mobile devices presents an opportunity for technology-based health interventions that should be explored.

  5. Assessment method of accessibility conditions: how to make public buildings accessible?

    Science.gov (United States)

    Andrade, Isabela Fernandes; Ely, e Vera Helena Moro Bins

    2012-01-01

    The enforcement of accessibility today has faced several difficulties, such as intervention in historic buildings that now house public services and cultural activities, such as town halls, museums and theaters and should allow access, on equal terms to all people. The paper presents the application of a method for evaluating the spatial accessibility conditions and their results. For this, we sought to support the theoretical foundation about the main issue involved and legislation. From the method used--guided walks--it was possible to identify the main barriers to accessibility in historic buildings. From the identified barriers, possible solutions are presented according to the four components of accessibility: spatial orientation, displacement, use and communication. It is hoped also that the knowledge gained in this research contributes to an improvement of accessibility legislation in relation to the listed items.

  6. Cell phone internet access, online sexual solicitation, partner seeking, and sexual risk behavior among adolescents.

    Science.gov (United States)

    Rice, Eric; Winetrobe, Hailey; Holloway, Ian W; Montoya, Jorge; Plant, Aaron; Kordic, Timothy

    2015-04-01

    Online partner seeking is associated with sexual risk behavior among young adults (specifically men who have sex with men), but this association has yet to be explored among a probability sample of adolescents. Moreover, cell phone internet access and sexual risk taking online and offline have not been explored. A probability sample (N = 1,831) of Los Angeles Unified School District high school students was collected in 2011. Logistic regression models assessed relationships between specific sexual risk behaviors (online sexual solicitation, seeking partners online, sex with internet-met partners, condom use) and frequency of internet use, internet access points, and demographics. Students with cell phone internet access were more likely to report being solicited online for sex, being sexually active, and having sex with an internet-met partner. Bisexual-identifying students reported higher rates of being approached online for sex, being sexually active, and not using condoms at last sex. Gay, lesbian, and questioning (GLQ) students were more likely to report online partner seeking and unprotected sex at last sex with an internet-met partner. Additionally, having sex with an internet-met partner was associated with being male, online sexual solicitation, and online partner seeking. Internet- and school-based sexual health programs should incorporate safety messages regarding online sexual solicitation, seeking sex partners online, and engaging in safer sex practices with all partners. Programs must target adolescents of all sexual identities, as adolescents may not yet be "out," and bisexual and GLQ adolescents are more likely to engage in risky sex behaviors.

  7. Quality Test Template toward Multi-user Access Control of Internet-Based System

    Directory of Open Access Journals (Sweden)

    Nan Nie

    2011-06-01

    Full Text Available Aiming at three kinds of Internet-based system quality problems, which is performance, liability and security, the paper proposes a kind of test template during multi-user login and resource access control, which includes test requirement, login script, role-resource correlating and mutation test technique. Some Internet-based systems are tested and diagnosed by automation test technique of test template. At last, system quality can be verified and improved through the realization mechanism of test template.

  8. Will 5G See its Blind Side? Evolving 5G for Universal Internet Access

    OpenAIRE

    Onireti, Oluwakayode; Qadir, Junaid; Imran, Muhammad Ali; Sathiaseelan, Arjuna

    2016-01-01

    Internet has shown itself to be a catalyst for economic growth and social equity but its potency is thwarted by the fact that the Internet is off limits for the vast majority of human beings. Mobile phones---the fastest growing technology in the world that now reaches around 80\\% of humanity---can enable universal Internet access if it can resolve coverage problems that have historically plagued previous cellular architectures (2G, 3G, and 4G). These conventional architectures have not been a...

  9. Internet access and sexual offences against children: an analysis of crime bureau statistics from India

    Directory of Open Access Journals (Sweden)

    Subahani Shaik

    2015-07-01

    Full Text Available Introduction: The association between pornography and sexual crime is controversial, with various researchers finding positive, no, or negative associations. Recent evidence suggests that there may be a specific association between child pornography, which is easily available on the Internet, and sexual offences against children. Methods: Using methodology similar to an earlier study from India, we obtained official statistics on sexual offences against children, namely rape and procurement of minor girls, for the period 2000-2012 from the National Crime Records Bureau. We analysed the association between the rates of these crimes and Internet access, measured by the number of users per 1,00,000 people. Results: Even after correcting for population growth, we found significant linear associations between Internet availability and the rates of both these offences against children. However, there was no correlation between the growth rate of Internet access and the rate of increase of these crimes. Discussion: While the association between pornography and the rape of adults is still under debate, our results provide indirect evidence of a possible association between Internet availability and sexual crimes against children. Regulation of the Internet to suppress access to child pornography may prevent at least some of these crimes.

  10. Computer and internet access for long-term care residents: perceived benefits and barriers.

    Science.gov (United States)

    Tak, Sunghee H; Beck, Cornelia; McMahon, Ed

    2007-05-01

    In this study, the authors examined residents' computer and Internet access, as well as benefits and barriers to access in nursing homes. Administrators of 64 nursing homes in a national chain completed surveys. Fourteen percent of the nursing homes provided computers for residents to use, and 11% had Internet access. Some residents owned personal computers in their rooms. Administrators perceived the benefits of computer and Internet use for residents as facilitating direct communication with family and providing mental exercise, education, and enjoyment. Perceived barriers included cost and space for computer equipment and residents' cognitive and physical impairments. Implications of residents' computer activities were discussed for nursing care. Further research is warranted to examine therapeutic effects of computerized activities and their cost effectiveness.

  11. Public Libraries and Internet Access across the United States: A Comparison by State 2004–2006

    Directory of Open Access Journals (Sweden)

    Paul T. Jaeger

    2007-06-01

    Full Text Available Drawing upon findings from a national survey of U.S. public libraries, this paper examines trends in Internet and public computing access in public libraries across states from 2004 to 2006. Based on library-supplied information about levels and types of Internet and public computing access, the authors offer insights into the network-based content and services that public libraries provide. Examining data from 2004 to 2006 reveals trends and accomplishments in certain states and geographic regions. This paper details and discusses the data, identifies and analyzes issues related to Internet access, and suggests areas for future research.

  12. IPTV-Internet Protocol Televisions Key Broadcast Building Blocks

    Directory of Open Access Journals (Sweden)

    Muhammad Asif

    2012-01-01

    Full Text Available Telcos, in pursuit of the triple play (voice, video, and data, are investing heavily to compete with the cable companies in providing quality video content to the consumer. However, most telco infrastructures do not currently have the bandwidth to support high-quality video distribution. The telcos are updating their Internet protocol (IP networks and using new encoding schemes such as MPEG4-Part 10 (also called H.264-AVC to deliver video content to the consumer. This creates a huge opportunity for supplying telcos with updated equipment including the latest encoders and decoders. This paper will investigate the technology that is fueling this new Internet protocol television (IPTV infrastructure. The first portion will be looking at the video encoding method and the second portion will focus on the video-over-IP network design that is being used for IPTV.

  13. Security Camera System can be access into mobile with internet from remote place

    Directory of Open Access Journals (Sweden)

    Dr. Khanna SamratVivekanand Omprakash

    2012-01-01

    Full Text Available This paper represents how camera can captured the images and video into the database and then it may transformed to the mobile with help of Internet. Developing mobile applications how the data can be viewed on the mobile from the remote place. By assigning real IP to the storage device from ISP and connected to the internet . Developing mobile applications on windows mobile which runs only on the windows mobile . Wireless camera in terms of 4 , 8, 12, 16 are connected with the system. Windows based application develop for 4 , 8 , 12,16 channels to see at a time on desktop computer . The PC is connected with internet and having Client server application which is connected to the Windows Web hosting Server through the internet. With the help of ISP server we can assign IP to the Window Web Server with domain name . Domain name will be access from the world. By developing mobile applications on web we can access it on mobile . Separate setup of windows .exe develop for the Windows Mobile phone to access the information from the server. Client setup can be installed on the mobile and it fetches the data from server and server is based on real IP with domain name and connected with Internet . Digital Wireless cameras are connected & data is stored in Digital Video Recorder having 1 Terabyte of hard disk with different channel like 4, 8, 12,16. We can see Video output in mobile by installing the client setup or by accessing directly from web browser which supports the application for mobile. The beauty of this software is that we can access security camera system into the mobile with internet from remote place.

  14. Internet access and use by COPD patients in the National Emphysema/COPD Association Survey

    Science.gov (United States)

    2014-01-01

    Background Technology offers opportunities to improve healthcare, but little is known about Internet use by COPD patients. We tested two hypotheses: Internet access is associated with socio-demographic disparities and frequency of use is related to perceived needs. Methods We analyzed data from a 2007–2008 national convenience sample survey of COPD patients to determine the relationship between Internet access and frequency of use with demographics, socio-economic status, COPD severity, and satisfaction with healthcare. Results Among survey respondents (response rate 7.2%; n = 914, 59.1% women, mean age 71.2 years), 34.2% reported lack of Internet access, and an additional 49% had access but used the Internet less than weekly. Multivariate models showed association between lack of access and older age (OR 1.10, 95% CI 1.07, 1.13), lower income (income below $30,000 OR 2.47, 95% CI 1.63, 3.73), less education (high school highest attainment OR 2.30, 95% CI 1.54, 3.45), comorbid arthritis or mobility-related disease (OR 1.56, 95% CI 1.05, 2.34). More frequent use (at least weekly) was associated with younger age (OR 0.95, 95% CI 0.93, 0.98), absence of cardiovascular disease (OR 0.48, 95% CI 0.29, 0.78), but with perception of needs insufficiently met by the healthcare system, including diagnostic delay (OR 1.72, 95% CI 1.06, 2.78), feeling treated poorly (OR 2.46, 95% CI 1.15, 5.24), insufficient physician time (OR 2.29, 95% CI 1.02, 5.13), and feeling their physician did not listen (OR 3.14, 95% CI 1.42, 6.95). Conclusions An analysis of the characteristics associated with Internet access and use among COPD patients identified two different patient populations. Lack of Internet access was a marker of socioeconomic disparity and mobility-associated diseases, while frequent Internet use was associated with less somatic disease but dissatisfaction with care. PMID:24755090

  15. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...

  16. Are nations so different as they access the internet?

    Directory of Open Access Journals (Sweden)

    Alexandre Cappellozza

    2014-04-01

    Full Text Available Abstract: This study analyzed the existence of a common prominence in the audience of websites in different groups of countries aiming at discover whether there is some kind of preferential pattern of access, regardless of the variety of endogenous and exogenous influences that might interfere in the audience of these portals. To appraise the overall popularity of websites, the study developed a Virtual Popularity Index – VPI and applied it with data obtained at the website Alexa (www.alexa.com which provides information about the access to different electronic portals. This information includes traffic, origin and access duration. Thus, through the development and use of this Index as applied to a sample of 2500 observations covering the 20 most visited websites in 125 countries, it was possible to identify that the first eight most accessed websites are the same in the African, American, Asian and European continents. The study also revealed that certain websites analyzed in different continents were able to reach an audience hegemony overcoming any barriers adopted by the users via the possibility of individual content customization.

  17. Who's Connected? Trends from 1999 to 2011 in Home Internet Access in North Carolina

    Directory of Open Access Journals (Sweden)

    Kenneth Wilson

    2013-06-01

    Full Text Available Using the Internet has become an essential part of many people's daily life activities. In this information age, the Internet is an indispensible tool for communicating and sharing of information. This transformation of technological incorporation into every aspect of social life has been relatively swift, although not all-inclusive. Lack of access to the Internet produces and perpetuates social inequality. In this paper we present results of a unique data set compiled from six studies conducted across twelve years in the state of North Carolina. Our results show differences in home access to the Internet are associated with various aspects of social stratification. The findings reveal that digital divide persists over time. At least one quarter of respondents with one or more of the following sociodemographic characteristics reported not having home Internet access: African Americans, those with only a high school degree or less, those without school-age children in the home, those with a household income less than $30,000, people age 69 years and older, and rural residents. Future research and policy recommendations are provided.

  18. Accessibility in Public Buildings: Efficiency of Checklist Protocols.

    Science.gov (United States)

    Andersson, Jonas E; Skehan, Terry

    2016-01-01

    In Sweden, governmental agencies and bodies are required to implement a higher level of accessibility in their buildings than that stipulated by the National Building and Planning Act (PBL). The Swedish Agency for Participation (MFD, Myndigheten för delaktighet) develops holistic guidelines in order to conceptualize this higher level of accessibility. In conjunction to these guidelines, various checklist protocols have been produced. The present study focuses on the efficiency of such checklist protocols. The study revolved around the use of a checklist protocol in assessments of two buildings in Stockholm: the new head office for the National Authority for Social Insurances (ASI) and the School of Architecture at the Royal Institute of Technology (KTH). The study included three groups: Group 1 and Group 2 consisted of 50 real estate managers employed by the ASI, while Group 3 consisted of three participants in a course at the KTH. The results were similar in all of the groups. The use of the checklist protocol generated queries, which related mainly to two factors: (1) the accompanying factsheet consisted of textual explanations with no drawings, photographs or illustrations and (2) the order of the questions in the checklist protocol was difficult to correlate with the two buildings' spatial logic of accessing, egressing and making use of the built space.

  19. Internet accessibility and usage among urban adolescents in Southern California: implications for web-based health research.

    Science.gov (United States)

    Sun, Ping; Unger, Jennifer B; Palmer, Paula H; Gallaher, Peggy; Chou, Chih-Ping; Baezconde-Garbanati, Lourdes; Sussman, Steve; Johnson, C Anderson

    2005-10-01

    The World Wide Web (WWW) poses a distinct capability to offer interventions tailored to the individual's characteristics. To fine tune the tailoring process, studies are needed to explore how Internet accessibility and usage are related to demographic, psychosocial, behavioral, and other health related characteristics. This study was based on a cross-sectional survey conducted on 2373 7th grade students of various ethnic groups in Southern California. Measures of Internet use included Internet use at school or at home, Email use, chat-room use, and Internet favoring. Logistic regressions were conducted to assess the associations between Internet uses with selected demographic, psychosocial, behavioral variables and self-reported health statuses. The proportion of students who could access the Internet at school or home was 90% and 40%, separately. Nearly all (99%) of the respondents could access the Internet either at school or at home. Higher SES and Asian ethnicity were associated with higher internet use. Among those who could access the Internet and after adjusting for the selected demographic and psychosocial variables, depression was positively related with chat-room use and using the Internet longer than 1 hour per day at home, and hostility was positively related with Internet favoring (All ORs = 1.2 for +1 STD, p Internet use (ORs for +1 STD ranged from 1.2 to 2.0, all p Internet use. Substance use was positively related to email use, chat-room use, and at home Internet use (OR for "used" vs. "not used" ranged from 1.2 to 4.0, p Internet use at home but lower levels of Internet use at school. More physical activity was related to more email use (OR = 1.3 for +1 STD), chat room use (OR = 1.2 for +1 STD), and at school ever Internet use (OR = 1.2 for +1 STD, all p Internet use-related measures. In this ethnically diverse sample of Southern California 7(th) grade students, 99% could access the Internet at school and/or at home. This suggests that the Internet

  20. Reducing the MAC Latency for IEEE 802.11 Vehicular Internet Access

    Directory of Open Access Journals (Sweden)

    Daehan Kwak

    2010-01-01

    Full Text Available In an intermittently connected environment, access points are sparsely distributed throughout an area. As mobile users travel along the roadway, they can opportunistically connect, albeit temporarily, to roadside 802.11 (Wi-Fi APs for Internet access. Net-working characteristics of vehicular Internet access in an intermittently connected environment face numerous challenges, such as short periods of connectivity and unpredictable connection times. To meet these challenges, we propose an Access Point Report (APR protocol where mobile stations opportunistically collaborate by broadcasting an APR to other mobile stations to fully utilize the short-lived connection periods. APR can optimize the use of short connection periods by minimizing the scanning delay and also act as a hint that enables mobile users to predict when connection can be established.

  1. Reducing the MAC Latency for IEEE 802.11 Vehicular Internet Access

    Directory of Open Access Journals (Sweden)

    Kang Moonsoo

    2010-01-01

    Full Text Available In an intermittently connected environment, access points are sparsely distributed throughout an area. As mobile users travel along the roadway, they can opportunistically connect, albeit temporarily, to roadside 802.11 (Wi-Fi APs for Internet access. Net-working characteristics of vehicular Internet access in an intermittently connected envi ronment face numerous challenges, such as short periods of connectivity and unpredictable connection times. To meet these challenges, we propose an Access Point Report (APR protocol where mobile stations opportunistically collaborate by broadcasting an APR to other mobile stations to fully utilize the short-lived connection periods. APR can optimize the use of short connection periods by minimizing the scanning delay and also act as a hint that enables mobile users to predict when connection can be established.

  2. Cost effective Internet access and video conferencing for a community cancer network.

    Science.gov (United States)

    London, J W; Morton, D E; Marinucci, D; Catalano, R; Comis, R L

    1995-01-01

    Utilizing the ubiquitous personal computer as a platform, and Integrated Services Digital Network (ISDN) communications, cost effective medical information access and consultation can be provided for physicians at geographically remote sites. Two modes of access are provided: information retrieval via the Internet, and medical consultation video conferencing. Internet access provides general medical information such as current treatment options, literature citations, and active clinical trials. During video consultations, radiographic and pathology images, and medical text reports (e.g., history and physical, pathology, radiology, clinical laboratory reports), may be viewed and simultaneously annotated by either video conference participant. Both information access modes have been employed by physicians at community hospitals which are members of the Jefferson Cancer Network, and oncologists at Thomas Jefferson University Hospital. This project has demonstrated the potential cost effectiveness and benefits of this technology.

  3. Adapting Building Design to Access by Individuals with Intellectual Disability

    Directory of Open Access Journals (Sweden)

    L Castell

    2012-11-01

    Full Text Available Over the last 15 years, since introductionof the Disability Discrimination Act (DDA(Commonwealth Government of Australia,1992, there has been much discussionabout the extent and nature of buildingaccess for the disabled, particularly inresponse to proposed revisions to theBuilding Code of Australia (BCA and theintroduction of a Premises Standardcovering building access. Much of theargument which contributed to the twoyear delay in submitting a final version ofthese documents for government approvalrelated to the extent of access provisionsand the burden of cost. The final versionsubmitted to government by the AustralianBuilding Codes Board (ABCB (notreleased publicly appears to still containinconsistencies between the DDA and theBCA in several areas such as wayfindingand egress.In the debate preceding submission of thefinal version there appears to have beenlittle reference to access requirements forindividuals with intellectual disability (ID.This may be due to a general lack ofresearch on the topic. Consequently, thispaper uses a combination of theknowledge gained from a limited numberof previous wayfinding studies, literaturedescribing general problems faced bythose with ID and the author’s personalexperience observing others with ID tocreate a list of probable difficulties andsuggested solutions. The paperconcludes with a discussion about theassociated cost implications and benefitsin providing the required access.

  4. Towards a tangible web: using physical objects to access and manipulate the Internet of Things

    CSIR Research Space (South Africa)

    Smith, Andrew C

    2013-09-01

    Full Text Available . This additional step has resulted in the phenomenon commonly referred to as the Internet of Things (IoT). In order to realise the full potential of the IoT, individuals need a mechanism to access and manipulate it. A potential mechanism for achieving...

  5. On-Line Access to Linguistically Annotated Text Corpora of Dutch via Internet.

    Science.gov (United States)

    Kruyt, J. G.; Raaijmakers, S. A.; van der Kamp, P. H. J.; van Strien, R. J.

    Corpora of present-day Dutch developed by the Institute for Dutch Lexicology include two linguistically annotated corpora that can be accessed via Internet: a 5-million word corpus covering a variety of topics and text types, and a 27-million word newspaper corpus. The texts of both were acquired in machine-readable form and have been lemmatized…

  6. Global Market Access in the Internet Era: South Africa's Wood Furniture Industry.

    Science.gov (United States)

    Moodley, Sagren

    2002-01-01

    Explores the link between Internet connectivity and access to global markets, and uses the South African wood furniture producers as they are integrated into global value chains and exposed to the demands of more sophisticated markets. Articulates policy recommendations to promote greater diffusion of e-commerce technologies in the wood furniture…

  7. e-Portfolios for Learning and Development: without constant internet or electrical grid access

    NARCIS (Netherlands)

    Casey, John; Calverley, Gayle; Greller, Wolfgang; Uhomoibhi, James

    2011-01-01

    Casey, J., Calverley, G., Greller, W., & Uhomoibhi, J. (2010, 26-28 May). e-Portfolios for Learning and Development: without constant internet or electrical grid access. Presentation at the 5th International Conference on ICT for Development, Education, and Training - eLearning Africa, Lusaka, Zamb

  8. Internet Information-Seeking and Its Relation to Support for Access to Government Records

    Science.gov (United States)

    Cuillier, David; Piotrowski, Suzanne J.

    2009-01-01

    Public access to government records is essential for democratic self-governance, and attitudes toward that right can facilitate or hinder public policy regarding transparency. As more people use the internet for gathering information about their governments and communities, it is unknown whether such online information-seeking is related to…

  9. Outsourcing a High Speed Internet Access Project: An Information Technology Class Case Study in Three Parts

    Science.gov (United States)

    Platt, Richard G.; Carper, William B.; McCool, Michael

    2010-01-01

    In early 2004, the Hilton Hotels Corporation (HHC) required that all of its hotels (both owned and franchised) install high-speed Internet access (HSIA) in all of their rooms by June 2004. This case focuses on how one of its franchise properties located on the northern gulf coast of Florida (the Hilton Sandestin Beach Golf Resort &…

  10. The Changing Role of Community Networks in Providing Citizen Access to the Internet.

    Science.gov (United States)

    Keenan, Thomas P.; Trotter, David Mitchell

    1999-01-01

    Examines the changing role of community network associations or freenets in providing Internet access by examining the case of the Calgary Community Network Association (CCNA) in Alberta, Canada. Discusses the withdrawal of states from the telecommunications field, priorities of the Canadian government, and the role of the private sector.…

  11. Global Market Access in the Internet Era: South Africa's Wood Furniture Industry.

    Science.gov (United States)

    Moodley, Sagren

    2002-01-01

    Explores the link between Internet connectivity and access to global markets, and uses the South African wood furniture producers as they are integrated into global value chains and exposed to the demands of more sophisticated markets. Articulates policy recommendations to promote greater diffusion of e-commerce technologies in the wood furniture…

  12. 36 CFR 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Science.gov (United States)

    2010-07-01

    ... access use of the Internet on NARA-supplied computers? 1254.32 Section 1254.32 Parks, Forests, and Public... of the Internet on NARA-supplied computers? (a) Public access computers (workstations) are available... use personally owned diskettes on NARA personal computers. You may not load files or any type of...

  13. Enhancing Independent Internet Access for Individuals with Mental Retardation through Use of a Specialized Web Browser: A Pilot Study.

    Science.gov (United States)

    Davies, Daniel K.; Stock, Steven E.; Wehmeyer, Michael L.

    2001-01-01

    In this study, a prototype web browser, called Web Trek, that utilizes multimedia to provide access for individuals with cognitive disabilities was developed and pilot-tested with 12 adults with mental retardation. The Web Trek browser provided greater independence in accessing the Internet compared to Internet Explorer. (Contains references.)…

  14. Inhabitation and Access: Landscape and the Internet at Gardom's Edge

    Directory of Open Access Journals (Sweden)

    Mark Edmonds

    1999-05-01

    Full Text Available Last summer saw the launch of a website built around current field research at Gardom's Edge in Derbyshire http://www.shef.ac.uk/~geap/. In this article, we want to highlight some of the ideas that went into the initial development of the site, how it relates to various aspects of our research, and how our first forays into this field have thrown up new questions and problems. We also want to explore how web-based media offer novel forms of access and engagement, particularly for those communities that we often lump together under the catch-all term `the public'.

  15. Data Transmission and Access Protection of Community Medical Internet of Things

    Directory of Open Access Journals (Sweden)

    Xunbao Wang

    2017-01-01

    Full Text Available On the basis of Internet of Things (IoT technologies, Community Medical Internet of Things (CMIoT is a new medical information system and generates massive multiple types of medical data which contain all kinds of user identity data, various types of medical data, and other sensitive information. To effectively protect users’ privacy, we propose a secure privacy data protection scheme including transmission protection and access control. For the uplink transmission data protection, bidirectional identity authentication and fragmented multipath data transmission are used, and for the downlink data protection, fine grained access control and dynamic authorization are used. Through theoretical analysis and experiment evaluation, it is proved that the community medical data can be effectively protected in the transmission and access process without high performance loss.

  16. Local government broadband policies for areas with limited Internet access

    Directory of Open Access Journals (Sweden)

    Yoshio Arai

    2014-03-01

    Full Text Available Despite their wide diffusion in developed countries, broadband services are still limited in areas where providing them is not profitable for private telecom carriers. To address this, many local governments in Japan have implemented broadband deployment projects subsidized by the national government. In this paper, we discuss local government broadband policies based on survey data collected from municipalities throughout the country. With the support of national promotion policies, broadband services were rapidly introduced to most local municipalities in Japan during the 2000s. Local government deployment policies helped to reduce the number of areas with no broadband access. A business model based on the Indefeasible Right of Use (IRU contract between a private telecom carrier and a local government has been developed in recent years. Even local governments without the technical capacity to operate a broadband business can introduce broadband services into their territory using the IRU business model.

  17. Access to CERN from the Internet: termination of the VPN service - Reminder

    CERN Multimedia

    IT Department

    2008-01-01

    Due to the continued incidents and growing security risks associated with the service, access to CERN using the VPN (Virtual Private Network) service will be discontinued as of Tuesday, 29 January 2008. In addition, new registrations are no longer accepted. For further information see: http://cern.ch/security/vpn. Users are requested to stop using VPN immediately and to start to use the recommended alternative methods for connecting to CERN from the Internet. An outline of these methods and a set of FAQs are available at: http://cern.ch/security/Internet IT Department

  18. Access to CERN from the Internet: termination of the VPN service

    CERN Multimedia

    2007-01-01

    Due to the continued incidents and growing security risks from the service, access to CERN using the VPN (Virtual Private Network) service will be discontinued on Tuesday 29th January 2008. In addition, new registrations will no longer be accepted. Further information is linked from: http://cern.ch/security/vpn Users are requested to stop using VPN immediately and start using the recommended alternative methods for connecting to CERN from the Internet. These are outlined together with a set of FAQs at: http://cern.ch/security/Internet IT Department

  19. Access to Internet of People With Disabilities Engellilerin Internet'e Erişimi Üzerine

    Directory of Open Access Journals (Sweden)

    Fatoş Subaşıoğlu

    2000-06-01

    Full Text Available The last decade has producted a revolution in the world of Internet and computer technology for many disabled people. Especially, with the help of adaptive technology, for example, deaf-blind people can communicate over telephone networks and severely visaully impaired people can read a computer screen directly with the help of speech synthesis or automatically generated Braille displays. People with physical disabilities can use personel computers by blowing. If s even possible to control computers by using the voice. However, currently, the largest problem is that WWW pages are increasingly developed with pictures, images, audio and video clips carrying much of the information. For this reason, the aims of this article are twofold: first, to give some information about products of adaptive technologies for people with disabilities, and second, to give some design examples about Web pages for this people. Son 10 yıl içinde, engellilere yönelik Internet ve bilgisayar teknolojisi alanında yeni bir oluşum yaşanmaya başlandı. Özellikle uyarlanmış teknoloji yardımıyla örneğin, sağır-kör insanlar telefon ağları ile iletişim kurabilmekte ve birçok görme engelli insan konuşma sentezi aracılığı ile bir bilgisayar ekranını ya da otomatik olarak üretilmiş Braille görüntülerini okuyabilmektedir. Fiziksel engelliler, üfleyerek bilgisayarlarını kullanabilmekte, hatta ses ile bilgisayarı kullanmak mümkün olmaktadır. Ancak, günümüzde en büyük sorun, WWW say falarının yoğunlukla resimler, görüntüler, ses ve video küpleri ile geliştirilmekte olduğudur. Bu nedenle bu makalenin amacı, öncelikle engellilere yönelik uyarlanmış teknoloji ürünleri alanında bilgi vermek ve bu bireylere yönelik Web tasarım örnekleri sunmaktır.

  20. Literacy disparities in patient access and health-related use of Internet and mobile technologies.

    Science.gov (United States)

    Bailey, Stacy C; O'Conor, Rachel; Bojarski, Elizabeth A; Mullen, Rebecca; Patzer, Rachel E; Vicencio, Daniel; Jacobson, Kara L; Parker, Ruth M; Wolf, Michael S

    2015-12-01

    Age and race-related disparities in technology use have been well documented, but less is known about how health literacy influences technology access and use. To assess the association between patients' literacy skills and mobile phone ownership, use of text messaging, Internet access, and use of the Internet for health-related purposes. A secondary analysis utilizing data from 1077 primary care patients enrolled in two, multisite studies from 2011-2013. Patients were administered an in-person, structured interview. Patients with adequate health literacy were more likely to own a mobile phone or smartphone in comparison with patients having marginal or low literacy (mobile phone ownership: 96.8 vs. 95.2 vs. 90.1%, respectively, P text messaging (78.6 vs. 75.2 vs. 53.1%, P literacy-related disparities in technology access and use are widespread, with lower literate patients being less likely to own smartphones or to access and use the Internet, particularly for health reasons. Future interventions should consider these disparities and ensure that health promotion activities do not further exacerbate disparities. © 2014 John Wiley & Sons Ltd.

  1. The Study of Access Control for Service-Oriented Computing in Internet of Things

    Directory of Open Access Journals (Sweden)

    Guoping Zhang

    2012-06-01

    Full Text Available In Internet of Things, computing and processing of information is the core supporting. In this paper, we introduce “Service-Oriented Computing” to solve the computing and processing of information in IoT. However, a key challenge in service-oriented environment is the design of effective access control schemas.We put forward a model of Workflow -oriented Attributed Based Access Control (WABAC, and an access control framework based on WABAC model. WABAC model grants and adapts permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

  2. The digital divide: Trends in global mobile and broadband Internet access from 2000-2010.

    Science.gov (United States)

    Ronquillo, Charlene; Currie, Leanne

    2012-01-01

    The digital divide is described as the gap between those who do and do not have access to digital information and communications technologies (ICT). ICTs are viewed as an indicator of infrastructure and potential for development, and are a growing platform for health information and services delivery. This study compares the penetration of mobile and broadband Internet technologies by global region from 2000 to 2010. Results illustrate the rapid growth of mobile cellular telephone subscriptions in all global regions with trends suggesting a continued increase. Little to modest gains were made in fixed broadband Internet subscriptions globally. There is a growing popularity of mobile subscriptions with use of data communications, exceeding the numbers of fixed Internet subscriptions. This comparison reveals current strengths that can be built on and highlights the importance of awareness of global trends and using such knowledge to inform design and delivery of ICT-based health services.

  3. The digital divide: Trends in global mobile and broadband Internet access from 2000–2010

    Science.gov (United States)

    Ronquillo, Charlene; Currie, Leanne

    2012-01-01

    The digital divide is described as the gap between those who do and do not have access to digital information and communications technologies (ICT). ICTs are viewed as an indicator of infrastructure and potential for development, and are a growing platform for health information and services delivery. This study compares the penetration of mobile and broadband Internet technologies by global region from 2000 to 2010. Results illustrate the rapid growth of mobile cellular telephone subscriptions in all global regions with trends suggesting a continued increase. Little to modest gains were made in fixed broadband Internet subscriptions globally. There is a growing popularity of mobile subscriptions with use of data communications, exceeding the numbers of fixed Internet subscriptions. This comparison reveals current strengths that can be built on and highlights the importance of awareness of global trends and using such knowledge to inform design and delivery of ICT-based health services. PMID:24199118

  4. A Novel Adaptive MAC Protocol for Wireless Internet Access Network with Smart Antennas

    Institute of Scientific and Technical Information of China (English)

    YANGJun; LIJiandong

    2004-01-01

    Employing smart antennas in the Central access point (CAP) of wireless Internet access networks is studied. Based on the characteristics of the networks and smart antennas, a Polling-based Adaptive beamforming multiple access protocol (PB-ABFMA) is proposed. In PB-ABFMA, the CAP requests the corresponding Mobile terminal (MT) to transmit training sequence just before the data packets transmission, so the Temporal reference beamforming (TRB) can be performed by the smart antennas. The CAP schedules packet transmissions based on the polling mechanism and dynamic TDMA, and a mini-slot is used to keep connectivity when an MT is idle, therefore,the access delay is reduced. Meanwhile, a simple and effec-tive access method is proposed to guarantee rapid access of new arrival MTs to the channel. Based on the “requestreply” traffic, which is the main traffic in Internet, the theoretical analysis of channel utilization and mean turnaround delay is presented. Analysis and simulation results show that the proposed PB-ABFMA protocols effectively support the application of smart antennas and provide high channel utilization and low turn-around delay.

  5. Security analysis and improvements of authentication and access control in the Internet of Things.

    Science.gov (United States)

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  6. Evolution of Network Access Points (NAPs and agreements among Internet Service Providers (ISPs in South America

    Directory of Open Access Journals (Sweden)

    Fernando Beltrán

    2006-05-01

    Full Text Available Este artículo presenta los aspectos principales del desarrollo histórico y de asuntos actuales en el mercado suramericano de acceso a Internet: los acuerdos de interconexión para el intercambio de tráfico local y regional en Suramérica, los incentivos que tienen los proveedores de acceso a Internet para mantener o modificar la naturaleza de los acuerdos y los métodos de recuperación de costos en los puntos de intercambio de tráfico. El artículo también identifica algunas amenazas a la estabilidad de los puntos de intercambio de tráfico y las ilustra con dos casos. / This paper presents the main aspects of the historical development and the current issues at stake in the South American Internet access market: the interconnection schemes for the exchange of local and regional traffic in the South American region, the incentives Internet access providers have for keeping or modifying the nature of the agreements, and the cost recovery methods at the traffic exchange points. Some threats to the stability of the scheme for domestic traffic exchange adopted throughout the region are also identified and subsequently illustrated with country-cases.

  7. Internet中数据库访问方法%The Methods of Accessing Database through Internet

    Institute of Scientific and Technical Information of China (English)

    李惠欢

    2001-01-01

    介绍了在Internet中可以访问数据库的几种方法,包括CGI,JDBC,IDC等,以及各种方法的工作方式、特点、目前支持的厂商等。结合Sybase数据库和广东省仪器设备系统,用各种方法进行实际应用,并分析结果。%This paper introduces the methods of accessing database through Internet, including CGI, JDBC, IDC, etc. Describes how they work, their specialties and their suppliers. Using these methods we access Sybase SQL Server through Internet and analyze the result.

  8. Providing India with Internet access anywhere there is electricity - and Canada with commercial opportunity

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    Access to high-speed Internet service is booming all over the world but the cost of optic cable installation and other related broadband delivery technology is still too high for many developing countries to afford. A Canada-India R & D group is working on a broadband technology delivered over the power line in order to provide internet access wherever there is electricity. Moreover, the application of such a technology in rural India could also improve the distribution and management of India's national electrical grid, as the risk of electricity theft can be monitored by power assumption tracking. Since the required infrastructure is already in place across the country, this project could be deployed rapidly and in a cost-efficient manner, providing thousands of potential opportunities for rural dwellers as well as for Indian and international companies.

  9. Cell Phone Internet Access, Online Sexual Solicitation, Partner Seeking, and Sexual Risk Behavior among Adolescents

    OpenAIRE

    Rice, Eric; Winetrobe, Hailey; Holloway, Ian W.; Montoya, Jorge; Plant, Aaron; Kordic, Timothy

    2014-01-01

    Online partner seeking is associated with sexual risk behavior among young adults (specifically men who have sex with men), but this association has yet to be explored among a probability sample of adolescents. Moreover, cell phone internet access and sexual risk taking online and offline have not been explored. A probability sample (N = 1,831) of Los Angeles Unified School District high school students was collected in 2011. Logistic regression models assessed relationships between specific ...

  10. Universal model for collective access patterns in the Internet traffic dynamics: A superstatistical approach

    Science.gov (United States)

    Tamazian, A.; Nguyen, V. D.; Markelov, O. A.; Bogachev, M. I.

    2016-07-01

    We suggest a universal phenomenological description for the collective access patterns in the Internet traffic dynamics both at local and wide area network levels that takes into account erratic fluctuations imposed by cooperative user behaviour. Our description is based on the superstatistical approach and leads to the q-exponential inter-session time and session size distributions that are also in perfect agreement with empirical observations. The validity of the proposed description is confirmed explicitly by the analysis of complete 10-day traffic traces from the WIDE backbone link and from the local campus area network downlink from the Internet Service Provider. Remarkably, the same functional forms have been observed in the historic access patterns from single WWW servers. The suggested approach effectively accounts for the complex interplay of both “calm” and “bursty” user access patterns within a single-model setting. It also provides average sojourn time estimates with reasonable accuracy, as indicated by the queuing system performance simulation, this way largely overcoming the failure of Poisson modelling of the Internet traffic dynamics.

  11. Primary health-care nurses and Internet health information-seeking: Access, barriers and quality checks.

    Science.gov (United States)

    Gilmour, Jean; Strong, Alison; Chan, Helen; Hanna, Sue; Huntington, Annette

    2016-02-01

    Online information is a critical resource for evidence-based practice and patient education. This study aimed to establish New Zealand nurses' access and evaluation of online health information in the primary care context using a postal questionnaire survey; there were 630 respondents from a random sample of 931 nurses. The majority of respondents were satisfied with work access to online information (84.5%, n = 501) and searched for online information at least several times a week (57.5%, n = 343). The major barrier to online information seeking was insufficient time, but 68 respondents had no work online information access. The level of nursing qualification was significantly correlated with computer confidence and information quality checking. A range of information evaluation approaches was used. Most nurses in study accessed and evaluated Internet information in contrast to the findings of earlier studies, but there were barriers preventing universal integration into practice.

  12. Internet accessible hot cell with gamma spectroscopy at the Missouri S and T nuclear reactor

    Energy Technology Data Exchange (ETDEWEB)

    Grant, Edwin [Nuclear Engineering, Missouri University of Science and Technology, 203 Fulton Hall, 300 W. 13th St., Rolla, MO 65409 (United States); Mueller, Gary, E-mail: gmueller@mst.edu [Nuclear Engineering, Missouri University of Science and Technology, 203 Fulton Hall, 300 W. 13th St., Rolla, MO 65409 (United States); Castano, Carlos; Usman, Shoaib; Kumar, Arvind [Nuclear Engineering, Missouri University of Science and Technology, 203 Fulton Hall, 300 W. 13th St., Rolla, MO 65409 (United States)

    2011-08-15

    Highlights: > A dual-chambered internet-accessible heavily shielded facility has been built. > The facility allows distance users to analyze neutron irradiated samples remotely. > The Missouri S and T system uses computer automation with user feedback. > The system can analyze multiple samples and assist several researchers concurrently. - Abstract: A dual-chambered internet-accessible heavily shielded facility with pneumatic access to the University of Missouri Science and Technology (Missouri S and T) 200 kW Research Nuclear Reactor (MSTR) core has been built and is currently available for irradiation and analysis of samples. The facility allows authorized distance users engaged in collaborative activities with Missouri S and T to remotely manipulate and analyze neutron irradiated samples. The system consists of two shielded compartments, one for multiple sample storage, and the other dedicated exclusively for radiation measurements and spectroscopy. The second chamber has multiple detector ports, with graded shielding, and has the capability to support gamma spectroscopy using radiation detectors such as an HPGe detector. Both these chambers are connected though a rapid pneumatic system with access to the MSTR nuclear reactor core. This new internet-based system complements the MSTR's current bare pneumatic tube (BPT) and cadmium lined pneumatic tube (CPT) facilities. The total transportation time between the core and the hot cell, for samples weighing 10 g, irradiated in the MSTR core, is roughly 3.0 s. This work was funded by the DOE grant number DE-FG07-07ID14852 and expands the capabilities of teaching and research at the MSTR. It allows individuals who do not have on-site access to a nuclear reactor facility to remotely participate in research and educational activities.

  13. Building partnership to improve migrants’ access to healthcare in Mumbai

    Directory of Open Access Journals (Sweden)

    Nilesh Chandrakant Gawde

    2015-11-01

    Full Text Available Objectives: An intervention to improve migrants’ access to healthcare was piloted in Mumbai with purpose of informing health policy and planning. This paper aims to describe the process of building partnership for improving migrants’ access to healthcare of the pilot intervention including the role played by different stakeholders and the contextual factors affecting the intervention. Methods: The process evaluation was based upon Baranowski and Stables’ framework. their Observations in community and conversations with stakeholders as recorded in daily diaries, minutes of pre-intervention workshops and stakeholder meetings served as data sources. Data were coded using the framework and descriptive summaries of evaluation components were prepared.Results: Recruitment of stakeholders was easier than sustaining their interest. Community representatives led the intervention assisted by government officials. They planned community level interventions to improve access to healthcare which involved predominantly information, education and communication activities for which pre-existing formal and informal social networks and community events were used. Although the intervention reached migrants living with families, single male migrants neither participated nor did the intervention reach them consistently. Contextual factors such as culture differences between migrants and native population and illegality in the nature of the settlement resulting in the exclusion from services were the barriers. Conclusion: Inclusive multi-stakeholder partnership including migrants themselves and using both formal and informal networks in community is a feasible strategy for health education and has potential to improve the migrants’ access to healthcare. However, there are challenges to the partnership process and new strategies to overcome these challenges need to be tested such as peer-led models for involvement of single male migrants. For sustaining such

  14. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned......Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... attacks. The protocol evaluation by using security protocol verification tool shows that IECAC is secure against these attacks. This paper also discusses performance analysis of the protocol in terms of computational time and compared with other existing solutions....

