WorldWideScience

Sample records for internet applications

  1. Adaptive Reactive Rich Internet Applications

    Science.gov (United States)

    Schmidt, Kay-Uwe; Stühmer, Roland; Dörflinger, Jörg; Rahmani, Tirdad; Thomas, Susan; Stojanovic, Ljiljana

    Rich Internet Applications significantly raise the user experience compared with legacy page-based Web applications because of their highly responsive user interfaces. Although this is a tremendous advance, it does not solve the problem of the one-size-fits-all approach1 of current Web applications. So although Rich Internet Applications put the user in a position to interact seamlessly with the Web application, they do not adapt to the context in which the user is currently working. In this paper we address the on-the-fly personalization of Rich Internet Applications. We introduce the concept of ARRIAs: Adaptive Reactive Rich Internet Applications and elaborate on how they are able to adapt to the current working context the user is engaged in. An architecture for the ad hoc adaptation of Rich Internet Applications is presented as well as a holistic framework and tools for the realization of our on-the-fly personalization approach. We divided both the architecture and the framework into two levels: offline/design-time and online/run-time. For design-time we explain how to use ontologies in order to annotate Rich Internet Applications and how to use these annotations for conceptual Web usage mining. Furthermore, we describe how to create client-side executable rules from the semantic data mining results. We present our declarative lightweight rule language tailored to the needs of being executed directly on the client. Because of the event-driven nature of the user interfaces of Rich Internet Applications, we designed a lightweight rule language based on the event-condition-action paradigm.2 At run-time the interactions of a user are tracked directly on the client and in real-time a user model is built up. The user model then acts as input to and is evaluated by our client-side complex event processing and rule engine.

  2. Internet applications in radiation safety

    International Nuclear Information System (INIS)

    Hill, P.; Geisse, C.; Wuest, E.

    1998-01-01

    As a means of effective communication the Internet is presently becoming more and more important in German speaking countries, too. Its possibilities to exchange and to obtain information efficiently and rapidly are excellent. Internet and email access are available now in most institutions for professional use. Internet services of importance to radiation safety professionals are described. (orig.) [de

  3. Application of Internet in Road Traffic Engineering

    Directory of Open Access Journals (Sweden)

    Ivan Dadić

    2012-10-01

    Full Text Available The paper deals with the implementation of Internet in trafficengineering with the purpose of improving the professionaland scientific research development of the traffic system in theRepublic of Croatia.Fast growth of the world computer network, Internet, andits applications in almost all the fields of human activities,change the picture of the modern world. The current exchangeof data in all their forms and the daily growth of the network,supplemented by almost incredible amounts of data that can bealmost instantly accessible, indicates that Internet is not just theinfomwtion technology revolution, but that it is a revolutionper se. More than 100 million computers are estimated to benetworked beginning of the 21" century.Internet seems almost as if it were created for the purposesof knowledge and expe1ience exchange in traffic, a relativelyyoung scientific branch. 11 can be concluded that the presenceof traffic engineers in Internet is today's reality and tomon·ow'snecessity.

  4. Internet of Things: Architectures, Protocols, and Applications

    OpenAIRE

    Sethi, Pallavi; Sarangi, Smruti R.

    2017-01-01

    The Internet of Things (IoT) is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose. In this paper, we survey state-of-the-art methods, protocols, and applications in this new emerging area. This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human ...

  5. Internet tomography an introduction to concepts, techniques, tools and applications

    CERN Document Server

    Moloisane, Abia; O’Droma, Máirtín

    2013-01-01

    Internet tomography, introduced from basic principles through to techniques, tools and applications, is the subject of this book. The design of Internet Tomography Measurement Systems (ITMS) aimed at mapping the Internet performance profile spatially and temporally over paths between probing stations is a particular focus.The Internet Tomography Measurement System design criteria addressed include:Minimally-invasive, independent and autonomous, active or passive measurement;Flexibility and scalability;Capability of targeting local, regional and global Internet paths and underlying IP networks;

  6. Compulsive Internet use: the role of online gaming and other internet applications.

    Science.gov (United States)

    van Rooij, Antonius J; Schoenmakers, Tim M; van de Eijnden, Regina J J M; van de Mheen, Dike

    2010-07-01

    Increasing research on Internet addiction makes it necessary to distinguish between the medium of Internet and its specific applications. This study explores the relationship between time spent on various Internet applications (including online gaming) and Compulsive Internet Use in a large sample of adolescents. The 2007 (N=4,920) and 2008 (N=4,753) samples of a longitudinal survey study among adolescents were used, as well as the 2007-2008 cohort subsample (N=1421). Compulsive Internet Use was predicted from the time spent on the various Internet applications in two cross-sectional multiple linear regression models and one longitudinal regression model in which changes in behavior were related to changes in Compulsive Internet Use. In both samples, downloading, social networking, MSN use, Habbo Hotel, chatting, blogging, online games, and casual games were shown to be associated with Compulsive Internet Use. Off these, online gaming was shown to have the strongest association with Compulsive Internet Use. Moreover, changes in online gaming were most strongly associated with changes in Compulsive Internet Use over time for the longitudinal cohort. A clear relationship was shown between online gaming and Compulsive Internet Use. It is further argued that a subgroup of compulsive Internet users should be classified as compulsive online gamers. Copyright (c) 2010 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  7. Creation of web applications by Rich Internet Application Adobe Flex

    OpenAIRE

    PEKA, Karel

    2011-01-01

    Bachelor work focuses on explaining the functions and development of interactive applications in Adobe Flex RIA also compared to similar web technologies such as AJAX, Microsoft Silverlight or Adobe Flash. Explain the difference between "ordinary" sites and Rich Internet Application (RIA) and the difference shows a series of demonstration examples were processed in Adobe Flash Builder (environment for building Flex applications). Also will be created large-scale application for comprehensive ...

  8. Validation of Internet Application: Study, Analysis and Evaluation

    OpenAIRE

    Dinesh Kumar

    2012-01-01

    Today, testing applications for Internet (web sites and other applications) is being verified using proprietary test solutions. The Internet Security became a very important and complex field of researches in our present time, especially if we apply this to the discussion of Internet protocols as basic interfaces for exchanging sensitive data over the Internet and finding appropriate and trustworthy algorithms for their validation. Test Competence Centre at Ericsson AB has expertise on tes...

  9. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  10. Internet of Things novel advances and envisioned applications

    CERN Document Server

    Geetha, M

    2017-01-01

    This book focuses on a combination of theoretical advances in the Internet of Things, cloud computing and its real-life applications to serve society. The book discusses technological innovations, authentication, mobility support and security, group rekeying schemes and a range of concrete applications. The Internet has restructured not only global interrelations, but also an unbelievable number of personal characteristics. Machines are increasingly able to control innumerable autonomous gadgets via the Internet, creating the Internet of Things, which facilitates intelligent communication between humans and things, and among things. The Internet of Things is an active area of current research, and technological advances have been supported by real-life applications to establish their soundness. The material in this book includes concepts, figures, graphs, and tables to guide researchers through the Internet of Things and its applications for society. .

  11. Freeform Compliant CMOS Electronic Systems for Internet of Everything Applications

    KAUST Repository

    Shaikh, Sohail F.; Ghoneim, Mohamed T.; Sevilla, Galo T.; Nassar, Joanna M.; Hussain, Aftab M.; Hussain, Muhammad Mustafa

    2017-01-01

    of flexibility and stretchability in electronics for emerging Internet of Everything application can unleash smart application horizon in unexplored areas, such as robotics, healthcare, smart cities, transport, and entertainment systems. While flexible

  12. Word of mouth marketing applications on the internet

    OpenAIRE

    Gülmez, Mustafa

    2011-01-01

    Word of mouth marketing, also called WOMM in English, is a marketing strategyform via oral or written in which consumers share&spread other people aboutproduct or firm. Word of mouth marketing is an extremely important factor in theconsumer’s final purchase decision in the conscious societies on the internet. Thispaper aims to evaluate word of mouth marketing applications on the internet.

  13. Internet applications in nuclear power plant operation management

    International Nuclear Information System (INIS)

    Munoz, M.

    2000-01-01

    The use of the Internet is quickly becoming widespread in practically all areas of business and industry. The nuclear industry should not remain indifferent to this new trend. This paper analyses some of the Internet applications that can be easily adapted to nuclear power plant operation management, including. (Author)

  14. INTERNET OF THINGS (IOT) - APPLICATIONS AND CHALLENGES

    OpenAIRE

    K. Lathika

    2016-01-01

    The internet of things (IoT) as the new influence to the human world and machine world is emerging as a new high tide wave in the development of internet. Internet of things is expected to have massive impact on the customer of electric equipment’s, business which will all be integrated and synchronized and also the fact is these are the early days. Looking at the potential of the wide suitability to all most all the vectors of the core areas like business, industries, manufacturing consumer...

  15. Addictive Potential of Internet Applications and Differential Correlates of Problematic Use in Internet Gamers versus Generalized Internet Users in a Representative Sample of Adolescents.

    Science.gov (United States)

    Rosenkranz, Tabea; Müller, Kai W; Dreier, Michael; Beutel, Manfred E; Wölfling, Klaus

    2017-01-01

    This paper examines the addictive potential of 8 different Internet applications, distinguishing male and female users. Moreover, differential correlates of problematic use are investigated in Internet gamers (IG) and generalized Internet users (GIU). In a representative sample of 5,667 adolescents aged 12-19 years, use of Internet applications, problematic Internet use, psychopathologic symptoms (emotional problems, hyperactivity/inattention, and psychosomatic complaints), personality (conscientiousness and extraversion), psychosocial correlates (perceived stress and self-efficacy), and coping strategies were assessed. The addictive potential of Internet applications was examined in boys and girls using regression analysis. MANOVAs were conducted to examine differential correlates of problematic Internet use between IG and GIU. Chatting and social networking most strongly predicted problematic Internet use in girls, while gaming was the strongest predictor in boys. Problematic IG exhibited multiple psychosocial problems compared to non-problematic IG. In problematic Internet users, GIU reported even higher psychosocial burden and displayed dysfunctional coping strategies more frequently than gamers. The results extend previous findings on the addictive potential of Internet applications and validate the proposed distinction between specific and generalized problematic Internet use. In addition to Internet gaming disorder, future studies should also focus on other highly addictive Internet applications, that is, chatting or social networking, regarding differential correlates of problematic use. © 2017 S. Karger AG, Basel.