  15. AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS

    Directory of Open Access Journals (Sweden)

    F. Beritelli1

    2016-06-01

    Full Text Available The paper proposes a new method for the analysis and evaluation of the Quality of Service (QoS in a mobile Internet access scenario. In particular, the paper proposes a throughput evaluation method based on PathChirp algorithm. The end-to-end bandwidth was estimated by means of the Self Loading of Periodic Streams (SloPS technique. The obtained measurements were then analyzed by estimating the degree of correlation with other parameters that characterize the data transmission such as power, round trip time, etc. Finally, in order to have greater spatial resolution performance guaranteed by an Internet service provider, a 3D reconstruction method based on using drones is proposed and some preliminary results are discussed.

  16. Access for Internet of Things using Smartphone as a Gateway utilizing LTE and WiFi

    DEFF Research Database (Denmark)

    Mathur, Prateek; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2016-01-01

    the data to the Internet. In this paper we present a system model wherein the smartphone functions as a gateway for the IoT devices operating on NFC, ZigBee and Bluetooth. The smartphone functioning as a gateway for transferring IoT data. The system modelled in the form of a Markov Chain based......Communicating the Internet of Things (IoT) data relying on Long-Term Evolution (LTE) and WiFi has been been presented in the relevant literature. However, this necessitates devices to have LTE/WiFi capability of their own, that has limitations in the form of power consumption, and radio access...... congestion. Alternatively, Bluetooth, ZigBee, and Near Field Communication (NFC) are promising technologies for low power personal area network communication, and used for IoT devices. These technologies have not been truly examined for their capacity for IoT as they require a custom gateway to communicate...

  17. Broadband wireless communications for railway applications for onboard internet access and other applications

    CERN Document Server

    Masson, Émilie

    2017-01-01

    This book focuses on the needs of railway operators in terms of wireless communications, divided in two main categories: the commercial services and the operational needs. Then, all available technologies that can be used to provide Internet access on board trains and all the other operational applications requiring high capacity are detailed. Finally, challenges and trends in railway telecommunications are highlighted, through the presentation of the future and emerging technologies, the current discussions and works in the different authorities, and the key challenges and scientific barriers.

  18. Internet Access in U.S. Public Schools and Classrooms: 1994-2005. Highlights. NCES 2007-020

    Science.gov (United States)

    Wells, John; Lewis, Laurie

    2006-01-01

    The National Center for Education Statistics (NCES) has employed its Fast Response Survey System (FRSS) to track access to information technology in schools and classrooms since 1994. This report presents key findings from the 2005 FRSS survey on Internet access in U.S. public schools and selected comparisons with data from previous FRSS…

  19. Distributed Multi-Sensor Real-Time Building Environmental Parameters Monitoring System with Remote Data Access

    Directory of Open Access Journals (Sweden)

    Beinarts Ivars

    2014-12-01

    Full Text Available In this paper the advanced monitoring system of multiple environmental parameters is presented. The purpose of the system is a long-term estimation of energy efficiency and sustainability for the research test stands which are made of different building materials. Construction of test stands, and placement of main sensors are presented in the first chapter. The structure of data acquisition system includes a real-time interface with sensors and a data logger that allows to acquire and log data from all sensors with fixed rate. The data logging system provides a remote access to the processing of the acquired data and carries out periodical saving at a remote FTP server using an Internet connection. The system architecture and the usage of sensors are explained in the second chapter. In the third chapter implementation of the system, different interfaces of sensors and energy measuring devices are discussed and several examples of data logger program are presented. Each data logger is reading data from analog and digital channels. Measurements can be displayed directly on a screen using WEB access or using data from FTP server. Measurements and acquired data graphical results are presented in the fourth chapter in the selected diagrams. The benefits of the developed system are presented in the conclusion.

  20. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Bruce Ndibanje

    2014-08-01

    Full Text Available Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. According to our analysis, Jing et al.’s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  1. Perceptions of Medicaid Beneficiaries Regarding the Usefulness of Accessing Personal Health Information and Services through a Patient Internet Portal

    Science.gov (United States)

    Lobach, David F.; Willis, Janese M.; Macri, Jennifer M.; Simo, Jessica; Anstrom, Kevin J.

    2006-01-01

    Increasing emphasis is being placed on the importance of information technology to improve the safety and quality of healthcare. However, concern is growing that these potential benefits will not be equally distributed across the population because of a widening digital divide along racial and socioeconomic lines. In this pilot study, we surveyed 31 Medicaid beneficiaries to ascertain their interest in and projected use of a healthcare patient Internet portal. We found that most Medicaid beneficiaries (or their parents/guardians) were very interested in accessing personal health information about themselves (or their dependents) online. Additionally, they were interested in accessing healthcare services online. We also found that many Medicaid beneficiaries have Internet access, including a slight majority with access to high-speed Internet connections. Our study revealed significant concern about the privacy of online health information. PMID:17238393

  2. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2013-01-01

    and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... is secure against aforementioned attacks. This paper also discusses performance analysis of the protocol in terms of computational time compared to other existing solutions. Furthermore, this paper addresses challenges in IoT and security attacks are modelled with the use cases to give an actual view of IoT......In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...

  3. Results of an Iridium-Based Data Communication System Providing Internet Access to Polar Expeditions

    Science.gov (United States)

    Mohammad, A.; Frost, V.; Braaten, D.

    2003-12-01

    ' W) from June 23-July 17, 2003. We measured the reliability, throughput and general performance of this system over periods of up to 24 hours. This included delay, loss, throughput, call drops/up-time, relative signal strengths, connection time and number of connection retries. The system was also successfully tested while moving across the ice sheet at speeds of up to 30 km/h. We were successful in uploading and downloading large files (.2MB to 7.2MB) to the Internet. In combination with a modified Wi-Fi deployment, wireless Internet access was also provided to the entire NorthGRIP camp for a few days. The field experiments have shown that standard Internet protocols combined with MLPPP and Iridium modems can provide Internet access for polar expeditions at useful data rates. The 4-modem configuration we tested was observed to be >90 % efficient, e.g., a 2.5 MB video file was transferred in 35 min. at 9.524 Kb/s. The system had an average up-time of over 90 % and thus is stable and suitable for autonomous operation. Mobile performance results were very similar to that of stationary systems. While the end-to-end network architecture developed to provide Internet access worked well, the system round trip time is significant ( ˜ 1.8 seconds), which can impair real time interactions.

  4. Associations among Different Internet Access Time, Gender and Cyberbullying Behaviors in Taiwan’s Adolescents

    Directory of Open Access Journals (Sweden)

    Cheng-Min Chao

    2017-06-01

    Full Text Available With the increasing convenience of social networking sites and their interconnectedness with human interaction, verbal and image bullying have turned digital, making cyberbullying a new form of bullying attracting the attention of researchers, social workers, and schools. This study focuses on the status quo of attitude toward cyberbullying and cyberbullying behavior, explores associations of attitude toward behavior on cyberbullying behavior in gender and different internet access times. In a cross-sectional survey, adolescents were surveyed through self-report questionnaires, 13,864 respondents were received among 150 high schools in Taiwan. Statistical analyses were performed using structural equation modeling (SEM. The study revealed that attitude toward cyberbullying has a direct effect on cyberbullying behavior; among the greatest direct impact were when students use the Internet during the time frame 10:00–14:00. Parents and schoolteachers pay special attention to students using the Internet during this time frame 10:00–14:00 and give guidance, express care, and help those being bullied to communicate and use the Internet in a correct manner. Among genders, male student attitude toward behavior has a greater effect than those of female students. Both male and female students know what cyberbullying is and have witnessed, heard of, or personally encountered cyberbullying behavior. We recommend students talk to parents or teachers or other people who care to reduce the negative effects of cyberbullying. We hopeful that the conceptualization model presented in this study serves as an activator for researches on attitude toward cyberbullying and cyberbullying behavior, and serves a guide and a call to attract more researches in this area.

  5. Associations among Different Internet Access Time, Gender and Cyberbullying Behaviors in Taiwan’s Adolescents

    Science.gov (United States)

    Chao, Cheng-Min; Yu, Tai-Kuei

    2017-01-01

    With the increasing convenience of social networking sites and their interconnectedness with human interaction, verbal and image bullying have turned digital, making cyberbullying a new form of bullying attracting the attention of researchers, social workers, and schools. This study focuses on the status quo of attitude toward cyberbullying and cyberbullying behavior, explores associations of attitude toward behavior on cyberbullying behavior in gender and different internet access times. In a cross-sectional survey, adolescents were surveyed through self-report questionnaires, 13,864 respondents were received among 150 high schools in Taiwan. Statistical analyses were performed using structural equation modeling (SEM). The study revealed that attitude toward cyberbullying has a direct effect on cyberbullying behavior; among the greatest direct impact were when students use the Internet during the time frame 10:00–14:00. Parents and schoolteachers pay special attention to students using the Internet during this time frame 10:00–14:00 and give guidance, express care, and help those being bullied to communicate and use the Internet in a correct manner. Among genders, male student attitude toward behavior has a greater effect than those of female students. Both male and female students know what cyberbullying is and have witnessed, heard of, or personally encountered cyberbullying behavior. We recommend students talk to parents or teachers or other people who care to reduce the negative effects of cyberbullying. We hopeful that the conceptualization model presented in this study serves as an activator for researches on attitude toward cyberbullying and cyberbullying behavior, and serves a guide and a call to attract more researches in this area. PMID:28713309

  6. Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies

    OpenAIRE

    Hui, Terence K. L.; Sherratt, R. Simon; Diaz Sanchez, Daniel

    2016-01-01

    The recent boom in the Internet of Things (IoT) will turn Smart Cities and Smart Homes (SH) from hype to reality. SH is the major building block for Smart Cities and have long been a dream for decades, hobbyists in the late 1970s made Home Automation (HA) possible when personal computers started invading home spaces. While SH can share most of the IoT technologies, there are unique characteristics that make SH special. From the result of a recent research survey on SH and IoT technologies, th...

  7. Internet

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    微软想要统治Internet,Windows XP就是这个计划中的一个组成部分。微软已经努力争取提供连接Internet的最方便、最完整的方法。新的操作系统含有Internet Explorer 6(IE6)、新的保密功能以及防火墙保护。Windows XP甚至包含有一个Macromedia Flash播放器插件。但是对Sun微系统公司的打击就是

  8. Using a Virtual Room Platform To Build a Multimedia Distance Learning Environment For The Internet

    Directory of Open Access Journals (Sweden)

    Allen Ginsberg

    2000-01-01

    Full Text Available Education and training are expected to change dramatically due to the combined impact of the Internet and multimedia technologies. A challenge for internet-based education systems is to allow educators and trainers to work from known models, while simultaneously letting them experiment with innovations without requiring frequent retooling. Work in distance learning, while of interest in its own right, is important to our general research program as a test bed for our ideas. The basic research program is to provide a general foundation, or set of "primitive" classes, for building remote collaboration environments, and then to build toolkits using these classes, and other more specific classes, that will address the particular requirements of various collaboration environments. Our basic premise is that the virtual room concept together with other fundamental concepts provides such a foundation. In this paper we discuss our virtual room platform and a distance-learning environment called PERSYST. PERSYST has been used in several distance-learning trials; we close this paper with a discussion of the trials and what we have learned from them.

  9. Smart Residential Buildings as Learning Agent Organizations in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Schatten Markus

    2014-03-01

    Full Text Available Background: Smart buildings are one of the major application areas of technologies bound to embedded systems and the Internet of things. Such systems have to be adaptable and flexible in order to provide better services to its residents. Modelling such systems is an open research question. Herein, the question is approached using an organizational modelling methodology bound to the principles of the learning organization. Objectives: Providing a higher level of abstraction for understanding, developing and maintaining smart residential buildings in a more human understandable form. Methods/Approach: Organization theory provides us with the necessary concepts and methodology to approach complex organizational systems. Results: A set of principles for building learning agent organizations, a formalization of learning processes for agents, a framework for modelling knowledge transfer between agents and the environment, and a tailored organizational structure for smart residential buildings based on Nonaka’s hypertext organizational form. Conclusions: Organization theory is a promising field of research when dealing with complex engineering systems

  10. Web based dosimetry system for reading and monitoring dose through internet access

    Energy Technology Data Exchange (ETDEWEB)

    Perle, S.C.; Bennett, K.; Kahilainen, J.; Vuotila, M. [Mirion Technologies (United States); Mirion Technologies (Finland)

    2010-07-01

    The Instadose{sup TM} dosemeter from Mirion Technologies is a small, rugged device based on patented direct ion storage technology and is accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) through NIST, bringing radiation monitoring into the digital age. Smaller than a flash drive, this dosemeter provides an instant read-out when connected to any computer with internet access and a USB connection. Instadose devices provide radiation workers with more flexibility than today's dosemeters. Non Volatile Analog Memory Cell surrounded by a Gas Filled Ion Chamber. Dose changes the amount of Electric Charge in the DIS Analog Memory. The total charge storage capacity of the memory determines the available dose range. The state of the Analog Memory is determined by measuring the voltage across the memory cell. AMP (Account Management Program) provides secure real time access to account details, device assignments, reports and all pertinent account information. Access can be restricted based on the role assignment assigned to an individual. A variety of reports are available for download and customizing. The Advantages of the Instadose dosemeter are: - Unlimited reading capability, - Concerns about a possible exposure can be addressed immediately, - Re-readability without loss of exposure data, with cumulative exposure maintained. (authors)

  11. Collaborative Virtual 3D Environment for Internet-Accessible Physics Experiments

    Directory of Open Access Journals (Sweden)

    Bettina Scheucher

    2009-08-01

    Full Text Available Abstract—Immersive 3D worlds have increasingly raised the interest of researchers and practitioners for various learning and training settings over the last decade. These virtual worlds can provide multiple communication channels between users and improve presence and awareness in the learning process. Consequently virtual 3D environments facilitate collaborative learning and training scenarios. In this paper we focus on the integration of internet-accessible physics experiments (iLabs combined with the TEALsim 3D simulation toolkit in Project Wonderland, Sun's toolkit for creating collaborative 3D virtual worlds. Within such a collaborative environment these tools provide the opportunity for teachers and students to work together as avatars as they control actual equipment, visualize physical phenomenon generated by the experiment, and discuss the results. In particular we will outline the steps of integration, future goals, as well as the value of a collaboration space in Wonderland's virtual world.

  12. Menores y acceso a Internet en el hogar: las normas familiares Internet Access by Minors at Home: Usage Norms Imposed by Parents

    Directory of Open Access Journals (Sweden)

    Mercè Morey López

    2010-03-01

    Full Text Available Este artículo analiza el establecimiento de normas por parte de los progenitores a sus hijos sobre la utilización de Internet en los hogares. Los datos se han obtenido mediante encuestación sobre una muestra representativa de los menores de las Islas Baleares de entre 6 y 16 años, habiéndose analizado las siguientes dimensiones: acceso de los menores a Internet desde el hogar; grado de autonomía o acompañamiento en la navegación; normativización impuesta en el hogar por parte de sus padres y madres; tipos de normas impuestas; relación entre normas y género; valoración de los menores de los conocimientos y habilidades de sus progenitores para navegar por Internet y, finalmente, el acompañamiento de los padres y madres a la hora de navegar por Internet. Se constata que poco más del 53% de los menores de entre 6 y 14 años, y del 62% de los de 15 y 16 años navegan a través de Internet sin que sus progenitores les establezcan limitaciones. Cuando establecen algún tipo de normas, éstas se refieren, principalmente, a restricciones de carácter temporal. Por tanto, se infiere que los padres y madres no son conscientes de los peligros de la Red o que, al menos, actúan de forma poco razonable. Ello muestra la necesidad de sensibilizar y formar a las familias para que asuman su responsabilidad educativa.This paper examines and discusses the rules and standards set by parents for their children on Internet usage at home. Data that supports the paper have been obtained by surveying a representative sample of children in the Balearic Islands aged between 6 and 16 years; the analysis dimensions are: access by minors to the Internet from home; location of the computer from which have online access; level of autonomy or accompaniment while surfing the Net; norms imposed by their parents; types of rules imposed; relationship between norms and gender; the minors’ opinion and assessment of the knowledge and abilities of their parents on use of

  13. Closing the digital divide in HIV/AIDS care: development of a theory-based intervention to increase Internet access.

    Science.gov (United States)

    Kalichman, S C; Weinhardt, L; Benotsch, E; Cherry, C

    2002-08-01

    Advances in information technology are revolutionizing medical patient education and the Internet is becoming a major source of information for people with chronic medical conditions, including HIV/AIDS. However, many AIDS patients do not have equal access to the Internet and are therefore at an information disadvantage, particularly minorities, persons of low-income levels and individuals with limited education. This paper describes the development and pilot testing of a workshop-style intervention designed to close the digital divide in AIDS care. Grounded in the Information-Motivation-Behavioral Skills (IMB) model of health behaviour change, we developed an intervention for persons with no prior history of using the Internet. The intervention included instruction in using hardware and search engines, motivational enhancement to increase interest and perceived relevance of the Internet, and skills for critically evaluating and using health information accessed via the Internet. Participants were also introduced to communication and support functions of the Internet including e-mail, newsgroups and chat groups. Pilot testing demonstrated feasibility, acceptability and promise for closing the digital divide in HIV/AIDS care using a relatively brief and intensive theory-based intervention that could be implemented in community settings.

  14. Architectural and Mobility Management Designs in Internet-Based Infrastructure Wireless Mesh Networks

    Science.gov (United States)

    Zhao, Weiyi

    2011-01-01

    Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…

  15. Architectural and Mobility Management Designs in Internet-Based Infrastructure Wireless Mesh Networks

    Science.gov (United States)

    Zhao, Weiyi

    2011-01-01

    Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…

  16. A Way to Build Software Culture: Distributed Object-Oriented Software Engineering over Internet

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper focuses on Distributed Object-Oriented SoftwareEngineerin g over Internet, which is a way to build software culture. We believe that our w ork will contribute to better understanding of how to meet the needs of the big potential software market and to promote the software industry in developing cou ntry. The United States and Western Europe have well-established software indu s try and related civilization. Software science, technology, and engineering are needed in China; however, maybe what is needed, first of all, is software civil ization, including software ideas, customs, skills, arts, etc. We will draw a f ramework for the software culture as following: Software is the most important c ommodity in this age; Brilliance of hardware component era has become past fact; A software component era is ahead; Traditional linear process model is obsolete ; Modern software engineering has a new face, object evolution model; Distribute d object-oriented software engineering over Internet is an approach to software component era; and Complete software civilization will be formed all over the wo rld in next century.

  17. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  18. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Meng Yi

    2016-11-01

    Full Text Available This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  19. Accessing and managing open medical resources in Africa over the Internet

    Science.gov (United States)

    Hussein, Rada; Khalifa, Aly; Jimenez-Castellanos, Ana; de la Calle, Guillermo; Ramirez-Robles, Maximo; Crespo, Jose; Perez-Rey, David; Garcia-Remesal, Miguel; Anguita, Alberto; Alonso-Calvo, Raul; de la Iglesia, Diana; Barreiro, Jose M.; Maojo, Victor

    2014-10-01

    Recent commentaries have proposed the advantages of using open exchange of data and informatics resources for improving health-related policies and patient care in Africa. Yet, in many African regions, both private medical and public health information systems are still unaffordable. Open exchange over the social Web 2.0 could encourage more altruistic support of medical initiatives. We have carried out some experiments to demonstrate the feasibility of using this approach to disseminate open data and informatics resources in Africa. After the experiments we developed the AFRICA BUILD Portal, the first Social Network for African biomedical researchers. Through the AFRICA BUILD Portal users can access in a transparent way to several resources. Currently, over 600 researchers are using distributed and open resources through this platform committed to low connections.

  20. The Potential of Using a Mobile Phone to Access the Internet for Learning EFL Listening Skills within a Korean Context

    Science.gov (United States)

    Nah, Ki Chune; White, Peter; Sussex, Roland

    2008-01-01

    Interest in the use of a mobile phone to access the Internet for learning English in general, and listening skills in particular, has been increasing in Korea over the last few years. However, there has been only a small number of studies on this topic in Korea. The present paper investigates the potential of using a mobile phone to browse…

  1. Filtering Access to Internet Content at Higher Education Institutions: Stakeholder Perceptions and Their Impact on Research and Academic Freedom

    Science.gov (United States)

    Orenstein, David I.

    2009-01-01

    Hardware and software filters, which sift through keywords placed in Internet search engines and online databases, work to limit the return of information from these sources. By their very purpose, filters exist to decrease the amount of information researchers can access. The purpose of this study is to gain insight into the perceptions key…

  2. Help-seeking characteristics of Chinese- and English-speaking Australians accessing Internet-delivered cognitive behavioural therapy for depression.

    Science.gov (United States)

    Choi, Isabella; Andrews, Gavin; Sharpe, Louise; Hunt, Caroline

    2015-01-01

    Internet treatments may overcome barriers and improve access to mental health services for people who do not access professional help. It may be particularly beneficial for Chinese Australians, a group that tends to delay and underutilize face-to-face treatments. This study explored the appeal of Internet therapy to Chinese- and English-speaking Australians with depression who accessed Internet-delivered cognitive behavioural therapy (iCBT) programs. Data collected from previous randomised controlled trials of iCBT depression programs were used. Using a matched samples design, 55 Chinese- and 55 English-speaking iCBT participants with depression were matched on age, gender, and depression screener scores. They were compared on their symptom severity, previous help-seeking patterns, and reasons for seeking Internet treatment. The Chinese-speaking participants had significantly milder depressive symptoms and were less likely to have previously sought professional help compared to the English-speaking participants (all ps speaking participants were more likely to seek iCBT due to lack of knowledge about face-to-face treatment (p = 0.005), while the English-speaking participants were more likely to report not benefiting from traditional help (p = 0.030). The attraction of iCBT appears to be the reduction of structural barriers to treatment. iCBT may reduce treatment delay and increase access to Chinese Australians who have not sought professional help. English-speaking Australians are seeking iCBT as an additional means of getting help.

  3. Accessing Suicide-Related Information on the Internet: A Retrospective Observational Study of Search Behavior

    Science.gov (United States)

    2013-01-01

    Background The Internet’s potential impact on suicide is of major public health interest as easy online access to pro-suicide information or specific suicide methods may increase suicide risk among vulnerable Internet users. Little is known, however, about users’ actual searching and browsing behaviors of online suicide-related information. Objective To investigate what webpages people actually clicked on after searching with suicide-related queries on a search engine and to examine what queries people used to get access to pro-suicide websites. Methods A retrospective observational study was done. We used a web search dataset released by America Online (AOL). The dataset was randomly sampled from all AOL subscribers’ web queries between March and May 2006 and generated by 657,000 service subscribers. Results We found 5526 search queries (0.026%, 5526/21,000,000) that included the keyword "suicide". The 5526 search queries included 1586 different search terms and were generated by 1625 unique subscribers (0.25%, 1625/657,000). Of these queries, 61.38% (3392/5526) were followed by users clicking on a search result. Of these 3392 queries, 1344 (39.62%) webpages were clicked on by 930 unique users but only 1314 of those webpages were accessible during the study period. Each clicked-through webpage was classified into 11 categories. The categories of the most visited webpages were: entertainment (30.13%; 396/1314), scientific information (18.31%; 240/1314), and community resources (14.53%; 191/1314). Among the 1314 accessed webpages, we could identify only two pro-suicide websites. We found that the search terms used to access these sites included “commiting suicide with a gas oven”, “hairless goat”, “pictures of murder by strangulation”, and “photo of a severe burn”. A limitation of our study is that the database may be dated and confined to mainly English webpages. Conclusions Searching or browsing suicide-related or pro-suicide webpages was

  4. Moving toward More Effective Public Internet Access: The 1998 National Survey of Public Library Outlet Internet Connectivity.

    Science.gov (United States)

    Bertot, John Carlo; McClure, Charles R.

    This publication reports on research conducted to follow up on a 1997 survey of public libraries and the Internet, co-sponsored by the National Commission on Libraries and Information Science and the American Library Association. The 1998 survey is based on a sample of 2,500 of the nation's 15,718 public library outlets. The survey found that…

  5. Integrating open-source technologies to build low-cost information systems for improved access to public health data

    Directory of Open Access Journals (Sweden)

    Oberle Mark W

    2008-06-01

    Full Text Available Abstract Effective public health practice relies on the availability of public health data sources and assessment tools to convey information to investigators, practitioners, policy makers, and the general public. Emerging communication technologies on the Internet can deliver all components of the "who, what, when, and where" quartet more quickly than ever with a potentially higher level of quality and assurance, using new analysis and visualization tools. Open-source software provides the opportunity to build low-cost information systems allowing health departments with modest resources access to modern data analysis and visualization tools. In this paper, we integrate open-source technologies and public health data to create a web information system which is accessible to a wide audience through the Internet. Our web application, "EpiVue," was tested using two public health datasets from the Washington State Cancer Registry and Washington State Center for Health Statistics. A third dataset shows the extensibility and scalability of EpiVue in displaying gender-based longevity statistics over a twenty-year interval for 3,143 United States counties. In addition to providing an integrated visualization framework, EpiVue's highly interactive web environment empowers users by allowing them to upload their own geospatial public health data in either comma-separated text files or MS Excel™ spreadsheet files and visualize the geospatial datasets with Google Maps™.

  6. The Blind Can 'Seeing' Tourist Destinations in the Internet? An Analysis of the Accessibility of Official Websites of Brazilian States

    Directory of Open Access Journals (Sweden)

    Francisco Vicente Sales Melo

    2013-08-01

    Full Text Available This paper analyzes the accessibility of official websites of Brazilian states with regard to seeking information about their destinations by blind people. We evaluated all tourism portals of each state through two software accessibility evaluators. Then, two blind people who are users of the Internet and has a habit of traveling for leisure accessed portals. After analysis, it was found that only the tourism website of the State of Paraná presented as accessible both in analysis of the software for the evaluation of the participants, indicating that almost all Brazilian portals are not accessible to these people. The study does not present practical solutions to improve the accessibility of Brazilian tourism portals, just from a descriptive analysis, but especially relevant, raise issues and provoke discussion about the topic in question.

  7. Software for Building Models of 3D Objects via the Internet

    Science.gov (United States)

    Schramer, Tim; Jensen, Jeff

    2003-01-01

    The Virtual EDF Builder (where EDF signifies Electronic Development Fixture) is a computer program that facilitates the use of the Internet for building and displaying digital models of three-dimensional (3D) objects that ordinarily comprise assemblies of solid models created previously by use of computer-aided-design (CAD) programs. The Virtual EDF Builder resides on a Unix-based server computer. It is used in conjunction with a commercially available Web-based plug-in viewer program that runs on a client computer. The Virtual EDF Builder acts as a translator between the viewer program and a database stored on the server. The translation function includes the provision of uniform resource locator (URL) links to other Web-based computer systems and databases. The Virtual EDF builder can be used in two ways: (1) If the client computer is Unix-based, then it can assemble a model locally; the computational load is transferred from the server to the client computer. (2) Alternatively, the server can be made to build the model, in which case the server bears the computational load and the results are downloaded to the client computer or workstation upon completion.

  8. The digital divide: Examining socio-demographic factors associated with health literacy, access and use of internet to seek health information.

    Science.gov (United States)

    Estacio, Emee Vida; Whittle, Rebecca; Protheroe, Joanne

    2017-02-01

    This article aims to examine the socio-demographic characteristics associated with access and use of Internet for health-related purposes and its relationship with health literacy. Data were drawn from a health literacy survey ( N = 1046) and analysed using logistic regression. Results show a strong association between health literacy, internet access and use. Socio-demographic characteristics particularly age, education, income, perceived health and social isolation also predict internet access. Thus, in addition to widening access, the movement towards digitisation of health information and services should also consider digital skills development to enable people to utilise digital technology more effectively, especially among traditionally hard-to-reach communities.

  9. Analysis of accessibility for buildings of a graduation school--an experiment in ergonomics training curriculum.

    Science.gov (United States)

    Acioly, A S G; Oliveira, M D; Freitas, V H F

    2012-01-01

    This article presents a description of a study experience developed in the Discipline of Supervised Internship of the Industrial Design Course of the Federal University of Paraíba. The study is based on focused on ergonomics analysis and accessibility as an object of study, access into and out of buildings of classrooms and laboratories of the same institution. Among the buildings selected, which encompass where the course is established, is a contemporary building and a renovated building of historical and artistic values for current use. The study is characterized by a description of the objects of study, analysis of the reference literature and recommendations for adjustments in the event of any inconsistency with the accessibility standards. The experience of this supervised training provided an opportunity to perform design activities to a group of students in applied ergonomics, as well as enabling contact with professional practice, adding the contact with the appropriate guidelines governing intervention in historic heritage buildings.

  10. Internet Banking

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2006-01-01

    Full Text Available Internet Banking (known also as online banking allows performing transactions and payments over the internet through a bank's secure website. This can be very useful, especially for banking outside bank hours (which tend to be very short and banking from anywhere where internet access is available. In most cases a web browser such as Internet Explorer or Mozilla Firefox is utilized and any normal internet connection is suitable. No special software or hardware is usually needed.

  11. Impact of language anxiety and self-efficacy on accessing Internet sites.

    Science.gov (United States)

    Yang, Hui-Jen; Lay, Yun-Long; Tsao, Wen-Yu; Liou, Yi-Chin; Lin, Cheng-Kun

    2007-04-01

    Language interface plays a critical role as the foundation of communication. Possessing greater fluency in the host language can lead to increased opportunities for interaction with host members. This research is to examine the impact of language and Internet usage anxiety and self-efficacy on the intended uses of Internet sites, respectively. By the same token, whether Internet/language self-efficacy would mediate the effects of Internet/language anxiety on the intention of the Internet site use is also examined. A valid sample of 368 undergraduates was tested in this study. The path analysis results mostly supported the model tested. The results display that the anxiety of language and Internet use have significantly influenced self-efficacy of Internet use and language, respectively. Anxiety about language and Internet use have also significantly influenced the intention to use Internet sites individually. Furthermore, language self-efficacy has significantly influenced the intention to use Internet sites, but Internet self-efficacy has not. The implications are discussed at the end of the paper.

  12. Public library computer training for older adults to access high-quality Internet health information.

    Science.gov (United States)

    Xie, Bo; Bugg, Julie M

    2009-09-01

    An innovative experiment to develop and evaluate a public library computer training program to teach older adults to access and use high-quality Internet health information involved a productive collaboration among public libraries, the National Institute on Aging and the National Library of Medicine of the National Institutes of Health (NIH), and a Library and Information Science (LIS) academic program at a state university. One hundred and thirty-one older adults aged 54-89 participated in the study between September 2007 and July 2008. Key findings include: a) participants had overwhelmingly positive perceptions of the training program; b) after learning about two NIH websites (http://nihseniorhealth.gov and http://medlineplus.gov) from the training, many participants started using these online resources to find high quality health and medical information and, further, to guide their decision-making regarding a health- or medically-related matter; and c) computer anxiety significantly decreased (p libraries, LIS academic programs, and other organizations interested in providing similar programs in their communities.

  13. Access to Everything: Building the Future Academic Library Collection

    Science.gov (United States)

    Levine-Clark, Michael

    2014-01-01

    Academic libraries have always been deeply associated with their collections, but the nature of those collections has changed radically as we have entered the digital age. As libraries continue to evolve, they will focus strongly on special collections while adopting a goal of providing access to as much other content as possible. The collection…

  14. The influence of the digital divide on face preferences in El Salvador: people without internet access prefer more feminine men, more masculine women, and women with higher adiposity.

    Science.gov (United States)

    Batres, Carlota; Perrett, David I

    2014-01-01

    Previous studies on face preferences have found that online and laboratory experiments yield similar results with samples from developed countries, where the majority of the population has internet access. No study has yet explored whether the same holds true in developing countries, where the majority of the population does not have internet access. This gap in the literature has become increasingly important given that several online studies are now using cross-country comparisons. We therefore sought to determine if an online sample is representative of the population in the developing country of El Salvador. In studies of Hispanic men and women aged 18-25, we tested facial masculinity and adiposity preferences by collecting data in person as well as online. Our results showed that there were no differences in preferences between people who reported having internet access, whether they were tested online or in person. This provides evidence that testing style does not bias preferences among the same population. On the other hand, our results showed multiple differences in preferences between people who reported having internet access and people who reported not having internet access. More specifically, we found that people without internet access preferred more feminine men, more masculine women, and women with higher adiposity than people with internet access. We also found that people without internet access had fewer resources (e.g. running water) than people with internet access, suggesting that harshness in the environment may be influencing face preferences. These findings suggest that online studies may provide a distorted perspective of the populations in developing countries.

  15. The influence of the digital divide on face preferences in El Salvador: people without internet access prefer more feminine men, more masculine women, and women with higher adiposity.

    Directory of Open Access Journals (Sweden)

    Carlota Batres

    Full Text Available Previous studies on face preferences have found that online and laboratory experiments yield similar results with samples from developed countries, where the majority of the population has internet access. No study has yet explored whether the same holds true in developing countries, where the majority of the population does not have internet access. This gap in the literature has become increasingly important given that several online studies are now using cross-country comparisons. We therefore sought to determine if an online sample is representative of the population in the developing country of El Salvador. In studies of Hispanic men and women aged 18-25, we tested facial masculinity and adiposity preferences by collecting data in person as well as online. Our results showed that there were no differences in preferences between people who reported having internet access, whether they were tested online or in person. This provides evidence that testing style does not bias preferences among the same population. On the other hand, our results showed multiple differences in preferences between people who reported having internet access and people who reported not having internet access. More specifically, we found that people without internet access preferred more feminine men, more masculine women, and women with higher adiposity than people with internet access. We also found that people without internet access had fewer resources (e.g. running water than people with internet access, suggesting that harshness in the environment may be influencing face preferences. These findings suggest that online studies may provide a distorted perspective of the populations in developing countries.

  16. Internet sites of public utilities. Customers wish for interactive access; Die Internetauftritte der Versorger. Kunden wuenschen interaktive Anbindung

    Energy Technology Data Exchange (ETDEWEB)

    Knechtel, Karsten [Process Management Consulting GmbH, Muenchen (Germany)

    2010-11-15

    Electric and gas utilities all have internet sites for private customers. Many of them provide interactive access to all relevant services for both regular and interested new customers. To the end users, innovative aspects of energy supply in the deregulated market are currently of increasing interest. A recent industry barometer shows the extent to which utilities have installed interactive integration of both their current and prospective private customers in their business processes. Especially multimedia criteria are gaining increasing importance. (orig.)

  17. Planning of Efficient Wireless Access with IEEE 802.16 for Connecting Home Network to the Internet

    Directory of Open Access Journals (Sweden)

    Krairit Donyaprueth

    2010-01-01

    Full Text Available The emergence of IEEE802.16 wireless standard technology (WiMAX has significantly increased the choice to operators for the provisioning of wireless broadband access network. WiMAX is being deployed to compliment with xDSL in underserved or lack of the broadband network area, in both developed and developing countries. Many incumbent operators in developing countries are considering the deployment of WiMAX as part of their broadband access strategy. This paper presents an efficient and simple method for planning of broadband fixed wireless access (BFWA with IEEE802.16 standard to support home connection to Internet. The study formulates the framework for planning both coverage and capacity designs. The relationship between coverage area and access rate from subscriber in each environment area is presented. The study also presents the throughput and channel capacity of IEEE802.16 in different access rates. An extensive analysis is performed and the results are applied to the real case study to demonstrate the practicality of using IEEE 802.16 for connecting home to Internet. Using empirical data and original subscriber traffic from measurement, it is shown that the BFWA with IEEE802.16 standard is a capacity limited system. The capacity of IEEE802.16 is related to different factors including frequency bandwidth, spectrum allocation, estimation of traffic per subscriber, and choice of adaptive modulation from subscriber terminal. The wireless access methods and procedures evolved in this research work and set out in this paper are shown to be well suited for planning BFWA system based on IEEE802.16 which supports broadband home to Internet connections.

  18. Alimentação saudável: acesso à informação via mapas de navegação na internet Healthy Nutrition: access to information via navigation maps on the internet

    Directory of Open Access Journals (Sweden)

    Maria Ligia Rangel-S

    2012-01-01

    Full Text Available Apresentam-se e discutem-se os resultados de uma pesquisa realizada com o objetivo de desenvolver uma tecnologia de informação e comunicação via web para a promoção da alimentação saudável, mediante a facilitação do acesso à informação na internet. Buscou-se, mediante entrevistas, conhecer as concepções e identificar demandas e necessidades de informações e conhecimentos sobre o tema, dentre ONGs que trabalham com saúde; e ainda, mapear informações e conhecimentos acerca da alimentação saudável na web, em sítios nacionais. A partir dos resultados, elaboraram-se mapas conceituais, colocados em diálogo mediado pelos pesquisadores, com os saberes dos especialistas. Descreve-se a metodologia utilizada para construir os mapas de navegação orientados por mapas conceituais e discutem-se os desafios da gestão e do acesso à informação e ao conhecimento em saúde na internet. Destaca-se o potencial para deslocar o modelo da oferta de informação para o de construção compartilhada do conhecimento mediada por tecnologias de informação e comunicação.We present and discuss the results of a survey that aimed of develop an information and communication technology in the web in order to promote healthy nutrition, by facilitating access to information on the internet. We sought through interviews, knowing the concepts and identifying demands and needs for information and knowledge on the subject, among NGO's working with health. Besides, mapping information and knowledge about the healthy eating on the web at national sites. From the results, concept maps were prepared, placed in dialogue, mediated by researchers with the knowledge of experts. The paper also describes the methodology used to build navigation maps oriented by concept maps and discusses the challenges of management and access to health information and knowledge on the internet. We highlight the potential to shift the model of supply information for the shared

  19. Access and use of the Internet for health information seeking: a survey of local public health professionals in the northwest.

    Science.gov (United States)

    Turner, Anne M; Petrochilos, Deanna; Nelson, David E; Allen, Eileen; Liddy, Elizabeth D

    2009-01-01

    We conducted an on-line survey of 164 local health departments' staff in five Northwestern states in 2006-2007 to assess Internet access and use by staff. Most (96%) respondents had full-time access to their own worksite computer. The most important selection criterion for selecting Web sites was credibility of the sponsoring organization (55%). Accuracy (46%), reputable source (30%), and currency of information (19%) were considered most critical for assessing information quality. Centers for Disease Control and Prevention (80%) and state health department (60%) sites were used most commonly. These findings can be used to improve public health Web sites and support decision making in practice.

  20. Analysis and Research of Internet Access Technology%Internet接入技术的分析与研究

    Institute of Scientific and Technical Information of China (English)

    张莉

    2015-01-01

    该文分析研究了各种Internet接入技术或手段,其中包括电话拨号、DDN专线、xDSL、Cable-modem、光纤、无线、电力线接入技术,并比较了它们的优缺点.%In this paper, we analyze and study the technology of Internet access, including telephone dialing, DDN, Cable-mo-dem, xDSL, optical fiber, wireless, power line access technology, and compare their advantages and disadvantages.

  1. Impacts of Public Access to the Internet through Pennsylvania Public Libraries.

    Science.gov (United States)

    Bertot, John Carlo; McClure, Charles R.

    1997-01-01

    Presents an evaluation of the OnLine at PA Libraries (1996-97) Internet-based information services and resources project for Pennsylvania residents. The project provided a statewide demonstration to improve public library services; connect public libraries to the Internet; provide a range of new services and resources to their communities; and…

  2. 探析鄞州广电宽带上网管控系统%Analysis of Broadband Internet Accessing Management System of Yinzhou Radio and Television

    Institute of Scientific and Technical Information of China (English)

    陈成; 邱荣国

    2012-01-01

    In the progress of boosting triple play, Yinzhou Radio and Television abundantly developed conscious activity on broadband internet accessing business. According to actual situation itself, instantaneously developed broadband internet accessing management system, which better satisfied the requirement of broadband internet accessing of triple play and realized careful management of broadband internet accessing equipment and users.%在推进三网融合的过程中,鄞州广电在发展宽带上网业务中充分发挥主观能动性,根据自身的实际情况即时地开发了宽带上网管控系统,更好地符合三网融合的宽带上网业务发展要求,实现了对宽带上网设备与用户的精细化管理。

  3. Government internet secure access technical architecture%政府部门互联网安全接入技术架构

    Institute of Scientific and Technical Information of China (English)

    刘盛辉; 朱志祥; 任学强

    2012-01-01

    In view of government internet access situation, it presents the Government Internet Secure Access Technical architecture. By constructing the Government Internet Secure Access Point Government Internet Secure Access Operation Center, it achieves the goals of manageability, controllability, scalability of E-government network.. It also takes Shaanxi Province for example and describes Shaanxi Government Internet Secure Access technical architecture, which is mainly relying on the E-Government unified platform, by constructing six Government Internet Secure Access Points and one Government Internet Secure Access Operation Center, can we realize the secure access and centralized supervision of Government Internet.%针对我国政府部门互联网接入现状,提出了政府部门互联网安全接入技术架构。通过建立政府部门安全接入点和安全接入管理中心,实现对电子政务网络的可管、可控和可剥离。并以陕西省为例,详细介绍了陕西省政府部门互联网安全接入技术架构,依托电子政务统一平台,通过建立6个互联网安全接入点和1个安全接入管理中心,实现了政府部门互联网安全接入和集中监管。

  4. Mobile agent-enabled framework for structuring and building distributed systems on the internet

    Institute of Scientific and Technical Information of China (English)

    CAO Jiannong; ZHOU Jingyang; ZHU Weiwei; LI Xuhui

    2006-01-01

    Mobile agent has shown its promise as a powerful means to complement and enhance existing technology in various application areas. In particular, existing work has demonstrated that MA can simplify the development and improve the performance of certain classes of distributed applications, especially for those running on a wide-area, heterogeneous, and dynamic networking environment like the Internet. In our previous work, we extended the application of MA to the design of distributed control functions, which require the maintenance of logical relationship among and/or coordination of processing entities in a distributed system. A novel framework is presented for structuring and building distributed systems, which use cooperating mobile agents as an aid to carry out coordination and cooperation tasks in distributed systems. The framework has been used for designing various distributed control functions such as load balancing and mutual exclusion in our previous work. In this paper, we use the framework to propose a novel approach to detecting deadlocks in distributed system by using mobile agents, which demonstrates the advantage of being adaptive and flexible of mobile agents. We first describe the MAEDD (Mobile Agent Enabled Deadlock Detection) scheme, in which mobile agents are dispatched to collect and analyze deadlock information distributed across the network sites and, based on the analysis, to detect and resolve deadlocks. Then the design of an adaptive hybrid algorithm derived from the framework is presented. The algorithm can dynamically adapt itself to the changes in system state by using different deadlock detection strategies. The performance of the proposed algorithm has been evaluated using simulations. The results show that the algorithm can outperform existing algorithms that use a fixed deadlock detection strategy.

  5. Evaluation of an open-access CBT-based Internet program for social anxiety: Patterns of use, retention, and outcomes.

    Science.gov (United States)

    Dryman, M Taylor; McTeague, Lisa M; Olino, Thomas M; Heimberg, Richard G

    2017-10-01

    Internet-delivered cognitive-behavioral therapy (ICBT) has been established as both efficacious and effective in reducing symptoms of social anxiety. However, most research has been conducted in controlled settings, and little is known regarding the utility of such programs in an open-access format. The present study examined the use, adherence, and effectiveness of Joyable, an open-access, Internet-delivered, coach-supported CBT-based intervention for social anxiety. Participants were 3,384 registered users (Mage [SD] = 29.82 [7.89]; 54% male) that created an account between 2014 and 2016. Characteristics of use, factors related to attrition and adherence, and within-group outcomes were examined. The primary outcome measure was the Social Phobia Inventory. On average, participants remained in the program for 81.02 days (SD = 60.50), during which they completed 12.14 activities (SD = 11.09) and 1.53 exposures (SD = 3.18). About half (57%) had contact with a coach. Full adherence to the program was achieved by 16% of participants, a rate higher than previously published open-access studies of ICBT. Social anxiety symptoms were significantly reduced for participants that engaged in the program, with medium within-group effects from baseline through the cognitive restructuring module (d = 0.63-0.76) and large effects from baseline through the exposure module (d = 1.40-1.83). Response rates were high (72%). Exposures and coach contact were significant predictors of retention and outcome. This open-access online CBT-based program is effective in reducing social anxiety symptoms and has the potential to extend Internet-based mental health services to socially anxious individuals unwilling or unable to seek face-to-face evidence-based therapy. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  6. Chromhome: A rich internet application for accessing comparative chromosome homology maps

    Directory of Open Access Journals (Sweden)

    Cox Tony

    2008-03-01

    Full Text Available Abstract Background Comparative genomics has become a significant research area in recent years, following the availability of a number of sequenced genomes. The comparison of genomes is of great importance in the analysis of functionally important genome regions. It can also be used to understand the phylogenetic relationships of species and the mechanisms leading to rearrangement of karyotypes during evolution. Many species have been studied at the cytogenetic level by cross species chromosome painting. With the large amount of such information, it has become vital to computerize the data and make them accessible worldwide. Chromhome http://www.chromhome.org is a comprehensive web application that is designed to provide cytogenetic comparisons among species and to fulfil this need. Results The Chromhome application architecture is multi-tiered with an interactive client layer, business logic and database layers. Enterprise java platform with open source framework OpenLaszlo is used to implement the Rich Internet Chromhome Application. Cross species comparative mapping raw data are collected and the processed information is stored into MySQL Chromhome database. Chromhome Release 1.0 contains 109 homology maps from 51 species. The data cover species from 14 orders and 30 families. The homology map displays all the chromosomes of the compared species as one image, making comparisons among species easier. Inferred data also provides maps of homologous regions that could serve as a guideline for researchers involved in phylogenetic or evolution based studies. Conclusion Chromhome provides a useful resource for comparative genomics, holding graphical homology maps of a wide range of species. It brings together cytogenetic data of many genomes under one roof. Inferred painting can often determine the chromosomal homologous regions between two species, if each has been compared with a common third species. Inferred painting greatly reduces the need to

  7. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

    Science.gov (United States)

    Hernández-Ramos, José L; Bernabe, Jorge Bernal; Moreno, M Victoria; Skarmeta, Antonio F

    2015-07-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  8. Internet Use and Access, Behavior, Cyberbullying, and Grooming: Results of an Investigative Whole City Survey of Adolescents.

    Science.gov (United States)

    Vismara, Marco Flavio Michele; Toaff, Joseph; Pulvirenti, Giuliana; Settanni, Chiara; Colao, Emma; Lavano, Serena Marianna; Cemicetti, Riccardo; Cotugno, David; Perrotti, Giuseppe; Meschesi, Viviana; Montera, Roberto; Zepponi, Barbara; Rapetto, Umberto; Marotta, Rosa

    2017-08-29

    According to the Digital Agenda for Europe, the way children use the Internet and mobile technologies has changed dramatically in the past years. The aims of this study were to: (1) breakdown the modalities of access and use of the Internet by teenagers to assess risks and risky behaviors; and (2) provide scientific data to evaluate and counsel safe use of the Internet and new technologies by teenagers. The study was conducted under the program "Strategies for a Better Internet for Children" started in May 2012 by the European Commission. It represents the main result of the project launched by Telecom Italia, "Anche io ho qualcosa da dire" (I too have something to say), thanks to which many contributions were collected and used to develop a survey. The questionnaire was structured in 45 questions, covering three macro areas of interest. It was approved by the Department Board at University of Magna Graecia's School of Medicine. After authorization from the regional high school authority, it was administered to all 1534 students (aged 13-19 years) in the city of Catanzaro, Italy. The data was broken down into three main groups: (1) describing education and access to the Internet; (2) methods of use and social networking; and (3) perception and evaluation of risk and risky behaviors. Among noteworthy results in the first group, we can mention that the average age of first contact with information technologies was around 9 years. Moreover, 78.87% (1210/1534) of the interviewed students reported having access to a smartphone or a tablet. Among the results of the second group, we found that the most used social networks were Facebook (85.78%, 1316/1534), YouTube (61.14%, 938/1534), and Google+ (51.56%, 791/1534). About 71.31% (1094/1534) of the interviewed teenagers use their name and surname on social networks, and 40.09% (615/1534) of them knew all their Facebook contacts personally. Among the results of the third group, we found that 7.69% (118/1534) of the

  9. Breast cancer information on the internet: analysis of accessibility and accuracy.

    Science.gov (United States)

    Quinn, E M; Corrigan, M A; McHugh, S M; Murphy, D; O'Mullane, J; Hill, A D K; Redmond, H P

    2012-08-01

    Studies show internet sourced information often has poor accuracy. However, it is rapidly becoming a major source of patient information. Our aim was to assess accuracy of breast cancer-related information on the internet. The top five breast cancer-related search terms were identified using the commercial program "Wordtracker". These terms were searched using the search-engine "Google" and the top 100 webpages per topic analysed for applicability and accuracy of information. Overall 500 webpages were analysed. 42% were inapplicable to the question asked. Applicable accuracy rates were variable amongst the five terms: "breast cancer symptoms" 84%, "breast cancer care" 87%, "breast cancer stage" 88%, "breast cancer survival" 91% and "breast cancer signs" 78%. Educational websites were more likely to be accurate(p cancer information on the internet is difficult due to large numbers of inapplicable unregulated websites preferentially returned via search engines.

  10. A Web-based computer system supporting information access, exchange and management during building processes

    DEFF Research Database (Denmark)

    Sørensen, Lars Schiøtt

    1998-01-01

    During the last two decades, a number of research efforts have been made in the field of computing systmes related to the building construction industry. Most of the projects have focused on a part of the entire design process and have typically been limited to a specific domain. This paper prese...... presents a newly developed computer system based on the World Wide Web on the Internet. The focus is on the simplicity of the systems structure and on an intuitive and user friendly interface...

  11. "La Comunidad Habla": Using Internet Community-Based Information Interventions to Increase Empowerment and Access to Health Care of Low Income Latino/a Immigrants

    Science.gov (United States)

    Ginossar, Tamar; Nelson, Sara

    2010-01-01

    The innovative educational communication interventions described in this paper include the use of bi-lingual, low literacy level websites and training created by low income Latina women to increase access to health care, health information, and the internet. We focus on one grassroots intervention, aimed at increasing access to health care for…

  12. "La Comunidad Habla": Using Internet Community-Based Information Interventions to Increase Empowerment and Access to Health Care of Low Income Latino/a Immigrants

    Science.gov (United States)

    Ginossar, Tamar; Nelson, Sara

    2010-01-01

    The innovative educational communication interventions described in this paper include the use of bi-lingual, low literacy level websites and training created by low income Latina women to increase access to health care, health information, and the internet. We focus on one grassroots intervention, aimed at increasing access to health care for…

  13. Toward a Multifaceted Model of Internet Access for Understanding Digital Divides: An Empirical Investigation

    NARCIS (Netherlands)

    Deursen, van Alexander J.A.M.; Dijk, van Jan A.G.M.

    2015-01-01

    In this investigation, a multifaceted model of Internet appropriation that encompasses four types of access—motivational, material, skills, and usage—is tested with a representative sample of the Dutch population. The analysis indicates that while the digital divide policies' focus has moved to skil

  14. Toward a Multifaceted Model of Internet Access for Understanding Digital Divides: An Empirical Investigation

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; van Dijk, Johannes A.G.M.

    2015-01-01

    In this investigation, a multifaceted model of Internet appropriation that encompasses four types of access—motivational, material, skills, and usage—is tested with a representative sample of the Dutch population. The analysis indicates that while the digital divide policies' focus has moved to

  15. Increasing Public Awareness of Direct-to-Consumer Genetic Tests: Health Care Access, Internet Use, and Population Density Correlates

    Directory of Open Access Journals (Sweden)

    Lila J. Finney Rutten

    2012-01-01

    Full Text Available Uncertainty around the value of and appropriate regulatory models for direct-to-consumer (DTC genetic testing underscores the importance of tracking public awareness of these services. We analyzed nationally representative, cross-sectional data from the Health Information National Trends Survey in 2008 (n=7,674 and 2011 (n=3,959 to assess population-level changes in awareness of DTC genetic testing in the U.S. and to explore sociodemographic, health care, Internet use, and population density correlates. Overall, awareness increased significantly from 29% in 2008 to 37% in 2011. The observed increase in awareness from 2008 to 2011 remained significant (OR=1.39 even when adjusted for sociodemographic variables, health care access, Internet use, and population density. Independent of survey year, the odds of awareness of DTC genetic tests were significantly higher for those aged 50–64 (OR=1.64, and 65–74 (OR=1.60; college graduates (OR=2.02; those with a regular source of health care (OR=1.27; those with a prior cancer diagnosis (OR=1.24; those who use the Internet (OR=1.27; and those living in urban areas (OR=1.25. Surveillance of awareness—along with empirical data on use of and response to genetic risk information—can inform public health and policy efforts to maximize benefits and minimize risks of DTC genetic testing.

  16. Internet Banking: An Interaction Building Channel for Bank-Customer Relationships

    Science.gov (United States)

    Banerjee, Madhumita

    This chapter examines the weakening and strengthening of relationships in technology determined bank-customer interactions. It focuses on the use of Internet banking for long-term service maintenance in a multiple channel usage context. The research findings from a study conducted with retail banking customers in the UK, indicate how customers combine the concepts of ‘convenience’ and ‘control’ in performing banking activities through Internet banking. In addition, while the users demand enhanced functionalities, the non-users seek innovation in customer service to aid their understanding and initiate their use of Internet banking. Such a scenario creates situations that transfer work back from the customers to the bank employees with likely changes in the roles and responsibilities of the frontline staff. As a social consequence of Internet banking usage, issues about the dichotomy of convenience and stress are also discussed. The potential of a virtual and remote channel like Internet banking in creating enhanced bank-customer relationships becomes salient with implications for organisational strategies.

  17. The construction industry has to focus on the Internet

    DEFF Research Database (Denmark)

    Sørensen, Lars Schiøtt; Balogh, Andre

    1997-01-01

    The construction industries needs to follow the developments on the computing scene is discussed. A proposal to separate information relevant for the building sector into three areas are described. Further it is described how this information can be accessed during new technology, especially...... the Internet. An "extra-net" on the Internet combined with an user friendly GUI is described as a possibility....

  18. Testing the associations between different aspects of seafarers' employment contract and on-board internet access and their job and life satisfaction and health.

    Science.gov (United States)

    Slišković, Ana; Penezić, Zvjezdan

    2016-12-01

    The aim of this study was to test for associations between different aspects of contract and on-board internet access and seafarers' satisfaction and health. Altogether 298 Croatian seafarers, all officers, employed on cargo ships, with a minimum work experience of two years with their current shipping company, participated in an online survey. The questionnaire included sociodemographic items, questions relating to their employment contract and internet access, and measures of job satisfaction, life satisfaction, mental health, and gastrointestinal and cardiovascular symptoms. Their job- and lifesatisfaction levels were higher for shorter duration on board, favourable ratio of work to non-work days, and compliance with the employment contract regarding the changes to work and non-work days. Mental health differed likewise but only in relation to two aspects of the contract: on-board duration and compliance with the contract. The level of gastrointestinal symptoms was lower in cases of shorter on-board duration and compliance with the contract, and in seafarers who have free, unlimited internet access on board. Lower level of cardiovascular symptoms was found in seafarers with free, unlimited internet access on board. Our findings suggest that in promoting satisfaction and health in seafaring, attention should be given to reducing on-board duration, compliance with the contract, and internet accessibility on board.

  19. Internet Grey Literature and Its Access and Utilization%网上灰色文献及其获取与利用

    Institute of Scientific and Technical Information of China (English)

    张瑜

    2012-01-01

    With the approach of the information age,accessing and using the internet grey literatures have been changing.This paper mainly discusses: the concept of the internet grey literature,the troubles when to get the internet grey literature,how to access them and using the internet grey literature.%信息时代的到来使网上灰色文献的获取和利用发生变化。对网上灰色文献的概念进行界定,分析了网上灰色文献的获取障碍,归纳其获取途径,对现今网上灰色文献的利用现状进行总结并提出完善其获取与利用的措施。

  20. Internet卫星接入技术%Satellite Communication Technology Used for the Access to Internet

    Institute of Scientific and Technical Information of China (English)

    龚建勇; 王建生

    2000-01-01

    为高速接入Internet,宽带接入技术应运而生,本文对目前流行的几种Internet宽带接入方式进行了简要比较,并重点介绍了Internet的卫星宽带接入技术及其应用领域和发展前景.

  1. Classification and promotion different types of information product by internet marketing on the example of machine building enterprises

    Directory of Open Access Journals (Sweden)

    Roman Oksentyuk

    2013-11-01

    Full Text Available Considering the features of modern marketing, Internet-marketing in particular, the types of promotion information products are classified in the article, such as a separate product (goods,firm or company, thematic information resource (website, online-store, online-project. All of the above objects have their own characteristics, both in content and in the budget part, which leads to differences in the choice of promotion strategy, selection of Internet-marketing techniques and, consequently, the relative efficiency of the use by machine-building enterprises. We consider each of them separately and set the typical promotion scheme through information technology and World Wide Web. Made the estimation of marketing effectiveness use of strategies to promote different types of Internet-based products, which should include a number of parameters that are presented in this article. Analyzed the importance of availability of website as a necessary condition for the successful promotion of their products in the market and doing business in today's market environment.

  2. Breast cancer information on the internet: analysis of accessibility and accuracy.

    LENUS (Irish Health Repository)

    Quinn, E M

    2012-02-18

    Studies show internet sourced information often has poor accuracy. However, it is rapidly becoming a major source of patient information. Our aim was to assess accuracy of breast cancer-related information on the internet. The top five breast cancer-related search terms were identified using the commercial program "Wordtracker". These terms were searched using the search-engine "Google" and the top 100 webpages per topic analysed for applicability and accuracy of information. Overall 500 webpages were analysed. 42% were inapplicable to the question asked. Applicable accuracy rates were variable amongst the five terms: "breast cancer symptoms" 84%, "breast cancer care" 87%, "breast cancer stage" 88%, "breast cancer survival" 91% and "breast cancer signs" 78%. Educational websites were more likely to be accurate(p < 0.001) and interest group administered websites less likely to be accurate(p = 0.018) than other websites. Finding accurate breast cancer information on the internet is difficult due to large numbers of inapplicable unregulated websites preferentially returned via search engines.

  3. Technical Evaluation Report 32: Using Internet Audio to Enhance Online Accessibility

    Directory of Open Access Journals (Sweden)

    Linda Matula Schwartz

    2004-08-01

    Full Text Available What constitutes online accessibility? Vanderheiden, Harkins and Barnicle (2002 indicate that accessibility involves the ability to use online content without vision, without hearing, without pointing or manipulation, and without speech by persons with cognitive limitations, with language disabilities, with low vision and limited or no hearing, and with alternative languages.

  4. Transition from closed system to Internet of Things: A study in standardizing building lighting systems

    NARCIS (Netherlands)

    Mathews, E.; Muller, G.

    2016-01-01

    Internet of Things (IoT) is triggering changes in lighting industry from the traditional closed and propriety systems to flexible, interoperable and service oriented systems. To address the challenges of this transition and catering the specific requirements of lighting networks, an Open Architectur

  5. Integrating Chemistry Laboratory Instrumentation into the Industrial Internet: Building, Programming, and Experimenting with an Automatic Titrator

    Science.gov (United States)

    Famularo, Nicole; Kholod, Yana; Kosenkov, Dmytro

    2016-01-01

    This project is designed to improve physical chemistry and instrumental analysis laboratory courses for undergraduate students by employing as teaching tools novel technologies in electronics and data integration using the industrial Internet. The project carried out by upper-division undergraduates is described. Students are exposed to a complete…

  6. Integrating Chemistry Laboratory Instrumentation into the Industrial Internet: Building, Programming, and Experimenting with an Automatic Titrator

    Science.gov (United States)

    Famularo, Nicole; Kholod, Yana; Kosenkov, Dmytro

    2016-01-01

    This project is designed to improve physical chemistry and instrumental analysis laboratory courses for undergraduate students by employing as teaching tools novel technologies in electronics and data integration using the industrial Internet. The project carried out by upper-division undergraduates is described. Students are exposed to a complete…

  7. Building secure wireless access point based on certificate authentication and firewall captive portal

    OpenAIRE

    Soewito B.; Hirzi

    2014-01-01

    Wireless local area network or WLAN more vulnerability than wired network even though WLAN has many advantages over wired. Wireless networks use radio transmissions to carry data between end users and access point. Therefore, it is possible for someone to sit in your office building's lobby or parking lot or parking lot to eavesdrop on the wireless network communication. This paper discussed securing wires local area network used WPA2 Enterprise based PEAP MS-CHAP and Captive portal firewall....

  8. Abandonment and accessibility in railway historical buildings: Central do Brasil and Leopoldina Railstation.

    Science.gov (United States)

    Brasil, C C G; Costa, A M; Castañon, J A B

    2012-01-01

    This paper aims to demonstrate the evolution of a study in the city of Juiz de Fora-MG, whose objective is the assessment of areas of train station in relation to the inclusion of people with disabilities and consequently promote the historical and cultural heritage of this city. The railway buildings are important landmarks in the history of the city and its surroundings was formed the first core of urban development. Because this building was of the early nineteenth century, these were not designed to assist people with disabilities, in effect, we observed that the buildings are being underutilized. The difficulty of insertion of incentive policies is therefore not due to the commitment by the majority, making the deployment of new access.

  9. Design and Implementation of A DICOM PACS With Secure Access Via Internet

    Science.gov (United States)

    2007-11-02

    Digital Radiology Department”. [Last access 05/28/2001]. Available URL: http://ej.rsna.org/EJ_0_96/0051-97.fin/Pacs97.html [13] B. Parker. “ Estudio ...de un caso de implantación de [Last access 05/25/2001]. Available URL: http://www.vcgimagen.com.ar./EspPACS3.htm [14] “Apache secured by SSL” [Last

  10. OpenAIRE - Building a collaborative Open Access infrastructure for European researchers

    Directory of Open Access Journals (Sweden)

    Najla Rettberg

    2012-11-01

    Full Text Available This paper outlines the efforts of the OpenAIRE networking team to establish a Europe-wide open access initiative. OpenAIRE is an effort to realize the open access policies of the European Commission, and has built an infrastructure to support the widest possible dissemination of project results within a certain funding area, FP7. The purpose of the paper is to highlight how such a service can be established through the work of a successful network of European open access contacts and by effective communication with a range of stakeholders. The paper also outlines the flexible technical infrastructure and research activities within the project. Not without its challenges, the approach to tackling existing barriers, such as building repository interoperability, are explored. The paper also introduces the aims and initial activities of the continuation project, OpenAIREplus.

  11. 基于DOCSIS在有线电视网上实现高速INTERNET接入%Access to Internet Based on Catv with DOCSIS

    Institute of Scientific and Technical Information of China (English)

    张武平; 杨学良; 刘新彦; 薛俊峰

    2001-01-01

    This paper describes briefly the characteristic of access to Internet with cable modem,details the key technology of DOCSIS and the solution to access to Internet based on Catv.%文章分析了通过线缆调制解调器接入INTERNET的特点,阐述了DOCSIS的关键技术。并对基于DOCSIS的有线电视高速INTERNET接入解决方案进行了深入完整的分析和研究。

  12. Internet access to Salvia divinorum: implications for policy, prevention, and treatment.

    Science.gov (United States)

    Hoover, Valerie; Marlowe, Douglas B; Patapis, Nicholas S; Festinger, David S; Forman, Robert F

    2008-07-01

    This study determined the degree to which Salvia divinorum, a potent hallucinogenic drug that is legal in most U.S. jurisdictions, is being proffered for sale over the Internet and how it is being characterized on popular Web sites. Search results revealed that between one half and two thirds (58%) of the Web sites either offered to sell S. divinorum or linked to other Web sites offering to sell the drug and that more than three quarters (78%) of the Web sites advocated for its use. Many of the statements issued on the Web sites were erroneous or falsely interpreted the absence of scientific data on the possible side effects of S. divinorum as evidence that no side effect exists. The portrayal and availability of S. divinorum on the Internet are similar to those of other illicit and prescription drugs of abuse. However, much less is known about the short- and long-term effects of this novel drug. Consequently, there is little basis to contradict the many Web sites that encourage its use. Implications for drug policy, prevention, and treatment are discussed.

  13. Analysing the Image Building Effects of TV Advertisements Using Internet Community Data

    Science.gov (United States)

    Uehara, Hiroshi; Sato, Tadahiko; Yoshida, Kenichi

    This paper proposes a method to measure the effects of TV advertisements on the Internet bulletin boards. It aims to clarify how the viewes' interests on TV advertisements are reflected on their images on the promoted products. Two kinds of time series data are generated based on the proposed method. First one represents the time series fluctuation of the interests on the TV advertisements. Another one represents the time series fluctuation of the images on the products. By analysing the correlations between these two time series data, we try to clarify the implicit relationship between the viewer's interests on the TV advertisement and their images on the promoted products. By applying the proposed method to an Internet bulletin board that deals with certain cosmetic brand, we show that the images on the products vary depending on the difference of the interests on each TV advertisement.

  14. Internet Access Technology Based on XPort and ZigBee%XPort与ZigBee模块的Internet接入技术

    Institute of Scientific and Technical Information of China (English)

    王立波; 陈慈发

    2009-01-01

    介绍一种由嵌入式设备组成的ZigBee无线网络接入Internet的技术.设计了由TCP/IP到串口的转换设备XPort与ZigBee模块组成的ZigBee网关,阐述了XPort与ZigBee模块的连接电路、工作方式以及ZigBee组网过程,实现了Internet网络远程访问和便捷控制家中的ZigBee无线智能家电设备的目标.%This paper introduces a technology to connect ZigBee wireless network of embedded devices to the Internet.The ZigBee gateway consists of ZigBee module and XPort which converts TCP/IP data to serial interface.The electrical circuit of XPort and ZigBee module,the way it works and the formation of ZigBee network are elaborated.Smart ZigBee appliances devices can be accessed remotely and controlled conveniently through Internet.

  15. Social disparities in internet patient portal use in diabetes: evidence that the digital divide extends beyond access.

    Science.gov (United States)

    Sarkar, Urmimala; Karter, Andrew J; Liu, Jennifer Y; Adler, Nancy E; Nguyen, Robert; López, Andrea; Schillinger, Dean

    2011-05-01

    The authors investigated use of the internet-based patient portal, kp.org, among a well-characterized population of adults with diabetes in Northern California. Among 14,102 diverse patients, 5671 (40%) requested a password for the patient portal. Of these, 4311 (76%) activated their accounts, and 3922 (69%), logged on to the patient portal one or more times; 2990 (53%) participants viewed laboratory results, 2132 (38%) requested medication refills, 2093 (37%) sent email messages, and 835 (15%) made medical appointments. After adjustment for age, gender, race/ethnicity, immigration status, educational attainment, and employment status, compared to non-Hispanic Caucasians, African-Americans and Latinos had higher odds of never logging on (OR 2.6 (2.3 to 2.9); OR 2.3 (1.9 to 2.6)), as did those without an educational degree (OR compared to college graduates, 2.3 (1.9 to 2.7)). Those most at risk for poor diabetes outcomes may fall further behind as health systems increasingly rely on the internet and limit current modes of access and communication.

  16. INCREASE IN INTERNET ACCESS BY YOUNGSTERS FROM BRAZIL´S PYRAMID BASE AND ITS SINGULARITIES

    Directory of Open Access Journals (Sweden)

    Ian Freitas

    2013-01-01

    Full Text Available The present work deals with technological foresight in the defense sector, in Brazil. The theme deals with the case of technological foresight developed by the Brazilian Army (EB, between the years 2009 to 2012. The objective was to identify the systems and materials needed to EB, the technologies required to enable their achievement, and scenarios of national defense industry in 2030. The research method was in two phases, a theoretical framework for the methodology of prospecting, and other empirical, for the fieldwork. The empirical phase was conducted via the Internet, with the consultation of about 2000 respondents, from the most diverse areas of society. The research result was a set of systems, materials and technologies as well as a bunch of tables with probabilities, impact, timing, relevance and risks of the scenarios of national defense industry in 2030. With this information, the EB can develop strategies for transform itself into a new Armed Force, the EB 2030.

  17. Supporting Teachers to Automatically Build Accessible Pedagogical Resources: The APEINTA Project

    Science.gov (United States)

    Iglesias, Ana; Moreno, Lourdes; Jiménez, Javier

    Most of the universities in Europe have started their process of adaptation towards a common educational space according to the European Higher Education Area (EHEA). The social dimension of the Bologna Process is a constituent part of the EHEA and it is a necessary condition for the attractiveness and competitiveness of the EHEA. Two of the main features of the social dimension are the equal access for all the students and the lifelong learning. One of the main problems of the adaptation process to the EHEA is that the teachers have no previous references and models to develop new pedagogical experiences accessible to all the students, nevertheless of their abilities, capabilities or accessibility characteristics. The APEINTA project presented in this paper can be used as a helpful tool for teachers in order to cope with the teaching demands of EHEA, helping the teachers to automatically build accessible pedagogical resources even when the teachers are not accessibility experts. This educational project has been successfully used in 2009 in two different degrees at the Carlos III University of Madrid: Computer Science and Library and Information Science.

  18. Internet Access, Use and Sharing Levels among Students during the Teaching-Learning Process

    Science.gov (United States)

    Tutkun, Omer F.

    2011-01-01

    The purpose of this study was to determine the awareness among students and levels regarding student access, use, and knowledge sharing during the teaching-learning process. The triangulation method was utilized in this study. The population of the research universe was 21,747. The student sample population was 1,292. Two different data collection…

  19. Partners on the Net: FDLP Partnering to Coordinate Remote Access to Internet-Based Government Information.

    Science.gov (United States)

    Aldrich, Duncan

    1998-01-01

    Discusses the Government Printing Office (GPO) plan for the transition to an electronic Federal Depository Library Program (FDLP) that, through a network of partnerships comprised of the GPO, the National Archives and Records Administration, federal agencies, and FDLP libraries, will increase public access to government information. (JAK)

  20. Comportamento de busca na internet: umestudo exploratório em salas comunitárias Information seeking behaviour on the internet: An exploratory study in community access centres

    Directory of Open Access Journals (Sweden)

    Ariadne Chlöe Mary Furnival

    2008-01-01

    Full Text Available Estudo sobre o comportamento de busca de informação dos usuários das salas deInternet existentes em duas instituições numa cidade do interior do estado de São Paulo,que promovem o acesso gratuito à comunidade, assim contribuindo ativamente ao processo de inclusão digital; A análise do comportamento de busca de informação dos usuários visou identificar a estratégia global de busca empregada, compreendendo a utilização da sintaxe e semântica de busca, as fontes de informação e os usos da Internet; Foram aplicados 61 questionários com perguntas fechadas e abertas_ e os resultados permitem afirmar que os usuários possuem pouca familiaridade com a Internet, efetuam em média 1 a 2 buscas e empregam poucos termos na formulação da expressão de busca, ainda que recuperem as informações que necessitam.The information seeking behaviour of the users of Internet access centres that are located in two organizations in a town in the interior of the state of Sâo Paulo was studied. These organizations promote free internet access to the community, thereby contributing to the process of digial inclusion. The analysis of the users´information searching behaviour sought to identify what global search strategy the users used, including search syntax and semantics, information sources and for what the Internet was used. Sixty-one questionnaires with open and closed questions were applied, and the results point to the fact that the users have little familiarity with the Internet, that they carry out one to two searches on average, and that they use few terms in the formulation of the search expression, despite retrieving the information that they require.

  1. Internet access share and the simulation under the Dr.COM authentication environment%Dr.COM认证环境下 Internet 接入共享与仿真

    Institute of Scientific and Technical Information of China (English)

    崔建涛; 赵晓君; 张烁

    2013-01-01

    为了满足企业内、外网之间灵活访问的需求,设计了一个改进的 Internet 接入共享方案,基于路由和远程访问服务和网络地址转换技术,成功实现了 Dr.COM宽带认证环境下主机和移动终端的网络接入共享,并在 VMware 虚拟机上仿真某企业网络.改进后的方案,无需购置专用硬件路由器,具有成本低、软硬件可扩充性强、组网灵活等优点,尤其适用于中小型企业,并为工程技术人员研究 In-ternet 接入提供了有益参考.%In order to meet the flexible access requirements between internal and external enterprise net-work,the improved Internet connection share scheme based on RRAS and NAT was designed.The simula-tion of the company network based on VMware virtual machine was carried out,and Internet access share of host and mobile terminal under the Dr.COM broadband authentication environment was successfully real-ized.Compared with traditional network access scheme,without purchasing dedicated hardware routers,the improved scheme has some advantages,such as the lower cost,the strong scalability of hardware and soft-ware,the flexible networking,etc,which was especially suitable for small and medium enterprises.This scheme provided the beneficial reference about studying Internet access for engineering and technical per-sonnel.

  2. Medication errors with the use of allopurinol and colchicine : A retrospective study of a national, anonymous Internet-accessible error reporting system

    NARCIS (Netherlands)

    Mikuls, TR; Curtis, [No Value; Allison, JJ; Hicks, RW; Saag, KG

    2006-01-01

    Objectives. To more closely assess medication errors in gout care, we examined data from a national, Internet-accessible error reporting program over a 5-year reporting period. Methods. We examined data from the MEDMARX (TM) database, covering the period from January 1, 1999 through December 31, 200

  3. Linking People to the Global Networked Society. Evaluation of the Online at PA Libraries Project: Public Access to the Internet through Public Libraries.

    Science.gov (United States)

    McClure, Charles R.; Bertot, John Carlo

    This report provides an evaluation of the Online at PA Libraries project which was initiated in the Fall of 1996 by the Pennsylvania Department of Education's Office of Commonwealth Libraries and the Schuylkill Intermediate Unit. The report documents that the following goals were accomplished: (1) provide public access to the Internet through…

  4. Lively data: discover, browse and access ocean altimetry data on internet

    Directory of Open Access Journals (Sweden)

    V. Rosmorduc

    2006-01-01

    Full Text Available The Products and Services (P&S department in the Space Oceanography Division at CLS (Collecte, Localisation, Satellites is in charge of distributing and promoting altimetry and operational oceanography data. The department is thus involved in the Aviso satellite altimetry project (the French service which distributes altimetry products since 1992, in the Mercator ocean operational forecasting system, and in the European Godae/Mersea ocean portal. Aiming to a standardisation and a common vision and management of all these ocean data, all these projects, led to the implementation of several Opendap/LAS Internet servers (Baudel et al., 2004. Some of the possibilities of the tools, as well as how-to information will be highlighted, as they are in the "Lively data'' section of Aviso website (see http://www.aviso.oceanobs.com/html/donnees/las/. Moreover, with a two-year experience we now have some feedback and analysis of how people – users, would-be users and students alike – are using this tool, some ideas for possible enhancements, etc.

  5. U.S. Government Open Internet Access to Sub-meter Satellite Data

    Science.gov (United States)

    Neigh, Christopher S. R> Masek, Jeffery G.; Nickeson, Jaime E.

    2012-01-01

    The National Geospatial-Intelligence Agency (NGA) has contracted United States commercial remote sensing companies GeoEye and Digital Globe to provide very high resolution commercial quality satellite imagery to federal/state government agencies and those projects/people who support government interests. Under NextView contract terms, those engaged in official government programs/projects can gain online access to NGA's vast global archive. Additionally, data from vendor's archives of IKONOS-2 (IK-2), OrbView-3 (OB-3), GeoEye-1 (GE-1), QuickBird-1 (QB-1), WorldView-1 (WV-1), and WorldView-2 (WV-2), sensors can also be requested under these agreements. We report here the current extent of this archive, how to gain access, and the applications of these data by Earth science investigators to improve discoverability and community use of these data. Satellite commercial quality imagery (CQI) at very high resolution (< 1 m) (here after referred to as CQI) over the past decade has become an important data source to U.S. federal, state, and local governments for many different purposes. The rapid growth of free global CQI data has been slow to disseminate to NASA Earth Science community and programs such as the Land-Cover Land-Use Change (LCLUC) program which sees potential benefit from unprecedented access. This article evolved from a workshop held on February 23rd, 2012 between representatives from NGA, NASA, and NASA LCLUC Scientists discussion on how to extend this resource to a broader license approved community. Many investigators are unaware of NGA's archive availability or find it difficult to access CQI data from NGA. Results of studies, both quality and breadth, could be improved with CQI data by combining them with other moderate to coarse resolution passive optical Earth observation remote sensing satellites, or with RADAR or LiDAR instruments to better understand Earth system dynamics at the scale of human activities. We provide the evolution of this effort, a

  6. Second Language Identity Building through Participation in Internet-Mediated Environments: A Critical Perspective

    Science.gov (United States)

    Klimanova, Liudmila

    2013-01-01

    Using a data-driven qualitative approach and drawing from language socialization and communities of practice theories, this dissertation study examines the second language (L2) identity-building strategies of 22 American learners of Russian who engaged in a six-week telecollaborative project with Russian native speakers in two genres of…

  7. Second Language Identity Building through Participation in Internet-Mediated Environments: A Critical Perspective

    Science.gov (United States)

    Klimanova, Liudmila

    2013-01-01

    Using a data-driven qualitative approach and drawing from language socialization and communities of practice theories, this dissertation study examines the second language (L2) identity-building strategies of 22 American learners of Russian who engaged in a six-week telecollaborative project with Russian native speakers in two genres of…

  8. The Potential of Wastewater Energy Recovery in Smart Buildings by using Internet of Things Technology

    DEFF Research Database (Denmark)

    Lynggaard, Per

    2015-01-01

    There is a large untapped potential to harvest heat from the wastewater leaving a building. Especially, shower, washing machines and dishwashers are sources that waste heat directly into the drainage system. This paper focuses on the potential of recovering some of this wasted heat by using heat...

  9. Electronic business in the Building-Construction (BC) industry: Preparing for the new Internet

    NARCIS (Netherlands)

    Tolman, F.P.; Böhms, H.M.

    2000-01-01

    This paper presents the objectives and initial results of the European 5th Framework eConstruct project (IST-10303). The aim of eConstruct is to develop, implement, apply and disseminate an XML vocabulary (bcXML) for the European Building-Construction (BC) industry. This new Communication Technology

  10. Remote Internet access to advanced analytical facilities: a new approach with Web-based services.

    Science.gov (United States)

    Sherry, N; Qin, J; Fuller, M Suominen; Xie, Y; Mola, O; Bauer, M; McIntyre, N S; Maxwell, D; Liu, D; Matias, E; Armstrong, C

    2012-09-04

    Over the past decade, the increasing availability of the World Wide Web has held out the possibility that the efficiency of scientific measurements could be enhanced in cases where experiments were being conducted at distant facilities. Examples of early successes have included X-ray diffraction (XRD) experimental measurements of protein crystal structures at synchrotrons and access to scanning electron microscopy (SEM) and NMR facilities by users from institutions that do not possess such advanced capabilities. Experimental control, visual contact, and receipt of results has used some form of X forwarding and/or VNC (virtual network computing) software that transfers the screen image of a server at the experimental site to that of the users' home site. A more recent development is a web services platform called Science Studio that provides teams of scientists with secure links to experiments at one or more advanced research facilities. The software provides a widely distributed team with a set of controls and screens to operate, observe, and record essential parts of the experiment. As well, Science Studio provides high speed network access to computing resources to process the large data sets that are often involved in complex experiments. The simple web browser and the rapid transfer of experimental data to a processing site allow efficient use of the facility and assist decision making during the acquisition of the experimental results. The software provides users with a comprehensive overview and record of all parts of the experimental process. A prototype network is described involving X-ray beamlines at two different synchrotrons and an SEM facility. An online parallel processing facility has been developed that analyzes the data in near-real time using stream processing. Science Studio and can be expanded to include many other analytical applications, providing teams of users with rapid access to processed results along with the means for detailed

  11. Artificial intelligence, neural network, and Internet tool integration in a pathology workstation to improve information access

    Science.gov (United States)

    Sargis, J. C.; Gray, W. A.

    1999-03-01

    The APWS allows user friendly access to several legacy systems which would normally each demand domain expertise for proper utilization. The generalized model, including objects, classes, strategies and patterns is presented. The core components of the APWS are the Microsoft Windows 95 Operating System, Oracle, Oracle Power Objects, Artificial Intelligence tools, a medical hyperlibrary and a web site. The paper includes a discussion of how could be automated by taking advantage of the expert system, object oriented programming and intelligent relational database tools within the APWS.

  12. 10 years experience with pioneering open access publishing in health informatics: the Journal of Medical Internet Research (JMIR).