  16. Internet applications, sites, trends and happenings

    Directory of Open Access Journals (Sweden)

    David Raitt

    2003-01-01

    Full Text Available This column aims to draw your attention to various interesting Web sites that I have come across and that may appeal to you. It also aims to keep you up to date with news and views on Internet trends, developments and statistics. It offers essentially a personal selection rather than comprehensive coverage.

  17. Application on Internet of Things Technology Using in Library Management

    Science.gov (United States)

    Liu, Xueqing; Sheng, Wenwen

    Following the computer, Internet and mobile communication network, the Internet of Things (IOT) will bring a new development of information industry, and moreover is a global technology revolution that is bound to have a profound impact on the economic development and social life. This paper analyzes the key technology and working principle of IOT, its development at home and abroad, its application in the library management, and proposes its development direction in the field of library management and promotion programs.

  18. Internet

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet. The latest communication revolution surrounds Internet. Some stats*:. 210 billion emails sent daily; 15 billion phone calls everyday; ~40 billion WWW links served everyday. * Source : The Radicati group.

  19. Internet of Things, Blockchain and Shared Economy Applications

    OpenAIRE

    Huckle, Steve; Bhattacharya, Rituparna; White, Martin; Beloff, Natalia

    2016-01-01

    This paper explores how the Internet of Things and blockchain technology can benefit shared economy applications. The focus of this research is understanding how blockchain can be exploited to create decentralised, shared economy applications that allow people to monetise, securely, their things to create more wealth. Shared economy applications such as Airbnb and Uber are well-known applications, but there are many other opportunities to share in the digital economy. With the recent interest...

  20. Adobe AIR, Bringing Rich Internet Applications to the Desktop

    Directory of Open Access Journals (Sweden)

    Valentin Vieriu

    2009-01-01

    Full Text Available Rich Internet Applications are the new trend in software development today. Adobe AIR offers the possibility to create cross-platform desktop applications using popular Web technologies like HTML, JavaScript, Flash and Flex. This article is focused on presenting the advantages that this new environment has to offer for the web development community and how quickly you can develop a desktop application using Adobe AIR.

  1. Adobe AIR, Bringing Rich Internet Applications to the Desktop

    OpenAIRE

    Vieriu, Valentin; Tuican, Catalin

    2009-01-01

    Rich Internet Applications are the new trend in software development today. Adobe AIR offers the possibility to create cross-platform desktop applications using popular Web technologies like HTML, JavaScript, Flash and Flex. This article is focused on presenting the advantages that this new environment has to offer for the web development community and how quickly you can develop a desktop application using Adobe AIR.

  2. Designing Interaction Spaces for Rich Internet Applications with UML

    DEFF Research Database (Denmark)

    Dolog, Peter; Stage, Jan

    2007-01-01

    In this paper, we propose a new method for designing rich internet applications. The design process uses results from an object-oriented analysis and employs interaction spaces as the basic abstraction mechanism. State diagrams are employed as refinements of interaction spaces and task models...

  3. A STUDY ON INTERNET OF THINGS APPLICATIONS AND RELATED ISSUES

    OpenAIRE

    Sandeep Kumar; Hemlata Dalmia

    2017-01-01

    Day by day Internet of Things (IoT) has gained a great attention from research community because of the importance of IoT technology in human life. IoT is a smart system which consists of different type of sensors and real world application connected with each other through internet via wired or wireless network structure. The IoT makes the world smart in every aspects means IoT gives the information regarding the surrounding condition of things with the help of technology i.e. smart home, sm...

  4. HTML5 Designing Rich Internet Applications

    CERN Document Server

    David, Matthew

    2010-01-01

    Implement the powerful new multimedia and interactive capabilities offered by HTML5, including style control tools, illustration tools, video, audio, and rich media solutions. Understand how HTML5 is changing the Web development game with this full-color, project-based treatment that shows you-not just tells you-what HTML5 can do for your Web sites. Reinforce your practical understanding of the new standard with demo applications and tutorials, so that execution is one short step away. The companion website, visualizetheweb.com, is packed full of extra information, online code libraries, and

  5. Internet applications in nuclear power plant operation management; Aplicaciones de internet en la gestion de la explotacion de centrales nucleares

    Energy Technology Data Exchange (ETDEWEB)

    Munoz, M. [Empresarios Agrupados, A. I. E. Madrid (Spain)

    2000-07-01

    The use of the Internet is quickly becoming widespread in practically all areas of business and industry. The nuclear industry should not remain indifferent to this new trend. This paper analyses some of the Internet applications that can be easily adapted to nuclear power plant operation management, including. (Author)

  6. IoF2020 - the Internet of Meat: towards applications of Internet of Things in the meat supply chain

    NARCIS (Netherlands)

    Maselyne, Jarissa; Mertens, Kristof; Nuffel, Annelies Van; Scholten, Huub; Athanasiadis, Ioannis N.; Larrañaga, Mikel; Fernández, Izaskun

    2017-01-01

    To enable all actors in the meat supply chain to monitor, manage and optimise their production process, Internet of Things applications create multiple opportunities. In the IoF2020 project (Internet of Food and Farm 2020), starting early 2017, 11 partners from five countries focus on large-scale

  7. Designing Privacy-aware Internet of Things Applications

    OpenAIRE

    Perera, Charith; Barhamgi, Mahmoud; Bandara, Arosha K.; Ajmal, Muhammad; Price, Blaine; Nuseibeh, Bashar

    2017-01-01

    Internet of Things (IoT) applications typically collect and analyse personal data that can be used to derive sensitive information about individuals. However, thus far, privacy concerns have not been explicitly considered in software engineering processes when designing IoT applications. In this paper, we explore how a Privacy-by-Design (PbD) framework, formulated as a set of guidelines, can help software engineers to design privacy-aware IoT applications. We studied the utility of our propos...

  8. Research on Key Technology and Applications for Internet of Things

    Science.gov (United States)

    Chen, Xian-Yi; Jin, Zhi-Gang

    The Internet of Things (IOT) has been paid more and more attention by the academe, industry, and government all over the world. The concept of IOT and the architecture of IOT are discussed. The key technologies of IOT, including Radio Frequency Identification technology, Electronic Product Code technology, and ZigBee technology are analyzed. The framework of digital agriculture application based on IOT is proposed.

  9. THE MAIN APPLICATIONS OF THE INTERNET IN TOURISM MARKETING

    OpenAIRE

    Beatrice Sion; Cezar Mihălcescu

    2010-01-01

    The Internet as a marketing media can be of great benefit to virtual all areas of marketing, from marketing research, through market segmentation, targeting and positioning, to the effective use of the marketing mix, and marketing organisation and control. The following discussion does not attempt to provide an exhaustive list of the Net's use in tourism; rather, it simply intends to exemplify its common applications in and main implications for tourism marketing.

  10. Internet of things cognitive transformation technology research trends and applications

    OpenAIRE

    Vermesan, Ovidiu; Eisenhauer, Markus; Sundmaeker, Harald; Guillemin, Patrick; Serrano, Martin; Tragos, Elias Z.; Valino, Javier; van der Wees, Arthur; Gluhak, Alex; Bahr, Roy

    2017-01-01

    The Internet of Things (IoT) is changing how industrial and consumer markets are developing. Robotic devices, drones and autonomous vehicles, blockchains, augmented and virtual reality, digital assistants and machine learning (artificial intelligence or AI) are the technologies that will provide the next phase of development of IoT applications. The combination of these disciplines makes possible the development of autonomous systems combining robotics and machine learning for designing simil...

  11. Semantic Reasoning for Context-aware Internet of Things Applications

    OpenAIRE

    Maarala, Altti Ilari; Su, Xiang; Riekki, Jukka

    2016-01-01

    Advances in ICT are bringing into reality the vision of a large number of uniquely identifiable, interconnected objects and things that gather information from diverse physical environments and deliver the information to a variety of innovative applications and services. These sensing objects and things form the Internet of Things (IoT) that can improve energy and cost efficiency and automation in many different industry fields such as transportation and logistics, health care and manufacturi...

  12. Internet

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    微软想要统治Internet,Windows XP就是这个计划中的一个组成部分。微软已经努力争取提供连接Internet的最方便、最完整的方法。新的操作系统含有Internet Explorer 6(IE6)、新的保密功能以及防火墙保护。Windows XP甚至包含有一个Macromedia Flash播放器插件。但是对Sun微系统公司的打击就是

  13. Smartphone applications for immersive virtual reality therapy for internet addiction and internet gaming disorder.

    Science.gov (United States)

    Zhang, Melvyn W B; Ho, Roger C M

    2017-01-01

    There have been rapid advances in technologies over the past decade and virtual reality technology is an area which is increasingly utilized as a healthcare intervention in many disciplines including that of Medicine, Surgery and Psychiatry. In Psychiatry, most of the current interventions involving the usage of virtual reality technology is limited to its application for anxiety disorders. With the advances in technology, Internet addiction and Internet gaming disorders are increasingly prevalent. To date, these disorders are still being treated using conventional psychotherapy methods such as cognitive behavioural therapy. However, there is an increasing number of research combining various other therapies alongside with cognitive behavioural therapy, as an attempt possibly to reduce the drop-out rates and to make such interventions more relevant to the targeted group of addicts, who are mostly adolescents. To date, there has been a prior study done in Korea that has demonstrated the comparable efficacy of virtual reality therapy with that of cognitive behavioural therapy. However, the intervention requires the usage of specialized screens and devices. It is thus the objective of the current article to highlight how smartphone applications could be designed and be utilized for immersive virtual reality treatment, alongside low cost wearables.

  14. Future internet applications: The next trillion to be connected

    CSIR Research Space (South Africa)

    Coetzee, L

    2012-10-01

    Full Text Available Constrained network Application IoT platform: management services, access control, resource management, security, Open API Constrained network ? Platform manages resources and provides enabling services and open APIs ? Provides for software...://popsci.typepad.com/popsci/2007/09/rfid-implants-m.html http://www.weathershop.co.uk/shop/replacement-temp-sensor-thr228n-sensor IoT == Phenomenon This phenomenon is called... The Internet of Things ? CSIR 2012 Slide 4 Imagine the Possibilities.. ...when Any-one, Any...

  15. Freeform Compliant CMOS Electronic Systems for Internet of Everything Applications

    KAUST Repository

    Shaikh, Sohail F.