    Science.gov (United States)

    Eysenbach, Gunther

    2010-01-01

    Peer-reviewed journals remain important vehicles for knowledge transfer and dissemination in health informatics, yet, their format, processes and business models are changing only slowly. Up to the end of last century, it was common for individual researchers and scientific organizations to leave the business of knowledge transfer to professional publishers, signing away their rights to the works in the process, which in turn impeded wider dissemination. Traditional medical informatics journals are poorly cited and the visibility and uptake of articles beyond the medical informatics community remain limited. In 1999, the Journal of Medical Internet Research (JMIR; http://www.jmir.org) was launched, featuring several innovations including 1) ownership and copyright retained by the authors, 2) electronic-only, "lean" non-for-profit publishing, 3) openly accessible articles with a reversed business model (author pays instead of reader pays), 4) technological innovations such as automatic XML tagging and reference checking, on-the-fly PDF generation from XML, etc., enabling wide distribution in various bibliographic and full-text databases. In the past 10 years, despite limited resources, the journal has emerged as a leading journal in health informatics, and is presently ranked the top journal in the medical informatics and health services research categories by impact factor. The paper summarizes some of the features of the Journal, and uses bibliometric and access data to compare the influence of the Journal on the discipline of medical informatics and other disciplines. While traditional medical informatics journals are primarily cited by other Medical Informatics journals (33%-46% of citations), JMIR papers are to a more often cited by "end-users" (policy, public health, clinical journals), which may be partly attributable to the "open access advantage".

  13. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  14. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  15. Open sesame: IDC launches Internet site to access well logs, other data

    Energy Technology Data Exchange (ETDEWEB)

    Marsters, S.

    2001-06-01

    International Datashare Corporation has recently opened a new website - www.EnerGISite.com - to make it possible for geologists and geophysicists to access its vast store of Canadian well logs. The well logs have been reproduced over the years in a variety of forms: microfiche, half-scale prints and film, and full-scale prints and film. More recently, IDC has digitized a large number of logs and captured the images in raster form (i.e. scanned, not digitized). The digital and raster logs will, henceforth, be accessible in the EnerGISite through a GIS map front end. When users log on to the site, a picture of world will appear. Clicking on the Canadian landmass, the database will the tell the user what data is available. By zooming in on a particular area of the map such as for example Alberta, all well locations will be shown. By selecting individual wells, users can find out if raster and digital curves exist. Individual logs can be purchased on a transactional basis. Companies can also subscribe for unlimited usage. Logs will be sent by e-mail, or downloaded directly into a user-created file. U.S. data is expected to be launched in July 2001, with selected areas of the world added at a later date. Production data for a site will be provided by International Petrodata Limited, a business partner of IDC. New datasets and software tools to the site are planned by IDC over time.

  16. Analisis Performansi VOIP (Voice Over Internet Protocol Pada Jaringan Wimax (Worldwide Interoperability For Microwave Access Di Wilayah DKI Jakarta

    Directory of Open Access Journals (Sweden)

    Widhiatmoko Widhiatmoko

    2011-05-01

    Full Text Available VoIP is a system that uses the Internet network to transmit voice packets from one place to another using IP protocols intermediaries. With VoIP technology can be much cheaper call charges, especially for communicating overseas because of voice and data using the same network ie the Internet network. VoIP is a service that is very susceptible to delay while the existing access network is currently providing a significant delay for VoIP. One alternative network that can be used to overcome these problems is to use WiMAX technology because WiMAX can provide speed data services up to 70 Mbps.From the research,  results of one way delay, jitter and packet loss still at the value recommended by ITU-T, which is the maximum value of one way delay measurement is 159.87 ms, for jitter 7.52 ms and for packet loss is 3.175%. The one way delay and packet loss from the measurement used to find the MOS score which is the value for quality of VoIP. MOS value range obtained from the calculation of 3.6 to 4.2, which means VoIP feasible to apply to the WiMAX network. The maximum value can reach 2.8 Mbps throughput to 0.575 Mbps for downlink and uplink. From the research also found that the SQI values that are above the standard value of the device will provide a high SNR value, and the higher SQI values then its RSSI value is also bigger.

  17. Capacity Building for the Access and Application of NASA Earth Science Data

    Science.gov (United States)

    Blevins, B.; Prados, A. I.; Hook, E.

    2016-12-01

    Since 2008, NASA's Applied Remote Sensing Training (ARSET) program has built capacity in applied remote sensing by building awareness, and enabling access and use of NASA Earth science data. To reach decision and policy makers from all sectors, ARSET hosts hands-on workshops and online webinars. With over 70 trainings, reaching more than 6,000 people from 130 countries and 1,600 organizations, ARSET has ample experience with assessing and meeting end-user needs. To meet the spectrum of needs and levels of attendee expertise, ARSET holds trainings for both the novice and experienced end-user. Trainings employ exercises, assignments, and live demonstrations of data access tools to reinforce remote sensing concepts and to facilitate data use and analysis techniques. This program is in a unique position to collect important feedback from thousands of participants each year through formal surveys and informal methods on NASA tools, portals, data formats, and the applications of Earth science data for end-user decision making activities. This information is shared with NASA data centers and program managers to help inform data portal development and to help prioritize the production of new satellite derived data products. This presentation will discuss the challenges that arise in capacity building trainings, the integration of community feedback into the training development cycle, and lessons learned throughout the process.

  18. Research trends in existing technologies that are building blocks to the internet of things

    CSIR Research Space (South Africa)

    Dlodlo, N

    2013-07-01

    Full Text Available (FTP), Simple Mail Transfer Protocol (SMTP), Advanced Message Queuing protocol (AMQP), Extensible Messaging and Presence Protocol (XMPP), Message Queue Telemetry Transport (MQTT), Real Time Streaming Protocol (RTSP) and Simple Object Access... IP address but are allocated IP addresses at any point in time when a transaction has to occur. Network Address Translation (NAT) translates private addresses in one network into a public address going into another network. In dual stacking, IPv6...

  19. GEOCAB Portal: A gateway for discovering and accessing capacity building resources in Earth Observation

    Science.gov (United States)

    Desconnets, Jean-Christophe; Giuliani, Gregory; Guigoz, Yaniss; Lacroix, Pierre; Mlisa, Andiswa; Noort, Mark; Ray, Nicolas; Searby, Nancy D.

    2017-02-01

    The discovery of and access to capacity building resources are often essential to conduct environmental projects based on Earth Observation (EO) resources, whether they are Earth Observation products, methodological tools, techniques, organizations that impart training in these techniques or even projects that have shown practical achievements. Recognizing this opportunity and need, the European Commission through two FP7 projects jointly with the Group on Earth Observations (GEO) teamed up with the Committee on Earth observation Satellites (CEOS). The Global Earth Observation CApacity Building (GEOCAB) portal aims at compiling all current capacity building efforts on the use of EO data for societal benefits into an easily updateable and user-friendly portal. GEOCAB offers a faceted search to improve user discovery experience with a fully interactive world map with all inventoried projects and activities. This paper focuses on the conceptual framework used to implement the underlying platform. An ISO19115 metadata model associated with a terminological repository are the core elements that provide a semantic search application and an interoperable discovery service. The organization and the contribution of different user communities to ensure the management and the update of the content of GEOCAB are addressed.

  20. Comparative Analysis of Disabled Accessibility Needs of Heritage Building in Perak

    Directory of Open Access Journals (Sweden)

    Zahari Nurul Fadzila

    2016-01-01

    Full Text Available Tourism sector was the sixth highest national income provider to the Malaysian economy in 2014. In order to replenish Malaysian economy through tourism, the Malaysian government has to diversify the present tourism products and offers a wide variety of tourism packages. This has mentioned in the National Key Results Area (NKRA development platform highlighted in the 10th Malaysian Plan. Therefore, the tourism sector needs to continuously re-engineer and adapt its business model to suit every customer’s needs and demands, including disabled people. At the moment, one of the highest tourist attraction contributors in Malaysia is the heritage building sector. The heritage building sector in Malaysia becomes popular due to its diverse historical background and culture. It attracts local and international tourists to visit. However, the lack of facilities provided especially for the disable people has hindered its future prospects to become globally popular. The national heritage should be viewed, explored and enjoyed by everybody without discriminating anyone. Insufficient of provision for disable facilities in heritage act has caused barrier to the disable people to enjoy and visit the heritage sites. The objective of this research is to analyze the comparative data that been retrieved in the field of selected case study. It will be carried out by visiting the selected case study, observation and documentary analysis. This research aims to do a comparative analysis of Disabled Accessibility needs of Heritage Building in Perak. The findings of this research will alert the needs of disabled in visiting the heritage building and documented for future research.

  1. An Adaptive Gateway Discovery Algorithm to support QoS When Providing Internet Access to Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mari Carmen Domingo

    2007-04-01

    Full Text Available When a node in an ad hoc network wants Internet access, it needs to obtain information about the available gateways and it should select the most appropriate of them. In this work we propose a new gateway discovery scheme suitable for real-time applications that adjusts the frequency of gateway advertisements dynamically. This adjustment is related to the percentage of real-time sources that have quality of service problems because of excessive end-to-end delays. The optimal values for the configuration parameters (time interval and threshold of the proposed adaptive gateway discovery mechanism for the selected network conditions have been studied with the aid of simulations. The scalability of the proposed scheme with respect to mobility as well as the impact of best-effort traffic load have been analyzed. Simulation results indicate that the proposed scheme significantly improves the average end-to-end delay, jitter and packet delivery ratio of real-time flows; the routing overhead is also reduced and there is no starvation of best-effort traffic.

  2. The Role of Internet Paleo Perspective Overviews in Making Data About Past Climate and Environmental Change More Accessible

    Science.gov (United States)

    Anderson, D. M.; Bauer, B. A.; Gille, E. P.; Gross, W. S.; Hartman, M. A.; Shah, A. M.; Woodhouse, C. A.

    2005-12-01

    The cornerstone of scientific discovery is the peer-reviewed journal article, yet for non-specialists these articles can be difficult to appreciate. Scientific writing and the sheer number of articles published each month compound the problem. At the World Data Center for Paleoclimatology, a primary goal is to make published scientific results more accessible to non-specialists. In partnership with scientists, we have created Paleo Perspectives, online essays that provide an introduction to the scientific literature on a topic, background needed to appreciate the results, figures with detailed captions, photographs, short movies and visualizations, summaries, glossaries, direct links to the data, and links to additional information. The power and flexibility of the Internet enables us to provide and update this rich array of material. We have produced three paleo perspectives (global warming, drought, abrupt climate change), with a fourth in review (arctic climate variability). Web statistics indicate these are some of the Data Center`s most often-used web pages (more so for hot topics such as global warming), and awards and accolades indicate that the content is appreciated and on-target. Review by scientists assures the accuracy of the presentations, and newly-contributed data provide material for updates.

  3. Exploration on Access Control Policies of the Internet of Things%物联网访问控制策略探析

    Institute of Scientific and Technical Information of China (English)

    罗洪; 杨杰

    2014-01-01

    With the rapid development of computer technology, the security of the Internet of Things will increasingly attract the attention of people. Based on the hierarchical structure of the Internet of Things, analyses the security requirements of each layer ,and puts forward some sug-gestions for access control policies of the Internet of Things.%随着计算机技术的快速发展,各种物联网应用在人们生活中越来越多,因而物联网安全问题也更加引人关注。针对物联网安全中的访问控制问题,分析物联网分层结构中各层的安全需求,给出联网的环境下的访问控制策略供参考。

  4. Internet Access, Use and Gratification among University Students: A Case Study of the Islamia University of Bahawalpur, Pakistan

    Directory of Open Access Journals (Sweden)

    Shakeel Ahmad Khan

    2011-12-01

    Full Text Available This study aims to investigate the attitude s of students at the Islamia University of Bahawalpur, Pakistan towards learning through the Internet. A structured questionnaire was used for data collection. It was found that a vast majority of the students learnt how to use the Internet by themselves or with the assistance of their friends. The findings showed that their attitude towards the Internet was very positive and they used it mainly for study purpose. They used online databases, dictionaries, encyclopedias and online courses. Google was the most popular search engine for retrieving information on the Internet. However, the use of free database services provide d by the Higher Education Commission (HEC of Pakistan was not satisfactory. The respondents were also dissatisfied with the Internet service provision, slow speed of the Internet connection and inadequate number of computers in computer labs.

  5. Internet and Surveillance

    DEFF Research Database (Denmark)

    The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....

  6. Building secure wireless access point based on certificate authentication and firewall captive portal

    Directory of Open Access Journals (Sweden)

    Soewito B.

    2014-03-01

    Full Text Available Wireless local area network or WLAN more vulnerability than wired network even though WLAN has many advantages over wired. Wireless networks use radio transmissions to carry data between end users and access point. Therefore, it is possible for someone to sit in your office building's lobby or parking lot or parking lot to eavesdrop on the wireless network communication. This paper discussed securing wires local area network used WPA2 Enterprise based PEAP MS-CHAP and Captive portal firewall. We also divided the network for employer and visitor to increase the level of security. Our experiment showed that the WLAN could be broken using the attacker tool such as airodump, aireply, and aircrack.

  7. The Role of the Adult Educator in Helping Learners Access and Select Quality Health Information on the Internet

    Science.gov (United States)

    Wright, Melissa; Grabowsky, Adelia

    2011-01-01

    In 2002, 45 percent of American adults had used the Internet to search for health information. However, according to a 2009 report, the number had increased to 71 percent of adults ages thirty to forty-nine and 46 percent of those 50 and older who had sought health information online. While the number of adults using the Internet to search for…

  8. Science and Technology Undergraduate Students' Use of the Internet, Cell Phones and Social Networking Sites to Access Library Information

    Science.gov (United States)

    Salisbury, Lutishoor; Laincz, Jozef; Smith, Jeremy J.

    2012-01-01

    Many academic libraries and publishers have developed mobile-optimized versions of their web sites and catalogs. Almost all database vendors and major journal publishers have provided a way to connect to their resources via the Internet and the mobile web. In light of this pervasive use of the Internet, mobile devices and social networking, this…

  9. The Internet Playground: Children's Access, Entertainment, and Mis-Education. Second Printing. Popular Culture and Everyday Life Volume 10

    Science.gov (United States)

    Seiter, Ellen

    2007-01-01

    Based on four years of experience teaching computers to 8-12 year olds, media scholar Ellen Seiter offers parents and educators practical advice on what children need to know about the Internet and when they need to know it. "The Internet Playground" argues that, contrary to the promises of technology boosters, teaching with computers is very…

  10. Does Internet Reporting Improve the Accessibility of Financial Information in a Global World? A Comparative Study of New Zealand and Indian Companies

    Directory of Open Access Journals (Sweden)

    Bikram Chatterjee

    2008-12-01

    Full Text Available The accessibility of business reporting, including financial reports on companywebsites is not necessarily increased by providing more information on websites. Thequality of Internet-based information is affected by both the accessibility and quantityof information provided. However, the accessibility of the information is an underresearched area. This paper contributes to the existing body of knowledge on webbasedbusiness reporting, by considering the dimension of accessibility in terms ofwebsite appearance and visual design from four different perspectives. The aim is toconsider the differences that occur in website organisation as a way of considering theaccessibility of information provided on company websites. The paper considers thedifferences in the accessibility of website information between New Zealand andIndian companies as a means of demonstrating the variation that can occur acrosscountries as well as within the same reporting structure. We conclude that Internetfinancial reporting does provide the illusion of comparability but without a moresustained focus on the harmonisation of terminology and attributes included inInternet reporting, the potential for comparison is reduced.

  11. Building the Internet of Things with IPv6 and MIPv6 the evolving world of m2m communications

    CERN Document Server

    Minoli, Daniel

    2013-01-01

    ""If we had computers that knew everything there was to know about things-using data they gathered without any help from us-we would be able to track and count everything, and greatly reduce waste, loss, and cost. We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best. The Internet of Things has the potential to change the world, just as the Internet did. Maybe even more so.""-Kevin Ashton, originator of the term, Internet of Things An examination of the concept and unimagined potential unleashed by the Internet of Things (IoT) with

  12. Internet Shopping

    Institute of Scientific and Technical Information of China (English)

    刘洪毓

    2004-01-01

    Nowadays you no longer need to walk round hundreds of shops looking for the items you need. You can shop for just about anything from your armchair. All you need is a computer and access(进入) to the Internet.

  13. Building

    OpenAIRE

    Seavy, Ryan

    2014-01-01

    Building for concrete is temporary. The building of wood and steel stands against the concrete to give form and then gives way, leaving a trace of its existence behind. Concrete is not a building material. One does not build with concrete. One builds for concrete. MARCH

  14. Bioaerosol assessment in naturally ventilated historical library building with restricted personnel access.

    Science.gov (United States)

    Harkawy, Aleksander; Górny, Rafał L; Ogierman, Leonard; Wlazło, Agnieszka; Ławniczek-Wałczyk, Anna; Niesler, Anna

    2011-01-01

    The aim of this study was to check the degree and identify the sources of microbial contamination of the Jasna Gora (Bright Hill) monastery library 10 years after disinfection of the incunabula collection. The registered maximum viable indoor microbial concentrations were 1,875 and 7,100 cfu/m³ for stationary and personal measurements, whereas respective total concentrations were 71,000 and 100,000 counts/m3. There was no statistically significant difference between the concentrations of viable microorganisms measured in the stationary using Andersen, GSP, and Button samplers. Moreover, GSP and Button samplers can be interchangeably applied when viable or total microbial levels are stationary or personally measured. The culturable microorganisms constituted 0.5 - 3.9% of the total microflora only. Filamentous fungi were the most prevalent outdoors, whereas Gram-positive cocci and endospore forming Gram-positive rods dominated indoors in the air and settled dust, respectively. Hence, an unrestrained infiltration of ambient air through the draughtiness of the building envelope is probably the main process responsible for indoor fungal pollution, whereas bacterial contaminants have their major sources in the indoor environment. Moreover, even a chemically cleansed library collection, having a restricted personnel access, but under the influence of ambient air, can undergo microbial contamination and becomes an important microbial emission source.

  15. Energy Consumption of Wireless Network Access Points

    OpenAIRE

    ANDRADE MORELLI, SEBASTIÁN; RUIZ SANCHEZ, EDUARDO; GRANELL ROMERO, EMILIO; Lloret, Jaime

    2013-01-01

    2nd International Conference on Green Communications and Networking, GreeNets 2012; Gandia; Spain; 25 October 2012 through 26 October 2012 The development of low cost technology based on IEEE 802.11 standard permits to build telecommunication networks at low cost, allowing providing Internet access in rural areas in developing countries. The lack of access to the electrical grid is a problem when the network is being developed in rural areas, so that wireless access points should operate u...

  16. Extending the Internet of Things to the Future Internet Through IPv6 Support

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2014-01-01

    Full Text Available Emerging Internet of Things (IoT/Machine-to-Machine (M2M systems require a transparent access to information and services through a seamless integration into the Future Internet. This integration exploits infrastructure and services found on the Internet by the IoT. On the one hand, the so-called Web of Things aims for direct Web connectivity by pushing its technology down to devices and smart things. On the other hand, the current and Future Internet offer stable, scalable, extensive, and tested protocols for node and service discovery, mobility, security, and auto-configuration, which are also required for the IoT. In order to integrate the IoT into the Internet, this work adapts, extends, and bridges using IPv6 the existing IoT building blocks (such as solutions from IEEE 802.15.4, BT-LE, RFID while maintaining backwards compatibility with legacy networked embedded systems from building and industrial automation. Specifically, this work presents an extended Internet stack with a set of adaptation layers from non-IP towards the IPv6-based network layer in order to enable homogeneous access for applications and services.

  17. Open Access

    Science.gov (United States)

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

  18. Open Access

    Science.gov (United States)

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

  19. Knowing, Building and Living Together on Internet and Social Networks: The ConRed Cyberbullying Prevention Program

    National Research Council Canada - National Science Library

    Rosario Ortega-Ruiz; Rosario Del Rey; José A Casas

    2012-01-01

      An evaluation of the success of the evidence-based ConRed program, which addresses cyberbullying and other emerging problems linked with the use of the internet and seeks to promote a positive use...

  20. Shortcut access to peptidosteroid conjugates: building blocks for solid-phase bile acid scaffold decoration by convergent ligation.

    Science.gov (United States)

    Verzele, Dieter; Figaroli, Sara; Madder, Annemieke

    2011-12-07

    We present three versatile solid-supported scaffold building blocks based on the (deoxy)cholic acid framework and decorated with handles for further derivatization by modern ligation techniques such as click chemistry, Staudinger ligation or native chemical ligation. Straightforward procedures are presented for the synthesis and analysis of the steroid constructs. These building blocks offer a new, facile and shorter access route to bile acid-peptide conjugates on solid-phase with emphasis on heterodipodal conjugates with defined spatial arrangements. As such, we provide versatile new synthons to the toolbox for bile acid decoration.

  1. Shortcut Access to Peptidosteroid Conjugates: Building Blocks for Solid-Phase Bile Acid Scaffold Decoration by Convergent Ligation

    Directory of Open Access Journals (Sweden)

    Sara Figaroli

    2011-12-01

    Full Text Available We present three versatile solid-supported scaffold building blocks based on the (deoxycholic acid framework and decorated with handles for further derivatization by modern ligation techniques such as click chemistry, Staudinger ligation or native chemical ligation. Straightforward procedures are presented for the synthesis and analysis of the steroid constructs. These building blocks offer a new, facile and shorter access route to bile acid-peptide conjugates on solid-phase with emphasis on heterodipodal conjugates with defined spatial arrangements. As such, we provide versatile new synthons to the toolbox for bile acid decoration.

  2. New Paradigms in Internet Computing

    CERN Document Server

    Tripathy, Piyu; Naik, Sagar

    2013-01-01

    The renaissance of internet has reached the mainstream that is named as Web 2.0. People are now using the web to build things they have never thought of earlier. Experts take a step forward to what we contribute, and extend it and give back to the society, i.e. really the boon of internet computing. It has revolutionized the current business environment, not as a mere computing tool, but offers versatile services and increase the productive flow of information. It is a new dimension in computing systems by which companies can curtail their operating expenses, by hosting and operating through the internet. Now the users can access the required information by means of any device connected with an internet. The challenge ahead for implementing this versatile system is that the software and technology has to be developed and deployed simultaneously vis-a-vis safeguarding the security and privacy of information.             This book encompasses various research and developments in Internet technology a...

  3. Linking research to global health equity: the contribution of product development partnerships to access to medicines and research capacity building.

    Science.gov (United States)

    Pratt, Bridget; Loff, Bebe

    2013-11-01

    Certain product development partnerships (PDPs) recognize that to promote the reduction of global health disparities they must create access to their products and strengthen research capacity in developing countries. We evaluated the contribution of 3 PDPs--Medicines for Malaria Venture, Drugs for Neglected Diseases Initiative, and Institute for One World Health--according to Frost and Reich's access framework. We also evaluated PDPs' capacity building in low- and middle-income countries at the individual, institutional, and system levels. We found that these PDPs advance public health by ensuring their products' registration, distribution, and adoption into national treatment policies in disease-endemic countries. Nonetheless, ensuring broad, equitable access for these populations--high distribution coverage; affordability, particularly for the poor; and adoption at provider and end-user levels--remains a challenge.

  4. Open-access Internet dictionaries in the ESP teaching/learning process: «businessdictionary.com» in cognitive situations

    Directory of Open Access Journals (Sweden)

    Pedro A. FUERTES-OLIVERA

    2012-05-01

    Full Text Available From its inception in the early 1960s, English for Specific Purposes (ESP has grown to become one of the most prominent areas of EFL teaching. ESP is usually concerned with the teaching of English used in academic studies and/or professional activities, especially the teaching of English related with Business/Economics, Medicine, and Engineering. As the number of courses and students has grown considerably the original team teaching methodology is being substituted by a more autonomous approach in which both ESP instructors and students have to acquire knowledge of the basic concepts of the field by themselves. This new approach lends support to recent developments in the field of learner’s autonomy, especially those based on Internet (for example, Moodle that are being promoted in this era of shortages and lack of resources. Within this framework, this article presents Internet dictionaries, especially the so-called free institutional Internet reference works, as adequate tools for using in cognitive situations, i.e., the social situations that arise when users want to gain knowledge about something. In particular, this article describes five lexicographical structures and functionalities of the BusinessDictionary.com that can be used by ESP instructors and students in order to acquire and/or update their business knowledge.

  5. The Tractor and the Taxi: Rural and Urban Students Build a New Vehicle for Friendship in an Internet Mural Project.

    Science.gov (United States)

    Stein, Sandra

    2001-01-01

    Describes how students in a rural Missouri high school collaborated online with students in an urban New York high school to create a mural in real space that celebrates the strengths of their two communities. Students had to conduct research, create a design, and then paint collaboratively via the Internet. The project forced them to address…

  6. The New York City eClinician Project: using Personal Digital Assistants and wireless internet access to support emergency preparedness and enhance clinical care in community health centers.

    Science.gov (United States)

    Adusumilli, Sri Raj; Tobin, Jonathan N; Younge, Richard G; Kendall, Mat; Kukafka, Rita; Khan, Sharib; Chang, Otto; Mahabir, Kasandra

    2006-01-01

    The New York City Department of Health and Mental Hygiene, The Community Health Care Association of New York State and Clinical Directors Network are collaborating on the "eClinician Project," which has distributed seven hundred public health-friendly, wireless (WiFi) enabled Personal Digital Assistants (PDAs) to primary care clinicians working in New York City, federally funded, Community Health Centers (CHC) which serve minority underserved communities that suffer a disproportionate burden of chronic disease and lack access to health promotion disease prevention services. Each participating health center also received a wireless router to create an onsite internet hot spot to enable clinicians to have internet access. The goals of the eClinician Project are to: 1) To encourage adoption of information technology among providers in Community Health Centers in New York City by providing PDAs as a first line strategy towards achieving this goal, 2) enhance access to information on emergency preparedness, 3) improve patient outcomes by providing PDA-based clinical decision-support tools that support evidence-based care, 4) encourage chronic care management and health promotion/disease prevention activities, and 5) increase productivity and efficiency. CHC clinicians have received a hands-on, on-site orientation to PDAs. Ongoing training has continued via online CME-accredited webcasts (see www.CDNetwork.org). Clinical decision-support tools are available for download via the eClinician project web portal (see www.eClinician.org ). Public health alerts can be delivered to the PDAs or to the clinicians' desktop computers. Pre and post training surveys, in addition to a case study, have been used to evaluate the population demographics, PDA adoption by the clinicians, clinician attitudes towards using PDAs, PDA influence on clinical-decision making and barriers to adoption of PDAs and information technology in general.

  7. Public access to the Internet and social change: an experience in El Carmen de Bolivar, between silence and hope

    Directory of Open Access Journals (Sweden)

    Luis Fernando Barón Porras

    2010-07-01

    Full Text Available This paper presents a case study of public access venues to Information and Communication Technologies (ICT in the small municipality of Carmen de Bolívar, a town in Northern Colombia. The case study assesses the contribution of public access to ICT to community development, in a region that has not only a long strong tradition of community organization for social development, but also a long history of violence that has weakened its social fabric

  8. Knowing, Building and Living Together on Internet and Social Networks: The ConRed Cyberbullying Prevention Program

    Directory of Open Access Journals (Sweden)

    Rosario Ortega-Ruiz

    2012-12-01

    Full Text Available An evaluation of the success of the evidence-based ConRed program, which addresses cyberbullying and other emerging problems linked with the use of the internet and seeks to promote a positive use of this new environment. The main aims of the ConRed program are a to improve perceived control over information on the internet, b to reduce the time dedicated to digital device usage, and c to prevent and reduce cyberbullying. The impact of the program was evaluated with a quasi-experimental design with a sample of 893 students (595 experimental and 298 control. The results of the mixed repeated measures ANOVAs demonstrate that ConRed contributes to reducing cyberbullying and cyber-dependence, to adjusting the perception of information control, and to increasing the perception of safety at school.

  9. How Internet of Things Influences Human Behavior Building Social Web of Services via Agent-Based Approach

    Directory of Open Access Journals (Sweden)

    Komarov Mikhail

    2016-09-01

    Full Text Available The paper discovers potential human interactions with growing amount of internet of things (IoT via proposed concept of Social Web of Services (classical social web with smart things - daily life objects connected to the internet. To investigate the impact of IoT on user behaviour patterns we modelled human-thing interactions using agent-based simulation (ABM. We have proved that under certain conditions SmartThings, connected to the IoT, are able to change patterns of Human behaviour. Results of this work predict our way of living in the era of caused by viral effects of IoT application (HCI and M2M connections, and could be used to foster business process management in the IoT era.

  10. The implications of reading en writing language preference with regard to internet access for users in South Africa

    Directory of Open Access Journals (Sweden)

    Pieter Blignaut

    2006-09-01

    Full Text Available Om historiese redes is Engels die taal van die internet. Tans trek e-handel kliënte van oral oor die wêreld. Om goeie besigheid te kan doen moet webruimtes bruikbaar wees vir kliënte van verskeie kulture en tale. Om bruikbaarheid vir ’n globale gehoor te verseker, moet webruimtes beide geïnternasionaliseer en gelokaliseer word. Gegewe die verskeidenheid van kulture en idiosinkrasieë van kulture, is beide hierdie take uiters kompleks en bykans onmoontlik om gelyktydig te vermag. Dit kan baie help as nie alle kulture verkies dat die taal van die internet dieselfde as hulle moedertaal moet wees nie. In hierdie studie is die voorkeurtaal vir lees en skryf van verskeie groeperinge van Afrikagebruikers bepaal. Daar is bevind dat die meeste Afrikaanssprekende gebruikers verkies om geskrewe materiaal in hulle moedertaal te sien, maar dat Afrikataalsprekers Engels verkies. Dit het enorme implikasies vir web-ontwikkeling, aangesien ontwikkelaars op die bruikbaarheid en funksionaliteit van ’n webwerf kan fokus en nie tyd hoef te bestee om die inhoud in ’n verskeidenheid van tale te vertaal nie.

  11. Scientists planning new internet

    CERN Multimedia

    Cookson, C

    2000-01-01

    British scientists are preparing to build the next generation internet - 'The Grid'. The government is expected to announce about 100 million pounds of funding for the project, to be done in collaboration with CERN (1/2 p).

  12. Race to replace internet

    CERN Multimedia

    Ahuja, A

    2000-01-01

    British scientists are urging the Government to support a project to build a computing 'Grid' to succeed the Internet. They believe that fortunes await the countries and companies who commit themselves from the very beginning (1 page).

  13. The network on the other side of the net: a multietnographic study on the public spaces with paid access to the Internet in Novo Hamburgo

    Directory of Open Access Journals (Sweden)

    Luís Marcelo Miranda

    2011-04-01

    Full Text Available This article discusses the interaction and new social habits in public spaces with paid access to the Internet downtown in Novo Hamburgo. For this, raises the multiethnograpy, a method that combines ethnography, photoethnography, and net(with wi-fi, cybercafés, and lan houses are observed, reported and discussed some of the characteristics of those places, which can be viewed as aggregations to cyberspace. Concrete examples are shown from photographs on the places, and urban notes describing the reality of online and off line spaces that serve as the link between physicaland virtual. They are places where contemporary sociability happen, emerging from new forms of socialization, new lifestyles and new forms of social organization.

  14. 通用Internet数据库访问模式的研究%Method for Internet Database Accessment

    Institute of Scientific and Technical Information of China (English)

    张德运; 苏东峰

    2000-01-01

    在分析比较目前Internet上的各种数据库访问方法的基础上,提出了一种通用的Internet数据库访问方案,为实现此方案提出了IDBC(Internet Data Base Connection)协议,并从服务器端应用程序和客户端应用程序2个方面,研究了通用型Internet数据库访问系统的实现原理和系统结构,最后通过Java语言实现了该系统.该系统的实现大大简化了用户对Internet上不同数据库的访问,推动了Internet通用数据库访问标准化的进程.

  15. The Internet-based Smart Campus and Its System Building%基于网络的智慧校园及其系统构建探究

    Institute of Scientific and Technical Information of China (English)

    陈翠珠; 黄宇星

    2012-01-01

    随着"感知中国"目标的提出,社会各界纷纷响应。利用先进的泛在网、物联网、传感器等关键技术,建设智慧型校园的计划也在紧锣密鼓地进行着。文章阐述建设智慧校园的概念、功能模块及其关键技术,结合现行案例,以了解其建设现状,并提出其系统建设构想。%With the proposition of the objective of "Sensing China",all circles in the society are active in responding.Based on the key techniques of Ubiquitous Network,Internet of Things and Sensor Network,the program of building smart campuses is in full wing.This paper expounds the concept of building smart campus,its capabilities and advanced technology.And based on the current situation of some examples,a plan for the system building is proposed.

  16. Building a foundation for systems change: increasing access to physical activity programs for older adults.

    Science.gov (United States)

    Lachenmayr, Sue; Mackenzie, Geraldine

    2004-10-01

    Although 25% of U.S. adults are physically inactive, this percentage increases dramatically for older adults. Organizational change theory guided a state health department in identifying system gaps and developing strategies to expand programming for seniors. A survey of provider agencies in New Jersey assessed (a) capacity for physical activity programs for older adults, (b) accessibility of programs, and (c) barriers to providing programs. One hundred sixty agencies provided physical activity programs to almost 184,000 individuals annually. Fewer than one half of the agencies provided exercise programs for people with disabilities, and only 44% provided in-home programs. Eighty-two percent of program providers wanted to expand programming but cited lack of trained instructors and peer leaders, inadequate facility space, insufficient funding, and limited transportation resources as barriers. Sustaining older adult behavior change requires infrastructure that will ensure access to diverse physical activities. This article provides strategies to expand access to physical activity programs for older adults.

  17. SMF/MMF Based In-building Gigabit Wireless Access Systems Using Simplified 60-GHz Transceivers

    DEFF Research Database (Denmark)

    Pham, Tien Thang; Lebedev, Alexander; Beltrán, M.

    2011-01-01

    Hybrid fiber-wireless transmission of 2-Gbps signals in 60-GHz band over a composite channel (10-km SMF/1-km MMF/6.5-m wireless) is experimentally demonstrated for gigabit inbuilding wireless access using simple direct modulation, optical upconversion and envelope detection.......Hybrid fiber-wireless transmission of 2-Gbps signals in 60-GHz band over a composite channel (10-km SMF/1-km MMF/6.5-m wireless) is experimentally demonstrated for gigabit inbuilding wireless access using simple direct modulation, optical upconversion and envelope detection....

  18. A Web-based computer system supporting information access, exchange and management during building processes

    DEFF Research Database (Denmark)

    Sørensen, Lars Schiøtt

    1998-01-01

    During the last two decades, a number of research efforts have been made in the field of computing systmes related to the building construction industry. Most of the projects have focused on a part of the entire design process and have typically been limited to a specific domain. This paper...

  19. Internet accounting dictionaries

    DEFF Research Database (Denmark)

    Nielsen, Sandro; Mourier, Lise

    2005-01-01

    An examination of existing accounting dictionaries on the Internet reveals a general need for a new type of dictionary. In contrast to the dictionaries now accessible, the future accounting dictionaries should be designed as proper Internet dictionaries based on a functional approach so they can...

  20. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...

  1. A new PON system for LAN and medium/high-speed Internet access%一种适用于LAN及 中高速Internet接入的PON系统

    Institute of Scientific and Technical Information of China (English)

    冯先成; 韵湘; 胡煌球

    2001-01-01

    一种适用于中高速计算机通信的共享接入的新型PON系统,将使多个ONU公平共享一条高速宽带通道,从而提供经济有效的中高速Internet接入.%A new shared-access system suitable for medium/high-speed Internet access has been developed. This system is based on PON system. By using the new shared-access technologies, where a high-speed path for computer communication is shared equally by multiple OUNs, high-speed path for Internet access can be provided economically.

  2. Internet of Drones

    National Research Council Canada - National Science Library

    Gharibi, Mirmojtaba; Boutaba, Raouf; Waslander, Steven L

    2016-01-01

    The Internet of Drones (IoD) is a layered network control architecture designed mainly for coordinating the access of unmanned aerial vehicles to controlled airspace, and providing navigation services between locations referred to as nodes...

  3. Building a multimodal network and determining individual accessibility by public transportation

    DEFF Research Database (Denmark)

    Djurhuus, Sune; Hansen, Henning Sten; Aadahl, Mette

    2016-01-01

    The increased availability of transit schedules from web sites or travel planners as well as more disaggregate data has led to a growing interest in creating individual public transportation accessibility measures. However, used extensively, standard GIS software does not have direct capabilities...

  4. Construction Guidelines and Specifications. Modifying the Existing Campus Building for Accessibility.

    Science.gov (United States)

    Cotler, Stephen Richard

    To address problems that the campus faces when attempting to make facility modifications that meet federal handicap accessibility requirements, this guidebook gives guidance on requirements and methods of "retrofitting" that meet the mobility needs of the disabled. Seven chapters discuss modifications to site, entrance, doors, interior…

  5. Internet Governance

    Directory of Open Access Journals (Sweden)

    Pedro Veiga

    2010-01-01

    Full Text Available It has now become quite obvious that the Internet has brought significant changes to our society and a break on how we lived before its emergence. It is still too early to assess the impact on society of the new services at our disposal, such as the capacity to communicate faster and cheaper on a global scale, access information and, perhaps more importantly, to produce and disseminate information in a way that is accessible to all.It is clear that the advent of the Information Society implies changes in our society that constitute a point of no return. However, contrary to what happened when we entered the Industrial Age about three centuries ago, when the changing process was slow and led by older individuals, these days the entrance into the Information Society is taking place rapidly and the decisive players are younger people. The global nature of the Internet, the possibility of producing and distributing any type of content in digital form at almost zero cost, as well as the vast number of people who use the web, have highlighted the need for new forms of intervention in a sector where there are many types of players. It is in this context that the problem of Internet Governance becomes a very current issue, inasmuch as one feels the need to guarantee a diversity of rights and duties, which may appear difficult to reconcile.This paper presents a brief overview of the main players and initiatives which, in the field of Internet Governance, have tried to contribute to turning this network into a factor for social development and democraticity on a global scale.

  6. Outside The Box: Building a Digital Asset Management Ecosystem for Preservation and Access

    Directory of Open Access Journals (Sweden)

    Andrew Weidner

    2017-04-01

    Full Text Available The University of Houston (UH Libraries made an institutional commitment in late 2015 to migrate the data for its digitized cultural heritage collections to open source systems for preservation and access: Hydra-in-a-Box, Archivematica, and ArchivesSpace. This article describes the work that the UH Libraries implementation team has completed to date, including open source tools for streamlining digital curation workflows, minting and resolving identifiers, and managing SKOS vocabularies. These systems, workflows, and tools, collectively known as the Bayou City Digital Asset Management System (BCDAMS, represent a novel effort to solve common issues in the digital curation lifecycle and may serve as a model for other institutions seeking to implement flexible and comprehensive systems for digital preservation and access.

  7. Software Applications to Access Earth Science Data: Building an ECHO Client

    Science.gov (United States)

    Cohen, A.; Cechini, M.; Pilone, D.

    2010-12-01

    Historically, developing an ECHO (NASA’s Earth Observing System (EOS) ClearingHOuse) client required interaction with its SOAP API. SOAP, as a framework for web service communication has numerous advantages for Enterprise applications and Java/C# type programming languages. However, as interest has grown for quick development cycles and more intriguing “mashups,” ECHO has seen the SOAP API lose its appeal. In order to address these changing needs, ECHO has introduced two new interfaces facilitating simple access to its metadata holdings. The first interface is built upon the OpenSearch format and ESIP Federated Search framework. The second interface is built upon the Representational State Transfer (REST) architecture. Using the REST and OpenSearch APIs to access ECHO makes development with modern languages much more feasible and simpler. Client developers can leverage the simple interaction with ECHO to focus more of their time on the advanced functionality they are presenting to users. To demonstrate the simplicity of developing with the REST API, participants will be led through a hands-on experience where they will develop an ECHO client that performs the following actions: + Login + Provider discovery + Provider based dataset discovery + Dataset, Temporal, and Spatial constraint based Granule discovery + Online Data Access

  8. Internet Banking System Prototype

    CERN Document Server

    Alnaqeib, Rami; Jalab, Hamid A; Zaidan, M A; Hmood, Ali K

    2010-01-01

    Internet Banking System refers to systems that enable bank customers to access accounts and general information on bank products and services through a personal computer or other intelligent device. Internet banking products and services can include detailed account information for corporate customers as well as account summery and transfer money. Ultimately, the products and services obtained through Internet Banking may mirror products and services offered through other bank delivery channels. In this paper, Internet Banking System Prototype has been proposed in order to illustrate the services which is provided by the Bank online services.

  9. AN APPROACH TO SELF- AND CO-REGULATION OF ELECTRONIC COMMERCE IN BUILDING TRUST OVER THE INTERNET

    Directory of Open Access Journals (Sweden)

    R. Serbu

    2016-10-01

    Full Text Available The goal of this paper is to highlights some thoughts about regulation and self-regulation for e-commerce, to present cases and the importance of co- and self-regulation in e-commerce. There are a couple of question that rise in this area and we will try to answer with this paper: What are the benefits and disadvantages of self- and co-regulation, how can online industry be a cause and effect for self and co-regulation, should our web portal and search engines be a subject to any kind of regulation, what is the impact of the Internet and self and co-regulation on the e-commerce.

  10. Party Building Work of Universities in the Internet Age%网络时代高校党建工作探析

    Institute of Scientific and Technical Information of China (English)

    朱宁

    2012-01-01

      With the advent of the Internet age, the university party building work is faced with opportunities and challenges coexist situation. The network can provide a new platform, improve working way, help the members play a more main role, but also impact on the students thoughts, increased the pressure of col ege party construction team, and the work experience is obviously insufficient. Therefore, to grasp the direction, form resultant force, perfect system, in order to ensure the university party building work.%  随着网络时代的到来,高校党建工作面临着新的机遇与挑战。网络可以提供新平台、改善工作方式、有利于发挥党员的主体作用,但也冲击着高校学生的思想、加大了党建工作队伍的压力,高校在网络时代的党建工作经验明显不足。因此,需要把握方向、形成合力、完善体制,多方面保证高校党建工作的顺利开展。

  11. Internet User Behaviour Model Discovery Process

    Directory of Open Access Journals (Sweden)

    2007-01-01

    Full Text Available The Academy of Economic Studies has more than 45000 students and about 5000 computers with Internet access which are connected to AES network. Students can access internet on these computers through a proxy server which stores information about the way the Internet is accessed. In this paper, we describe the process of discovering internet user behavior models by analyzing proxy server raw data and we emphasize the importance of such models for the e-learning environment.

  12. Internet User Behaviour Model Discovery Process

    OpenAIRE

    Dragos Marcel VESPAN

    2007-01-01

    The Academy of Economic Studies has more than 45000 students and about 5000 computers with Internet access which are connected to AES network. Students can access internet on these computers through a proxy server which stores information about the way the Internet is accessed. In this paper, we describe the process of discovering internet user behavior models by analyzing proxy server raw data and we emphasize the importance of such models for the e-learning environment.

  13. Avatars travel for free: virtual access to evidence-based intervention training and capacity building.

    Science.gov (United States)

    Villarruel, Antonia M; Aebersold, Michelle; Valladares, Angel F; Yeagley, Emily; Tschannen, Dana

    2014-10-01

    Virtual facilitator trainings have the potential to accelerate the dissemination of evidence-based interventions by increasing accessibility and affordability. We explore the feasibility and acceptability of translating facilitator trainings of ¡Cuídate!, an evidence-based sexual risk intervention for Latino youth, to a multi-user virtual environment (Second Life). We describe the adaptation process and compare participant ratings of face-to-face (n = 35) and Second Life trainings (n = 26). Second Life participants reported that training resources, activities, and demonstrations were good/very good (97%, 88.5%, 94%). While face-to-face participants rated training process outcomes significantly higher than those in Second Life (p virtual trainings are an acceptable and feasible option for training community facilitators on evidence-based interventions. This study contributes to the development of trainings necessary to disseminate and implement evidence-based interventions and is an important effort in providing end-users with access to trainings in order to provide needed community services.

  14. On Building Internet Media and Public Space%网络媒体与公共空间建设

    Institute of Scientific and Technical Information of China (English)

    杜吉刚; 王建美

    2012-01-01

    Public space,in essence,is primarily a subject of inter-space between different bodies,such as political public space within the system,outside the system and cultural public space.Public space is the major symbol of modern society.The existence of public space,communication within itself or with other social areas can effectively promote the healthy development of the society,and can also avoid an overall bias.Internet media is mainly positive to the construction of public space.This was reflected in the following aspects: the size of groups involved,the range and extension of the public space,the dimension extended.It helps to realize more smooth and convenient communication within the public space and with all areas of society.However,Internet media has some impacts and must be treated seriously.%公共空间,从本质上来讲,主要是一种主体间的间性空间。它主要包括体制内政治公共空间、体制外政治公共空间与文化公共空间三个领域。公共空间是现代社会的主要标志。公共空间的存在,公共空间内部以及公共空间与社会各领域之间的顺畅沟通,能够有效地促进社会的良性发展,避免出现整体性的偏差。网络媒体对于公共空间建设的影响主要是积极的、正面的。这主要表现在以下方面:网络媒体扩大了公共空间参与人群的规模,拓展了公共空间的延展范围、延展维度;网络媒体使公共空间内部、公共空间与社会各领域之间的沟通更加顺畅、便捷。当然,网络媒体对于公共空间建设也有一些消极的、负面的影响,还需要认真加以对待。

  15. CUAHSI-HIS: an Internet based system to facilitate public discovery, access, and exploration of different water science data sources

    Science.gov (United States)

    Arrigo, J. S.; Hooper, R. P.; Choi, Y.; Ames, D. P.; Kadlec, J.; Whiteaker, T.

    2011-12-01

    "Water is everywhere." This sentiment underscores the importance of instilling hydrologic and earth science literacy in educators, students, and the general public, but also presents challenges for water scientists and educators. Scientific data about water is collected and distributed by several different sources, from federal agencies to scientific investigators to citizen scientists. As competition for limited water resources increase, increasing access to and understanding of the wealth of information about the nation's and the world's water will be critical. The CUAHSI-HIS system is a web based system for sharing hydrologic data that can help address this need. HydroDesktop is a free, open source application for finding, getting, analyzing and using hydrologic data from the CUAHSI-HIS system. It works with HydroCatalog which indexes the data to find out what data exists and where it is, and then it retrieves the data from HydroServers where it is stored communicating using WaterOneFlow web services. Currently, there are over 65 services registered in HydroCatalog providing central discovery of water data from several federal and state agencies, university projects, and other sources. HydroDesktop provides a simplified GIS that allows users to incorporate spatial data, and simple analysis tools to facilitate graphing and visualization. HydroDesktop is designed to be useful for a number of different groups of users with a wide variety of needs and skill levels including university faculty, graduate and undergraduate students, K-12 students, engineering and scientific consultants, and others. This presentation will highlight some of the features of HydroDesktop and the CUAHSI-HIS system that make it particularly appropriate for use in educational and public outreach settings, and will present examples of educational use. The incorporation of "real data," localization to an area of interest, and problem-based learning are all recognized as effective strategies for

  16. S2RSLDB: a comprehensive manually curated, internet-accessible database of the sigma-2 receptor selective ligands.

    Science.gov (United States)

    Nastasi, Giovanni; Miceli, Carla; Pittalà, Valeria; Modica, Maria N; Prezzavento, Orazio; Romeo, Giuseppe; Rescifina, Antonio; Marrazzo, Agostino; Amata, Emanuele

    2017-01-01

    Sigma (σ) receptors are accepted as a particular receptor class consisting of two subtypes: sigma-1 (σ1) and sigma-2 (σ2). The two receptor subtypes have specific drug actions, pharmacological profiles and molecular characteristics. The σ2 receptor is overexpressed in several tumor cell lines, and its ligands are currently under investigation for their role in tumor diagnosis and treatment. The σ2 receptor structure has not been disclosed, and researchers rely on σ2 receptor radioligand binding assay to understand the receptor's pharmacological behavior and design new lead compounds. Here we present the sigma-2 Receptor Selective Ligands Database (S2RSLDB) a manually curated database of the σ2 receptor selective ligands containing more than 650 compounds. The database is built with chemical structure information, radioligand binding affinity data, computed physicochemical properties, and experimental radioligand binding procedures. The S2RSLDB is freely available online without account login and having a powerful search engine the user may build complex queries, sort tabulated results, generate color coded 2D and 3D graphs and download the data for additional screening. The collection here reported is extremely useful for the development of new ligands endowed of σ2 receptor affinity, selectivity, and appropriate physicochemical properties. The database will be updated yearly and in the near future, an online submission form will be available to help with keeping the database widely spread in the research community and continually updated. The database is available at http://www.researchdsf.unict.it/S2RSLDB.

  17. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire, IRSN, 92 - Fontenay aux Roses (France)

    2009-10-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear medicine and ionizing radiation, nuclear activity, radiation protection for populations, radioactive waste management in France and Europe. (N.C.)

  18. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire (IRSN), 92 - Fontenay-aux-Roses (France)

    2009-07-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection, and environment shared by sites in France, Europe, big agencies and non-ionizing radiations. (N.C.)

  19. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2010-01-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  20. Evaluation Capacity-Building of Internet Information Credibility%互联网信息可信性评价能力培养

    Institute of Scientific and Technical Information of China (English)

    虞俊杰

    2012-01-01

    日益丰富的互联网学术信息资源作为图书馆文献资源的有益补充,已成为用户信息资源获取的重要渠道。面对互联网庞杂无序的信息资源,图书馆用户信息评价能力的缺失为正确、合理、有效地利用互联网信息带来了障碍。用户互联网可信性评价能力可分为信息检索能力、信息认知能力和信息判断能力。图书馆应从提高用户信息检索能力、分析互联网用户的知识分享动机、掌握常用的互联网信息外部特征分析途径等方面,培养用户的信息可信性评价能力。%As the useful supplement to library literature resources, increasingly rich intemet academic information resources become the important channel of users accessing to information resources. Facing the chaotic information resources an internet, libraries are lack of the evaluation capacity of credibility users,it brings the barrier for the correct, reasonable and effective utilization of the intemet information. The evaluation capacity of the intemet information credibility of users could be divided into the information retrieval ability, the information cognitive ability and the information judgment ability. Libraries should bring up the evaluation capacity of the information credibility of users from following aspects: improving user's information retrieval capabilities, analyzing the knowledge sharing motivation of intemet users, mastering common analytical approaches of external characteristics of internet information.

  1. GOOSE: semantic search on internet connected sensors

    Science.gov (United States)

    Schutte, Klamer; Bomhof, Freek; Burghouts, Gertjan; van Diggelen, Jurriaan; Hiemstra, Peter; van't Hof, Jaap; Kraaij, Wessel; Pasman, Huib; Smith, Arthur; Versloot, Corne; de Wit, Joost

    2013-05-01

    More and more sensors are getting Internet connected. Examples are cameras on cell phones, CCTV cameras for traffic control as well as dedicated security and defense sensor systems. Due to the steadily increasing data volume, human exploitation of all this sensor data is impossible for effective mission execution. Smart access to all sensor data acts as enabler for questions such as "Is there a person behind this building" or "Alert me when a vehicle approaches". The GOOSE concept has the ambition to provide the capability to search semantically for any relevant information within "all" (including imaging) sensor streams in the entire Internet of sensors. This is similar to the capability provided by presently available Internet search engines which enable the retrieval of information on "all" web pages on the Internet. In line with current Internet search engines any indexing services shall be utilized cross-domain. The two main challenge for GOOSE is the Semantic Gap and Scalability. The GOOSE architecture consists of five elements: (1) an online extraction of primitives on each sensor stream; (2) an indexing and search mechanism for these primitives; (3) a ontology based semantic matching module; (4) a top-down hypothesis verification mechanism and (5) a controlling man-machine interface. This paper reports on the initial GOOSE demonstrator, which consists of the MES multimedia analysis platform and the CORTEX action recognition module. It also provides an outlook into future GOOSE development.

  2. TTLEM: Open access tool for building numerically accurate landscape evolution models in MATLAB

    Science.gov (United States)

    Campforts, Benjamin; Schwanghart, Wolfgang; Govers, Gerard

    2017-04-01

    Despite a growing interest in LEMs, accuracy assessment of the numerical methods they are based on has received little attention. Here, we present TTLEM which is an open access landscape evolution package designed to develop and test your own scenarios and hypothesises. TTLEM uses a higher order flux-limiting finite-volume method to simulate river incision and tectonic displacement. We show that this scheme significantly influences the evolution of simulated landscapes and the spatial and temporal variability of erosion rates. Moreover, it allows the simulation of lateral tectonic displacement on a fixed grid. Through the use of a simple GUI the software produces visible output of evolving landscapes through model run time. In this contribution, we illustrate numerical landscape evolution through a set of movies spanning different spatial and temporal scales. We focus on the erosional domain and use both spatially constant and variable input values for uplift, lateral tectonic shortening, erodibility and precipitation. Moreover, we illustrate the relevance of a stochastic approach for realistic hillslope response modelling. TTLEM is a fully open source software package, written in MATLAB and based on the TopoToolbox platform (topotoolbox.wordpress.com). Installation instructions can be found on this website and the therefore designed GitHub repository.

  3. The value of energy efficiency and accessibility. An analysis of the Dutch office building market; De waarde van energiezuinigheid en bereikbaarheid een analyse van de nederlandse kantorenmarkt

    Energy Technology Data Exchange (ETDEWEB)

    Kok, N. [Departement Financiering, School of Business and Economics, Universiteit Maastricht, Maastricht (Netherlands); Jennen, M. [Departement Financiering, Rotterdam School of Management, Erasmus Universiteit Rotterdam, Rotterdam (Netherlands)

    2011-02-15

    This study offers the first systematic insight in the effects of the main components of sustainability (energy efficiency and accessibility by public transport) on realized rent levels in the Dutch market for office buildings. The rent developments of inefficient and efficient office buildings vary significantly. Accessibility also pays. Both components of sustainability have a direct impact on the value development of both 'non-green' inefficient buildings and of office buildings on traditional single function locations. [Dutch] Dit onderzoek biedt het eerste systematische inzicht in de effecten van de belangrijkste componenten van duurzaamheid (energiezuinigheid en OV-bereikbaarheid) op gerealiseerde huurniveaus in de Nederlandse kantorenmarkt. De huurontwikkelingen van niet zuinige en zuinige kantoorgebouwen lopen sterk uiteen. Ook bereikbaarheid betaalt. Beide componenten van duurzaamheid hebben een directe impact op de waardeontwikkeling van zowel 'niet-groene', onzuinige gebouwen, als op kantoren op traditionele, 'monofunctionele' locaties.

  4. 试论“读书、读网、读人”的特性%On Characteristics of Accessing Information through Books, Internet and People

    Institute of Scientific and Technical Information of China (English)

    舒刚

    2012-01-01

    “读书、读网、读人”三种阅读方式各有其特性和优势:读书,即人与纸质文献的信息交流具有不可替代性;读网,即人与数字文献的信息交流具有双重性;读人,即人与人现场面对面的信息交流具有至上性。在个人的阅读中,促进三种阅读方式的优势互补,将使每个人的阅读更加丰富多彩,也对创造每个人的美好人生具有重大的作用。%Books, internet and people as three sources of intormat~on have different charactenstics and advantages, treading books - the exchange of information between people and paper texts is non - substitutable. Reading online,the exchange of information between peo- ple and digital literature is dual - natured. Reading people, the face - to - face exchanges of information between people are supreme. If one can complement the advantages of all these three accesses of information, his reading will be more colorful and his life will be made more beautiful.

  5. Programming Collective Intelligence Building Smart Web 2.0 Applications

    CERN Document Server

    Segaran, Toby

    2008-01-01

    This fascinating book demonstrates how you can build web applications to mine the enormous amount of data created by people on the Internet. With the sophisticated algorithms in this book, you can write smart programs to access interesting datasets from other web sites, collect data from users of your own applications, and analyze and understand the data once you've found it.

  6. From SMS to SNS: The Use of the Internet on the Mobile Phone among Young Danes

    DEFF Research Database (Denmark)

    Bertel, Troels Fibæk; Stald, Gitte Bang

    2011-01-01

    and by other studies, specifically from the Mobile Media, Mobile Youth study from spring 2011. The main point is that the spread and frequency of the use of the internet on mobile phones has increased rapidly and over short time primarily along with the adaptation of smart phones and the consequently easy...... or subscription limitations, that it is too cumbersome to be practical or too expensive to be worth it. Notably the majority of young Danes do have a laptop and extensive wifi access so the purchase and use of smart phones and internet on the mobile is not likely to be THE potential internet access. Altogether we......The focus of this paper is on the adaptation and use of the internet on the mobile among young Danes. The analysis builds on quantitative and qualitative data from a pilot study conducted among students at the IT University during the spring of 2011. These findings are supported theoretically...

  7. Internet dynamics

    Science.gov (United States)

    Lukose, Rajan Mathew

    The World Wide Web and the Internet are rapidly expanding spaces, of great economic and social significance, which offer an opportunity to study many phenomena, often previously inaccessible, on an unprecedented scale and resolution with relative ease. These phenomena are measurable on the scale of tens of millions of users and hundreds of millions of pages. By virtue of nearly complete electronic mediation, it is possible in principle to observe the time and ``spatial'' evolution of nearly all choices and interactions. This cyber-space therefore provides a view into a number of traditional research questions (from many academic disciplines) and creates its own new phenomena accessible for study. Despite its largely self-organized and dynamic nature, a number of robust quantitative regularities are found in the aggregate statistics of interesting and useful quantities. These regularities can be understood with the help of models that draw on ideas from statistical physics as well as other fields such as economics, psychology and decision theory. This thesis develops models that can account for regularities found in the statistics of Internet congestion and user surfing patterns and discusses some practical consequences. practical consequences.

  8. Internet and child pornography

    Directory of Open Access Journals (Sweden)

    Seda Çağlar

    2010-04-01

    Full Text Available Nowadays, internet use and access is becoming increasingly common as a great entertainment, communication and educational resource for children as well as for adults. Internet is a perfect environment for children, for exploring the world, learning and having fun. However, access to illegal sites that contain violence and sexuality, and contact dangerous people are among the particular risks for children using the internet. It is a known fact that, internet and developing technology make the production and distribution of child pornography cheaper and easier. There has been consensus on the need of creating a plan and increasing the awareness in the community for the fight against child pornography. Because of the increasing internet use and the risk for children mentioned, nurses got new responsibilities. Nurses have to inform society, especially families and children, about safe internet use. In this review, legal regulations about the fight against child pornography on the internet, the reasons that lay the ground for child pornography and their negative effects on children has been addressed.

  9. Cyber Security: Rule of Use Internet Safely?

    OpenAIRE

    -, Maskun

    2013-01-01

    International Journal Cyber security plays on important role to guarantee and protect people who use internet in their daily life. Some cases take place around the world that people get inconvenience condition when they access and use internet. Misuse of internet becomes a current issue which some cases take place including a university. Advantages of using internet in the university of course assist the student to get some information in internet. However, they have to be protected in ord...

  10. 浅谈internet访问缓慢的原因与解决方法%Talking about Internet Slow Access Reasons and Solutions

    Institute of Scientific and Technical Information of China (English)

    胡越鹏

    2011-01-01

    随着internet的发展速度日益加快,通过使用internet电子商务业务,网上冲浪,网上游戏,资料查询变得越来越方便,internet是目前世界上最大的计算机互连网络,提供有丰富的信息和资源,使用它所提供的服务,使得企业与外界的联系变得简单、方便、准确、高效。它最大的优势之一就是使用便捷,入网用户不必具备计算机网络的专门知识,便可在网上自由翱翔在使用,在使用internet的同时,人们对internet的访问速度,下载速度要求变得越来越高,本文对影响到internet访问速度的原因及解决方法进行详细说明。%With the rapid pace of interact development,e-commerce business through the use of internet,web surfing,online gaming,data queries become more convenient,Intemet is the world's largest computer interconnection network,providing a wealth of information and resources,the use of the services it provides,allows businesses with the outside world becomes simple,convenient,accurate and efficient.lt is one of the biggest advantages of ease of use,network users do not have expertise in computer network can fly freely in the use of the Intcmet,using the interact at the same time,people interact access speed,download speed requirements have become more and more high,this affects intemet access speed of the causes and solutions in detail.

  11. Internet-accessible, near-real-time volcano monitoring data for geoscience education: the Volcanoes Exploration Project—Pu`u `O`o

    Science.gov (United States)

    Poland, M. P.; Teasdale, R.; Kraft, K.

    2010-12-01

    Internet-accessible real- and near-real-time Earth science datasets are an important resource for geoscience education, but relatively few comprehensive datasets are available, and background information to aid interpretation is often lacking. In response to this need, the U.S. Geological Survey’s (USGS) Hawaiian Volcano Observatory, in collaboration with the National Aeronautics and Space Administration and the University of Hawai‘i, Mānoa, established the Volcanoes Exploration Project: Pu‘u ‘O‘o (VEPP). The VEPP Web site provides access, in near-real time, to geodetic, seismic, and geologic data from the Pu‘u ‘O‘o eruptive vent on Kilauea Volcano, Hawai‘i. On the VEPP Web site, a time series query tool provides a means of interacting with continuous geophysical data. In addition, results from episodic kinematic GPS campaigns and lava flow field maps are posted as data are collected, and archived Webcam images from Pu‘u ‘O‘o crater are available as a tool for examining visual changes in volcanic activity over time. A variety of background information on volcano surveillance and the history of the 1983-present Pu‘u ‘O‘o-Kupaianaha eruption puts the available monitoring data in context. The primary goal of the VEPP Web site is to take advantage of high visibility monitoring data that are seldom suitably well-organized to constitute an established educational resource. In doing so, the VEPP project provides a geoscience education resource that demonstrates the dynamic nature of volcanoes and promotes excitement about the process of scientific discovery through hands-on learning. To support use of the VEPP Web site, a week-long workshop was held at Kilauea Volcano in July 2010, which included 25 participants from the United States and Canada. The participants represented a diverse cross-section of higher learning, from community colleges to research universities, and included faculty who teach both large introductory non-major classes

  12. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [IRSN, 92 - Fontenay-aux-Roses (France)

    2010-04-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection in nuclear medicine, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  13. 物联网技术在智能建筑能源管理中应用的研究%Research on the application of the internet of things technology in the intelligent building energy management

    Institute of Scientific and Technical Information of China (English)

    杨桂明

    2016-01-01

    物联网技术是时代快速发展的技术性产物。在建筑行业进入智能建筑的阶段,将物联网和智能建筑中的能源管理相结合,使得物联网应用到相关的能源管理中,既推动了物联网技术的应用,也加快和保证了智能建筑的节能工作。本文主要对建筑的能源管理和节能手段、能源管理中应用到的物联网技术进行详细的解说,以及对能源管理和物联网技术的相结合通过实际案例进行一定的分析,探讨在实际的能源管理过程中物联网的应用效率,希望可以使更多的人关注到建筑节能。%The Internet of things technology is a technology product of the times. In the construction industry to enter the stage of intelligent building,the Internet of things and intelligent building energy management,making the application of the Internet of things related to energy management,both to promote the application of the Internet of things technology, but also to accelerate and ensure the energy-saving work of the smart building. In this paper,the construction of energy management and energy management, energy management in the application of the Internet of things technology for detailed explanation,as well as the combination of energy management and networking technology through the actual case of a certain analysis,to explore the application of the Internet of things in the actual energy management process,and hope that more people will pay attention to building energy efficiency.

  14. Pwned by the Internet: Explorative research into the causes and consequences of compulsive internet use

    NARCIS (Netherlands)

    G-J. Meerkerk

    2007-01-01

    textabstractThe first internet service provider (ISP) in the Netherlands (XS4ALL) started to provide internet access to private persons in 1993. A few years later, in 1996, less than 5% of the Dutch households had internet access. Now, 10 years later, this figure has risen to nearly 80%, which impli

  15. The Internet in Swaziland: Services under Transformation.

    Science.gov (United States)

    Muswazi, Paiki

    2000-01-01

    Reviews the history of libraries in Swaziland and discusses the introduction of computers in 1974 and Internet access in 1996. Topics include censorship laws that have restricted access; e-commerce; e-mail; obstacles, including limited user access in libraries and lack of computer literacy; and suggestions for extending Internet information…

  16. STRUGGLE FOR NEW MEDIA OF PEACE AND TOLERANCE: A CLOSE LOOK TO THE USAGE OF INTERNET IN DEFINING AND BUILDING YOUNG MUSLIM COMMUNITY IN INDONESIA

    Directory of Open Access Journals (Sweden)

    Imam Malik Ridwan

    2015-12-01

    Full Text Available As for religion, internet has become a very important aspect in people’s everyday live, especially for those who seek information and further understanding about religion; internet is a way in and out to do so. While in one side internet has been a great help in providing sources and opportunity to learn religion in a new way, it also has a negative potential for the growing numbers of radicalism and religious extremism. Various researches and studies have bought up large data showing that these negative effects of internet bring bad influences to religious believers. Nevertheless, the ability of internet in providing and spreading information are also a way out in bringing back religion to its ideal path, that is to evoke peace and welfare among people. Internet is then used as a field for dakwah (proselytizing to spread more peaceful as well as relevant information on religion and its related topics. Online dakwah is therefore meant to initiate peace and non-violent ways in understanding and practicing religion in real life. Focused targets for the dakwah are youth as the most active users of internet, as well as government to initiate and implement such policies to keep internet clean from violence and extremism.

  17. Internet addiction: A case report

    Directory of Open Access Journals (Sweden)

    Pejović-Milovančević Milica

    2009-01-01

    Full Text Available Some addictions cannot be connected with substance abuse (pathological gambling, video games playing, binge eating, compulsive physical activity, emotional relationship addiction, TV addiction. Since 1995, Internet addiction has been accepted as a clinical entity with profound negative effect on social, familial, educational and economical personal functioning. The diagnosis of Internet addiction could be established if the person spends more than 38 hours per week on the Internet exempting online professional needs. Basic symptoms are the increased number of hours spent in front of the computer along with the Internet use, development of abstinent syndrome if the Internet access is prohibited, sleep inversion, neglect of basic social requirements and personal hygiene, many somatic symptoms developed due to prolonged sitting or monitor watching, dissocial behavior. In this paper, data about the Internet addiction are presented and a case report of an adolescent with developed Internet addiction.

  18. Internet Addiction and Its Treatment

    Directory of Open Access Journals (Sweden)

    Ozden Arisoy

    2009-07-01

    Full Text Available With the introduction of new technologies, computer and internet use have become an unavoidable necessity in our daily lives. Internet was originally designed to facilitate communication and research. However the dramatic increase in use of internet in recent years has led to its pathologic use. Turkey, as a developing country with an increasing rate of internet access and computer use is at high risk for this disorder. In our country, this disorder is especially seen in young people who are more skilled in internet and computer use. And because their excessive internet use has led to negative consequences in their academic, social and family lives, patients and their families began search of treatment for this disorder. So clinicians must be aware of this newly emerging disorder and they should be able to apply the appropriate therapeutic interventions. This paper aims to summarize the pharmacological and cognitive-behavioral treatment of internet addiction.

  19. Disparities in internet use among orthopedic outpatients.

    Science.gov (United States)

    Walsh, Kenneth P; Rehman, Saqib; Goldhirsh, Jessie

    2014-02-01

    Internet access has lagged behind for patients with lower incomes and from certain ethnic groups. This study investigated the possible improvement of access to health-related information on the Internet for all patients in an urban outpatient setting, regardless of socioeconomic background. A 28-question survey was completed by 100 orthopedic outpatients evaluating associations between their age, ethnicity, income, or education level and their access to the Internet. The survey also examined how patients used the Internet to obtain information about their medical condition, their privacy concerns when conducting online research, and their use of mobile phones as a primary means of Internet access. The Internet was used by 57% of orthopedic outpatients in this urban setting. Internet access decreased with advancing age but increased with increasing income and education, findings consistent with similar studies. Despite the inability to identify an association between ethnicity and Internet access in this patient population, fewer Latinos (33%) than whites (67%) or African Americans (77%) sought information about their medical condition. Among patients who used a mobile phone as the primary method for online access, 74% were African American or Latino and 26% were white. This difference in mobile phone use for online access suggests that mobile phones have provided ethnic minorities with greater Internet access and thus may have narrowed the digital divide among the races.

  20. Internet roaming: a WLAN/3G integration system for enterprises

    Science.gov (United States)

    Luo, Hui; Jiang, Zhimei; Kim, Byoung J.; Shankar, Narendra K.; Henry, Paul

    2002-08-01

    This paper proposes an enterprise-oriented WLAN/3G network integration solution, called the Internet Roaming system. Differing from other operator-oriented WLAN/3G network integration solutions, the Internet Roaming system is a practical IP-based corporate network architecture that provides seamless internetworking across office WLAN, home WLAN, public WLAN, and 2.5G/3G cellular network for corporate wireless data users. An Internet Roaming system may have four building blocks. They are IRC (Internet Roaming Client), SMG (secure mobility gateway), SIA (Secure IP Access) gateway, and VSA (virtual single account) server. The IRC is a special client tool (software or hardware) installed on a wireless data device. It provides a secure mobile IP connection from the wireless data device to the corporate network transparent to the operating system of the wireless data devices. The SMG is a mobile IPsec gateway installed on the corporate core network facing the Internet. It works with the IRC to maintain a secure mobile IP connection when the wireless data device is connected on the Internet through a home WLAN, a public WLAN, or a cellular network. The SIA server is a special IPsec gateway installed on the corporate intranet where office WLAN is installed. It works with the IRC to assure the security of office WLAN while improving the routing efficiency for users computers. The VSA server manages the IRC, SMG, and SIA servers.

  1. Internet and Surveillance

    DEFF Research Database (Denmark)

    The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....

  2. Knowledge, Democracy, and the Internet

    Science.gov (United States)

    Mößner, Nicola; Kitcher, Philip

    2017-01-01

    The internet has considerably changed epistemic practices in science as well as in everyday life. Apparently, this technology allows more and more people to get access to a huge amount of information. Some people even claim that the internet leads to a "democratization of knowledge." In the following text, we will analyze this statement.…

  3. Length Calculation for Vehicle Access of Large Public Buildings%大型公共建筑机动车出入口长度计算

    Institute of Scientific and Technical Information of China (English)

    卓曦; 钱振东; 胡亮

    2012-01-01

    为提高出入口通行能力与城市道路交通安全水平,分析大型公共建筑机动车出入口长度影响因素,考虑大型公共建筑用地出行生成率与城市道路车辆反应视距,建立出入口长度模型.该模型利用建筑交通生成计算出入口道路排队长度,并利用视距三角形计算出入口车辆安全距离,取其中较大值为出入口长度.最后以某市公交枢纽站为例进行试算与仿真.仿真结果表明:应用模型所得出入口长度后,公交站出入口道路与临近城市道路的单车平均延误分别减少5.05s与6.37s,平均车速分别提高5.1 km/h与4.81 km/h.可见研究成果有利于大型公建机动车出入口交通渠化与线形改善.%To increase the access capacity and heighten the urban street traffic safety level, impact factors of the vehicle access length of large public buildings are analyzed. Then considering the land trip generation rate of large public buildings and vehicle decision sight distance of urban streets, the access length model is put forward. The model uses the building trip generation for calculating the access queue length and adopts the sight triangle to calculate the vehicle safety distance in the access, the larger one of which is considered as the access length. Finally, one urban public traffic transfer hub is taken as the example for calculating and simulating. The simulation result indicates that, after applying the access length from the model, the delay per vehicle of the public traffic station driveway and the adjacent urban street separately decreases 5. 05 s and 6. 37 s, while the average speed increases 5. 1 km/h and 4. 81 km/h. It can be seen that, research results are beneficial to improving the vehicle access traffic channelization and alignment of large public buildings.

  4. Teaching case study of a Shared Internet access authentication environment%一种认证环境下Internet共享接入的教学案例研究

    Institute of Scientific and Technical Information of China (English)

    崔建涛

    2016-01-01

    本文以某校园网络接入为背景,基于路由和远程访问服务、网络地址转换、代理、VPN技术,设计了一个改进的Internet共享接入教学案例,并在VMware虚拟机上仿真了该校园网络,成功实现了认证环境下主机和可移动终端的网络接入共享,满足了校园网络内不同位置主机、可移动终端灵活的访问需求。改进后的方案具有成本低、可扩充性强、组网灵活等优点。本文为教学研究人员设计Internet共享接入案例提供了有益的参考。%This article is set in a campus network access, based on the routing and remote access service, network address translation, agency, VPN technology, designs a improved teaching case sharing Internet access, and the simulation on a VMware virtual machine in the campus network, successfully realized the authentication environment network access to a Shared host and mobile terminals, to satisfy the different sites in the campus network host, flexible mobile terminal access requirements. The improved scheme has low cost, strong scalability, flexible networking, etc. In this paper, the researchers for the teaching design Shared Internet access case provides the beneficial reference.

  5. Internet economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1997-01-01

    A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect.......A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect....

  6. Internet Economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1998-01-01

    Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing.......Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing....

  7. Internet factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  8. Internet Factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  9. Internet Economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1998-01-01

    Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing.......Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing....

  10. Internet economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1997-01-01

    A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect.......A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect....

  11. INTERNET: MONITORED FREEDOM

    Directory of Open Access Journals (Sweden)

    Fernando Kuschnaroff Contreras

    2012-12-01

    Full Text Available The Internet is a phenomenal research and information tool. It has entered the lives of people in an extremely fast way, offering a sense of freedom, and discoveries. This study presents the Internet usage in organizations, along with the use of equipment and information systems supplied by the employer and personal Internet usage at work. The subjects of the present research are businesspeople chosen among employees with a university degree in companies in the City of Curitiba, in the State of Paraná, with leading, managerial or operational occupations, with access to the Internet in their offices as well as at home. The study proposal consists of a critical analysis on the theme.

  12. Internet marketing

    OpenAIRE

    2009-01-01

    In the bachelor thesis are introduced theoretical concepts of the Internet and marketing, accented the need of marketing mix along with its specifics of the internet environment. Next is interpreted which tools can be used for marketing of firms and which marketing instruments are to be deployed. Final chapter illustrates socio-demographics of Czech internet users along with media market allocation from the perspective of all media as well as in the segment of the Internet.

  13. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  14. Internet Accounting

    NARCIS (Netherlands)

    Pras, Aiko; Beijnum, van Bert-Jan; Sprenkels, Ron; Párhonyi, Robert

    2001-01-01

    This article provides an introduction to Internet accounting and discusses the status of related work within the IETF and IRTF, as well as certain research projects. Internet accounting is different from accounting in POTS. To understand Internet accounting, it is important to answer questions like

  15. The Internet Process Addiction Test: Screening for Addictions to Processes Facilitated by the Internet

    OpenAIRE

    2015-01-01

    The Internet Process Addiction Test (IPAT) was created to screen for potential addictive behaviors that could be facilitated by the internet. The IPAT was created with the mindset that the term “Internet addiction” is structurally problematic, as the Internet is simply the medium that one uses to access various addictive processes. The role of the internet in facilitating addictions, however, cannot be minimized. A new screening tool that effectively directed researchers and clinicians to the...

  16. Towards the internet of services

    CERN Document Server

    Wahlster, Wolfgang; Wess, Stefan; Friedrich, Hermann; Widenka, Thomas

    2014-01-01

    The Internet of Services and the Internet of Things are major building blocks of the Future Internet. The digital enterprise of the future is based not only on mobile, social, and cloud technologies, but also on se­mantic technologies and the future Internet of Everything. Semantic technologies now enable mass cus­tomization for the delivery of goods and services that meet individual customer needs and tastes with near mass production efficiency and reliability. This is creating a competitive advantage in the industrial econ­omy, the service economy, and the emerging data economy, leading to

  17. THE IMPACT OF SMARTPHONE AND INTERNET USAGE ON ENGLISH LANGUAGE LEARNING

    Directory of Open Access Journals (Sweden)

    Rosina Fransisca J. Lekawael

    2017-06-01

    Full Text Available English language skills here mean the development of the main parts or elements of the language which include speaking, listening, reading, and writing. English language subject has different educational tools that are likely suited with it. Smartphone and internet usage have actively influence daily life, even for children and adolescents. In learning activity, smartphone is a tool to help students connected to be online. A qualitative approach was pursued in this study. Then, the data collection technique used in this study is a survey by using questionnaires. As result, the research shows that most students spend much time to access the social network, some students access internet for dictionary and games, and only a few students access internet for education purposes. In short, the students rather to use smartphone for other thing than education. Therefore, English language learning should be focused on leading language teaching by using English resources from smartphone and internet, as media, which closed to students. By using smartphone and internet, it is expected that either teacher or students become more active and creative to explore their knowledge through media. Pedagogically, there is an urgent need for teachers to implement smartphone-based language learning in order to engage students to be critics with material and its content. So, it enables students to build and enhance a technology awareness of smartphone and internet usage on English language learning in classroom.

  18. China on the Internet

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    The big news on the Web in 2009 No more mobile porn The problem of cellphone pornography has been on the rise with more and more mobile phones that are equipped to surf the Internet coming into the market. Online sites accessible only through mobile phones are becoming a popular new method for distributing porn,

  19. Internet of Things

    Science.gov (United States)

    Ritz, John; Knaack, Zane

    2017-01-01

    In the 21st century, electronic connectivity is a major component of everyday life. One expects to have mobile phone coverage and to have access to log a computer or tablet onto the internet. This connectivity enables users to keep track of personal affairs and conduct work from remote locations. Designers and manufacturers are also connecting…

  20. 物联网接入技术研究与系统设计%Study on the access technology for internet of things and its system implementation schemes

    Institute of Scientific and Technical Information of China (English)

    张子木

    2016-01-01

    Taking Internet of things (IOT) technology as the core, through the study on Arduino technology and the access technology for IOT, this paper gives the design scheme of access system in IOT. This system can real-time transmission date to the internet which sensing device collected, without altering the original equipment. Compared with the access system in IOT based on FPGA technology, this system more flexible, and it shorten the development cycle, reduce the development cost, has practical value.%以物联网技术为核心,通过对Arduino技术和物联网接入技术的研究,提出了一种物联网接入技术方案,并完成了系统的软硬件设计。该物联网接入系统可以在不更改原有设备的前提下,实时的将无法自主联网的感知设备采集到的信息发送至互联网。与采用FPGA技术的物联网接入系统相比,具有开发周期短,开发成本低,灵活性强等特点,具有实际应用价值。

  1. Internet Censorship Issues for Teacher-Librarians.

    Science.gov (United States)

    Schrader, Alvin

    1999-01-01

    Describes and critiques emerging issues about Internet access in schools and school libraries. Discusses software products for filtering and rating expressive content on the Internet, reader-response-theory implications for filtering and rating Internet content, ambiguities, and the role of school librarians and acceptable-use policies. (AEF)

  2. Facilitating Internet-Scale Code Retrieval

    Science.gov (United States)

    Bajracharya, Sushil Krishna

    2010-01-01

    Internet-Scale code retrieval deals with the representation, storage, and access of relevant source code from a large amount of source code available on the Internet. Internet-Scale code retrieval systems support common emerging practices among software developers related to finding and reusing source code. In this dissertation we focus on some…

  3. The Page You Are Attempting to Access Has Been Blocked in Accordance with National Laws: Applying a Corporate Responsibility Framework to Human Rights Issues Facing Internet Companies

    Directory of Open Access Journals (Sweden)

    Emily C. Miletello

    2011-04-01

    Full Text Available According to the OpenNet Intiative, at least 40 countries engage in some degree of Internet censorship. 1 While censorship may be considered justifiable for various reasons—including national security, blocking child pornography, or protecting intellectual property—some authoritative states, most notably China, censor the Internet in order to control the activities of political dissidents, international human rights groups, or those who may be otherwise critical of the government. Potentially more troubling, both authoritative nations and liberal democracies alike frequently request  user-data information from Internet companies, which may infringe on individual rights to privacy and free speech, and may even lead to arbitrary detention and torture.

  4. Ponder over and Explore Shanghai Police Force Building from the Perspective of “Internet+”%“互联网+”思维下上海公安队伍建设的思考与探索

    Institute of Scientific and Technical Information of China (English)

    韩勇

    2016-01-01

    2015年3月,李克强总理在政府工作报告中首次提出制定“互联网+”行动计划,推动移动互联网、云计算、大数据、物联网等与传统行业紧密结合。在“互联网+”思维下,公安机关政工部门如何将公安队伍建设与教育管理等工作紧密结合,是当前我们必须认真思考和科学对待的课题。深入研究分析“互联网+”对公安工作和公安队伍建设的影响和当前“互联网+”思维下上海公安队伍建设存在的问题,并对“互联网+”思维下公安队伍建设的宏观规划和现实路径进行探索,具有现实意义。%In March, 2015, in his government work report Premier Li Keqiang suggested making an “Internet+” action plan to promote the close integration of mobile Internet, cloud computing, big data with traditional industries. From the perspective of “Internet+”, how HR departments of police units can be tired with police force building, education and management is an important subject that we should consider and take seriously now. It is of practical signiifcance to conduct in-depth research into and analysis of effects of “Internet+” on police force building and present problems in it and to explore its macro planning and realization methodology.

  5. 物联网感知层一种基于属性的访问控制机制%Attribute-based access control scheme for the perceptive layer of the Internet of Things

    Institute of Scientific and Technical Information of China (English)

    任方; 马建峰; 郝选文

    2012-01-01

    In order to achieve the fine-grained access control and the anonymity of the user access to data in the Internet of Things, an attribute-based access control model is proposed and realized by using the bilinear map. In this scheme, users request data access to the sensor node based on their attributes certificates and the sensor node determines whether to allow access according to the threshold principle. This scheme effectively realizes the flexible fine-graind access control and anonymous access to data. The number of interactions between users and sensor nodes is minimized and the computation of sensor nodes is reduced to one public key encryption. Analysis shows that the scheme has the advantages over the current access control mechanisms of better scalability and lower cost in communication and computation and can adapt to access control requirement of perceptive layer of the Internet of Things.%为了实现物联网感知层的细粒度访问控制和用户的匿名数据访问,提出了一种基于用户属性的访问控制机制,并利用双线性映射给出了具体的算法实现.该方案中,用户以其属性证书为依据向传感器节点发起数据访问请求,传感器节点根据门限原则决定是否允许用户访问.该方案可以实现灵活的细粒度访问控制和匿名的数据访问,用户和传感器节点的信息交互次数达到了最少,节点运算量少,只需要进行一次公钥加密.与现有的传感器网络访问控制方案相比,该方案传感器节点开销较小,可扩展性良好,可以适应物联网感知层的访问控制需求.