    2017-01-17

    The state-of-the-art electronics technology has been an integral part of modern advances. The prevalent rise of the mobile device and computational technology in the age of information technology offers exciting applications that are attributed to sophisticated, enormously reliable, and most mature CMOS-based electronics. We are accustomed to high performance, cost-effective, multifunctional, and energy-efficient scaled electronics. However, they are rigid, bulky, and brittle. The convolution of flexibility and stretchability in electronics for emerging Internet of Everything application can unleash smart application horizon in unexplored areas, such as robotics, healthcare, smart cities, transport, and entertainment systems. While flexible and stretchable device themes are being remarkably chased, the realization of the fully compliant electronic system is unaddressed. Integration of data processing, storage, communication, and energy management devices complements a compliant system. Here, a comprehensive review is presented on necessity and design criteria for freeform (physically flexible and stretchable) compliant high-performance CMOS electronic systems.

  16. The Internet of Things Technology Development and Application -- Zhengzhou Airport as An Example

    Directory of Open Access Journals (Sweden)

    Hu Songlin

    2017-01-01

    Full Text Available In order to understand the trend of the development of the Internet of things, and the role of development and construction in the future,this article introduces the developing situation of the Internet of things at home and abroad. Summarizes the architecture and key technologies of iot, this paper expounds the application of the Internet of things, the last development of the Internet of things industry of our country is prospected. Combining with the development of the Internet of things industry area, zhengzhou air port development makes us on the Internet of things has a comprehensive and accurate understanding and awareness.

  17. Measurement and Statistics of Application Business in Complex Internet

    Science.gov (United States)

    Wang, Lei; Li, Yang; Li, Yipeng; Wu, Shuhang; Song, Shiji; Ren, Yong

    Owing to independent topologies and autonomic routing mechanism, the logical networks formed by Internet application business behavior cause the significant influence on the physical networks. In this paper, the backbone traffic of TUNET (Tsinghua University Networks) is measured, further more, the two most important application business: HTTP and P2P are analyzed at IP-packet level. It is shown that uplink HTTP and P2P packets behavior presents spatio-temporal power-law characteristics with exponents 1.25 and 1.53 respectively. Downlink HTTP packets behavior also presents power-law characteristics, but has more little exponents γ = 0.82 which differs from traditional complex networks research result. Moreover, downlink P2P packets distribution presents an approximate power-law which means that flow equilibrium profits little from distributed peer-to peer mechanism actually.

  18. Direct Deposit Applications filed via the Internet - FY 2016 (53rd week)

    Data.gov (United States)

    Social Security Administration — This dataset provides monthly volumes at the national level from federal fiscal year 2016 for Internet Direct Deposit applications. This dataset includes data from...

  19. Research on Application of Internet of Things in the Disposal of Environmental Emergency

    Directory of Open Access Journals (Sweden)

    Zhu Yanju

    2015-01-01

    Full Text Available Internet of things is an important part of a new generation of information technology and also an important stage of Information Age. Application of Internet of things in the disposal of environmental emergency is an inevitable trend of application of Internet of things in the field of environmental protection. This paper summarizes the principle, process and application field of Internet of things, and focuses on the general frame-work of environmental emergency disposal system based on Internet of things and further analyses the factors of restricting application of Internet of things in the disposal of environmental emergency. At last, the suggestions and countermeasures to optimize environmental emergency disposal system are proposed.

  20. The application of the Internet of Things to animal ecology.

    Science.gov (United States)

    Guo, Songtao; Qiang, Min; Luan, Xiaorui; Xu, Pengfei; He, Gang; Yin, Xiaoyan; Xi, Luo; Jin, Xuelin; Shao, Jianbin; Chen, Xiaojiang; Fang, Dingyi; Li, Baoguo

    2015-11-01

    For ecologists, understanding the reaction of animals to environmental changes is critical. Using networked sensor technology to measure wildlife and environmental parameters can provide accurate, real-time and comprehensive data for monitoring, research and conservation of wildlife. This paper reviews: (i) conventional detection technology; (ii) concepts and applications of the Internet of Things (IoT) in animal ecology; and (iii) the advantages and disadvantages of IoT. The current theoretical limits of IoT in animal ecology are also discussed. Although IoT offers a new direction in animal ecological research, it still needs to be further explored and developed as a theoretical system and applied to the appropriate scientific frameworks for understanding animal ecology. © 2015 International Society of Zoological Sciences, Institute of Zoology/Chinese Academy of Sciences and Wiley Publishing Asia Pty Ltd.

  1. Internet application: production-technical information system MoNET

    International Nuclear Information System (INIS)

    Tomiga, J.

    2004-01-01

    MoNET is the production-technical information system supporting engineering, operational and maintenance processes of distribution network administrator. It utilizes the model of distribution network that is situated in the geo-space relational database. The geo-space database represents an information base of operational-technical processes. It contains elements and equipment s of the distribution network, failures, operational events, maintenance records, but also, parcels, reference planimetry, e.g. and other subjects for which is relevant the positional datum - geo-space information. MoNET is typically exploited in the fields: - evidence of the subjects and equipment of network, technical documentation; - property administration; - planning of network development, support of designing and construction; - technical calculation; - breakdown controller centre; - maintenance management. MoNET can be implemented as the desktop application, however its first benefit is derived from its usage as the intranet application MoNET WEB for the whole enterprise or organisation. This version enables an unrestricted number of end-users to enter this system. The end-users don't need any special software to enter the data of MoNet WEB application, the pre-installed Internet Explorer will do. (author)

  2. 77 FR 74278 - Proposed Information Collection (Internet Student CPR Web Registration Application); Comment Request

    Science.gov (United States)

    2012-12-13

    ... (Internet Student CPR Web Registration Application); Comment Request AGENCY: Veterans Health Administration.... Title: Internet Student CPR Web Registration Application, VA Form 10-0468. OMB Control Number: 2900-0746... Minneapolis VA Medical Center Education Service. Students will be able to identify and register for a training...

  3. The application of the Internet of Things and Physical Internet in Norwegian aquaculture supply chains

    OpenAIRE

    Ødegaard, Andreas; Dåvøy, Simon

    2016-01-01

    Master's thesis in Strategy and Management The topic for this master thesis is Supply Chain Management within the Norwegian aquaculture industry. The thesis aims to examine how the industry can make use of aspects within the Internet of Things and Physical Internet in order to improve their supply chains. Moreover, the thesis identifies and defines three main factors affecting the customers purchasing decision; namely quality, time, and price. These factors are interconnected, and inf...

  4. Internet of Things Technology and its Applications in Smart Grid

    OpenAIRE

    Liu Hua; Zhang Junguo; Lin Fantao

    2013-01-01

    Smart grid is the latest trend of development and reform in today’s world, and it is also a major technological innovation and development trend in the 21st century. Internet of Things technology is a new information processing and acquisition method, and it has been widely used in intelligent transportation, environmental monitoring and other fields. Internet of Things is an important technical mean to promote the development of smart grid. Using Internet of Things technology can effectively...

  5. Potential applications of the Internet of Things in sustainable rural development in South Africa

    CSIR Research Space (South Africa)

    Dlodlo, N

    2012-05-01

    Full Text Available Conference of Information Science and Computer Applications (ICISCA), Bali, Indonesia, 19-20 November 2012 Potential applications of the Internet of Things in sustainable rural development in South Africa Nomusa Dlodlo and Mofolo Mofolo CSIR...

  6. CMOS-Technology-Enabled Flexible and Stretchable Electronics for Internet of Everything Applications

    KAUST Repository

    Hussain, Aftab M.; Hussain, Muhammad Mustafa

    2015-01-01

    Flexible and stretchable electronics can dramatically enhance the application of electronics for the emerging Internet of Everything applications where people, processes, data and devices will be integrated and connected, to augment quality of life

  7. Internet of Things: Concept, Building blocks, Applications and Challenges

    OpenAIRE

    Abdmeziem, Riad; Tandjaoui, Djamel

    2014-01-01

    Internet of things (IoT) constitutes one of the most important technology that has the potential to affect deeply our way of life, after mobile phones and Internet. The basic idea is that every objet that is around us will be part of the network (Internet), interacting to reach a common goal. In another word, the Internet of Things concept aims to link the physical world to the digital one. Technology advances along with popular demand will foster the wide spread deployement of IoT's services...

  8. Study on the application of mobile internet cloud computing platform

    Science.gov (United States)

    Gong, Songchun; Fu, Songyin; Chen, Zheng

    2012-04-01

    The innovative development of computer technology promotes the application of the cloud computing platform, which actually is the substitution and exchange of a sort of resource service models and meets the needs of users on the utilization of different resources after changes and adjustments of multiple aspects. "Cloud computing" owns advantages in many aspects which not merely reduce the difficulties to apply the operating system and also make it easy for users to search, acquire and process the resources. In accordance with this point, the author takes the management of digital libraries as the research focus in this paper, and analyzes the key technologies of the mobile internet cloud computing platform in the operation process. The popularization and promotion of computer technology drive people to create the digital library models, and its core idea is to strengthen the optimal management of the library resource information through computers and construct an inquiry and search platform with high performance, allowing the users to access to the necessary information resources at any time. However, the cloud computing is able to promote the computations within the computers to distribute in a large number of distributed computers, and hence implement the connection service of multiple computers. The digital libraries, as a typical representative of the applications of the cloud computing, can be used to carry out an analysis on the key technologies of the cloud computing.

  9. Application Platforms for the Internet of Things: Theory, Architecture, Protocols, Data Formats, and Privacy

    OpenAIRE

    Collina, Matteo

    2014-01-01

    The Internet of Things (IoT) is the next industrial revolution: we will interact naturally with real and virtual devices as a key part of our daily life. This technology shift is expected to be greater than the Web and Mobile combined. As extremely different technologies are needed to build connected devices, the Internet of Things field is a junction between electronics, telecommunications and software engineering. Internet of Things application development happens in silos, often using p...

  10. Mobile internet technologies and their application to intelligent transportation systems

    Science.gov (United States)

    2003-01-01

    The worlds of mobile communication and the Internet are rapidly converging. This new domain, which is being touted as the "Wireless Web" or "Mobile Internet", is in its infancy and will require a number of complex technologies to mature and converge ...

  11. Internet: Education and Application for the Knowledge Warrior

    Science.gov (United States)

    1995-05-01

    Demonstrate the ability to execute basic Telnet and FTP actions on the seminar computer . INTERNET / INFORMATION TECHNOLOGY (IT) COURSE OBJECTIVES: 1...and FTP actions on the seminar computer . INTERNET / INFORMATION TECHNOLOGY (IT) COURSE OBJECTIVES: 1. Comprehend the concept and capabilities of...have information on demand for future conflicts.9 As computer and telecommunications technologies continue to expand, they are redefining the way

  12. Internet Factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  13. Internet factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  14. Analysis of Camera Arrays Applicable to the Internet of Things.