  6. Building a Privacy, Ethics, and Data Access Framework for Real World Computerised Medical Record System Data: A Delphi Study. Contribution of the Primary Health Care Informatics Working Group.

    Science.gov (United States)

    Liyanage, H; Liaw, S-T; Di Iorio, C T; Kuziemsky, C; Schreiber, R; Terry, A L; de Lusignan, S

    2016-11-10

    Privacy, ethics, and data access issues pose significant challenges to the timely delivery of health research. Whilst the fundamental drivers to ensure that data access is ethical and satisfies privacy requirements are similar, they are often dealt with in varying ways by different approval processes. To achieve a consensus across an international panel of health care and informatics professionals on an integrated set of privacy and ethics principles that could accelerate health data access in data-driven health research projects. A three-round consensus development process was used. In round one, we developed a baseline framework for privacy, ethics, and data access based on a review of existing literature in the health, informatics, and policy domains. This was further developed using a two-round Delphi consensus building process involving 20 experts who were members of the International Medical Informatics Association (IMIA) and European Federation of Medical Informatics (EFMI) Primary Health Care Informatics Working Groups. To achieve consensus we required an extended Delphi process. The first round involved feedback on and development of the baseline framework. This consisted of four components: (1) ethical principles, (2) ethical guidance questions, (3) privacy and data access principles, and (4) privacy and data access guidance questions. Round two developed consensus in key areas of the revised framework, allowing the building of a newly, more detailed and descriptive framework. In the final round panel experts expressed their opinions, either as agreements or disagreements, on the ethics and privacy statements of the framework finding some of the previous round disagreements to be surprising in view of established ethical principles. This study develops a framework for an integrated approach to ethics and privacy. Privacy breech risk should not be considered in isolation but instead balanced by potential ethical benefit.

  7. Synthesis of (-)-Harzialactone A from a Readily Accessible Epoxy Chiral Building Block%Synthesis of (-)-Harzialactone A from a Readily Accessible Epoxy Chiral Building Block

    Institute of Scientific and Technical Information of China (English)

    何蕾; 张少敏; 伍贻康; 李焰

    2011-01-01

    The antipode of (+)-harzialactone A, an antitumor marine metabolite, was synthesized with the two stereogenic centers in the target structure taken from an optically active epoxy cbiral building block.

  8. The Importance of California Public Libraries in Increasing Public Access to the Internet: Findings from the InFoPeople Site Visits. Stage II Final Report.

    Science.gov (United States)

    Bertot, John Carlo; McClure, Charles R.; Ryan, Joe

    In less than five years, the California State Library-sponsored InFoPeople project connected 46% of California's public libraries to the Internet and established a highly regarded, sustained training program to assist librarians in taking advantage of the new networked resources and services. The primary objective of this Stage II report was to…

  9. Student Empowerment Through Internet Usage

    DEFF Research Database (Denmark)

    Purushothaman, Aparna

    2011-01-01

    in a University in Southern India to empower the female students through Internet usage. The study was done to find out the problems the woman students faced in gaining access and using Internet and how they can be empowered through Internet usage. Future workshop was conducted to find out the problems...... Technologies that brought massive change in the ways people communicate and how information is exchanged across the globe. Educational sector has been strongly influenced by the emergence of Internet Technologies. Digital literacy is a prerequisite for students of this generation. Studies say that woman always...... and a research design was formulated in consultation with the participants. Action research model for reflective Internet searching developed by Edwards and Bruce (2002) was deployed in the study where students did the Internet searching based on the action research cycle of planning, acting, recording...

  10. Acesso a informações de saúde na internet: uma questão de saúde pública? Access to health information on the internet: a public health issue?

    Directory of Open Access Journals (Sweden)

    Felipe Azevedo Moretti

    2012-12-01

    Full Text Available OBJETIVO: Avançar no entendimento sobre o perfil do usuário e as tendências de busca por informações de saúde na internet. MÉTODOS: As análises foram feitas a partir de 1.828 indivíduos que responderam a um questionário eletrônico disponibilizado em um portal de saúde de grande acesso. Paralelamente, por meio do método de "survey de elites", 20 especialistas foram entrevistados para avaliar estratégias de controle de qualidade das informações de saúde veiculadas na rede. RESULTADOS: Verificou-se o predomínio de usuários do gênero feminino que buscam informações para própria saúde(= 90%, que consideram a internet uma de suas principais fontes de informação em saúde (86% e passam de 5 a 35 horas na web por semana (62%. Atribui-se alta confiança às informações vindas de especialistas (76% e baixa confiança na televisão, rádio ou blogs (14%. CONCLUSãO: Conclui-se que a internet tem-se mostrado uma fonte de informação em saúde de grande relevância para população e que a certificação de sites é uma estratégia a ser considerada, na perspectiva de melhoria da qualidade das informações e promoção da saúde pública.OBJECTIVE: To progress in the understanding of the user profile and of search trends for health information on the internet. METHODS: Analyses were performed based on 1,828 individuals who completed an electronic questionnaire available on a very popular health website. At the same time, through the "elite survey" method, 20 specialists were interviewed, aiming at assessing quality control strategies regarding health information disseminated online. RESULTS: A predominance of female users who research information for themselves (= 90%, who consider the internet one of their main sources of health information (86%, and who spend from 5 to 35 hours online every week (62% was verified. High reliability is assigned to information from specialists (76%, and low reliability to television, radio, or

  11. Internet Protocol Television (IPTV

    Directory of Open Access Journals (Sweden)

    Lokesh Mittal

    2012-09-01

    Full Text Available IPTV is one of the mostly used technology of Internet and IP application. IPTV is a service for the delivery of broadcast TV, movies on demand and other interactive multimedia services over a secure, end-to-end operator managed broadband IP data network with desired QoS to the public with a broadband Internet connection. IPTV system may also include Internet services such as Web access and VoIP where it may be called Triple Play and is typically supplied by a broadband operator using the same infrastructure. IPTV is not the Internet Video that simply allows users to watch videos, like movie previews and web-cams, over the Internet in a best effort fashion. IPTV technology offers revenue-generating opportunities for the telecom and cable service providers. For traditional telephone service providers, Triple Play is delivered using a combination of optical fiber and Digital Subscriber Line (DSL technologies to its residential base. IPTV is a system where a digital television service is delivered by using Internet Protocol over a network infrastructure, which may include delivery by a broadband connection. A general definition of IPTV is television content that, instead of being delivered through traditional broadcast and cable formats, is received by the viewer through the technologies used for computer networks. In this paper I am trying to discuss this topic as my knowledge, including what is IPTV, how it works, its advantages and its applications

  12. Strategy and the Internet.

    Science.gov (United States)

    Porter, M E

    2001-03-01

    Many of the pioneers of Internet business, both dot-coms and established companies, have competed in ways that violate nearly every precept of good strategy. Rather than focus on profits, they have chased customers indiscriminately through discounting, channel incentives, and advertising. Rather than concentrate on delivering value that earns an attractive price from customers, they have pursued indirect revenues such as advertising and click-through fees. Rather than make trade-offs, they have rushed to offer every conceivable product or service. It did not have to be this way--and it does not have to be in the future. When it comes to reinforcing a distinctive strategy, Michael Porter argues, the Internet provides a better technological platform than previous generations of IT. Gaining competitive advantage does not require a radically new approach to business; it requires building on the proven principles of effective strategy. Porter argues that, contrary to recent thought, the Internet is not disruptive to most existing industries and established companies. It rarely nullifies important sources of competitive advantage in an industry; it often makes them even more valuable. And as all companies embrace Internet technology, the Internet itself will be neutralized as a source of advantage. Robust competitive advantages will arise instead from traditional strengths such as unique products, proprietary content, and distinctive physical activities. Internet technology may be able to fortify those advantages, but it is unlikely to supplant them. Porter debunks such Internet myths as first-mover advantage, the power of virtual companies, and the multiplying rewards of network effects. He disentangles the distorted signals from the marketplace, explains why the Internet complements rather than cannibalizes existing ways of doing business, and outlines strategic imperatives for dot-coms and traditional companies.

  13. Design of Sensors Access Scheme Based on Internet of Things Gateways%基于物联网网关的传感器接入方案设计

    Institute of Scientific and Technical Information of China (English)

    王丽红; 滕海坤; 于光华

    2015-01-01

    物联网被看作信息领域一次重大的发展和变革机遇,狭义上的物联网指的是连接物品到物品的网络,从而实现物品的智能化识别和管理;广义上的物联网则可以看作是信息空间与物理空间的融合,将一切事物数字化网络化,在物与物之间、物与人之间、人与现实环境之间实现高效信息交互的一种方式。物联网网关是连接传感器网络与互联网网络的接入与控制设备,传感器收集的数据通过网关实现与互联网的互连,并进一步实现各种数据的转换及转发。文章首先简单介绍了物联网体系架构,在此基础上提出了基于物联网网关的传感器接入方案,最后,文章以LDAP作为开发环境,实现了传感器接入的信息存储方案。%Internet of Things (IoT) is seen as a major development and change opportunity in the information technology field. In the narrow sense, IoT refers to the network connecting objects, enabling intelligent identification and management of them;In the broad, IoT can be seen as the integration of information space and physical space, which makes all the objects digital and achieve efficient information exchange between objects, object and people, people and the real environment. IoT gateway is the access and control equipment connecting sensor network and Internet network. Data collected by sensors connect to the Internet through gateways, and further achieve conversion and forwarding of various data. This paper firstly introduces the technology of Internet of Things, and then proposes the sensors access scheme design based on the IoT gateways. Lastly, we take LDAP as development environment to achieve the information storage scheme for sensors access.

  14. 陕西省互联网接入市场现状及发展对策研究%Research on Actuality of Internet Access to Market and its Development Strategy of Shaanxi Province

    Institute of Scientific and Technical Information of China (English)

    孔令夷

    2011-01-01

    Based on Micro- economics and Industry Economics,the paper analyzes the actuality of Shaanxi Province's intermet access to servie market,operation behavior,competitiveness of telecommunication enterprises and internet service provider.The paper provides strategies for enterprises and local government to solve problems of consumer leaving in order to bring efficient competition and health development to the internet access to market in Shaanxi Province.%根据微观经济学和产业经济学的基本原理,运用产业组织理论的分析方法,对陕西省互联网接入市场结构进行剖析,并分析基础电信企业和增值服务企业的经营行为和竞争能力,最后为企业和政府管制部门提出对策建议,从而解决陕西省网站用户外流的问题,实现陕西省互联网接入市场的有效竞争及健康发展.

  15. Saving the internet.

    Science.gov (United States)

    Zittrain, Jonathan

    2007-06-01

    The Internet goose has laid countless golden eggs, along with a growing number of rotten ones. But it's the rotten ones that now tempt commercial, governmental, and consumer interests to threaten the Internet's uniquely creative power. The expediently selected, almost accidentally generative properties of the Internet - its technical openness, ease of access and mastery, and adaptability - have combined, especially when coupled with those of the PC, to produce an unsurpassed environment for innovative experiment. Those same properties, however, also make the Internet hospitable to various forms of wickedness: hacking, porn, spam, fraud, theft, predation, and attacks on the network itself. As these undesirable phenomena proliferate, business, government, and many users find common cause for locking down Internet and PC architecture in the interests of security and order. PC and Internet security vulnerabilities are a legitimate menace. However, the most likely reactions - if they are not forestalled - will be at least as unfortunate as the security problems themselves. Consider the growing profusion of "tethered appliances" - devices whose functions cannot readily be altered by their owners (think TiVo). Such appliances take Internet innovations and wrap them up in a neat, easy-to-use package, which is good - but only if the Internet and PC can remain sufficiently in the center of the digital ecosystem to produce the next round of innovations and to generate competition. People buy these devices for their convenience or functionality and may appreciate the fact that they are safer to use (they limit the damage users can do through ignorance or carelessness). But the risk is that users, by migrating to such appliances, will unwittingly trade away the future benefits of generativity - a loss that will go unappreciated even as innovation tapers off.

  16. Internet Policy

    Science.gov (United States)

    Lehr, William H.; Pupillo, Lorenzo Maria

    The Internet is now widely regarded as essential infrastructure for our global economy and society. It is in our homes and businesses. We use it to communicate and socialize, for research, and as a platform for E-commerce. In the late 1990s, much was predicted about what the Internet has become at present; but now, we have actual experience living with the Internet as a critical component of our everyday lives. Although the Internet has already had profound effects, there is much we have yet to realize. The present volume represents a third installment in a collaborative effort to highlight the all-encompassing, multidisciplinary implications of the Internet for public policy. The first installment was conceived in 1998, when we initiated plans to organize an international conference among academic, industry, and government officials to discuss the growing policy agenda posed by the Internet. The conference was hosted by the European Commission in Brussels in 1999 and brought together a diverse mix of perspectives on what the pressing policy issues would be confronting the Internet. All of the concerns identified remain with us today, including how to address the Digital Divide, how to modify intellectual property laws to accommodate the new realities of the Internet, what to do about Internet governance and name-space management, and how to evolve broadcast and telecommunications regulatory frameworks for a converged world.

  17. [Internet addiction].

    Science.gov (United States)

    Korkeila, Jyrki

    2012-01-01

    Internet addiction is defined as uncontrolled and harmful use of Internet, which manifests in three forms: gaming, various sexual activities and excessive use of emails, chats or SMS messaging. Several studies have found that abuse of alcohol and other substances, depression and other health problems are associated with Internet addiction. In boys and men depression may be more a consequence of the addiction than a cause for it. ADHD seems to be a significant background factor for developing the condition. Because it is almost impossible to lead a life without Internet and computers nowadays, it is unrealistic to aim towards full abstinence. Treatment has generally followed the guidelines adapted for pathological gambling.

  18. Mobile Internet: Politics of Mobile Code and Networks

    NARCIS (Netherlands)

    L. Mosemghvdlishvili (Lela)

    2015-01-01

    markdownabstract__Abstract__ The term mobile internet refers to accessing the internet through (cellular) mobile devices and represents the convergence of mobile telephony, internet services, and personal computing. Whereas iMode (mobile internet and data services) was introduced in Japan as long a

  19. Mobile Internet: Politics of Mobile Code and Networks

    NARCIS (Netherlands)

    L. Mosemghvdlishvili (Lela)

    2015-01-01

    markdownabstract__Abstract__ The term mobile internet refers to accessing the internet through (cellular) mobile devices and represents the convergence of mobile telephony, internet services, and personal computing. Whereas iMode (mobile internet and data services) was introduced in Japan as long a

  20. Access Denied

    Science.gov (United States)

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  1. The Internet for Librarians

    Science.gov (United States)

    Grothkopf, U.

    Librarianship is currently undergoing major changes. New information sources, accessible via the "network of networks", the Internet, offer opportunities which were previously unknown, but which require continuous ongoing learning. The Internet seems to be organized badly or not at all. The poor appearance might lead to an underestimation of its value. In the following, an introduction to the main functions will be given in order to facilitate understanding and use of the Internet. E-Mail, FTP (File Transfer Protocol) and Telnet will be covered, as well as Mailing lists, Newsgroups and the tools Archie, Gopher, Veronica, WAIS (Wide Area Information Server) and the World Wide Web (WWW). Examples will be given to show possible applications for library services.

  2. Internet effects

    NARCIS (Netherlands)

    Valkenburg, P.M.; Peter, J.; Levesque, R.J.R.

    2011-01-01

    Adolescents’ extensive use of Internet communication and the uncertainty about its consequences call for an integrative perspective that helps to understand both the appeal of Internet communication and its risks and opportunities. The aim of this essay is to theorize, and if possible, substantiate

  3. Internet Predictions

    OpenAIRE

    Estrin, Deborah; Chandy, K. Mani; Young, R. Michael; Smarr, Larry; Odlyzko, Andrew; Clark, David; Reding, Viviane; Ishida, Toru; Sharma, Sharad; Cerf, Vinton G.; Hölzle, Urs; Barroso, Luiz André; Mulligan, Geoff; Hooke, Adrian; Elliott, Chip

    2010-01-01

    More than a dozen leading experts give their opinions on where the Internet is headed and where it will be in the next decade in terms of technology, policy, and applications. They cover topics ranging from the Internet of Things to climate change to the digital storage of the future. A summary of the articles is available in the Web extras section.

  4. Internet effects

    NARCIS (Netherlands)

    Valkenburg, P.M.; Peter, J.; Levesque, R.J.R.

    2011-01-01

    Adolescents’ extensive use of Internet communication and the uncertainty about its consequences call for an integrative perspective that helps to understand both the appeal of Internet communication and its risks and opportunities. The aim of this essay is to theorize, and if possible, substantiate

  5. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire - IRSN, 92 - Clamart (France)

    2011-01-15

    This section gathers a selection of Internet links to online articles dealing with radiation protection issues. Below are the titles of the papers with their web site source: 1 - A mission of the European Commission verifies the proper enforcement by France of the EURATOM treaty dispositions relative to the control of radioactivity in the vicinity of uranium mines (http://www.asn.fr); 2 - tritium contamination at Saint-Maur-des-Fosses: new results from measurements performed by IRSN in the environment; 3 - status of radioactivity monitoring in French Polynesia in 2009 (http://www.irsn.fr); 4 - study of mortality and cancers impact near the Aube facility for low- and medium-activity waste storage (http://www.invs.sante.fr); 5 - Marcel Jurien de la Graviere appointed president of the guidance committee of the defense nuclear expertise of the Institute of radiation protection and nuclear safety (IRSN) (http://www.legifrance.gouv.fr); 6 - radiation protection 163: 'Childhood Leukaemia - Mechanisms and Causes'; 7- Radiation Protection 164: Radioactive effluents from nuclear power stations and nuclear fuel reprocessing sites in the European Union, 2004-08; 8 - Radiation Protection 165: Medical Effectiveness of Iodine Prophylaxis in a Nuclear Reactor Emergency Situation and Overview of European Practices Protection (http://ec.europa.eu); 9 - Report RIFE 15: Radioactivity in Food and the Environment - RIFE (SEPA - Scottish Environment Protection Agency, http://www.sepa.org.uk); 10 - HPA response statement: Advisory Group on Ionising Radiation's report on circulatory disease risk (HPA - Health Protection Agency, http://www.hpa.org.uk); 11 - launching of the national database for the voluntary registering of (quasi) incidents (AFCN - Federal agency of nuclear control, http://www.fanc.fgov.be); 12 - Radiation dose optimization in nuclear medicine (IAEA RPOP - Radiation Protection Of Patients, http://rpop.iaea.org); 13 - The government of Canada finances

  6. Connection Sharing Scheme of Ad hoc Network Accessing to Internet%Ad hoc网络接入Internet的连接共享机制

    Institute of Scientific and Technical Information of China (English)

    王海涛

    2005-01-01

    方便地接入Internet,对于发挥Ad hoc网络的潜能至关重要.首先说明了Ad hoc网络接入Internet面临的问题,然后介绍了一种基于连接共享机制使Ad hoc网络接入Internet的网络配置,接着详细阐述了连接共享的过程和相关机制,并对连接共享协议的开销进行了分析.

  7. Voice Interactive Classroom, a service-oriented software architecture to enable cross-platform multi-channel access to Internet-based learning

    OpenAIRE

    Álvarez García, Víctor Manuel

    2014-01-01

    La tecnología software está creando un contexto ubicuo para la vida y el aprendizaje humano en el que gradualmente se incorporan nuevos modos de interacción. Además, la interacción con los sistemas de aprendizaje basados en Internet ha evolucionado desde el acceso tradicional a través del navegador web de un ordenador personal o portátil a accesos más flexibles desde dispositivos móviles. Sin embargo, en ambos casos, los sistemas de e-learning han creado un contexto en el cual la interacción ...

  8. A library-publisher partnership for open access: building an innovative relationship between scholarly publishers and academic libraries

    Directory of Open Access Journals (Sweden)

    Monica Ward

    2016-02-01

    Full Text Available This article presents an overview of a strategic partnership undertaken by the Canadian Research Knowledge Network (CRKN and the Érudit Consortium (Érudit to support the move towards open access for Canadian francophone scholarly journals.CRKN and Érudit have had a relationship through a traditional commercial subscription model since 2008. In 2014, the two organizations recognized the need for a new relationship that would address two major challenges: the fragility of the Canadian not-for-profit scholarly publishing environment and the increasing pressure from libraries and funding agencies for scholarly journals to move towards open access. Érudit and CRKN have worked collaboratively to create an innovative partnership, which provides a framework for a new relationship between publishers and libraries, and helps to provide financial support to Canadian publishers during the transition to a fully open access model.This paper presents the perspectives of the two organizations involved in the partnership by outlining the common goals, objectives, and strategy, as well as the differing needs and perspectives of libraries and publishers. It summarizes the key aspects of the partnership as well as the challenges faced. Through this case study, the authors demonstrate how university libraries can play an active role in working with journals to support open access to research.

  9. Tracking deep geothermal energy. Leibniz Institute for Applied Geophysics offers Internet access to basic data for deep geothermal energy; Tiefer Erdwaerme auf der Spur. Leibniz-Institut fuer Angewandte Geophysik bietet im Internet Zugang zu Basisdaten fuer die tiefe Geothermie

    Energy Technology Data Exchange (ETDEWEB)

    Milles, Uwe

    2011-07-01

    There are many places in Germany where deep geothermal energy is available as an environmentally friendly alternative to fossil fuels as a source of power and heat. When it comes to utilising this energy, drilling is the most expensive part. Power and heat generation is only cost-effective if sufficiently high water temperatures and flow rates are found. Via GeotIS, an online information system, planners can now gain fast access to geological and geophysical data for Germany. (orig.)

  10. Access/AML -

    Data.gov (United States)

    Department of Transportation — The AccessAML is a web-based internet single application designed to reduce the vulnerability associated with several accounts assinged to a single users. This is a...

  11. Research on analytic and evaluation system of existing building' s reliability based on Internet/Intranet%基于Internet/Intranet的既有建(构)筑物可靠性分析与评判系统研究

    Institute of Scientific and Technical Information of China (English)

    孙增寿; 韩建刚; 董建华

    2005-01-01

    以模糊综合评判基本理论和评判技术为基础,将互联网技术和建(构)筑物可靠性分析评定理论有机结合起来,提出了基于Internet/Intranet的建(构)筑物可靠性评判系统,实现了既有建(构)筑物可靠性的日常管理及远程分析、诊断与管理.并通过在电力系统变电站建(构)筑物可靠性评定中的应用,详细介绍了该系统的主要评判过程和步骤,验证了评判系统的实用性.

  12. Internet Inquiry

    DEFF Research Database (Denmark)

    This collection of dialogues is the only textbook of its kind. Internet Inquiry: Conversations About Method takes students into the minds of top internet researchers as they discuss how they have worked through critical challenges as they research online social environments. Editors Annette N....... Markham and Nancy K. Baym illustrate that good research choices are not random but are deliberate, studied, and internally consistent. Rather than providing single "how to" answers, this book presents distinctive and divergent viewpoints on how to think about and conduct qualitative internet studies....

  13. Internet Inquiry

    DEFF Research Database (Denmark)

    This collection of dialogues is the only textbook of its kind. Internet Inquiry: Conversations About Method takes students into the minds of top internet researchers as they discuss how they have worked through critical challenges as they research online social environments. Editors Annette N....... Markham and Nancy K. Baym illustrate that good research choices are not random but are deliberate, studied, and internally consistent. Rather than providing single "how to" answers, this book presents distinctive and divergent viewpoints on how to think about and conduct qualitative internet studies....

  14. Economics and Governance of the wireless Internet

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders; Tadayoni, Reza

    capabilities and limitations, and with different techno-economic characteristics. The question is whether these trends challenge the current mode of governance for the Internet. In the early days, the Internet was considered to be open, free, competitive, with a high level of entrepreneurialism, and with low...... barriers of entry. In this paper three issues are discussed: 1) Developments in pricing schemes for Internet interconnection and Internet access with special focus on the role of wireless access. 2) Developments in supporting infrastructures with special focus on the increasing role of wireless...

  15. Internet and data communication security

    OpenAIRE

    Zoranović, Tihomir

    2014-01-01

    Digital communication is so common now days that we have almost forgot about any other way to transfer data. Accessibility, simplicity and ease of use of digital devices had lead to very little thinking about the disadvantages or dangers of this type of data transfer. Internet today represents the most commonly used channel for data transmission. However, the transmission of data over the Internet is now one of the most delicate operations of every institution, company, household or individua...

  16. Internet Financial Innovation and Brand Building Model of Commercial Banks%互联网金融创新与商业银行品牌塑造模式

    Institute of Scientific and Technical Information of China (English)

    谢治春

    2016-01-01

    With the influence of Internet banking,commercial banks’ digital and network transformation would bear upon the better service ability for economy and inclusive finance promotion. In this process of transformation, brand management has become an important part. Should commercial banks have a new model to adapt to digital and network transformation? We believe that the Internet has a direct impact on commercial banks brand foundation. At first, this paper analyzes Internet financial innovation how to shape the brand foundation. It is proved that products or services provider, product or service users, information exchange, product and service delivery channels are the four contents of brand foundation. Then, it puts forward a new brand building model -Co-construction brand building model, and discusses how to build the new brand model of commercial banks.%在互联网金融影响下,商业银行的数字化和网络化转型与服务实体经济及推广普惠金融有重要关系。在这个转型过程中,品牌管理成为重要内容。商业银行是否应该有一种新的品牌塑造模式来适应数字化和网络化转型?我们认为,互联网金融创新直接影响了商业银行品牌塑造基础。本文首先分析了互联网金融创新对品牌塑造基础的影响,认为品牌塑造基础由产品和服务的提供者、产品和服务的使用者、信息交换方式、产品和服务交付渠道等四个方面构成。接着,作者提出了一种新的品牌塑造模式———共建式品牌塑造模式,并对商业银行如何实施共建式品牌塑造模式进行了讨论。

  17. Open access

    CERN Document Server

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder consent, and many authors, musicians, filmmakers, and other creators who depend on royalties are understandably unwilling to give their consent. But for 350 years, scholars have written peer-reviewed journal articles for impact, not for money, and are free to consent to open access without losing revenue. In this concise introduction, Peter Suber tells us what open access is and isn't, how it benefits authors and readers of research, how we pay for it, how it avoids copyright problems, how it has moved from the periphery to the mainstream, and what its future may hold. Distilling a decade of Suber's influential writing and thinking about open access, this is the indispe...

  18. Security of the Internet Transactions

    Institute of Scientific and Technical Information of China (English)

    Felix Musau; Shengbing Ren; Shouyi Yu

    2002-01-01

    The new generation of networked business solutions brings legacy data and applications to the world wide Web, and lets companies redefine internal and external business processes. The present need for internet transaction has forced many business to adopt the internet forms of distribution of its business items. This has threatened security, hence needs to be given a key priority. This paper alights the key areas on how to protect the information we transact on the internet. It also aims at improving the security of our data and the computers we use to access this data.

  19. INTERNET ETHICS

    OpenAIRE

    Laurentiu Fratila

    2008-01-01

    In our age, Internet is the biggest information network in the world; it consists of a set of heterogeneous networks from over 100 countries displaying huge amounts of virtual resources; it provides facilities such as email, file transmission protocol (ftp), workgroups discussion or chat, information and dissemination of information (www – world wide web). Internet has a major impact over all activity fields: political, social, economic and private life of users, as well. Newly developed, mod...

  20. The Composition and Activities of Internet Users of China%中国网民构成与行为分析

    Institute of Scientific and Technical Information of China (English)

    王恩海

    2005-01-01

    The paper gives an overall analysis on Chinese Internet users' demographic structure and Internet behaviors. According to the survey result published in Jan, 2005 by China Internet Network Information Center(CNNIC), the paper makes it clear that who are the Internet users, when do they access Internet,where do they use Internet, how do they access Internet and what are they doing on Internet.

  1. Partnerships---A Way of Making Astrophysics Research Accessible to the K--12 Community through the Internet and World Wide Web

    Science.gov (United States)

    Hawkins, I.; Battle, R.; Miller-Bagwell, A.

    1996-05-01

    We describe a partnership approach in use at UC Berkeley's Center for EUV Astrophysics (CEA) that facilitates the adaptation of astrophysics data and information---in particular from NASA's EUVE satellite---for use in the K--12 classroom. Our model is founded on a broad collaboration of personnel from research institutions, centers of informal science teaching, schools of education, and K--12 schools. Several CEA-led projects follow this model of collaboration and have yielded multimedia, Internet-based, lesson plans for grades 6 through 12 that are created and distributed on the World Wide Web (http://www.cea.berkeley.edu/Education). Use of technology in the classroom can foster an environment that more closely reflects the processes scientists use in doing research (Linn, diSessa, Pea, & Songer 1994, J.Sci.Ed.Tech., ``Can Research on Science Learning and Instruction Inform Standards for Science Education?"). For instance, scientists rely on technological tools to model, analyze, and ultimately store data. Linn et al. suggest introducing technological tools to students from the earliest years to facilitate scientific modeling, scientific collaborations, and electronic communications in the classroom. Our investigation aims to construct and evaluate a methodology for effective participation of scientists in K--12 education, thus facilitating fruitful interactions with teachers and other educators and increasing effective use of technology in the classroom. We describe several team-based strategies emerging from these project collaborations. These strategies are particular to the use of the Internet and World Wide Web as relatively new media for authoring K--12 curriculum materials. This research has been funded by NASA contract NAS5-29298, NASA grant ED-90033.01-94A to SSL/UCB, and NASA grants NAG5-2875 and NAGW-4174 to CEA/UCB.

  2. Discussion on RCS Building Programs in Operators Based on Internet Thinking%基于互联网思维的运营商RCS建设方案探讨

    Institute of Scientific and Technical Information of China (English)

    赵远; 沈蕾

    2015-01-01

    Firstly,based on the Internet thinking, such as user thinking, traffic thinking and big data platform thinking, the RCS building programs in operators were introduced, and five rules of Internet thinking were given. And then the construction method of the fusion of RCS and communications platform was discussed from two aspects which were user scale prediction and network deployment. Finally, the research conclusion was given.%首先,基于互联网思维,如用户思维、流量思维、平台大数据思维,介绍了电信运营商如何进行RCS的方案建设及运营,并给出了5条互联网思维法则。然后,从用户规模预测和组网部署两方面探讨了建设RCS业务融合通信平台的方法。最后给出了研究结论。

  3. 基于物联网与云计算的智慧校园的构建概述%Building Wisdom Campus Based on the Internet of Things and Cloud Computing

    Institute of Scientific and Technical Information of China (English)

    蔡晓丽; 陈舜青; 丁志云

    2013-01-01

    With the emergence of the ideas such as″Smart Planet″and″Smart City″,here comes″Smart Campus″as a heated response.This article introduces the Internet of Things and cloud computing,which are the most important technologies of smart campus.And based on the technologies six models are proposed for building the smart campus,so as to lay a foundation for further study.%文章阐述了智慧校园的概念,介绍了物联网、云计算等核心技术,探讨了基于物联网与云计算技术,构建智慧校园的六大功能模块的思路和设想,为进一步研究打下基础。

  4. 用ISDN构建企业级Internet访问路由器%Build Enterprise-Level Internet Access Router with ISDN

    Institute of Scientific and Technical Information of China (English)

    李德

    2000-01-01

    企业级Internet访问路由器解决了费用、管理、速度等几个问题,为员工使用Internet带来方便,为多用户使用Internet降低了费用.但是如何降低企业级Internet访问路由器本身的造价呢?本文介绍了珠海人民广播电台构建低成本Internet访问路由器的经验.

  5. Reconstructing Sessions from Data Discovery and Access Logs to Build a Semantic Knowledge Base for Improving Data Discovery

    Directory of Open Access Journals (Sweden)

    Yongyao Jiang

    2016-04-01

    Full Text Available Big geospatial data are archived and made available through online web discovery and access. However, finding the right data for scientific research and application development is still a challenge. This paper aims to improve the data discovery by mining the user knowledge from log files. Specifically, user web session reconstruction is focused upon in this paper as a critical step for extracting usage patterns. However, reconstructing user sessions from raw web logs has always been difficult, as a session identifier tends to be missing in most data portals. To address this problem, we propose two session identification methods, including time-clustering-based and time-referrer-based methods. We also present the workflow of session reconstruction and discuss the approach of selecting appropriate thresholds for relevant steps in the workflow. The proposed session identification methods and workflow are proven to be able to extract data access patterns for further pattern analyses of user behavior and improvement of data discovery for more relevancy data ranking, suggestion, and navigation.

  6. Access For All

    DEFF Research Database (Denmark)

    Andersen, Ove Kjeld; Hjulmand, Christian

    2005-01-01

    . There is a clear need for a free internet based Danish text-to-speech synthesizer. Furthermore, the current state of technology i.e. internet bandwidth, response time and server technology is sufficient for setting up an online automatic reading service that is used by steadily growing number of individuals......Approximately 30% of the Danish population has severe problems in reading everyday text. In the light of the increasing amount of text available on the Internet this poses a democratic challenge to ensure “equal access” to information. The Talking Internet service - Access For All (AFA) - offers...... a free Internet-based tool for reading aloud any marked text with a synthetic voice. The only requirements are a standard equipped PC running a recent Windows OS and an Internet connection. Experiences gathered from running the service for more than 28 months underline the viability of the concept...

  7. Application of Internet technology to intelligent buildings%Internet技术在智能楼宇设备监控中的应用

    Institute of Scientific and Technical Information of China (English)

    李平; 李哲; 谢军龙

    2001-01-01

    介绍了将Internet技术应用到智能楼宇设备远程监控系统的 方法,并且针对某楼宇自动化系统给出了这种方法的详细实施方案。%Describes the ways of putting the use of Inter net technology into remote monitor and control systems of intelligent buildings. Gives the detailed scheme based on a building automation system.

  8. 建筑用电设备物联网与云计算平台的融合应用%Fusion Application of Building Electrical Equipment Internet of Things and Cloud Computing Platform

    Institute of Scientific and Technical Information of China (English)

    高晓菲

    2014-01-01

    文章提出了建筑用电设备物联网与云计算平台融合应用的思路,通过这种途径,在降低硬件投入成本的前提下,很好地解决了大规模应用建筑用电设备物联网时,可能出现的节点错误、服务器瘫痪等现象。两者的融合应用必然具有广阔的前景。%With the development of internet of things (IoT)technology,the building electrical equip-ment IoT system,which aims at energy conservation and emissions reduction,has produced a large amount of data.However,traditional servers can hardly meet the demand of data computing and processing.Cloud computing which is characterized by virtualization,flexible expansion and distributed storage and operation is suitable to be used as a platform to support large-scale computing.Based on the analysis,this paper pro-posed an idea that combines building electrical equipment IoT and cloud computing.With this method,in the premise of reducing input costs,it is a good solution to errors happened on the note,it servers crash and other obstacles when we use building electrical equipment IoT.The combination of the building electrical e-quipment IoT and cloud computing must have a broad prospect.

  9. Using Internet of Things technologies for wireless sensor networks

    Science.gov (United States)

    Martinez, K.; Hart, J. K.; Basford, P. J.; Bragg, G. M.; Ward, T.

    2013-12-01

    Numerous authors have envisioned the future internet where anything will be connected: the Internet of Things (IoT). The idea is an extrapolation of the spread of networked devices such as phones, tablets etc. Each device is expected to have its own Internet address and thus be easy to access. The key building blocks of any IoT system are networking, hardware platforms and node software - so they are similar to wireless sensor network requirements. Most existing IoT demonstrators and applications have been gadget-style objects where power and connectivity problems are not too restricting. Environmental sensor networks can benefit from using some of the technologies involved in IoT development. However it is expected that tuning the networking and power management will be necessary to make them as efficient as state of the art wireless sensor networks. Some IoT assumptions such as always-connected nodes and full IP capability need to be considered. This paper will illustrate the advantages and disadvantages of IoT techniques for environment sensing drawing on a range of employment scenarios. We also describe a glacial 'Internet of things' project, which aims to monitor glacial processes. In particular we describe the IoT developments in a deployment in Iceland to examine glacier seismicity, velocity and provide camera images.

  10. A new routing assignment model for Internet

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper builds a new traffic assignment model for Internet. The routing policy based on this model can realize load splitting in a network automatically, which overcomes the shortcoming of OSPF and satisfies the load balancing requirement of IETF.

  11. Developing an internet presence for your practice.

    Science.gov (United States)

    Maley, Catherine; Baum, Neil

    2009-01-01

    Yesterday, it was the Yellow Pages that informed the public where and how to reach their physicians. Today, it is the Internet. With the Internet, patients have 24/7 access to your practice that will do far more than any Yellow Pages or advertising could possibly do. This article discusses the importance of the Internet for the contemporary physician and how to create a useful and interactive Web site.

  12. Game design in an Internet of Things

    OpenAIRE

    Coulton, P.; Burnett, D; Gradinar, A.; Gullick, D.; Murphy, Emma Lee

    2014-01-01

    Whilst no consensus yet exists on how the Internet of Things will be realised, a global infrastructure of networked physical objects that are readable, recognizable, locatable, addressable and controllable is undoubtedly a compelling vision. Although many implementations of the Internet of Things have presented these objects in a largely ambient sensing role, or providing some form of remote access/control, in this paper we consider the emerging convergence between games and the Internet of T...

  13. An anonymous access control and authenticated key exchange protocol for Mobile RFID systems in the internet of things%物联网移动RFID系统匿名访问控制认证密钥交换协议

    Institute of Scientific and Technical Information of China (English)

    朱炜玲; 喻建平

    2012-01-01

    针对物联网移动RFID系统标签隐私信息的访问控制以及用户身份隐私保护问题,本文采用身份加密和属性加密相结合的方法,建立了IB-AB-eCK安全模型,设计了基于身份及属性的认证密钥交换协议IB-AB-AKE.基于IB-AB-AKE协议,提出了移动RFID手机与信息服务器之间认证密钥交换协议,实现了在保护移动RFID手机用户身份隐私的同时,根据标签所有者定制的访问控制策略进行标签信息的访问控制认证和会话密钥交换,防止了隐私信息被非法访问.分析表明,IB-AB-AKE协议在IB-AB-eCK模型下是安全的,且在通信次数、通信量及计算量方面具有优势.%For the access control of a tag’s privacy information and the privacy protection of a user' s identity in Mobile RFID systems in the internet of things, a security model called IB-AB-eCK is introduced, and an identity-based and attribute-based authenticated key exchange (IB-AB-AKE) protocol is proposed in this paper. Based on IB-AB-AKE protocol, an authenticated key exchange scheme is then established between mobile RFID phones and information servers of mobile RFID systems in the internet of things. The scheme not only preserves the identity privacy of the user of mobile RFID phone, but also completes the authentication and agrees upon a session key for the access to the tag' s information according to the owner' s access control policy. The analyses show that IB-AB-AKE protocol is secure in IB-AB-eCK model and it has advantages for communication round, communication traffic and computing complexity.

  14. STUDY ON GEOGRAPHY STUDENTS’ INTERNET USE

    Directory of Open Access Journals (Sweden)

    MARIA ELIZA DULAMĂ

    2015-01-01

    Full Text Available In this study we analyze the behavior of a sample of 30 third-year students of various majors of the Faculty of Geography, “Babeş-Bolyai” University of ClujNapoca, Romania, regarding the Internet use. We applied a questionnaire containing 15 items related to: Internet activities performed; length of time students spend on the Internet; devices used to access the Internet; types of materials that students downloaded, read, viewed, forwarded or posted on the Internet; types of applications used. Taking into account the time students spent daily on the Internet and correlated with other responses we concluded that their concerns were closely related to the Internet, whether it was about communication, career, or personal life.

  15. Internet Freedom in Asia: Case of Internet Censorship in China

    Directory of Open Access Journals (Sweden)

    ZAINUDDIN MUDA Z. MONGGILO

    2016-02-01

    Full Text Available Internet can develop the communication and information freedom on society but unfortunately in some nations, especially in Asia, it cannot be fully accessed because of government censorship. This report explains the relationship between the practice of Internet censorship imposed by the Chinese government and the freedom of its citizens (in the internet surfing experience as the realization of human rights in the freedom of expression and opinion (seek, receive-use, and communicate information which is traced through the relevant literature study. China is a unique case since the internet censorship regulation contributes to its status as the country with the least internet freedom yet at the same time it is credited as having the most internet users globally. In addition, China known as the communist country that began opening up to globalization and information of technology, but the government’s control over it is still so tight and binding, not only in the press, or the traditional media, but also in new media with the internet censorship. The control over this information may have a clear objective to maintain a climate of information in the community, but on the other hand, such control is tantamount to restricting the right of citizens to make, use, and distribute information, and more fatal as a violation of human rights.