    Science.gov (United States)

    Yang, Jiachen; Xu, Ru; Lv, Zhihan; Song, Houbing

    2016-03-22

    The Internet of Things is built based on various sensors and networks. Sensors for stereo capture are essential for acquiring information and have been applied in different fields. In this paper, we focus on the camera modeling and analysis, which is very important for stereo display and helps with viewing. We model two kinds of cameras, a parallel and a converged one, and analyze the difference between them in vertical and horizontal parallax. Even though different kinds of camera arrays are used in various applications and analyzed in the research work, there are few discussions on the comparison of them. Therefore, we make a detailed analysis about their performance over different shooting distances. From our analysis, we find that the threshold of shooting distance for converged cameras is 7 m. In addition, we design a camera array in our work that can be used as a parallel camera array, as well as a converged camera array and take some images and videos with it to identify the threshold.

  15. Principles and Application of Geographic Information Systems and Internet/Intranet Technology

    Science.gov (United States)

    2001-04-01

    technology enables the introduction of GIS based services which can be used in Intranets and in the Internet. For these services recently also eCommerce ...114 Figure 5: GIS and Internet example of USGS (screenshot) Some of these application are using eCommerce techniques and products to allow for a more

  16. Preschool Teachers' Attitudes toward Internet Applications for Professional Development in Taiwan

    Science.gov (United States)

    Chen, Ru-Si

    2016-01-01

    This study focuses on preschool teachers' attitudes toward integrated Internet applications for professional development by a survey in Taiwan. The researcher developed a survey questionnaire consisting of five factors: usefulness, effectiveness, behavioral intention, Internet connection, and professional competence. This study analyzed the survey…

  17. Safe and reliable solutions for Internet application in power sector

    International Nuclear Information System (INIS)

    Eichelburg, W. K.

    2004-01-01

    The requirements for communication of various information systems (control systems, EMS, ERP) continually increase. Internet is prevailingly a Universal communication device for interconnection of the distant systems at the present. However, the communication with the outside world is important, the internal system must be protected safely and reliably. The goal of the article is to inform the experienced participants with the verified solutions of the safe and reliable Internet utilization for interconnection of control systems on the superior level, the distant management, the diagnostic and for interconnection of information systems. An added value is represented by the solutions using Internet for image and sound transmission. (author)

  18. Computer and internet use in vascular outpatients--ready for interactive applications?

    Science.gov (United States)

    Richter, J G; Schneider, M; Klein-Weigel, P

    2009-11-01

    Exploring patients' computer and internet use, their expectations and attitudes is mandatory for successful introduction of interactive online health-care applications in Angiology. We included 165 outpatients suffering from peripheral arterial disease (PAD; n = 62) and chronic venous and / or lymphatic disease (CVLD; n = 103) in a cross-sectional-study. Patients answered a paper-based questionnaire. Patients were predominantly female (54.5%). 142 (86.1%) reported regular computer use for 9.7 +/- 5.8 years and 134 (81.2 %) used the internet for 6.2 +/- 3.6 years. CVLD-patients and internet-user were younger and higher educated, resulting in a significant difference in computer and internet use between the disease groups (p internet users without significant differences between the groups. The topics retrieved from the internet covered a wide spectrum and searches for health information were mentioned by 41.2 %. Although confidence in the internet (3.3 +/- 1.1 on a 1-6 Likert scale) and reliability in information retrieved from the internet (3.1 +/- 1.1) were relatively low, health-related issues were of high actual and future interest. 42.8% of the patients were even interested in interactive applications like health educational programs, 37.4% in self-reported assessments and outcome questionnaires and 26.9% in chatforums; 50% demanded access to their medical data on an Internetserver. Compared to older participants those internet more often for shopping, chatting, and e-mailing, but not for health information retrieval and interactive applications. Computers are commonly used and the internet has been adopted as an important source of information by patients suffering from PAD and CVLD. Besides, the internet offers great potentials and new opportunities for interactive disease (self-)management in angiology. To increase confidence and reliability in the medium a careful introduction and evaluation of these new online applications is mandatory.

  19. An application of TOPSIS for ranking internet web browsers

    Directory of Open Access Journals (Sweden)

    Shahram Rostampour

    2012-07-01

    Full Text Available Web browser is one of the most important internet facilities for surfing the internet. A good web browser must incorporate literally tens of features such as integrated search engine, automatic updates, etc. Each year, ten web browsers are formally introduced as top best reviewers by some organizations. In this paper, we propose the implementation of TOPSIS technique to rank ten web browsers. The proposed model of this paper uses five criteria including speed, features, security, technical support and supported configurations. In terms of speed, Safari is the best web reviewer followed by Google Chrome and Internet Explorer while Opera is the best web reviewer when we look into 20 different features. We have also ranked these web browsers using all five categories together and the results indicate that Opera, Internet explorer, Firefox and Google Chrome are the best web browsers to be chosen.

  20. Managing the Internet of Things architectures, theories, and applications

    CERN Document Server

    Hua, Kun

    2016-01-01

    The implementation and deployment of the Internet of Things (IoT) brings with it management challenges around seamless integration, heterogeneity, scalability, mobility, security, and many other issues. This comprehensive book explores these challenges and looks at possible solutions.

  1. Internet of Things Applications on Supply Chain Management

    OpenAIRE

    B. Cortés; A. Boza; D. Pérez; L. Cuenca

    2015-01-01

    The Internet of Things (IoT) field has been applied in industries with different purposes. Sensing Enterprise (SE) is an attribute of an enterprise or a network that allows it to react to business stimuli originating on the Internet. These fields have come into focus recently on the enterprises, and there is some evidence of the use and implications in supply chain management, while finding it as an interesting aspect to work on. This paper presents a revision and proposa...

  2. The Mobile Application Social Mode of Manufacturing Enterprise under the Environment of Mobile Internet

    Directory of Open Access Journals (Sweden)

    Zuo Cen

    2017-01-01

    Full Text Available The rapid development of the mobile internet, mobile communication technology and mobile terminal stimulate demand of mobile application in manufacturing enterprises, which makes the enterprise implement the mobile ERP. The implementation of mobile ERP changes the internal application management of manufacturing enterprises to social applications. We analyse the driving factors of implementing the mobile application social mode considering the complexity of organization relations and business processes of manufacturing enterprise. And then the mobile application social mode of the manufacturing enterprise is built based on mobile internet. Finally, we present the management strategies of the mobile application social network to provide references for the manufacturing enterprise.

  3. Application of a forum on the internet for risk communications

    International Nuclear Information System (INIS)

    Takizawa, Masayuki; Shobu, Nobuhiro

    2003-01-01

    A case of 'internet forum' that various kinds of person can exchange views on the theme of geological disposal on the internet is explained. It is managed by a third organization such as Mitsubishi Research Institute, Inc. To exchange views as fast as possible, on the basis of individual opinion, a private person or an acting partner can contribute to it without one's position. User ID and input password are need. Target is selected as the industries related to geological disposal in the nuclear power field, person interested in garbage problem, environmental problems, geological disposal and students in Japan. The construction of site has been modified on the basis of various viewpoints. The cumulative access number is increasing from 76 to 414 in the fiscal 1998 to 2000. The important factor on the internet forum is neutrality of site management, individual opinion, joining many participants. A questionnaire was carried out by 1000 person using internet. The results of questionnaire are reported. (S.Y.)

  4. [Design and Application of High-risk Pregnancy Monitoring & Warning Internet Platform Based on Internet of Things].

    Science.gov (United States)

    Lu, Heqing; Zhang, Xiaofeng; Li, Bin

    2017-09-30

    Through illustrating the designing of high-risk pregnancy maternal-fetal monitoring system based on the internet of things, this paper introduced the specific application of using wearable medical devices to provide maternal-fetal mobile medical services. With the help of big data and cloud obstetrics platform, the monitoring and warning network was further improved, the level-to-level administration of high-risk pregnancy was realized, the level of perinatal health care was enhanced and the risk of critical emergency of pregnancy decreased.

  5. Broadband wireless communications for railway applications for onboard internet access and other applications

    CERN Document Server

    Masson, Émilie

    2017-01-01

    This book focuses on the needs of railway operators in terms of wireless communications, divided in two main categories: the commercial services and the operational needs. Then, all available technologies that can be used to provide Internet access on board trains and all the other operational applications requiring high capacity are detailed. Finally, challenges and trends in railway telecommunications are highlighted, through the presentation of the future and emerging technologies, the current discussions and works in the different authorities, and the key challenges and scientific barriers.

  6. The monitoring and managing application of cloud computing based on Internet of Things.

    Science.gov (United States)

    Luo, Shiliang; Ren, Bin

    2016-07-01

    Cloud computing and the Internet of Things are the two hot points in the Internet application field. The application of the two new technologies is in hot discussion and research, but quite less on the field of medical monitoring and managing application. Thus, in this paper, we study and analyze the application of cloud computing and the Internet of Things on the medical field. And we manage to make a combination of the two techniques in the medical monitoring and managing field. The model architecture for remote monitoring cloud platform of healthcare information (RMCPHI) was established firstly. Then the RMCPHI architecture was analyzed. Finally an efficient PSOSAA algorithm was proposed for the medical monitoring and managing application of cloud computing. Simulation results showed that our proposed scheme can improve the efficiency about 50%. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  7. Research on the Orientation and Application of Distributed Energy Storage in Energy Internet

    Science.gov (United States)

    Zeng, Ming; Zhou, Pengcheng; Li, Ran; Zhou, Jingjing; Chen, Tao; Li, Zhe

    2018-01-01

    Energy storage is indispensable resources to achieve a high proportion of new energy power consumption in electric power system. As an important support to energy Internet, energy storage system can achieve a variety of energy integration operation to ensure maximum energy efficiency. In this paper, firstly, the SWOT analysis method is used to express the internal and external advantages and disadvantages of distributed energy storage participating in the energy Internet. Secondly, the function orientation of distributed energy storage in energy Internet is studied, based on which the application modes of distributed energy storage in virtual power plant, community energy storage and auxiliary services are deeply studied. Finally, this paper puts forward the development strategy of distributed energy storage which is suitable for the development of China’s energy Internet, and summarizes and prospects the application of distributed energy storage system.

  8. Characteristics of the Application of the Criminal Law for Crimes, Committed in the Internet

    Directory of Open Access Journals (Sweden)

    Anton A. Komarov

    2016-11-01

    Full Text Available The article analyzes the basic postulates of the principle of territorial application of criminal law in space in relation to the global computer network – Internet. As part of the comparative legal method various approaches of American, German, Russian forensic scientists to the resolution of conflicts regarding the infrastructure of the Internet, computer information and features of the action of the national criminal law in these countries are analyzed.

  9. TIME TO ABANDON INTERNET ADDICTION? PREDICTING PROBLEMATIC INTERNET, GAME, AND SOCIAL MEDIA USE FROM PSYCHOSOCIAL WELL-BEING AND APPLICATION USE

    OpenAIRE

    van Rooij, Antonius J.; Ferguson, Christopher J.; van de Mheen, Dike; Schoenmakers, Tim M.

    2017-01-01

    Objective: There have long been indications that those with problems controlling their Internet use manifest those problems in relation to specific applications. The current study empirically explores the option of abandoning a unified approach to problematic ‘Internet use’, by splitting the concept into more specific application level measurement. Method: The current study used self-report survey data, collected from Dutch adolescents (aged 12-15, N=3945). Two Structural Equation Models p...

  10. Professional BlazeDS Creating Rich Internet Applications with Flex and Java

    CERN Document Server

    Tiwari, Shashank

    2009-01-01

    A hands-on guide to creating Rich Internet Applications (RIA) using BlazeDS. BlazeDS enables you to easily connect to back-end distributed data and push data in real time to Adobe Flex and Adobe AIR applications in order to garner more responsive Rich Internet Application (RIA) experiences. It is a scalable option for Flex and Java integration and allows you to create excellent RIAs with both Flex and Java. This informative resource provides you with detailed examples and walkthroughs that explain the best practices for creating RIAs using BlazeDS. You'll begin with the essentials of BlazeDS a

  11. TIME TO ABANDON INTERNET ADDICTION? PREDICTING PROBLEMATIC INTERNET, GAME, AND SOCIAL MEDIA USE FROM PSYCHOSOCIAL WELL-BEING AND APPLICATION USE

    Directory of Open Access Journals (Sweden)

    Antonius J. van Rooij

    2017-02-01

    Full Text Available Objective: There have long been indications that those with problems controlling their Internet use manifest those problems in relation to specific applications. The current study empirically explores the option of abandoning a unified approach to problematic ‘Internet use’, by splitting the concept into more specific application level measurement. Method: The current study used self-report survey data, collected from Dutch adolescents (aged 12-15, N=3945. Two Structural Equation Models predicted either problematic Internet use (model 1 or both problematic game use and problematic social media use (model 2. Problematic use of the Internet/games/social media was assessed with three abbreviated 6-item versions of the CIUS. Predictors included computer-activity use type in hours per week, depressive mood, loneliness, social anxiety, negative self-esteem, and general life-satisfaction. Results: Problematic Internet use was associated with both social and gaming activities, as well as depressive mood. In the split model, problematic social media use was associated with three types of social, Internet behavior (social networking, Twitter, and instant messenger and depressive mood, while problematic gaming was associated with both online (Internet and offline gaming, as well as by gender (male and depressive mood. Conclusions: The more specific problematic social media use and problematic game use measures provide a less ambiguous and clearer picture that also reveals the role of gender within problematic game use. This provides some evidence to support splitting up measures of problematic Internet use into more specific measures in the future.

  12. The adaptive internet application for interpretation of the transformer oil gas chromatographic analysis results

    Directory of Open Access Journals (Sweden)

    Polužanski Vladimir

    2015-01-01

    Full Text Available This paper describes an adaptive Internet application for the interpretation of the transformer oil gas chromatographic analysis results. The first version of the application is developed by following an evolutionary software development concept. The most important software development risks and the appropriate solutions are described. An open-source web framework named Bootstrap is used for an application implementation. The application is developed by using ASP.NET and MS SQL server.

  13. Research on Application of Automatic Weather Station Based on Internet of Things

    Science.gov (United States)

    Jianyun, Chen; Yunfan, Sun; Chunyan, Lin

    2017-12-01

    In this paper, the Internet of Things is briefly introduced, and then its application in the weather station is studied. A method of data acquisition and transmission based on NB-iot communication mode is proposed, Introduction of Internet of things technology, Sensor digital and independent power supply as the technical basis, In the construction of Automatic To realize the intelligent interconnection of the automatic weather station, and then to form an automatic weather station based on the Internet of things. A network structure of automatic weather station based on Internet of things technology is constructed to realize the independent operation of intelligent sensors and wireless data transmission. Research on networking data collection and dissemination of meteorological data, through the data platform for data analysis, the preliminary work of meteorological information publishing standards, networking of meteorological information receiving terminal provides the data interface, to the wisdom of the city, the wisdom of the purpose of the meteorological service.

  14. Internet technology for clinical application in a digital radiology department

    International Nuclear Information System (INIS)

    Bergh, B.; Pietsch, M.; Vogl, T.J.

    2000-01-01

    Problem: To provide an overview and to assess the clinical feasibility of internet technology-based systems for hospital-wide image and report distribution as well as for video conferencing. Methods: The paper describes the theoretical concept behind, the various technical approaches and the experience gained from different systems. Results: Image and report distribution: Advantages include the universal availability of images and reports inside and outside hospitals; ease of use; security features; image and report integration; cost savings by reducing support and training efforts and by optimising available hardware. The main critical issues are performance and workflow integration with RIS and PACS. Video conferencing: Main advantages are the standardised, software-based approach and the low investments for hard- and software. Depending on the desired usage the communication performance can be seen as inappropriate. Conclusion: Today, internet technology-based systems appear to satisfy the main clinical needs in radiology. The mentioned drawbacks could be eliminated by means of modified software implementation and focused standardisation efforts. Considering the numerous advantages of these systems a further distribution can be expected for the future. (orig.) [de

  15. Pro Internet Explorer 8 & 9 Development Developing Powerful Applications for the Next Generation of IE

    CERN Document Server

    Crowley, Matthew

    2010-01-01

    This book is an in-depth guide to writing applications that embrace and extend the new features and capabilities of Windows Internet Explorer 8 and 9. With solid instruction, hands-on examples, and expert insight direct from the source into extending the browser, you'll learn how to create and maintain powerful applications for Microsoft's next-generation Internet platform. Join author Matthew Crowley as you discover how to take advantage of new features like accelerators, WebSlices, and search providers, and create intense web experiences for the browser that ships by default with the popular

  16. Application to an Internet site in radiation protection

    International Nuclear Information System (INIS)

    Gambini, D.J.; Baum, T.P.; Spector, M.; Elgard, M.C.; Mechaly, Y.; Grainer, R.; Barritault, L.

    1997-01-01

    Training specialists in medical radiation protection is ensured by the Continuous Training Center of University Rene Descartes since 1990. The necessity of updating knowledge has urged us to develop an Internet site (http://www.citi2.fr/RADIO). Besides the mandatory functions of the educational management (secretariat, information on the stages, registrations, etc.) this site provides: 1. Practical information (addresses of administrative and technical organisms, presentation of radiation protection programs); 2. Scientific information (bibliographic bulletin of the EDF service of radiation protection, updated every two months, description of recent radiation protection works); 3. Institutional documentation (analysis of recent basic texts, ICRP publications, European directives). The interrogation of general interest asked via e-mail and forum allowing communication between experts, graduated students and the education faculty will be available on the site. The communication will be augmented by tele-formation modules for continuous distant training

  17. Internet of Things and Artificial Vision, Performance and Applications: Literature Review

    Directory of Open Access Journals (Sweden)

    Vanessa Alvear-Puertas

    2017-02-01

    Full Text Available Internet of Things (or also known as IoT is one of the technologies most named today because of the ability it envisages to connect all kinds of devices to the Internet. If to the potentialities of IoT we add another technology of high impact as It is the Artificial Vision we have a wide field of innovative applications, where the processing of images and video in real time allow the visualization of large amounts of data on the Internet. The main applications developed with IoT and Artificial Vision can be implemented in education, medicine, intelligent buildings, surveillance systems of people and vehicles, among others. This type of applications improves the quality of life of users, however, for their development an infrastructure is required that allows the convergence of different protocols and devices, but in a special way that can handle the different phases of the acquisition of images. In this work, a review of the beginnings, concepts, technologies and applications related to the Artificial Vision with the Internet of Things has been carried out to be able to understand in a precise way the impact of its application in daily life.

  18. Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications

    Science.gov (United States)

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2014-05-01

    Mobile cloud computing is receiving world-wide momentum for ubiquitous on-demand cloud services for mobile users provided by Amazon, Google etc. with low capital cost. However, Internet-centric clouds introduce wide area network (WAN) delays that are often intolerable for real-time applications such as video streaming. One promising approach to addressing this challenge is to deploy decentralized mini-cloud facility known as cloudlets to enable localized cloud services. When supported by local wireless connectivity, a wireless cloudlet is expected to offer low cost and high performance cloud services for the users. In this work, we implement a realistic framework that comprises both a popular Internet cloud (Amazon Cloud) and a real-world cloudlet (based on Ubuntu Enterprise Cloud (UEC)) for mobile cloud users in a wireless mesh network. We focus on real-time video streaming over the HTTP standard and implement a typical application. We further perform a comprehensive comparative analysis and empirical evaluation of the application's performance when it is delivered over the Internet cloud and the cloudlet respectively. The study quantifies the influence of the two different cloud networking architectures on supporting real-time video streaming. We also enable movement of the users in the wireless mesh network and investigate the effect of user's mobility on mobile cloud computing over the cloudlet and Amazon cloud respectively. Our experimental results demonstrate the advantages of the cloudlet paradigm over its Internet cloud counterpart in supporting the quality of service of real-time applications.