  16. Tierless Programming for the Internet of Things

    Energy Technology Data Exchange (ETDEWEB)

    Decker, Brett [Brown Univ., Providence, RI (United States)

    2015-02-01

    The Internet of Things (IoT) is about Internet-addressability and connectivity for everyday devices. The goal of this project was to create a framework to allow developers to more easily control IoT devices and turn their interactions into meaningful applications. We leveraged a tierless approach for Software Defined Networking (SDN) to build this framework. We expanded Flowlog, a tierless programming language for SDN controllers, to support IoT devices developed by Spark IO to build this framework.

  17. Everyone's Internet

    Institute of Scientific and Technical Information of China (English)

    YAO BIN

    2010-01-01

    @@ After more than 20 years, the Internet in China has become a big success. The country has the world's largest Intemet population that topped 420 million at the end of June. In the first six months of this year, China's Internet market reached 74.3 billion yuan ($10.9 billion), the equivalent of 2009's total. Local businesses have risen to leaders on the Chinese market, as Chinese language search, instant messaging and online auction service providers have overwhelming advantages over foreign rivals.

  18. Internet Sexualities

    Science.gov (United States)

    Döring, Nicola

    The term “internet sexuality” (or OSA, online sexual activities) refers to sexual-related content and activities observable on the internet (cf. Adams, Oye, & Parker, 2003; Cooper, McLoughlin, & Campbell, 2000; Leiblum & Döring, 2002). It designates a variety of sexual phenomena (e.g., pornography, sex education, sexual contacts) related to a wide spectrum of online services and applications (e.g., websites, online chat rooms, peer-to-peer networks). If an even broader range of computer networks - such as the Usenet or bulletin board systems - is included in this extensional definition, one speaks of “online sexuality” or “cybersexuality.”

  19. Predicting Internet/E-Commerce Use.

    Science.gov (United States)

    Sexton, Randall S.; Johnson, Richard A.; Hignite, Michael A.

    2002-01-01

    Describes a study that analyzed variables in order to identify accurate predictors of individuals' use of the Internet and e-commerce. Results of survey research and a neural network identifies gender, overall computer use, job-related use, and home access as important characteristics that should influence use of the Internet and e-commerce.…

  20. Internet Addiction Risk in the Academic Environment

    Science.gov (United States)

    Ellis, William F.; McAleer, Brenda; Szakas, Joseph S.

    2015-01-01

    The Internet's effect on society is growing exponentially. One only has to look at the growth of e-commerce, social media, wireless data access, and mobile devices to see how communication is changing. The need and desire for the Internet, especially in such disciplines as Computer Science or Computer Information Systems, pose a unique risk for…

  1. Predicting Internet/E-Commerce Use.

    Science.gov (United States)

    Sexton, Randall S.; Johnson, Richard A.; Hignite, Michael A.

    2002-01-01

    Describes a study that analyzed variables in order to identify accurate predictors of individuals' use of the Internet and e-commerce. Results of survey research and a neural network identifies gender, overall computer use, job-related use, and home access as important characteristics that should influence use of the Internet and e-commerce.…

  2. Literasi Media Internet di Kalangan Mahasiswa

    Directory of Open Access Journals (Sweden)

    Gracia Rachmi Adiarsi

    2015-10-01

    Full Text Available This study aims to find out to what extent the Internet users in line with media literacy. According to Indonesia Internet Service Provider Association (APJII and BPS Statistic Indonesia, it was found that Internet users in Indonesia have grown since three years ago up to 13% or become 71.19 million people until the end of 2013. According to research survey MarkPlus Insight, “netizen” or Internet users who spend more than three hours per day on Internet. Moreover, they are increasing from 24,2 Million people in 2012 and become 31,7 million people in 2013. This research used qualitative method by gathering the data through Focus Group Discussion (FGD to private university students who spent for Internet 5 hours per day and less than 5 hours per day. The theory used in this research was media literacy. The result of this research stated that students who accessed the Internet below 5 hours per day were already busy with work and not too intense in using the Internet either via smartphone or a computer. Different findings came up from the students who accessed the Internet over 5 hours per day. Most of the time, they used the Internet for social media and instant messaging (instant messenger through smartphones. Critical attitude towards the media message depends on the informants’ interest toward the information. 

  3. Design and Realization of Internet-Based Power Centralized Controller for Buildings%基于网络的楼宇用电集中控制器的设计与实现

    Institute of Scientific and Technical Information of China (English)

    姚放吾; 王旭涛

    2011-01-01

    随着嵌入式技术的快速发展,各种嵌入式技术已经应用于人们日常生活当中,基于网络的楼宇集中控制器就是将嵌人式技术应用到楼字用电管理当中,为用户用电管理提供了有效、便捷的途径.基于网络的楼宇集中控制器构建于高性能的ARM9硬件环境和开源、稳定、安全的嵌入式Linux软件系统平台,同时系统服务程序采用多线程系统架构,实现系统服务高效性.该嵌入式系统通过BS485和基于TCP/IP的网络通信实现信息的收集、管理与上传,构成智能用电管理系统的核心.%Along with rapid development of cmbedded technology,various embedded techmology has been used in our daily life,Through the internet-based centralized controller for buildings embedded techmology is applied to electricity management for buildings.Thus,it provides and effective and convenient way for users'electricity management.The construction of the centralized controller for buildings is based on creating a high-performance ARM9 hardware environment and an enbedded linux software platform which is open-source,stable and secure,and meanwhile the program of system services utilizes the multi-thread system architecture to achitecture to achieve the high efficiency.This embedded system can collect,manage and upload information to constitute the core of internet-based intelligent power management system via RS485 and TCP/IP communications.

  4. [Internet addiction].

    Science.gov (United States)

    Nakayama, Hideki; Higuchi, Susumu

    2015-09-01

    Internet technologies have made a rapid progress, bringing convenience to daily life. On the other hand, internet use disorder and internet addiction (IA) have become reportedly serious health and social problems. In 2013, internet gaming disorder criteria have been proposed in the section of Conditions for Further Study of DSM-5. Existing epidemiological studies by questionnaire methods have reported that the prevalence of IA ranges between 2.8% and 9.9% among youths in Japan. Attention deficit hyperactivity disorder (ADHD), sleeping disorders, depression, obsessive compulsive disorder, and phobic anxiety disorder are extremely common comorbid mental disorders with IA. Some psychotherapies (e.g., cognitive behavioral therapy, motivational interviewing) and medical treatments (e.g., antidepressant drugs, methylphenidate) for comorbid mental disorders as well as rehabilitation (e.g., treatment camp) are effective for IA remission. However, some serious cases of IA may be difficult to treat, and prevention is very important. In future, the prevention, rehabilitations and treatments for IA will be more required in Japan.

  5. Internet India.

    Science.gov (United States)

    Pahl, Ronald H.

    1997-01-01

    Reviews a number of Internet sites containing information on every aspect of life in Modern India. The various sites provide information on such diverse topics as the Indian film industry, politics, the booming Indian computer industry, changing status of women, and financial and political issues. (MJP)

  6. Internet health information in the patient-provider dialogue.

    Science.gov (United States)

    Hong, Traci

    2008-10-01

    A patient discussing Internet health information with a health care provider (referred to as "patient-provider communication about Internet health information") can contribute positively to health outcomes. Although research has found that once Internet access is achieved, there are no ethnic differences in Internet health information seeking, it is unclear if there are ethnic differences in patient-provider communication about Internet health information. To help fill this gap in the literature, the National Cancer Institute's Health Information National Trends Survey 2005 was analyzed with Stata 9. Two sets of logistic regression analyses were conducted, one for a subsample of Internet users (n = 3,244) and one for a subsample of Internet users who are first-generation immigrants (n = 563). The dependent variable was patient-provider communication about Internet health information, which assessed whether survey participants had discussed online health information with a health care provider. The predictor variables included trust of health care provider, trust of online health information, Internet use, health care coverage, frequency of visits to health care provider, health status, and demographics. Among all Internet users, Whites had higher levels of patient-provider communication about Internet health information than Blacks and Asians. Similarly, among Internet users who are immigrants, Whites had higher levels of patient-provider communication about Internet health information than Blacks and Asians. While the digital divide is narrowing in terms of Internet access, racial differences in patient-provider communication about Internet health information may undermine the potential benefits of the information age.

  7. Urology on the internet - introduction and update

    OpenAIRE

    Inumpudi Anand; Srinivas, M.; A K Hemal

    2000-01-01

    The Internet, which has truly united the developed and developing nations, is an extensive network of inter-linked computers storing immense bytes of information, which can be accessed by anyone transcending all geographi-cal barriers and this has become the ultimate frontier to access information. The Urology and Andrology informa-tion on Internet is exponentially growing. The urologist need not know the intricacies of the hardware and soft-ware but can start right away navigating through th...

  8. Enabling Web-Based GIS Tools for Internet and Mobile Devices To Improve and Expand NASA Data Accessibility and Analysis Functionality for the Renewable Energy and Agricultural Applications

    Science.gov (United States)

    Ross, A.; Stackhouse, P. W.; Tisdale, B.; Tisdale, M.; Chandler, W.; Hoell, J. M., Jr.; Kusterer, J.

    2014-12-01

    The NASA Langley Research Center Science Directorate and Atmospheric Science Data Center have initiated a pilot program to utilize Geographic Information System (GIS) tools that enable, generate and store climatological averages using spatial queries and calculations in a spatial database resulting in greater accessibility of data for government agencies, industry and private sector individuals. The major objectives of this effort include the 1) Processing and reformulation of current data to be consistent with ESRI and openGIS tools, 2) Develop functions to improve capability and analysis that produce "on-the-fly" data products, extending these past the single location to regional and global scales. 3) Update the current web sites to enable both web-based and mobile application displays for optimization on mobile platforms, 4) Interact with user communities in government and industry to test formats and usage of optimization, and 5) develop a series of metrics that allow for monitoring of progressive performance. Significant project results will include the the development of Open Geospatial Consortium (OGC) compliant web services (WMS, WCS, WFS, WPS) that serve renewable energy and agricultural application products to users using GIS software and tools. Each data product and OGC service will be registered within ECHO, the Common Metadata Repository, the Geospatial Platform, and Data.gov to ensure the data are easily discoverable and provide data users with enhanced access to SSE data, parameters, services, and applications. This effort supports cross agency, cross organization, and interoperability of SSE data products and services by collaborating with DOI, NRCan, NREL, NCAR, and HOMER for requirements vetting and test bed users before making available to the wider public.

  9. Serving Grades Over the Internet.

    Science.gov (United States)

    Harris, James K.

    This paper demonstrates a grade server that allows college students to access their grades over the Internet from the instructor's home page. Using a CGI (common gateway interface) program written in Visual Basic, the grades are read directly from an Excel spreadsheet and presented to the requester after he/she enters a password. The grade for…

  10. History Sources on the Internet.

    Science.gov (United States)

    Fink, Kenneth D.

    This paper provides descriptions of key online history resources useful to teachers, librarians, and other education professionals. Highlights include: primary sources on the Internet; archives; Online Public Access Catalogs (OPACs); the American Historical Association (AHA) Web site; state and federal government resources; business history…

  11. A cost model for broadband access networks: FTTx versus WiMAX

    Science.gov (United States)

    Pereira, João Paulo Ribeiro

    2007-09-01

    Local communities and governments are taking various steps to fight the so-called "digital divide" between well served urban communities and undeserved areas. In order to make broadband access available to these under served areas, several technical solutions are available with the capacity to provide high speed Internet access, video, telephony services, etc. This paper presents a cost-model and a tool for the evaluation of broadband access technologies (xDSL, HFC, FTTx, WiMAX, PLC and satellite), and compares two technologies: FTTx and WiMAX. Our tool compares these different access technologies in different scenarios, and examining the capital expense and deployment of building access networks with the same requisite performance using each technology. The cost model is limited to the access part of the network. The results obtained by our evaluation tool give the possibility to compare several BB access technologies, and support the decision about which is the better technological solution for a given scenario

  12. Online access and literacy in Maori New Zealanders with diabetes.

    Science.gov (United States)

    Reti, Shane R; Feldman, Henry J; Safran, Charles

    2011-09-01

    Online web-based interventions can be effective ancillary tools for managing diabetes. There is a high prevalence of diabetes in New Zealand Maori, and yet this group has generally been a low priority for web-based interventions due to perceptions of low Internet access and Internet literacy. To assess Internet access and literacy in New Zealanders with diabetes, especially high-risk Maori. A telephone survey of all patients with diabetes in an urban general practice. Internet access is assessed by Internet presence in the home, and Internet literacy by the ability to use email and the World Wide Web. One hundred percent response rate with 68 participants, including 38% Maori. Internet access for Maori was 70% and Internet literacy 41%. Internet access and literacy for Maori with diabetes may be higher than previously thought. Health policies may wish to focus effective and cost-efficient web-based interventions on this high diabetes risk group.

  13. Rising expectations: access to biomedical information.

    Science.gov (United States)

    Lindberg, D A B; Humphreys, B L

    2008-01-01

    To provide an overview of the expansion in public access to electronic biomedical information over the past two decades, with an emphasis on developments to which the U.S. National Library of Medicine contributed. Review of the increasingly broad spectrum of web-accessible genomic data, biomedical literature, consumer health information, clinical trials data, and images. The amount of publicly available electronic biomedical information has increased dramatically over the past twenty years. Rising expectations regarding access to biomedical information were stimulated by the spread of the Internet, the World Wide Web, advanced searching and linking techniques. These informatics advances simplified and improved access to electronic information and reduced costs, which enabled inter-organizational collaborations to build and maintain large international information resources and also aided outreach and education efforts The demonstrated benefits of free access to electronic biomedical information encouraged the development of public policies that further increase the amount of information available. Continuing rapid growth of publicly accessible electronic biomedical information presents tremendous opportunities and challenges, including the need to ensure uninterrupted access during disasters or emergencies and to manage digital resources so they remain available for future generations.

  14. Educational Psychology and the Internet

    Science.gov (United States)

    Glassman, Michael

    2016-01-01

    The first comprehensive, research-based textbook on Internet-infused education, "Educational Psychology and the Internet" offers students an accessible guide to important issues in the field. Michael Glassman begins with an overview of the history that traces the evolution of the Internet and its significance for education. He outlines…

  15. Use of internet in rural areas of Zambia

    NARCIS (Netherlands)

    Hoorik, P. van; Mweetwa, F.

    2008-01-01

    Access to information and, more importantly, the internet is not evenly distributed in this world. But if they had it, would people in rural Africa want to use the internet? How would they use it and benefit from it? Will internet influence culture and how can communities prepare themselves when the

  16. A Study about Using Internet in History Lessons

    Science.gov (United States)

    Ulusoy, Kadir

    2012-01-01

    Internet has become an important part in the field of education as it is in every area nowadays as well. Internet has become appealing among educators and students with its easy and quick access and wide opportunities. In this study, an application of using internet in the history course was done. 160 students who were enrolled in College of…

  17. Use of internet in rural areas of Zambia

    NARCIS (Netherlands)

    Hoorik, P. van; Mweetwa, F.

    2008-01-01

    Access to information and, more importantly, the internet is not evenly distributed in this world. But if they had it, would people in rural Africa want to use the internet? How would they use it and benefit from it? Will internet influence culture and how can communities prepare themselves when the

  18. 77 FR 1039 - Internet-Based Telecommunications Relay Service Numbering

    Science.gov (United States)

    2012-01-09

    ... COMMISSION 47 CFR Part 64 Internet-Based Telecommunications Relay Service Numbering AGENCY: Federal... rules that govern access to toll-free numbers by users of Internet- based Telecommunications Relay... an impact on any rules of particular applicability. Subject: Internet-Based Telecommunications...

  19. Educational Psychology and the Internet

    Science.gov (United States)

    Glassman, Michael

    2016-01-01

    The first comprehensive, research-based textbook on Internet-infused education, "Educational Psychology and the Internet" offers students an accessible guide to important issues in the field. Michael Glassman begins with an overview of the history that traces the evolution of the Internet and its significance for education. He outlines…

  20. Internet addiction: a 21st century epidemic?

    Directory of Open Access Journals (Sweden)

    Christakis Dimitri A

    2010-10-01

    Full Text Available Abstract Internet addiction, while not yet officially codified within a psychopathological framework, is growing both in prevalence and within the public consciousness as a potentially problematic condition with many parallels to existing recognized disorders. The rapid and unfettered increase in the number of people accessing a relatively unrestricted internet substantially increases the possibility that those suffering with an underlying psychological comorbidity may be at serious risk of developing an addiction to the internet, lending further credence to this hitherto understudied condition. In this commentary, I outline my recommendations for improved diagnosis, study and prevention of internet addiction.

  1. Internet censorship.

    Science.gov (United States)

    1996-12-27

    The U.S. Supreme Court agreed to review a lower court ruling that found the Communications Decency Act to be an unconstitutional infringement on free speech. The judges from the U.S. District Court in Philadelphia said that parents should monitor material that children are exposed to on the Internet. AIDS groups that publish information on safer sex, HIV prevention and AIDS treatments are not responsible for censoring content.

  2. Learning potentials of the ubiquitous internet

    DEFF Research Database (Denmark)

    Dalsgaard, Christian; Pedersen, Nicholai Friis; Aaen, Janus Holst

    The aim of this paper is to identify the key learning potentials of the ubiquitous internet. Rather than focusing on mobile technology or the mobility of the learner, the paper emphasises the ubiquity of internet access as a paramount catalyst for new learning in the digital age. From a sociocult......The aim of this paper is to identify the key learning potentials of the ubiquitous internet. Rather than focusing on mobile technology or the mobility of the learner, the paper emphasises the ubiquity of internet access as a paramount catalyst for new learning in the digital age. From...... a sociocultural perspective the paper discusses different ways in which the use of mobile devices can extend and augment the context of the learner. The learning potentials of the ubiquitous internet relate to the opportunities to extend the context of the learner on three levels: 1) personalisation...

  3. 基于虎符TePA的物联网安全接入机制研究%Research on secure access mechanism in internet of things based on TePA

    Institute of Scientific and Technical Information of China (English)

    杨年鹏; 龙昭华; 蒋贵全; 马艳

    2012-01-01

    以椭圆曲线密码算法和三元对等鉴别架构为基础,通过对物联网的基本概念、体系结构的分析,提出了一种基于椭圆曲线签名、三元鉴别的物联网安全接入机制.该机制强化了对物联网中无线传感器节点的鉴别,要求通信的任何一方在通信前必须通过其它两方的身份验证.从性能和安全等方面分析了该机制的可行性和可靠性,增强了物联网下对接入访问的安全控制,从而对物联网的建设发展起到了一定的建言作用.%Based on elliptic curve cryptography (FCC) public-key algorithms and tri-element peer authentication (TePA), the basic concept and the architecture of internet of things (IoT) are analyzed, a secure access mechanism of IoT with tri-element authentication method is proposed. This mechanism strengthen authentication for all the entities in IoT, any party's identity should be checked by others when associating. From the performance and security, the feasibility and reliability of the mecha nism is discussed. The security of access control in IoT is enhanced Finally, these will play a positive and active influence for IoT.

  4. Professional Access 2013 programming

    CERN Document Server

    Hennig, Teresa; Hepworth, George; Yudovich, Dagi (Doug)

    2013-01-01

    Authoritative and comprehensive coverage for building Access 2013 Solutions Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments.  This book was written by a team of Microsoft Access MVPs, with consulting and editing by Access experts, MVPs and members of the Microsoft Access team. It gives you the information and examples to expand your areas of expertise and immediately start to develop and upgrade projects. Exp

  5. Dermatology resources on the internet.

    Science.gov (United States)

    George, Dean D; Wainwright, Brent D

    2012-09-01

    Both patients and medical professionals are increasingly accessing the Internet for health information. Today's Web enables features that facilitate information sharing in a social and collaborative manner, thus transforming the way we access data and communicate with our patients and colleagues. The visual nature of the field of dermatology lends itself to the use of the Internet for reference and educational purposes. To generate a list of Web sites commonly used by academic dermatologists, the authors polled the Accreditation Council for Graduate Medical Education Dermatology Program Directors for their top 3 Web resources. The purpose of this article is to identify resources used by dermatologists as well as patients and examine factors that can influence Internet search results. Concerns regarding professionalism in the era of social media are also explored. As the volume of health information on the Internet continues to increase, it is essential for physicians to be aware of what is available in cyberspace. Reference and learning tools for the physician, learning and support tools for the patient, and physician Internet presence are key aspects of modern dermatology practice.

  6. Building energy analysis tool

    Science.gov (United States)

    Brackney, Larry; Parker, Andrew; Long, Nicholas; Metzger, Ian; Dean, Jesse; Lisell, Lars

    2016-04-12

    A building energy analysis system includes a building component library configured to store a plurality of building components, a modeling tool configured to access the building component library and create a building model of a building under analysis using building spatial data and using selected building components of the plurality of building components stored in the building component library, a building analysis engine configured to operate the building model and generate a baseline energy model of the building under analysis and further configured to apply one or more energy conservation measures to the baseline energy model in order to generate one or more corresponding optimized energy models, and a recommendation tool configured to assess the one or more optimized energy models against the baseline energy model and generate recommendations for substitute building components or modifications.

  7. The Internet Process Addiction Test: Screening for Addictions to Processes Facilitated by the Internet

    Directory of Open Access Journals (Sweden)

    Jason C. Northrup

    2015-07-01

    Full Text Available The Internet Process Addiction Test (IPAT was created to screen for potential addictive behaviors that could be facilitated by the internet. The IPAT was created with the mindset that the term “Internet addiction” is structurally problematic, as the Internet is simply the medium that one uses to access various addictive processes. The role of the internet in facilitating addictions, however, cannot be minimized. A new screening tool that effectively directed researchers and clinicians to the specific processes facilitated by the internet would therefore be useful. This study shows that the Internet Process Addiction Test (IPAT demonstrates good validity and reliability. Four addictive processes were effectively screened for with the IPAT: Online video game playing, online social networking, online sexual activity, and web surfing. Implications for further research and limitations of the study are discussed.

  8. An electron-deficient small molecule accessible from sustainable synthesis and building blocks for use as a fullerene alternative in organic photovoltaics.

    Science.gov (United States)

    McAfee, Seth M; Topple, Jessica M; Payne, Abby-Jo; Sun, Jon-Paul; Hill, Ian G; Welch, Gregory C

    2015-04-27

    An electron-deficient small molecule accessible from sustainable isoindigo and phthalimide building blocks was synthesized via optimized synthetic procedures that incorporate microwave-assisted synthesis and a heterogeneous catalyst for Suzuki coupling, and direct heteroarylation carbon-carbon bond forming reactions. The material was designed as a non-fullerene acceptor with the help of DFT calculations and characterized by optical, electronic, and thermal analysis. Further investigation of the material revealed a differing solid-state morphology with the use of three well-known processing conditions: thermal annealing, solvent vapor annealing and small volume fractions of 1,8-diiodooctane (DIO) additive. These unique morphologies persist in the active layer blends and have demonstrated a distinct influence on device performance. Organic photovoltaic-bulk heterojunction (OPV-BHJ) devices show an inherently high open circuit voltage (Voc ) with the best power conversion efficiency (PCE) cells reaching 1.0 V with 0.4 v/v % DIO as a processing additive.

  9. Studying Indiana Public Libraries' Usage of Internet Filters

    Science.gov (United States)

    Comer, Alberta Davis

    2005-01-01

    A lot of literature from the past few years has discussed the importance of bridging the digital divide that exists between those with Internet access and those without. Public libraries have often declared themselves to be that bridge. This article looks at how Indiana's public libraries allow the citizens they serve access to the Internet. With…

  10. Internet Use and Cognitive Development: A Theoretical Framework

    Science.gov (United States)

    Johnson, Genevieve

    2006-01-01

    The number of children and adolescents accessing the Internet as well as the amount of time online are steadily increasing. The most common online activities include playing video games, accessing web sites, and communicating via chat rooms, email, and instant messaging. A theoretical framework for understanding the effects of Internet use on…

  11. Internet-Based Communication

    Science.gov (United States)

    Gernsbacher, Morton Ann

    2014-01-01

    Google the question, "How is the Internet changing the way we communicate?," and you will find no shortage of opinions, or fears, about the Internet altering the way we communicate. Although the Internet is not necessarily making communication briefer (neither is the Internet making communication less formal), the Internet is manifesting…

  12. Internet-Based Communication

    Science.gov (United States)

    Gernsbacher, Morton Ann

    2014-01-01

    Google the question, "How is the Internet changing the way we communicate?," and you will find no shortage of opinions, or fears, about the Internet altering the way we communicate. Although the Internet is not necessarily making communication briefer (neither is the Internet making communication less formal), the Internet is manifesting…

  13. CERN Access Cards and Access Authorisations

    CERN Multimedia

    2003-01-01

    From the 01/05/2003, all problems relating to access cards and refusal of access to any zone, building or experiment within CERN must be addressed to the Centrale de Surveillance des Accès (CSA building 120) on 78877 or send an e-mail to Access.Surveillance@cern.ch. The responsibles for CERN access control have put into place a procedure with the CSA, Service Enregistrement and the Technical Control Room, to make sure that all problems get resolved in a proper and timely manner.

  14. Affecting Factors and Outcome on Intermittent Internet Pulling Behavior in Taiwan's Undergraduate Students

    Science.gov (United States)

    Yang, Hui-Jen; Lay, Yun-Long

    2011-01-01

    Nowadays people's lives heavily rely on Internet facilities. Internet users generally have constant Internet connectivity and intermittently click on sites they want to access even amidst studying or working. In this study, we sought to examine the factors affecting intermittent Internet pulling behavior on undergraduate students. Furthermore, the…

  15. Call Me... Maybe: A Framework for Integrating the Internet into ELT

    Science.gov (United States)

    Chinnery, George M.

    2014-01-01

    This article outlines reasons to use (or not use) the Internet in English language teaching, exploring the Internet as tutor and tool. Discussion of Internet content includes types of content and how to select, save, and use content. Various learning tasks, appropriate even for those without Internet access, are presented and highlighted in a…

  16. 基于物联网技术的楼宇节能控制系统设计%Energy-saving Control System Design Based on Internet of Things for Building

    Institute of Scientific and Technical Information of China (English)

    孙田雨; 马倩; 黄杰; 赵豪; 万博涵

    2015-01-01

    随着我国城市化的建设,高耗能建筑引起的能源与环境问题日益突出,利用物联网技术对建筑进行节能系统设计已经刻不容缓。文章提出了一种基于物联网多传感器技术的嵌入式楼宇节能控制系统,详细的叙述了系统的结构及控制理论。该系统利用STC89C52芯片结合热释电红外微波双鉴传感器、温度传感器、光强传感器的监测数据对照明+窗帘光控系统、空调+风扇温控系统、防盗+防火安保系统进行实时节能控制。文中还对该系统进行了节能测试,试验的中型多媒体教室每年可省电45.4%,节省3042度电,节能效果显著。文章最后对系统进行了可行性分析,证明该系统具有成本低,收益高,易操作的特点,值得推广应用。%With the urbanization and the depletion of energy in China, the issues about environment and energy of building attach more and more attention in society. So it is necessary for us to take measurements of energy-saving control system design based on internet of things and multi-sensor technology for building. The passage combines the predecessors' theories with our ideas to propose a system based on internet of things and embedded energy-saving building control. It is about to elaborate the structure and control theory in four aspects such as lighting and curtain system based on light control, air-condition and fan system based on temperature control, security system for preventing theft and fire and software control. The passage also test the system's ability in energy-saving, the result that multi-media classrooms can save energy in the degree of 45.5 percent each year, up to 3042kW·h, is impressive. In the last part, a feasibility analysis had been taken to prove the proposed system which is worth to popularize has great features like cheap price, high profit and simple control.

  17. Internet health resources and the cancer patient.

    Science.gov (United States)

    Huang, George J; Penson, David F

    2008-03-01

    The last decade has witnessed an explosion of online information regarding cancer and healthcare. Accompanying this has been a large body of research analyzing the quality of this information, how patients perceive these data and how this affects the doctor-patient relationship. This report reviews this literature, summarizing the current state of internet health resources available to the cancer patient and identifying areas for future research. Studies indicate that there are considerable internet resources available to cancer patients and that patients are using these resources as secondary information sources. Specifically, studies indicate that 16-64% of patients are using the internet to obtain health information. For the most part, patients perceive the online information to be reliable but maintain a healthy degree of skepticism. Studies objectively evaluating cancer information on the internet indicate that there is reasonable quality, although the language level of many sites is higher than that of the average American, which may limit the utility of the websites. Finally, while there is widespread internet use by physicians, healthcare providers are skeptical of their patients' ability to use the internet and may even be somewhat threatened by it. In summary, while there is a fairly large literature on internet resources available to the cancer patient, more research is needed. Specifically, it is important to better understand how patients access health information online and their associated preferences so that we can improve cancer patient's access to high quality health information on the internet to facilitate decision-making and health outcomes.

  18. Sitewide task team report for Internet policy

    Energy Technology Data Exchange (ETDEWEB)

    Aichele, D.R.

    1995-03-01

    The Internet is rapidly becoming the standard for communications, information transfer, and information sharing among U.S. Department of Energy (DOE) organizations. It has long been used by the major laboratories, but is now beginning to be used by headquarters staff to communicate with field offices and contractors and as the access point to DOE`s repositories of information. It will soon become key to efficient conduct of operations. Sites without effective access to the Internet will have to rely on secondary, less effective communications. Therefore, the task team believes it is essential that Hanford become a full participant in utilizing this resource. To make this happen an effective access and delivery infrastructure must be provided to DOE and contractor staff and standard ways of doing business on the Internet are required. Much of the technology exists today for robust electronic interchange of information. The use of this technology needs to be expanded and coordinated throughout the DOE and Hanford contractor community. As the use of Internet within DOE is advancing rapidly, it will become the preferred method for communication and information sharing within 5 years. The conclusion of the Internet Inter-Contractor task team is that the use of the Internet is essential to communicate as well as provide and obtain information and knowledge. The Hanford Site must foster, support, and implement necessary changes to the technology infrastructure to improve user access, maintain security, and assure we are effective participants in the networked community.

  19. Access 2013 for dummies

    CERN Document Server

    Ulrich Fuller, Laurie

    2013-01-01

    The easy guide to Microsoft Access returns with updates on the latest version! Microsoft Access allows you to store, organize, view, analyze, and share data; the new Access 2013 release enables you to build even more powerful, custom database solutions that integrate with the web and enterprise data sources. Access 2013 For Dummies covers all the new features of the latest version of Accessand serves as an ideal reference, combining the latest Access features with the basics of building usable databases. You'll learn how to create an app from the Welcome screen, get support

  20. [Internet in medicine--development and perspectives].

    Science.gov (United States)

    Dezelić, Gjuro

    2002-01-01

    Internet is one of information technologies marking the transition from the second to the third millennium. The present role and expansion of Internet in medicine and healthcare is reviewed together with the perspective of further development. The beginning and initial expansion of the use of Internet in medicine are described. The World Wide Web (WWW or Web) is recognized as a major reason for this expansion, reaching a state described as a Web-pandemic. The rapid increase of the number of papers dealing with Internet in medical literature is presented as well as the appearance of several journals dedicated to Internet in medicine. First specialized symposia, among them MEDNET world conferences, are noted. First uses of Internet in medicine comprised databases, discussion groups, electronic newsletters, software archives and online public access catalogues. The appearance of the Web has led to a significant improvement of the Internet use in medicine, which is reflected in an exponential increase in the number of publications. It is noted that Internet allows "to do old things in new ways", but also "to do new things". It has become clear that the information revolution evoked by the internet shall leave a deep trace in medicine, as health information has become accessible to the public and ceased to be in exclusive control of health professionals. New medical fields--telemedicine and cybermedicine--appeared as the result of the development and global expansion of information and communication technologies, with cybermedicine dealing more specifically with the use of Internet. The advantages and disadvantages of cybermedicine are discussed, and major problems related to the quality of health information are highlighted. Several systems for quality criteria of health related Web-sites are described, indicating that Websites have to conform with the quality criteria such as transparency and honesty, accountability, privacy and data protection, currency

  1. The Physical Internet and Business Model Innovation

    Directory of Open Access Journals (Sweden)

    Diane Poulin

    2012-06-01

    Full Text Available Building on the analogy of data packets within the Digital Internet, the Physical Internet is a concept that dramatically transforms how physical objects are designed, manufactured, and distributed. This approach is open, efficient, and sustainable beyond traditional proprietary logistical solutions, which are often plagued by inefficiencies. The Physical Internet redefines supply chain configurations, business models, and value-creation patterns. Firms are bound to be less dependent on operational scale and scope trade-offs because they will be in a position to offer novel hybrid products and services that would otherwise destroy value. Finally, logistical chains become flexible and reconfigurable in real time, thus becoming better in tune with firm strategic choices. This article focuses on the potential impact of the Physical Internet on business model innovation, both from the perspectives of Physical-Internet enabled and enabling business models.

  2. Secure Environment for Internet Browsing

    Directory of Open Access Journals (Sweden)

    Alexandru Tudor Gavrilescu

    2014-03-01

    Full Text Available The Internet is used by a large proportion of the population, but unfortunately their education regarding the usage of the instruments available is poor, resulting in potential informational frauds, especially in the financial field.In this article I have approached a few simple problems, yet very important and frequently occurred, regarding the secure environment for Internet browsing, proposing solutions for each of them. The security methods are: anti-phishing; the prevention of SQL injection, through the verification of the data given as input in the Address Bar and in the password fields and blocking the access in case of a potential threat; a virtual keyboard for preventing the recording of the keys pressed (key loggers; the backup of the credentials in a local file and the encryption of it to prevent unauthorized access, the decryption of the data is made using a unique encryption key, owned by the user.

  3. Analysis of "Internet+" Major Project-Innovating “Two-Stage" Cloud Platform and Serving Building Materials Industry Transformation and Upgrading%“互联网+”重大工程项目分析--创新“两级”云平台,服务建材行业转型升级

    Institute of Scientific and Technical Information of China (English)

    祁晓荔; 邓金伟

    2016-01-01

    随着“互联网+”、中国制造2025、一带一路等政策的陆续推出,为建材行业在转型升级、供给侧改革确定的目标,落实“互联网+”与中国制造2025的有效融合在建材行业生产经营管理中至关重要。文章依托中国建材集团有限公司十三五信息化调研契机,结合建材行业特点创新提出建立“集团云+企业云”两级云平台,构建“IT治理+信息安全+信息技术支持”三大体系,对于建材行业落实“互联网+”与中国制造2025具有一定的指导意义。%The launch of a series of policy like Internet+, China Manufacturing 2025, The Belt and Road Initiative determines the objectives in the transformation, upgrading and supply-side reform of building materials industry. It is essential for the production and operating management of building materials industry to integrate the"Internet+"with China Manufacturing 2015. Taking advantage of the opportunity of China Building Materials Group Ltd 13th Five-year information research and combining with the characteristics of the building materials industry, this paper proposes establishing two stage cloud platform of"Group Cloud + Enterprise Cloud" and Constructing the three major systems of "IT management + Information Security + Information Technology Support", which have a certain guiding signiifcance for building materials industry to implement the"Internet+"and China Manufacturing 2025.

  4. Pricing, agents, perceived value and the Internet

    OpenAIRE

    Bradford, Phillip G.; Brown, Herbert E.; Saunders, Paula M.

    2001-01-01

    The Internet has changed the way people buy things. A pointed difference is the use of Internet auctions and bots. But, are these differences actually changing the role and function of price in the firm's marketing program? Are they possibly changing options for pricing, and perhaps even, the very notion of perceived value? Or in fact, does the new set of Internet pricing mechanisms merely require marketers to do what good marketers have always done, and that is to build customer-perceived va...

  5. Application of Internet in Road Traffic Engineering

    Directory of Open Access Journals (Sweden)

    Ivan Dadić

    2012-10-01

    Full Text Available The paper deals with the implementation of Internet in trafficengineering with the purpose of improving the professionaland scientific research development of the traffic system in theRepublic of Croatia.Fast growth of the world computer network, Internet, andits applications in almost all the fields of human activities,change the picture of the modern world. The current exchangeof data in all their forms and the daily growth of the network,supplemented by almost incredible amounts of data that can bealmost instantly accessible, indicates that Internet is not just theinfomwtion technology revolution, but that it is a revolutionper se. More than 100 million computers are estimated to benetworked beginning of the 21" century.Internet seems almost as if it were created for the purposesof knowledge and expe1ience exchange in traffic, a relativelyyoung scientific branch. 11 can be concluded that the presenceof traffic engineers in Internet is today's reality and tomon·ow'snecessity.

  6. Providing emergency services in Internet telephony

    Science.gov (United States)

    Schulzrinne, Henning G.; Arabshian, Knarig

    2002-07-01

    Assisting during emergencies is one of the important functions of the telephone system. Emergency communications has three components: summoning help during emergencies, coordinating emergency response and notifying citizens and public officials of local emergencies. As we transition to an Internet-based telecommunications system, these functions need to be provided, but there is also an opportunity to add new functionality and improve scalability and robustness. We discuss three aspects of Internet-based communications related to emergencies: First, we describe how Internet telephony can be used to provide emergency call (``911'' or ``112'') services. Secondly, Internet telephony needs to be enhanced to allow prioritized access to communications resources during emergency-induced network congestion. Finally, Internet event notification can be a valuable new mechanism to alert communities to pending or on-going emergencies such as hurricanes or chemical spills.

  7. Analysis of Internet Usage Intensity in Iraq: An Ordered Logit Model

    Directory of Open Access Journals (Sweden)

    Almas Heshmati

    2013-06-01

    Full Text Available Intensity of Internet use is significantly influenced by government policies, people’s levels of income, education, employment and general development and economic conditions. Iraq has very low Internet usage levels compared to the region and the world. This study uses an ordered logit model to analyse the intensity of Internet use in Iraq. The results showed that economic reasons (internet cost and income level were key cause for low level usage intensity rates. About 68% of the population revealed that Internet access at homes is costly. Thus, it is no wonder that Internet cafés is the most commonly used mode of Internet use followed by broadband and dial-up connections. Iraq has to develop proper strategies to enhance the rate of Internet use in the country. These strategies need to focus on decreasing internet access prices, increasing awareness about the importance of the technology and internet education in schools and universities.

  8. ICT Enhanced Buildings Potentials

    DEFF Research Database (Denmark)

    Christiansson, Per

    2007-01-01

    with focus on virtual building models support, new services and user environment definitions and development, virtual spaces and augmented reality, intelligent building components, application ontologies, and ICT systems integration to illustrate ICT enhanced buildings potentials and R&D needs.  ...... component systems that are accessed and integrated in the real world of building use in different contexts. The ICT systems may be physically or virtually embedded in the building. Already in 1982 AT&T established the 'intelligent buildings', IB, concept due to marketing reasons and the Informart building...

  9. Short Tandem Repeat DNA Internet Database

    Science.gov (United States)

    SRD 130 Short Tandem Repeat DNA Internet Database (Web, free access)   Short Tandem Repeat DNA Internet Database is intended to benefit research and application of short tandem repeat DNA markers for human identity testing. Facts and sequence information on each STR system, population data, commonly used multiplex STR systems, PCR primers and conditions, and a review of various technologies for analysis of STR alleles have been included.

  10. The Internet and the medical radiation science practitioner

    Energy Technology Data Exchange (ETDEWEB)

    Shanahan, Madeleine [School of Medical Science, RMIT University, Bundoora, Victoria 3083 (Australia)], E-mail: mshanahan@rmit.edu.au; Herrington, Anthony; Herrington, Jan [Faculty of Education, University of Wollongong, New South Wales (Australia)

    2009-08-15

    Purpose: The Internet is an important information source for health practitioners providing immediate access to the most current health and medical information. Factors limiting practitioner access to the Internet have been identified and the literature shows that access to the Internet varies across and within health professions. There is therefore a need for each health profession to investigate practitioner access to the Internet. There has been, however, no identified empirical research investigating medical radiation science (MRS) practitioner access to or use of the Internet. This research sought to establish the professional use of Internet-based tools by Australian MRS practitioners and issues affecting access to the Internet within MRS workplaces. Methods: Qualitative and quantitative approaches were used in this research. These included interviews with 28 MRS practitioners from the four areas of specialisation, namely nuclear medicine, radiation therapy, radiography and sonography and a survey of MRS practitioners. In 2007 a 4-page postal survey was sent to a random sample of 1142 MRS practitioners with a response rate of 32.8%. Results: The Internet is an important information source widely used by MRS practitioners. MRS practitioners search the Internet (87%), access specific web pages (86%), use email (82%) and listservs (39.4%) to update their professional knowledge. It was evident that access to the Internet within the workplace varied within the MRS profession. Whilst the majority (96.4%) of MRS practitioners had some level of access to the Internet in their workplace, factors shown to affect practitioner access were workplace setting (p = 0.000), work environment (p = 0.000), and geographic location (p = 0.025). The majority of clinical workplaces (81%) did not provide practitioners with remote access to electronic resources available in the workplace such as e-journals and databases. Conclusions: This research provides baseline data to the MRS

  11. UK Government Web Continuity: Persisting Access through Aligning Infrastructures

    Directory of Open Access Journals (Sweden)

    Amanda Spencer

    2009-06-01

    Full Text Available Normal 0 Government's use of the Web in the UK is prolific and a wide range of services are now available though this channel. The government set out to address the problem that links from Hansard (the transcripts of Parliamentary debates were not maintained over time and that therefore there was need for some long-term storage and stewardship of information, including maintaining access. Further investigation revealed that linking was key, not only in maintaining access to information, but also to the discovery of information. This resulted in a project that affects the entire  government Web estate, with a solution leveraging the basic building blocks of the Internet (DNS and the Web (HTTP and URIs in a pragmatic way, to ensure that an infrastructure is in place to provide access to important information both now and in the future.