  19. Innovative Second Language Speaking Practice with Interactive Videos in a Rich Internet Application Environment

    Science.gov (United States)

    Pereira, Juan A.; Sanz-Santamaría, Silvia; Montero, Raúl; Gutiérrez, Julián

    2012-01-01

    Attaining a satisfactory level of oral communication in a second language is a laborious process. In this action research paper we describe a new method applied through the use of interactive videos and the Babelium Project Rich Internet Application (RIA), which allows students to practice speaking skills through a variety of exercises. We present…

  20. Application Use, Online Relationship Types, Self-Disclosure, and Internet Abuse among Children and Youth: Implications for Education and Internet Safety Programs

    Science.gov (United States)

    Blau, Ina

    2011-01-01

    This study explores the relationships between Internet abuse (IA)--self-disclosure, online application usage, and relationship types--traditional long-distance, purely virtual, and migratory mixed-mode. An online questionnaire was administered to 2884 children and youth. According to the hypotheses, applications differed in their relationships…

  1. Research on the application of the internet of things in reverse logistics information management

    Directory of Open Access Journals (Sweden)

    Yuexia Gu

    2013-09-01

    Full Text Available Objective: Combined the current situation with the development trend of reverse logistics, the article focus on the research of Internet of Things application in the reverse logistics information management, starts with the study of reverse logistics information system, and describes the system structure and system process in applying Internet of Things in reverse logistics information management, finally brings forward the constraints like management and economic ones in applying the technology to the system. Research methods: By analyzing the current situation of reverse logistics information system, utilizing literature research methods to put forward characters of reverse logistics information system, and expanding the previous studies on Internet information transmission, we gradually establish the reverse logistics management information system on the basis of the application of Internet of Things. Research Results: Through applying the Internet of Things in the reverse logistics system, we can build a complete close-loop logistics system by linking both extreme ends of positive and negative logistics. Besides, the system will be engaged in data mining in backflow prediction data and re-processing data at regular and irregular intervals. Moreover, advice will be provided to design, purchase, manufacturing and customer service departments for their reference so as to promote respective business. Research Application and Limits: This paper focuses on how the enterprise should apply the Internet of Things technology in reverse logistics, and how to build this system in detail and what the flow planning is made. This thesis is only limited to the analysis of constraints impeding the development of the reverse logistics MIS, including management constraints, economic constraints, hardware technology, data security and rights management constraints. Detailed solutions to address these problems will be put forward in the further research.

  2. Adobe AIR 15 Cookbook Solutions and Examples for Rich Internet Application Developers

    CERN Document Server

    Tucker, David; DeWeggheleire, Koen

    2008-01-01

    The hands-on recipes in this cookbook help you solve a variety of tasks and scenarios often encountered when using Adobe AIR to build Rich Internet Applications for the desktop. Thoroughly vetted by Adobe's AIR development team, Adobe AIR 1.5 Cookbook addresses fundamentals, best practices, and more. If you want to learn the nuances of Adobe AIR to build innovative applications, this is the book you've been waiting for.

  3. Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture

    Directory of Open Access Journals (Sweden)

    Francisco Javier Ferrández-Pastor

    2016-07-01

    Full Text Available The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water; however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols, the evolution of Internet technologies (Internet of Things and ubiquitous computing (Ubiquitous Sensor Networks allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists when a project is launched.

  4. The Development of Key Technologies in Applications of Vessels Connected to the Internet

    Directory of Open Access Journals (Sweden)

    Zhe Tian

    2017-10-01

    Full Text Available With the development of science and technology, traffic perception, communication, information processing, artificial intelligence and the shipping information system have become important in supporting the realization of intelligent shipping transportation. Against this background, the Internet of Vessels (IoV is proposed to integrate all these advanced technologies into a platform to meet the requirements of international and regional transportations. The purpose of this paper is to analyze how to benefit from the Internet of Vessels to improve the efficiency and safety of shipping, and promote the development of world transportation. In this paper, the IoV is introduced and its main architectures are outlined. Furthermore, the characteristics of the Internet of Vessels are described. Several important applications that illustrate the interaction of the Internet of Vessels’ components are proposed. Due to the development of the Internet of Vessels still being in its primary stage, challenges and prospects are identified and addressed. Finally, the main conclusions are drawn and future research priorities are provided for reference and as professional suggestions for future researchers in this field.

  5. Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture.

    Science.gov (United States)

    Ferrández-Pastor, Francisco Javier; García-Chamizo, Juan Manuel; Nieto-Hidalgo, Mario; Mora-Pascual, Jerónimo; Mora-Martínez, José

    2016-07-22

    The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched.

  6. SPIAR: an architectural style for single page internet applications

    NARCIS (Netherlands)

    A. Mesbah (Ali); K. Broenink; A. van Deursen (Arie)

    2006-01-01

    textabstractA new breed of Web application, dubbed AJAX, is emerging in response to a limited degree of interactivity in large-grain stateless Web interactions. At the heart of this new approach lies a single page interaction model that facilitates rich interactivity. In this paper, we examine the

  7. Smart Connectivity for Internet of Things (IoT) Applications

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Sarkar, Mahasweta

    2017-01-01

    billions of devices through a myriad of technologies for the delivery of smart personalized services and applications. The main challenges and distinctive features of this scenario are the large amount of information gathered from the ambient environment and the human body that must be processed ...

  8. The Application of Internet of Things in Pig Breeding

    OpenAIRE

    Shang , Minghua; Dong , Gang; Mu , Yuanjie; Wang , Fujun; Ruan , Huaijun

    2015-01-01

    International audience; A pig breeding IoT system is designed, in view of the human resources, natural resources consumption, the quality and safety problems occurred frequently, the management mode is backward and so on. In this paper, the system architecture, information awareness, system application of the three aspects of pig farming system is introduced. The system can use all aspects of pig farming to sales, has some reference to the intensive farming of pigs.

  9. INFOMAT: The international materials assessment and application centre's internet gateway

    Science.gov (United States)

    Branquinho, Carmen Lucia; Colodete, Leandro Tavares

    2004-08-01

    INFOMAT is an electronic directory structured to facilitate the search and retrieval of materials science and technology information sources. Linked to the homepage of the International Materials Assessment and Application Centre, INFOMAT presents descriptions of 392 proprietary databases with links to their host systems as well as direct links to over 180 public domain databases and over 2,400 web sites. Among the web sites are associations/unions, governmental and non-governmental institutions, industries, library holdings, market statistics, news services, on-line publications, standardization and intellectual property organizations, and universities/research groups.

  10. Smart Connectivity for Internet of Things (IoT) Applications

    DEFF Research Database (Denmark)

    Mihovska, Albena Dimitrova; Sarkar, Mahasweta

    2017-01-01

    billions of devices through a myriad of technologies for the delivery of smart personalized services and applications. The main challenges and distinctive features of this scenario are the large amount of information gathered from the ambient environment and the human body that must be processed ...... to the cloud/network where information gets personalized. This chapter examines the main research challenges related to the enabling of smart connectivity in an AAL context and proposes a novel approach to scalable and autonomous interactions for an enhanced personalized experience....

  11. Increasing self-regulatory energy using an Internet-based training application delivered by smartphone technology.

    Science.gov (United States)

    Cranwell, Jo; Benford, Steve; Houghton, Robert J; Golembewski, Michael; Golembewksi, Michael; Fischer, Joel E; Hagger, Martin S

    2014-03-01

    Self-control resources can be defined in terms of "energy." Repeated attempts to override desires and impulses can result in a state of reduced self-control energy termed "ego depletion" leading to a reduced capacity to regulate future self-control behaviors effectively. Regular practice or "training" on self-control tasks may improve an individual's capacity to overcome ego depletion effectively. The current research tested the effectiveness of training using a novel Internet-based smartphone application to improve self-control and reduce ego depletion. In two experiments, participants were randomly assigned to either an experimental group, which received a daily program of self-control training using a modified Stroop-task Internet-based application delivered via smartphone to participants over a 4-week period, or a no-training control group. Participants assigned to the experimental group performed significantly better on post-training laboratory self-control tasks relative to participants in the control group. Findings support the hypothesized training effect on self-control and highlight the effectiveness of a novel Internet-based application delivered by smartphone as a practical means to administer and monitor a self-control training program. The smartphone training application has considerable advantages over other means to train self-control adopted in previous studies in that it has increased ecological validity and enables effective monitoring of compliance with the training program.

  12. Pavlovian-to-instrumental transfer: A new paradigm to assess pathological mechanisms with regard to the use of Internet applications.

    Science.gov (United States)

    Vogel, Verena; Kollei, Ines; Duka, Theodora; Snagowski, Jan; Brand, Matthias; Müller, Astrid; Loeber, Sabine

    2018-07-16

    At present, there is a considerable lack of human studies that investigated the impact of conditioned cues on instrumental responding although these processes are considered as core mechanisms contributing to the development and maintenance of addictive behaviours. No studies are available that assessed these processes with regard to Internet gaming or Internet shopping applications. We thus developed a Pavlovian-to-instrumental transfer (PIT)-Paradigm implementing appetitive stimuli related to Internet gaming and Internet shopping applications and investigated whether an outcome-specific PIT-Effect is observed. In addition, we assessed whether the problematic use of gaming or shopping applications, personality traits and stress would affect the acquisition of knowledge of the experimental contingencies during Pavlovian training and the impact of conditioned stimuli on instrumental responding. A PIT-Paradigm, screenings for Internet gaming disorder and Internet shopping disorder (s-IAT), and questionnaires on personality traits (NEO-FFI, BIS-15) and perceived stress (PSQ20) were administered to sixty-six participants. The PIT-Paradigm demonstrated the effects of stimuli conditioned to rewards related to Internet gaming and Internet shopping applications on instrumental responding to obtain such rewards. Findings also indicated that severity of problematic Internet gaming, but not Internet shopping, contributed to the acquisition of knowledge of the experimental contingencies. Stress, extraversion, neuroticism and gender emerged as further predictors. The strength of expectancy of the different reinforcers affected the 'gaming PIT'-Effect; however, none of the variables assessed in the present study showed any effect on the 'shopping PIT'-Effect. Future studies including participants with pathological use patterns that can be classified as internet use disorder are warranted to extend these findings. Copyright © 2018 Elsevier B.V. All rights reserved.

  13. Applications of Scalable Multipoint Video and Audio Using the Public Internet

    Directory of Open Access Journals (Sweden)

    Robert D. Gaglianello

    2000-01-01

    Full Text Available This paper describes a scalable multipoint video system, designed for efficient generation and display of high quality, multiple resolution, multiple compressed video streams over IP-based networks. We present our experiences using the system over the public Internet for several “real-world” applications, including distance learning, virtual theater, and virtual collaboration. The trials were a combined effort of Bell Laboratories and the Gertrude Stein Repertory Theatre (TGSRT. We also present current advances in the conferencing system since the trials, new areas for application and future applications.