  12. History, structure, and function of the Internet.

    Science.gov (United States)

    Glowniak, J

    1998-04-01

    The Internet stands at the forefront of telecommunications in medicine. This worldwide system of computers had its beginnings in networking projects in the United States and western Europe in the 1960s and 1970s. The precursor of the Internet was ARPANET, a long-distance telecommunication network funded by the Department of Defense that linked together computers throughout the United States. In the 1980s, ARPANET was superseded by NSFNET, a series of networks created by the National Science Foundation, which established the present-day structure of the Internet. The physical structure of the Internet resembles and is integrated with the telephone system. Long-distance data transport services are provided by large telecommunication companies, called network service providers (NSPs), through high-capacity, high-speed national and international fiber optic cables. These transport services are accessed through Internet service providers, ISPs. ISPs, the equivalent of regional Bell operating companies, provide the physical link to the NSPs for individuals and organizations. Telecommunications on the Internet are standardized by a set of communications protocols, the TCP/IP protocol suite, that describe routing of messages over the Internet, computer naming conventions, and commonly used Internet services such as e-mail. At present, the Internet consists of over 20 million computer worldwide and is continuing to grow at a rapid rate. Along with the growth of the Internet, higher speed access methods are offering a range of new services such as real-time video and voice communications. Medical education, teaching, and research, as well as clinical practice, will be affected in numerous different ways by these advances.

  13. 智能建筑区门禁系统自动化识别技术分析%Analysis on Automatic Identification Technology of Intelligent Building Access Control System

    Institute of Scientific and Technical Information of China (English)

    张卉

    2015-01-01

    门禁系统是智能建筑区必备设施,可对建筑区提供安全防护、自动调控等多方面功能.指纹识别系统是人工智能改造的新系统,为门禁系统自动识别提供了科技化措施.本文分析了智能建筑发展趋势及指纹识别系统的基本构成,介绍了智能建筑门禁系统自动化识别技术的应用方法.%The access control system of intelligent building is a necessary facility, which provides security protection, automatic control and so on. Fingerprint identification system is a new artificial intelligence system, providing technological measures for the automatic identification of access control system. This paper analyzes the development trend of intelligent building and the basic structure of fingerprint identification system, introduces the application of automatic recognition technology in intelligent building access control system.

  14. PEMANFAATAN INTERNET SEBAGAI SUMBER BELAJAR

    Directory of Open Access Journals (Sweden)

    Rediana Setiyani

    2016-01-01

    Full Text Available This study has objectives to know (1 the ways / patterns of Internet usage by accounting students of Economics Faculty, Unnes in the academic year of 2009/2010, (2 the benefits of Internet to support the studying of accounting students of Economics Faculty, Unnes in the academic year of 2009/2010 (3 the difference of internet usage as a learning resource among accounting students in 4th semester, 1st and 3rd semester of Economics Faculty at Unnes III in the academic year of 2009/2010. The populations of the study are all accounting program students of Economics Faculty, Unnes. The sampling technique used was stratified random sampling. Method of data collection was questionnaire. Technique of data analysis was descriptive analysis and One Way ANOVA test. The results of this study showed that students who used wifi / hotspot for internet were 57%, students who used the internet cafe were 29.7%, and 13.3% students via modem. Benefit of Internet in supporting their studying was in good categorization, it means that students were sure when they got more information; it would improve their achievement also. There are differences in Internet usage as a learning source by students in II semester and IV semester, students in II semester and  VI semester, students in IV semester and VI semester, students in IV semester  and VIII semester, students in VI semester and VIII semester. On the other hand, students in II semester and VIII semester were not different. From the results above, the suggestions are: 1 the hotspot area should be increased on the campus; so students can easily access anywhere, 2 the speed of internet access is also added, so students can quickly download information related to their studying, 3 students can take the advantages of hotspot areas in the campus as much as possible so they can get more information and 4 Students should not rely on textbooks only, but also should look for other information that supports their studying.

  15. PEMANFAATAN INTERNET SEBAGAI SUMBER BELAJAR

    Directory of Open Access Journals (Sweden)

    Rediana Setiyani

    2010-12-01

    Full Text Available This study has objectives to know (1 the ways / patterns of Internet usage by accounting students of Economics Faculty, Unnes in the academic year of 2009/2010, (2 the benefits of Internet to support the studying of accounting students of Economics Faculty, Unnes in the academic year of 2009/2010 (3 the difference of internet usage as a learning resource among accounting students in 4th semester, 1st and 3rd semester of Economics Faculty at Unnes III in the academic year of 2009/2010. The populations of the study are all accounting program students of Economics Faculty, Unnes. The sampling technique used was stratified random sampling. Method of data collection was questionnaire. Technique of data analysis was descriptive analysis and One Way ANOVA test. The results of this study showed that students who used wifi / hotspot for internet were 57%, students who used the internet cafe were 29.7%, and 13.3% students via modem. Benefit of Internet in supporting their studying was in good categorization, it means that students were sure when they got more information; it would improve their achievement also. There are differences in Internet usage as a learning source by students in II semester and IV semester, students in II semester and  VI semester, students in IV semester and VI semester, students in IV semester  and VIII semester, students in VI semester and VIII semester. On the other hand, students in II semester and VIII semester were not different. From the results above, the suggestions are: 1 the hotspot area should be increased on the campus; so students can easily access anywhere, 2 the speed of internet access is also added, so students can quickly download information related to their studying, 3 students can take the advantages of hotspot areas in the campus as much as possible so they can get more information and 4 Students should not rely on textbooks only, but also should look for other information that supports their studying.

  16. Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor

    OpenAIRE

    Desmedt, Yvo; Shaghaghi, Arash

    2016-01-01

    Security researchers have stated that the core concept behind current implementations of access control predates the Internet. These assertions are made to pinpoint that there is a foundational gap in this field, and one should consider revisiting the concepts from the ground up. Moreover, Insider threats, which are an increasing threat vector against organizations are also associated with the failure of access control. Access control models derived from access control matrix encompass three ...

  17. Internet course on total quality management.

    Science.gov (United States)

    Alemi, F; Walker, L R; Minter, R

    1998-01-01

    The Internet provides new opportunities to information-based industries such as universities. If a vast majority of potential customers of our programs have access to the Internet, then it is conceivable that many universities will begin teaching Internet courses and that such courses could, in many cases, replace or at least augment existing face-to-face classroom activities. This paper is an account of one such course at Cleveland State University and the type of policy issues raised by the course at this institution.

  18. Learning potentials of the ubiquitous internet

    DEFF Research Database (Denmark)

    Dalsgaard, Christian; Pedersen, Nicholai Friis; Aaen, Janus Holst

    The aim of this paper is to identify the key learning potentials of the ubiquitous internet. Rather than focusing on mobile technology or the mobility of the learner, the paper emphasises the ubiquity of internet access as a paramount catalyst for new learning in the digital age. From...... a sociocultural perspective the paper discusses different ways in which the use of mobile devices can extend and augment the context of the learner. The learning potentials of the ubiquitous internet relate to the opportunities to extend the context of the learner on three levels: 1) personalisation...

  19. Internet-based intelligent information processing systems

    CERN Document Server

    Tonfoni, G; Ichalkaranje, N S

    2003-01-01

    The Internet/WWW has made it possible to easily access quantities of information never available before. However, both the amount of information and the variation in quality pose obstacles to the efficient use of the medium. Artificial intelligence techniques can be useful tools in this context. Intelligent systems can be applied to searching the Internet and data-mining, interpreting Internet-derived material, the human-Web interface, remote condition monitoring and many other areas. This volume presents the latest research on the interaction between intelligent systems (neural networks, adap

  20. Serving up Access

    Science.gov (United States)

    Rich, Sarah

    2011-01-01

    When low-income students returned to Chicago public schools this fall, many had better access to technology, thanks to a public-private partnership. Chicago families with children enrolled in the National School Lunch Program are eligible for subsidized computers and Internet connections through an agreement between the city and telecom giant…

  1. The Internet and tourism

    OpenAIRE

    Verner, Zbyněk

    2012-01-01

    This work concentrates on Internet and its influence on tourism. It describes history of Internet, tourism and interactions among them. Next this work deals with the newest trends of Internet and their influence on tourism. Last but not least, it analyzes the influence of Internet on demand in tourism in Czech Republic.

  2. The Internet and tourism

    OpenAIRE

    Verner, Zbyněk

    2010-01-01

    This work concentrates on Internet and its influence on tourism. It describes history of Internet, tourism and interactions among them. Next this work deals with the newest trends of Internet and their influence on tourism. Last but not least, it analyzes the influence of Internet on demand in tourism in Czech Republic.

  3. Internet: um meio desmassificado

    OpenAIRE

    Sousa, Ivo Dias de

    2016-01-01

    Objetivos Identificar as diferentes fases de evolução da Internet. Perceber a Internet como um meio desmassificado. Entender o conceito de hipertexto e a sua evolução. Saber os diferentes tipos de utilização da Internet. Compreender as diferentes dimensões da presença na Internet. N/A

  4. Mobile and more productive? : firm-level evidence on the productivity effects of mobile internet use

    OpenAIRE

    2015-01-01

    Mobile internet access allows for flexibility with respect to working time and working place. We analyse whether employees' use of mobile internet access improves firms' labour productivity. Our data set contains 2143 German firms and refers to the year 2014, when high-speed mobile internet was still at a relatively early stage of diffusion within firms. The econometric analysis shows that firms' labour productivity significantly increases with the share of employees with mobile internet acce...

  5. Passive Wi-Fi Link Capacity Estimation on Commodity Access Points

    OpenAIRE

    Neves da Hora, Diego; Van Doorselaer, Karel; Van Oost, Koen; Teixeira, Renata; Diot, Christophe

    2016-01-01

    International audience; Wi-Fi is the preferred way of accessing the internet for many devices at home, but it is vulnerable to performance problems. In this work, we propose a method to estimate the link capacity of a Wi-Fi link using physical layer metrics passively sampled on commodity access points. We build a model that predicts the maximum UDP throughput a device can sustain, which extends previous models to consider IEEE 802.11n optimizations such as frame aggregation. We validate our m...

  6. Customer perceptions on Internet banking information protection

    Directory of Open Access Journals (Sweden)

    André Redlinghuis

    2010-08-01

    Full Text Available Background: South Africa has a well-developed and established banking system which compares favourably with those in many developed countries (e.g. USA, but also sets South Africa apart from many other emerging market countries like Egypt and Brazil. Four dominant banks, namely the Amalgamated Banks of South Africa (ABSA, Standard Bank, Nedcor and First National Bank (FNB influence the South African banking environment. Internet banking has slowly been taking off in South Africa since 1996 as consumers are attracted to the convenience, safety and lower costs of doing banking online. Trust is a significant component of Internet banking and online services and products.Objectives: This article has reported on the results of a survey (a close-ended questionnaire that was conducted by alumni of the University of Johannesburg (UJ. The research problem for this study has been formulated as ‘what are Internet banking customers’ perception on information protection when using Internet banking services and products?’Method: The methodology for this study falls on quantitative research. The research study consisted of a detailed literature review, followed by an empirical component which consisted of a quantitative questionnaire. The questionnaire used in this study consisted of eight sections covering biographical information, financial institution and Internet banking, Internet banking service quality and delivery, Internet banking functionality, Internet banking costs, Internet banking convenience and relationships, Internet banking trust and Internet banking security and information technology (IT.Results: It was established that the findings of this research could assist financial institutions with fostering and building greater value adding relationships with their customers. These value-adding endeavours will ensure that customers experience and perceive their Internet banking experience to be enriching. Education and awareness campaigns are

  7. Internet-kulttuuri nykytaiteessa

    OpenAIRE

    Höyssä, Timo

    2016-01-01

    Internet-kulttuuri nykytaiteessa Tutkimuksessa tarkastellaan internet-taiteen historiaa ja nykyisiä esityskäytäntöjä sekä sitä miten globaali internet-kulttuuri on muokannut nykytaidetta sekä galleriassa että webissä. Tutkimuksessa kysytään miten internetin kehitys on vaikuttanut internet-taiteeseen sekä post-internet-taiteen syntyyn? Mikä on internetin paikka nykytaiteessa sekä populaarikulttuurissa? Internet culture in contemporary art A study on the history of Internet art and it’...

  8. College Students' Use of the Internet

    Directory of Open Access Journals (Sweden)

    Anna C. McFadden

    1999-02-01

    Full Text Available Over the last several years there has been mounting concern about children being exposed to sex-related material on the Internet. Concern about pornography and obscenity is widespread and this concern has spawned a host of products to block or filter content. The notorious Time magazine article (July 3, 1995 "Cyberporn"--which Time later acknowledged had doubtful credibility (July 24, 1995--undoubtedly inflamed this trend. The article, which asserted that much of traffic on the Internet dealt with pornography, was based on the largely discredited research of a Carnegie Mellon undergraduate student who examined 32 alt.binaries newsgroups on Usenet, not the Internet. Nonetheless, the article was fodder for the Communications Decency Act of 1996. While the Supreme Court struck down the Act, pending bills such as the "Safe Schools Internet Act" (H.R. 3177 would require all public libraries and schools that receive federal funds for Internet access to install blocking software to restrict minors' access to "inappropriate" material. Other pending bills would punish commercial online distributors for access to material they do not directly control and require service providers to offer blocking software to customers. While most students who use computers in university computer labs are legally adults, many are not. If laws restrict access to minors, there will be a host of technical problems to provide access to scholars and adult students. Labs are open spaces where students come and go, using computers for many purposes but only part of the time for Internet access. Determining policies and creating procedures to implement and monitor policies will entail considerable resources for something that may not be a serious problem and something that cannot be effectively controlled with filtering software. It could require students to present identification to prove they are adults in order to access certain computer resources, not to mention the

  9. Internet Abuse Risk Factors among Spanish Adolescents.

    Science.gov (United States)

    Carballo, José L; Marín-Vila, María; Espada, José P; Orgilés, Mireia; Piqueras, José A

    2015-11-27

    Empirical evidence has revealed various factors that contribute to the development and maintenance of Internet abuse. The aim of this paper was to analyze, on a sample of Spanish adolescents, the relationship between Internet abuse and: (1) Personal and interpersonal risk factors, including social skills in both virtual and real-life contexts; (2) Drug use. A total of 814 high school students aged between 13 and 17 participated in this study, and were divided into two groups: Internet Abusers (IA = 173) and Non-Internet Abusers (NIA = 641). Questionnaires were used to analyze Internet and drug use/abuse, as well as social skills, in virtual and real contexts. Various interpersonal risk factors (family and group of friends) were also assessed. IA showed a more severe pattern of Internet and drug use, as well as poorer social skills in both contexts. Moreover, their groups of friends appeared more likely to become involved in risky situations related to Internet and drug abuse. Both IA and NIA showed more adaptive social skills in the virtual context than in the real one. There is a need for further research to build on these findings, with a view to designing specific preventive programs that promote responsible Internet use.

  10. Prevalence of internet addiction among schoolchildren in Novi Sad

    Directory of Open Access Journals (Sweden)

    Ač-Nikolić Eržebet

    2015-01-01

    Full Text Available Introduction. Internet use has increased rapidly all over the world. Excessive Internet use tends to lead to the creation of a non-chemical addiction, most commonly known as “Internet addiction.” Objective. The aim of this study was an assessment of the prevalence of Internet use and Internet addiction among school children aged 14-18 years in the Municipality of Novi Sad, Serbia, and influence of sociodemographic variables on Internet use. Methods. A cross-sectional study was conducted in Novi Sad among final-year students from elementary and first- and second-year students from high schools. The prevalence of Internet addiction was assessed by using Young’s Diagnostic Questionnaire. Results. Out of 553 participants, 62.7% were females, and the average age was 15.6 years. The sample consisted of 153 elementary school students and 400 high school students. Majority of respondents had a computer in their household. Our study showed widespread Internet use among adolescents. Facebook and YouTube were among most visited web-sites. The main purpose of Internet use was entertainment. Estimated prevalence of Internet addiction was high (18.7%, mostly among younger adolescents (p=0.013. Conclusion. Internet addiction was found in every fifth adolescent. Accessibility and availability of Internet use is constantly growing and therefore it is necessary to define more sensitive diagnostic tools for the assessment of Internet addiction and its underlying causes, in order to implement effective preventive programs.

  11. Prevalence of Internet Addiction among Schoolchildren in Novi Sad.

    Science.gov (United States)

    Ac-Nikolić, Erzebet; Zarić, Dragana; Nićiforović-Šurković, Olja

    2015-01-01

    Internet use has increased rapidly all over the world. Excessive Internet use tends to lead to the creation of a non-chemical addiction, most commonly known as "Internet addiction." The aim of this study was an assessment of the prevalence of Internet use and Internet addiction among school children aged 14-18 years in the Municipality of Novi Sad, Serbia, and influence of sociodemographic variables on Internet use. A cross-sectional study was conducted in Novi Sad among final-year students from elementary and first- and second-year students from high schools.The prevalence of Internet addiction was assessed by using Young's Diagnostic Questionnaire. Out of 553 participants, 62.7% were females, and the average age was 15.6 years. The sample consisted of 153 elementary school students and 400 high school students. Majority of respondents had a computer in their household. Our study showed widespread Internet use among adolescents. Facebook and YouTube were among most visited web-sites. The main purpose of Internet use was entertainment. Estimated prevalence of Internet addiction was high (18.7%), Mostly among younger adolescents (p = 0.013). Internet addiction was found in every fifth adolescent. Accessibility and availability of Internet use is constantly growing and therefore it is necessary to define more sensitive diagnostic tools for the assessment of Internet addiction and its underlying causes, in order to implement effective preventive programs.

  12. Internet addiction and its determinants among medical students

    Directory of Open Access Journals (Sweden)

    Bhushan Chaudhari

    2015-01-01

    Full Text Available Background: Exponential use of internet has resulted in internet addiction in recent times. Students are particularly at risk because of their unique personal, social, and academic needs. Objectives: The study was designed to evaluate the prevalence of internet addiction and its determinants among medical students. Materials and Methods: A cross-sectional study was conducted in 282 medical students with the help of semi-structured questionnaire consisting of questions related to demographic information, information related to internet use, and Young's internet addiction test. Results: We found prevalence of internet addiction among medical students to be 58.87% (mild – 51.42%, moderate –7.45% and significantly associated factors with internet addiction being male gender, staying in private accommodation, lesser age of first internet use, using mobile for internet access, higher expenditure on internet, staying online for longer time, and using internet for social networking, online videos, and watching website with sexual content. Conclusion: Medical students are vulnerable for internet addiction and efforts should be taken to increase awareness and prevent the problem of internet addiction in them.

  13. Internet addiction and its determinants among medical students.

    Science.gov (United States)

    Chaudhari, Bhushan; Menon, Preethi; Saldanha, Daniel; Tewari, Abhinav; Bhattacharya, Labhanya

    2015-01-01

    Exponential use of internet has resulted in internet addiction in recent times. Students are particularly at risk because of their unique personal, social, and academic needs. The study was designed to evaluate the prevalence of internet addiction and its determinants among medical students. A cross-sectional study was conducted in 282 medical students with the help of semi-structured questionnaire consisting of questions related to demographic information, information related to internet use, and Young's internet addiction test. We found prevalence of internet addiction among medical students to be 58.87% (mild - 51.42%, moderate -7.45%) and significantly associated factors with internet addiction being male gender, staying in private accommodation, lesser age of first internet use, using mobile for internet access, higher expenditure on internet, staying online for longer time, and using internet for social networking, online videos, and watching website with sexual content. Medical students are vulnerable for internet addiction and efforts should be taken to increase awareness and prevent the problem of internet addiction in them.

  14. Analysis of the Purpose of Using Internet in Iraq: A Multinomial Logit Model

    Directory of Open Access Journals (Sweden)

    Firas H. Al-Hammadany

    2011-10-01

    Full Text Available Internet accessibility is positively correlated with infrastructure development and nature of government policies. Though Iraq has shown considerable increase in Internet connectivity, it constitutes only 10 % of its population. In this study, the significant factors determining the use and non-use of Internet have been identified and analyzed. The results revealed that human development, human capital, institutional and legal environment, existing technologies, government policy making and income levels affect the Internet accessibility. The non-Internet users mainly comprised from 12-25 years age group. Similarly, high school and diploma students constituted significant proportion of non-Internet users. Lack of awareness and poor access to Internet facility were quoted as the most significant factors that resulted in the poor Internet accessibility which were supported by the used multinomial logit model. Low income level of the people resulted in non-use of Internet.The use of Internet was found to be highest among those with high level of education. Hence, the measures like provision of ICT based training programs, effective government policy for prioritizing Internet in education sector and allowing most advanced Internet technologies in e-governance and increased efforts for enhancing human development and human capital would enhance the rate of Internet accessibility in Iraq.

  15. Trends in Internet Marketing

    OpenAIRE

    Panchanathan, Nitin

    2005-01-01

    Internet marketing involves the usage of the Internet to market and sell goods or services. In this thesis we wished to seek answers for the following questions with the help of web, email surveys taking into consideration consumer perspective, company perspective and 3rd party internet marketing agency perspective. Our survey sample was based on a small set of companies, consumers and internet marketing agencies. The survey results helped us in predicting the trends in internet marketing. We...

  16. Integrated collaborative building design using Internet technology

    OpenAIRE

    Roshani, D.M.R.

    2005-01-01

    Communication between the parties in a project of an integrated collaborative engineering system has been the subject of active research for many years. The construction industry has a long tradition of collaborative working between the members of the construction team. At the design stage, this has traditionally been based on physical meetings between representatives of the principal design team members. To aid these meetings, the information and communication technologies that are currently...

  17. User profiles of internet addicts in Serbia

    Directory of Open Access Journals (Sweden)

    Hinić Darko

    2008-01-01

    Full Text Available This work was a part of a broader empirical study of Internet users with excessive and dysfunctional Internet use symptoms. The aim of this particular article was to describe user profiles of Internet addicts in Serbia. The study recruited 100 subjects in total, 50 in both the clinical and control group. The clinical group included the Internet users who asked for professional help due to the symptoms of the excessive Internet use and fulfilled the diagnostic criteria for Internet behavior disorder proposed by the American Psychology Association. The results have shown that population with Internet addiction symptoms equally included both males and females, mostly adolescent and younger population, teenagers and university students, persons with higher income and users from economically more developed areas of Serbia. The user profile of this group is characterized by frequent logging on with intervals of several hours online at one time, mainly in the evening or at night, and also intensive negative reactions to any form of Internet access deprivation. By means of factor analysis, three dimensions of pathological use have been established: mixed type with particular need for up-to-date information, social interaction addiction and need for fun-seeking, namely pursuing hobbies online (cyberpornography, online games, music, art and so on.

  18. Prevalence of Internet use amongst an elective spinal surgery outpatient population.

    LENUS (Irish Health Repository)

    Baker, Joseph F

    2010-10-01

    Nationally 62% of individuals in Ireland have internet access. Previous published work has suggested that internet use is higher among those with low back pain. We aimed to determine the levels of internet access and use amongst an elective spinal outpatient population and determine what characteristics influence these. We distributed a self-designed questionnaire to patients attending elective spinal outpatient clinics. Data including demographics, history of surgery, number of visits, level of satisfaction with previous consultations, access to the internet, possession of health insurance, and details regarding use of the internet to research one\\'s spinal complaint were collected. 213 patients completed the questionnaire. 159 (75%) had access to the internet. Of this group 48 (23%) used the internet to research their spinal condition. Increasing age, higher education level, and possession of health insurance were all significantly associated with access to the internet (p < 0.05). A higher education level predicted greater internet use while possession of insurance weakly predicted non-use (p < 0.05). In our practice, internet access is consistent with national statistics and use is comparable to previous reports. Approximately, one quarter of outpatients will use the internet to research their spinal condition. Should we use this medium to disseminate information we need to be aware some groups may not have access.

  19. Prevalence of Internet use amongst an elective spinal surgery outpatient population.

    Science.gov (United States)

    Baker, Joseph F; Devitt, Brian M; Kiely, Paul D; Green, James; Mulhall, Kevin J; Synnott, Keith A; Poynton, Ashley R

    2010-10-01

    Nationally 62% of individuals in Ireland have internet access. Previous published work has suggested that internet use is higher among those with low back pain. We aimed to determine the levels of internet access and use amongst an elective spinal outpatient population and determine what characteristics influence these. We distributed a self-designed questionnaire to patients attending elective spinal outpatient clinics. Data including demographics, history of surgery, number of visits, level of satisfaction with previous consultations, access to the internet, possession of health insurance, and details regarding use of the internet to research one's spinal complaint were collected. 213 patients completed the questionnaire. 159 (75%) had access to the internet. Of this group 48 (23%) used the internet to research their spinal condition. Increasing age, higher education level, and possession of health insurance were all significantly associated with access to the internet (p internet use while possession of insurance weakly predicted non-use (p internet access is consistent with national statistics and use is comparable to previous reports. Approximately, one quarter of outpatients will use the internet to research their spinal condition. Should we use this medium to disseminate information we need to be aware some groups may not have access.

  20. Indagando en la relevancia de Internet en el acceso, uso y deseos de las TIC por parte de las mujeres en las TIC Digging in the significance of the internet for the ICT access, uses and desires of women in ICT

    Directory of Open Access Journals (Sweden)

    Núria VERGÉS BOSCH

    2011-07-01

    Full Text Available A partir de los años 90 las teorías feministas de la tecnología experimentan un optimismo renovado con la aparición de las TIC y el desarrollo de la tercera ola feminista. Sin embargo, la investigación en género y tecnología se ha centrado en estudiar la exclusión de las mujeres de las TIC e, inversamente, las experiencias de las mujeres y sus estrategias para incluirse en las TIC han recibido menos atención. Motivadas por nuestras experiencias tecnoactivistas y la observación de una remarcable presencia de mujeres en ellas, con Donestech, iniciamos un proyecto de investigación sobre los accesos, usos y deseos de las mujeres en las TIC. A través de una investigación ciberfeminista recogimos, analizamos y visibilizamos las experiencias y opiniones de las mujeres en las TIC. Nuestros resultados sugieren que las trayectorias de inclusión y acceso de las mujeres en las TIC son diversas, así como heterogéneos son los usos que hacen de ellas, destacando el rol jugado por Internet en todo ello. Además mostramos que las mujeres en las TIC son curiosas y entusiastas, que quieren empoderarse y compartir el conocimiento. Finalmente, les disgusta y desconfían de las relaciones de poder existentes en los mundos tecnológicos, manteniendo una actitud crítica y creativa hacia las TIC.Since the 90’s the feminist theories of technology have experienced a renewed optimism with the rise of ICT and the development of the third-wave feminisms. However, Research on gender and technology still focuses on studying the exclusion of women from ICT. Conversely, women’s experiences and their strategies leading to their inclusion in ICT has received less attention. Motivated by our previous experience in technoactivism and the observation of a remarkable presence of women, within the Donestech Collective, we initiated a research project on the access, uses and desires of women who were involved in technology. Following a cyberfeminist activist

  1. Problems of Accessibility.

    Science.gov (United States)

    Servedio, William; McLeod, William

    1980-01-01

    Increased participation in recreational programing by persons with handicapping conditions is a right that calls for significant changes in accessibility of facilities. Both interior and exterior building modifications must be made. (CJ)

  2. Harmonizing the Interests of Free Speech, Obscenity, and Child Pornography in Cyberspace: The New Roles of Parents, Technology, and Legislation for Internet Safety

    OpenAIRE

    Amos O. Olagunju

    2009-01-01

    Inadvertent access to website addresses and spam e-mails continue to make pornography rampant on the Internet in schools, homes, and libraries. Collectively, parents, teachers, and members of the community must become more aware of the risks and consequences of open access to the Internet, and the distinction between censorship and Internet access filtering. Parental involvement is crucial for raising children with healthy Internet habits to access social and educational materials. Although g...

  3. Analysis of Scientific Attitude, Computer Anxiety, Educational Internet Use, Problematic Internet Use, and Academic Achievement of Middle School Students According to Demographic Variables

    Science.gov (United States)

    Bekmezci, Mehmet; Celik, Ismail; Sahin, Ismail; Kiray, Ahmet; Akturk, Ahmet Oguz

    2015-01-01

    In this research, students' scientific attitude, computer anxiety, educational use of the Internet, academic achievement, and problematic use of the Internet are analyzed based on different variables (gender, parents' educational level and daily access to the Internet). The research group involves 361 students from two middle schools which are…

  4. See the World on the Internet: Tips for Parents of Young Readers--and "Surfers" = Vea el mundo por Internet: Ideas por padres de jovenes lectores y exploradores.

    Science.gov (United States)

    Moss, Jeanette

    Regardless of whether a parent has Internet access at home, it is essential that parents learn with their children and be aware of where their travels on the Internet are taking them. Many libraries have Internet workshops for parents or children or both. In the excitement of looking at sites, children may not even realize they are reading. Many…

  5. Enhancing rural connectivity through an extended internet cafés business models

    DEFF Research Database (Denmark)

    Williams, Idongesit; Gyaase, Patrick Ohemeng Kwadwo; Falch, Morten

    2013-01-01

    This paper discusses the potentials of an adaptation of the Internet café business model adopted for Internet access in African cities to improve rural Internet access through a partnership between the public and private sectors. The rural areas in most developing countries e lack of Internet...... connectivity due to commercial unviability of such investment by the private sector alone.. The modernization theory is used to support the concept that the availability of Internet services in rural can be catalyzed if an Adaptation of the Internet cafés business model incorporating the public participation...... are replicated in the rural areas. . A study is carried out in Ghana, where the market players in the Internet café operations to ascertain the potential viability of public –private partnership in the provisioning of internet access in the rural areas in Ghana. A new business model in the form of Public Private...

  6. Factors influencing Internet banking adoption in South African rural areas

    Directory of Open Access Journals (Sweden)

    Thinamano C. Ramavhona

    2016-07-01

    Full Text Available Background: The banking industry globally provides Internet banking to offer their customers easy access to banking services. The banks in South Africa, like their counterparts in other parts of the world, offer Internet banking to customers. However, the majority of South Africans in rural areas do not adopt and use Internet banking despite its convenience, the availability of Internet banking infrastructure, the effort of banks in promoting Internet banking awareness and Internet security.Objectives: This research investigated factors which influence the adoption and use of Internet banking in the context of South African rural areas.Method: In this study, a quantitative research approach was used. Data were collected through questionnaires and analysed using Statistical Package for Social Sciences (SPSS tool.Results: The perceived compatibility, trialability and external variables such as awareness and security were found to have significant influence in the adoption of Internet banking in South African rural areas, whereas relative advantage was found not to be a significant factor. Security and the complexity of Internet banking were also revealed as some of the factors hampering the intention to adopt Internet banking in South African rural areas.Conclusion: The lack of awareness on Internet banking services and its benefits such as its convenience and the possibility to conduct banking transactions from any location with Internet is found to be the reason for South African rural area retail bank consumers’ reluctance to adopt Internet banking. The majority of retail bank customers in South African rural areas do not use Internet banking because of the lack of resources, such as computers with Internet access. The security of transactions conducted over the Internet is the main concern and significant element that customers consider before adopting Internet banking in South African rural areas as they perceive it as being easily exposed

  7. Internet use, abuse, and dependence among students at a southeastern regional university.

    Science.gov (United States)

    Fortson, Beverly L; Scotti, Joseph R; Chen, Yi-Chuen; Malone, Judith; Del Ben, Kevin S

    2007-01-01

    To assess Internet use, abuse, and dependence. 411 undergraduate students. Ninety percent of participants reported daily Internet use. Approximately half of the sample met criteria for Internet abuse, and one-quarter met criteria for Internet dependence. Men and women did not differ on the mean amount of time accessing the Internet each day; however, the reasons for accessing the Internet differed between the 2 groups. Depression was correlated with more frequent use of the Internet to meet people, socially experiment, and participate in chat rooms, and with less frequent face-to-face socialization. In addition, individuals meeting criteria for Internet abuse and dependence endorsed more depressive symptoms, more time online, and less face-to-face socialization than did those not meeting the criteria. Mental health and student affairs professionals should be alert to the problems associated with Internet overuse, especially as computers become an integral part of college life.

  8. Internet addiction is associated with social anxiety in young adults.

    Science.gov (United States)

    Weinstein, Aviv; Dorani, Dikla; Elhadif, Rotem; Bukovza, Yehely; Yarmulnik, Anastasya; Dannon, Pinhas

    2015-02-01

    Problematic Internet use or excessive Internet use is characterized by excessive or poorly controlled preoccupations, urges, or behaviors regarding computer use, and Internet access that leads to impairment or distress. Cross-sectional studies on samples of patients reported high comorbidity of Internet addiction with psychiatric disorders, especially affective disorders (including depression), anxiety disorders (generalized anxiety disorder, social anxiety disorder), and attention-deficit/hyperactivity disorder. We have investigated the association between Internet addiction and social anxiety in 2 samples of 120 university students (60 males and 60 females in each sample). We found a correlation between Internet addiction and social anxiety in the 2 samples (r=0.411, PInternet addiction. Thirdly, we did not find a preference for social networks among participants with high levels of social anxiety. The results of the study support previous evidence for co-occurrence of Internet addiction and social anxiety, but further studies need to clarify this association.

  9. Analisis Perkembangan Internet Broadband di Daerah Perbatasan Sulawesi Utara

    Directory of Open Access Journals (Sweden)

    Riva'atul Adaniah Wahab

    2016-12-01

    infrastructure is still insufficient, the availability of high-quality internet broadband services with low rates are still difficult to realize. From the aspect of demand, stigma or the community perception that the internet is not important makes the people don't have internet access. The barriers is predominantly lack of knowledge in internet usage. This factor also causes community internet broadband literacy at level 0. As solutions, the preparation and establishment of policies and regulations such as the QoS service, interconnection, infrastructure sharing can provide high-quality internet broadband internet at a cheaper price. Besides the distribution of valuable mobile device (smartphone should also be encouraged by the application of local content level for the production of the device. No less important is the increase of community lietracy in internet broadband through socialization or training, both formal and informal.

  10. Tagging: An Organization Scheme for the Internet

    Directory of Open Access Journals (Sweden)

    Marijke A. Visser

    2010-03-01

    Full Text Available How should the information on the Internet be organized? This question and the possible solutions spark debates among people concerned with how we identify, classify, and retrieve Internet content. This paper discusses the benefits and the controversies of using a tagging system to organize Internet resources. Tagging refers to a classification system where individual Internet users apply labels, or tags, to digital resources. Tagging increased in popularity with the advent of Web 2.0 applications that encourage interaction among users. As more information is available digitally, the challenge to find an organizational system scalable to the Internet will continue to require forward thinking. Trained to ensure access to a range of informational resources, librarians need to be concerned with access to Internet content. Librarians can play a pivotal role by advocating for a system that supports the user at the moment of need. Tagging may just be the necessary system.

  11. Politics and the Internet: A Phenomenological Critique

    Directory of Open Access Journals (Sweden)

    Gregory Cameron

    2011-12-01

    Full Text Available “Politics and the Internet” is a critique of the political potential of the internet from the perspective of Husserl’s discussion of intersubjectivity and objectivity in Cartesian Meditations and Origins of Geometry. Unlike other critiques of the internet from a phenomenological perspective, this paper does not consider the limitations of internet communication from the perspective of the body. Here, rather, the prime concern is with the constitution of objectivity and the ways in which the internet limits this constitution. The paper builds towards a consideration of the essential role of objectivity as a condition of possibility for politics and community. Implicit in the argument is a defence of print and broadcast media.

  12. The Policy Implications of Internet Connectivity in Public Libraries

    Science.gov (United States)

    Jaeger, Paul T.; Bertot, John Carlo; McClure, Charles R.; Langa, Lesley A.

    2006-01-01

    The provision of public Internet access and related networked services by public libraries is affected by a number of information policy issues. This article analyzes the policy dimensions of Internet connectivity in public libraries in light of the data and findings from a national survey of public libraries conducted by the authors of this…

  13. Awareness and use of internet services among first MBBS students

    Directory of Open Access Journals (Sweden)

    Srujan Kumar B.

    2016-12-01

    Conclusions: Though majority of the students have knowledge and awareness about the internet usage it is not being utilized properly as an educational tool. Attention should be paid to bring about interventional measures that can improve computer usage skills and access among students to reduce the occurrence of internet addiction behaviour. [Int J Res Med Sci 2016; 4(12.000: 5261-5264

  14. Understanding Student Internet Rights Begins with the First Amendment.

    Science.gov (United States)

    Floyd, Megan M.

    1999-01-01

    Suggests the rights of high school students to access and use their schools' Internet resources are confusing and complicated. Discusses authorized user policies, freedom of expression, and the Internet as a library. Concludes that until the Supreme Court establishes a legal precedent, students, parents, administrators, and teachers are left the…

  15. Modeling the Determinants of Internet Use

    Science.gov (United States)

    Chen, Y. L.

    2008-01-01

    The purpose of the study is to build a model that predicts the level of Internet use by teachers of English as a foreign language in the northern Taiwanese higher education institutions. It examines interactional relationships among variables associated with barriers and issues of technology application as a means of analyzing the extent and the…

  16. Internet Commerce Managing Financial on the Internet

    Directory of Open Access Journals (Sweden)

    Chandra Wibowo Widhianto

    2001-03-01

    Full Text Available Article explain how to business through internet which are web business clarification, strategy effect, how to make profit, and business electronic changes consist of criptografy, EDI, signature, digital notarisation, file, payment, and how to get succes in internet business.

  17. Internet and Internet Use: Teacher Trainees' Perspective

    Science.gov (United States)

    Akinoglu, Orhan

    2009-01-01

    The aim of this study is to present the development and issues of internet and internet use. The study has a descriptive survey design and 185 randomly selected teacher trainees at Marmara University, Ataturk Education Faculty in the 2001-2002 academic year constitute the sample. Data were collected via a questionnaire prepared by the researcher…

  18. Security incidents on the Internet, 1989--1995

    Energy Technology Data Exchange (ETDEWEB)

    Howard, J.D.

    1995-12-31

    This paper presents an analysis of trends in Internet security based on an investigation of 4,299 Internet security-related incidents reported to the CERT{reg_sign} Coordination Center (CERT{reg_sign}/CC) from 1989 through 1995. Prior to this research, knowledge of actual Internet security incidents was limited and primarily anecdotal. This research: (1) developed a taxonomy to classify Internet attacks and incidents, (2) organized, classified, and analyzed CERT{reg_sign}/CC incident records, (3) summarized the relative frequency of the use of tools and vulnerabilities, success in achieving access, and results of attacks, (4) estimated total Internet incident activity, (5) developed recommendations for Internet users and suppliers, and (6) developed recommendations for future research. With the exception of denial-of-service attacks, security incidents were found to be increasing at a rate less than Internet growth. Estimates showed that most, if not all, severe incidents were reported to the CERT{reg_sign}/CC, and that more than one out of three above average incidents (in terms of duration and number of sites) were reported. Estimates also indicated that a typical Internet site was involved in, at most, around one incident (of any kind) per year, and a typical Internet host in, at most, around one incident in 45 years. The probability of unauthorized privileged access was around an order of magnitude less likely. As a result, simple and reasonable security precautions should be sufficient for most Internet users.

  19. Commercialisation of Internet

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik

    An anthology dealing with the commercialisation of Internet and the development of new services.......An anthology dealing with the commercialisation of Internet and the development of new services....

  20. Internet user behaviour

    Directory of Open Access Journals (Sweden)

    Radbâță, A.

    2011-01-01

    Full Text Available Internet is a useful tool for everybody in a technologically advanced world. As Internet appears and develops, it creates a totally new network environment. The development of commerce on the Internet based on virtual communities has become one of the most successful business models in the world. After analyzing the concept of internet, the e-commerce market and its marketing mix and the benefits and limitations of the Internet, we have presented a few studies on Internet user behaviour. Furthermore, the paper looks at a representative sample of Romanian internet users. The results reveal that the Romanians are using the Internet especially for information gathering, e-mail, entertainment and social networking.