  14. Internet and smartphone application usage in eating disorders: A descriptive study in Singapore.

    Science.gov (United States)

    Tan, Tina; Kuek, Angeline; Goh, Shih Ee; Lee, Ee Lian; Kwok, Victor

    2016-02-01

    Eating disorders are associated with significant morbidity and mortality. The Internet is a popular medium for individuals with eating disorders to discuss and reinforce their affliction. However, the available literature on Internet usage and eating disorders is scarce, especially in the area of social media and smartphone application ("app") usage. This study looked at the Internet and smartphone app usage patterns of participants who presented with an eating disorder in Singapore, and whether it corresponded to severity of illness. Individuals who presented to the Eating Disorders clinic at the Singapore General Hospital completed a self-reported questionnaire on Internet and app usage. They also completed the EDE-Q, EAT-26 and CIA 3.0. 55 participants completed the study. 41.8% had anorexia nervosa, 34.5% had bulimia nervosa, and 9.1% were ED-NOS. 41.8% felt that apps helped to perpetuate their illness while 32.7% felt that the apps were helpful for recovery. Overall, any smartphone application usage was associated with younger age and greater eating disorder psychopathology and psychosocial impairment. While 30.9% had encountered eating disorder-related content on Facebook, only 12.7% visited Facebook groups related to eating disorders. For YouTube, "Cooking and Food" and "Beauty and Fashion" videos were among the top 3 types of videos that participants watched. In conclusion, Internet and smartphone app usage is significant, and they are associated with greater severity of illness. It is necessary to include interventions in this aspect as part of treatment of eating disorders. Copyright © 2015 Elsevier B.V. All rights reserved.

  15. Application of the Internet and its Association With Loneliness Among Retired Teachers

    Directory of Open Access Journals (Sweden)

    Malihe Saboor

    2014-04-01

    Full Text Available Objectives: The social engagement and participation of older adults in society are seen as indicators of healthy ageing. With the changing nature of society over recent years, many elderly people are at risk of being lonely. Evidence shows that loneliness has an adverse effect on older adults. Therefore, it is important to find some ways to overcome this problem. This study aimed to assess the level of loneliness among Iranian retired teachers and the impact of Internet application on the sense of loneliness and depression in this group. Methods & Materials: This Cross-sectional study was conducted among 445 retired teachers which 43 of them were Internet user. Data collected by a questionnaire consisted of three sections including demographic questions, 15 questions of Social and Emotional Loneliness Scale (SELSA, and 5 GDS questions. Results: from a Principle Component Factor Analysis reduced SELSA items to a three-factor model including Social, Family and Romantic Subscales. For Internet users one more section was used including 3 parts: frequency, history and nature of Internet application. Data was analyzed by SPSS. Results T, 37% of the non-user respondents reported social loneliness compared to 18.6% of users (P=0.002 However prevalence of family loneliness in those who were non-user was significantly lower (P=0.001. Living alone, being widowed or separated were predictors of loneliness (P<0.05. Findings showed that, the level of depression in users were significantly lower than that of non-users (P=0.002 (27.9% followed by 39.2%.  Conclusion: These findings in combination suggest that the level of loneliness and depression among non-user retired people is almost higher than users. Therefore, it is important to identify and implement strategies such as using the Internet to overcome the loneliness experienced by elderly people.

  16. Knowledge-Based Control Systems via Internet Part I. Applications in Biotechnology

    Directory of Open Access Journals (Sweden)

    Georgi Georgiev

    2005-04-01

    Full Text Available An extensive approach towards the dissemination of expert knowledge and coordination efforts to distributed points and seamless integration of control strategies applied to distributed yet identical systems is crucial to enhance overall efficiency and operational costs. Application of Knowledge-Based Control System via Internet will be very efficient especially in biotechnology, because many industrial bioprocesses, based on the same technological principles, are distributed in the whole world. Brewing industry oriented practical solutions illustrate this approach.

  17. Tracking the Evolution of the Internet of Things Concept Across Different Application Domains.

    Science.gov (United States)

    Ibarra-Esquer, Jorge E; González-Navarro, Félix F; Flores-Rios, Brenda L; Burtseva, Larysa; Astorga-Vargas, María A

    2017-06-14

    Both the idea and technology for connecting sensors and actuators to a network to remotely monitor and control physical systems have been known for many years and developed accordingly. However, a little more than a decade ago the concept of the Internet of Things (IoT) was coined and used to integrate such approaches into a common framework. Technology has been constantly evolving and so has the concept of the Internet of Things, incorporating new terminology appropriate to technological advances and different application domains. This paper presents the changes that the IoT has undertaken since its conception and research on how technological advances have shaped it and fostered the arising of derived names suitable to specific domains. A two-step literature review through major publishers and indexing databases was conducted; first by searching for proposals on the Internet of Things concept and analyzing them to find similarities, differences, and technological features that allow us to create a timeline showing its development; in the second step the most mentioned names given to the IoT for specific domains, as well as closely related concepts were identified and briefly analyzed. The study confirms the claim that a consensus on the IoT definition has not yet been reached, as enabling technology keeps evolving and new application domains are being proposed. However, recent changes have been relatively moderated, and its variations on application domains are clearly differentiated, with data and data technologies playing an important role in the IoT landscape.

  18. Affordable and Scalable Manufacturing of Wearable Multi-Functional Sensory “Skin” for Internet of Everything Applications

    KAUST Repository

    Nassar, Joanna M.

    2017-01-01

    Demand for wearable electronics is expected to at least triple by 2020, embracing all sorts of Internet of Everything (IoE) applications, such as activity tracking, environmental mapping, and advanced healthcare monitoring, in the purpose

  19. Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms

    OpenAIRE

    Perera , Charith; Mccormick , Ciaran; Bandara , Arosha K.; Price , Blaine A.; Nuseibeh , Bashar

    2016-01-01

    International audience; The Internet of Things (IoT) systems are designed and developed either as standalone applications from the ground-up or with the help of IoT middleware platforms. They are designed to support different kinds of scenarios, such as smart homes and smart cities. Thus far, privacy concerns have not been explicitly considered by IoT applications and middleware platforms. This is partly due to the lack of systematic methods for designing privacy that can guide the software d...

  20. Flex 4 Cookbook Real-world recipes for developing Rich Internet Applications

    CERN Document Server

    Noble, Joshua; Braithwaite, Garth; Casario, Marco; Tretola, Rich

    2010-01-01

    With this collection of proven recipes, you have the ideal problem-solving guide for developing interactive Rich Internet Applications on the Adobe Flash Platform. You'll find answers to hundreds of common problems you may encounter when using Adobe Flex, Flex 4 Framework, or Flash Builder, Adobe's GUI-based development tool. Flex 4 Cookbook has hands-on recipes for everything from Flex basics to solutions for working with visual components and data access, as well as tips on application development, unit testing, and Adobe AIR. Each recipe provides an explanation of how and why it works, an

  1. A Survey on Challenges of Semantics Application in the Internet of Things Domain

    Directory of Open Access Journals (Sweden)

    Harlamova Marina

    2017-05-01

    Full Text Available The Internet of Things (IoT, a global Internet-based system of computing devices and machines, is one of the most significant trends in the information technology area. An accepted unified communication approach would be a prerequisite for its mass adoption. Semantic technologies (Semantic Web have been advocated as enablers of unified communication. However, while there are particular advancements in research on application of Semantic Web in the IoT domain, the dynamic and complex nature of the IoT often requires case specific solutions hard to be applied widely. In the present survey, the semantic technology challenges in the IoT domain are amalgamated to provide background for further studies in the use of semantic technologies in the IoT.

  2. EBLAST: an efficient high-compression image transformation 3. application to Internet image and video transmission

    Science.gov (United States)

    Schmalz, Mark S.; Ritter, Gerhard X.; Caimi, Frank M.

    2001-12-01

    A wide variety of digital image compression transforms developed for still imaging and broadcast video transmission are unsuitable for Internet video applications due to insufficient compression ratio, poor reconstruction fidelity, or excessive computational requirements. Examples include hierarchical transforms that require all, or large portion of, a source image to reside in memory at one time, transforms that induce significant locking effect at operationally salient compression ratios, and algorithms that require large amounts of floating-point computation. The latter constraint holds especially for video compression by small mobile imaging devices for transmission to, and compression on, platforms such as palmtop computers or personal digital assistants (PDAs). As Internet video requirements for frame rate and resolution increase to produce more detailed, less discontinuous motion sequences, a new class of compression transforms will be needed, especially for small memory models and displays such as those found on PDAs. In this, the third series of papers, we discuss the EBLAST compression transform and its application to Internet communication. Leading transforms for compression of Internet video and still imagery are reviewed and analyzed, including GIF, JPEG, AWIC (wavelet-based), wavelet packets, and SPIHT, whose performance is compared with EBLAST. Performance analysis criteria include time and space complexity and quality of the decompressed image. The latter is determined by rate-distortion data obtained from a database of realistic test images. Discussion also includes issues such as robustness of the compressed format to channel noise. EBLAST has been shown to perform superiorly to JPEG and, unlike current wavelet compression transforms, supports fast implementation on embedded processors with small memory models.

  3. Improving the Security of Internet Banking Applications by Using Multimodal Biometrics

    Directory of Open Access Journals (Sweden)

    Cătălin Lupu

    2015-03-01

    Full Text Available Online banking applications are used by more and more people all over the world. Most of the banks are providing these services to their customers. The authentication methods varies from the basic user and password to username and a onetime password (OTP generated by a virtual or a physical digipass. The common thing among authentication methods is that the login wepage is provided through a secure channel. Some banks have introduced (especially for testing purposes the authentication using common biometric characteristics, like fingerprint, voice or keystroke recognition. This paper will present some of the most common online banking authentication methods, together with basic biometric characteristics that could be used in these applications. The security in internet banking applications can be improved by using biometrics for the authentication process. Also, the authors have developed an application for authentication of users using fingerprint as the main characteristic, which will be presented at the end of this paper.

  4. Tracking the Evolution of the Internet of Things Concept Across Different Application Domains

    Directory of Open Access Journals (Sweden)

    Jorge E. Ibarra-Esquer

    2017-06-01

    Full Text Available Both the idea and technology for connecting sensors and actuators to a network to remotely monitor and control physical systems have been known for many years and developed accordingly. However, a little more than a decade ago the concept of the Internet of Things (IoT was coined and used to integrate such approaches into a common framework. Technology has been constantly evolving and so has the concept of the Internet of Things, incorporating new terminology appropriate to technological advances and different application domains. This paper presents the changes that the IoT has undertaken since its conception and research on how technological advances have shaped it and fostered the arising of derived names suitable to specific domains. A two-step literature review through major publishers and indexing databases was conducted; first by searching for proposals on the Internet of Things concept and analyzing them to find similarities, differences, and technological features that allow us to create a timeline showing its development; in the second step the most mentioned names given to the IoT for specific domains, as well as closely related concepts were identified and briefly analyzed. The study confirms the claim that a consensus on the IoT definition has not yet been reached, as enabling technology keeps evolving and new application domains are being proposed. However, recent changes have been relatively moderated, and its variations on application domains are clearly differentiated, with data and data technologies playing an important role in the IoT landscape.

  5. Tracking the Evolution of the Internet of Things Concept Across Different Application Domains

    Science.gov (United States)

    Ibarra-Esquer, Jorge E.; González-Navarro, Félix F.; Flores-Rios, Brenda L.; Burtseva, Larysa; Astorga-Vargas, María A.

    2017-01-01

    Both the idea and technology for connecting sensors and actuators to a network to remotely monitor and control physical systems have been known for many years and developed accordingly. However, a little more than a decade ago the concept of the Internet of Things (IoT) was coined and used to integrate such approaches into a common framework. Technology has been constantly evolving and so has the concept of the Internet of Things, incorporating new terminology appropriate to technological advances and different application domains. This paper presents the changes that the IoT has undertaken since its conception and research on how technological advances have shaped it and fostered the arising of derived names suitable to specific domains. A two-step literature review through major publishers and indexing databases was conducted; first by searching for proposals on the Internet of Things concept and analyzing them to find similarities, differences, and technological features that allow us to create a timeline showing its development; in the second step the most mentioned names given to the IoT for specific domains, as well as closely related concepts were identified and briefly analyzed. The study confirms the claim that a consensus on the IoT definition has not yet been reached, as enabling technology keeps evolving and new application domains are being proposed. However, recent changes have been relatively moderated, and its variations on application domains are clearly differentiated, with data and data technologies playing an important role in the IoT landscape. PMID:28613238

  6. Appdaptivity: An Internet of Things Device-Decoupled System for Portable Applications in Changing Contexts

    Directory of Open Access Journals (Sweden)

    Cristian Martín

    2018-04-01

    Full Text Available Currently, applications in the Internet of Things (IoT are tightly coupled to the underlying physical devices. As a consequence, upon adding a device, device replacement or user’s relocation to a different physical space, application developers have to re-perform installation and configuration processes to reconfigure applications, which bears costs in time and knowledge of low-level details. In the emerging IoT field, this issue is even more challenging due to its current unpredictable growth in term of applications and connected devices. In addition, IoT applications can be personalised to each end user and can be present in different environments. As a result, IoT scenarios are very changeable, presenting a challenge for IoT applications. In this paper we present Appdaptivity, a system that enables the development of portable device-decoupled applications that can be adapted to changing contexts. Through Appdaptivity, application developers can intuitively create portable and personalised applications, disengaging from the underlying physical infrastructure. Results confirms a good scalability of the system in terms of connected users and components involved.

  7. Appdaptivity: An Internet of Things Device-Decoupled System for Portable Applications in Changing Contexts.

    Science.gov (United States)

    Martín, Cristian; Hoebeke, Jeroen; Rossey, Jen; Díaz, Manuel; Rubio, Bartolomé; Van den Abeele, Floris

    2018-04-26

    Currently, applications in the Internet of Things (IoT) are tightly coupled to the underlying physical devices. As a consequence, upon adding a device, device replacement or user’s relocation to a different physical space, application developers have to re-perform installation and configuration processes to reconfigure applications, which bears costs in time and knowledge of low-level details. In the emerging IoT field, this issue is even more challenging due to its current unpredictable growth in term of applications and connected devices. In addition, IoT applications can be personalised to each end user and can be present in different environments. As a result, IoT scenarios are very changeable, presenting a challenge for IoT applications. In this paper we present Appdaptivity, a system that enables the development of portable device-decoupled applications that can be adapted to changing contexts. Through Appdaptivity, application developers can intuitively create portable and personalised applications, disengaging from the underlying physical infrastructure. Results confirms a good scalability of the system in terms of connected users and components involved.

  8. User Requirements for Internet Of Things (IoT) Applications : An Observational study

    OpenAIRE

    Namirimu, Victoria

    2015-01-01

    Context. Internet of Things (IoT) is a new trending phase of technology. IoT refers to communication and connectivity between things such as technological devices, actuators, sensors, and people or processes with unique identifiers. The importance of IoT is to improve the daily living standards of an average user. IoT is made for the people and used by the people for many reasons such as improved health, business innovations, and personal health trackers. Examples of IoT applications and serv...

  9. Trust-based Service Management of Internet of Things Systems and Its Applications

    OpenAIRE

    Guo, Jia

    2018-01-01

    A future Internet of Things (IoT) system will consist of a huge quantity of heterogeneous IoT devices, each capable of providing services upon request. It is of utmost importance for an IoT device to know if another IoT service is trustworthy when requesting it to provide a service. In this dissertation research, we develop trust-based service management techniques applicable to distributed, centralized, and hybrid IoT environments. For distributed IoT systems, we develop a trust protocol...

  10. A Comprehensive Study on the Internet of Underwater Things: Applications, Challenges, and Channel Models

    Directory of Open Access Journals (Sweden)

    Chien-Chi Kao

    2017-06-01

    Full Text Available The Internet of Underwater Things (IoUT is a novel class of Internet of Things (IoT, and is defined as the network of smart interconnected underwater objects. IoUT is expected to enable various practical applications, such as environmental monitoring, underwater exploration, and disaster prevention. With these applications, IoUT is regarded as one of the potential technologies toward developing smart cities. To support the concept of IoUT, Underwater Wireless Sensor Networks (UWSNs have emerged as a promising network system. UWSNs are different from the traditional Territorial Wireless Sensor Networks (TWSNs, and have several unique properties, such as long propagation delay, narrow bandwidth, and low reliability. These unique properties would be great challenges for IoUT. In this paper, we provide a comprehensive study of IoUT, and the main contributions of this paper are threefold: (1 we introduce and classify the practical underwater applications that can highlight the importance of IoUT; (2 we point out the differences between UWSNs and traditional TWSNs, and these differences are the main challenges for IoUT; and (3 we investigate and evaluate the channel models, which are the technical core for designing reliable communication protocols on IoUT.

  11. A Comprehensive Study on the Internet of Underwater Things: Applications, Challenges, and Channel Models.

    Science.gov (United States)

    Kao, Chien-Chi; Lin, Yi-Shan; Wu, Geng-De; Huang, Chun-Ju

    2017-06-22

    The Internet of Underwater Things (IoUT) is a novel class of Internet of Things (IoT), and is defined as the network of smart interconnected underwater objects. IoUT is expected to enable various practical applications, such as environmental monitoring, underwater exploration, and disaster prevention. With these applications, IoUT is regarded as one of the potential technologies toward developing smart cities. To support the concept of IoUT, Underwater Wireless Sensor Networks (UWSNs) have emerged as a promising network system. UWSNs are different from the traditional Territorial Wireless Sensor Networks (TWSNs), and have several unique properties, such as long propagation delay, narrow bandwidth, and low reliability. These unique properties would be great challenges for IoUT. In this paper, we provide a comprehensive study of IoUT, and the main contributions of this paper are threefold: (1) we introduce and classify the practical underwater applications that can highlight the importance of IoUT; (2) we point out the differences between UWSNs and traditional TWSNs, and these differences are the main challenges for IoUT; and (3) we investigate and evaluate the channel models, which are the technical core for designing reliable communication protocols on IoUT.

  12. Management of cyber physical objects in the future Internet of Things methods, architectures and applications

    CERN Document Server

    Loscri, Valeria; Rovella, Anna; Fortino, Giancarlo

    2016-01-01

    This book focuses on new methods, architectures, and applications for the management of Cyber Physical Objects (CPOs) in the context of the Internet of Things (IoT). It covers a wide range of topics related to CPOs, such as resource management, hardware platforms, communication and control, and control and estimation over networks. It also discusses decentralized, distributed, and cooperative optimization as well as effective discovery, management, and querying of CPOs. Other chapters outline the applications of control, real-time aspects, and software for CPOs and introduce readers to agent-oriented CPOs, communication support for CPOs, real-world deployment of CPOs, and CPOs in Complex Systems. There is a focus on the importance of application of IoT technologies for Smart Cities.

  13. A Middleware with Comprehensive Quality of Context Support for the Internet of Things Applications.

    Science.gov (United States)

    Gomes, Berto de Tácio Pereira; Muniz, Luiz Carlos Melo; da Silva E Silva, Francisco José; Dos Santos, Davi Viana; Lopes, Rafael Fernandes; Coutinho, Luciano Reis; Carvalho, Felipe Oliveira; Endler, Markus

    2017-12-08

    Context aware systems are able to adapt their behavior according to the environment in which the user is. They can be integrated into an Internet of Things (IoT) infrastructure, allowing a better perception of the user's physical environment by collecting context data from sensors embedded in devices known as smart objects. An IoT extension called the Internet of Mobile Things (IoMT) suggests new scenarios in which smart objects and IoT gateways can move autonomously or be moved easily. In a comprehensive view, Quality of Context (QoC) is a term that can express quality requirements of context aware applications. These requirements can be those related to the quality of information provided by the sensors (e.g., accuracy, resolution, age, validity time) or those referring to the quality of the data distribution service (e.g, reliability, delay, delivery time). Some functionalities of context aware applications and/or decision-making processes of these applications and their users depend on the level of quality of context available, which tend to vary over time for various reasons. Reviewing the literature, it is possible to verify that the quality of context support provided by IoT-oriented middleware systems still has limitations in relation to at least four relevant aspects: (i) quality of context provisioning; (ii) quality of context monitoring; (iii) support for heterogeneous device and technology management; (iv) support for reliable data delivery in mobility scenarios. This paper presents two main contributions: (i) a state-of-the-art survey specifically aimed at analyzing the middleware with quality of context support and; (ii) a new middleware with comprehensive quality of context support for Internet of Things Applications. The proposed middleware was evaluated and the results are presented and discussed in this article, which also shows a case study involving the development of a mobile remote patient monitoring application that was developed using the

  14. CMOS-Technology-Enabled Flexible and Stretchable Electronics for Internet of Everything Applications

    KAUST Repository

    Hussain, Aftab M.

    2015-11-26

    Flexible and stretchable electronics can dramatically enhance the application of electronics for the emerging Internet of Everything applications where people, processes, data and devices will be integrated and connected, to augment quality of life. Using naturally flexible and stretchable polymeric substrates in combination with emerging organic and molecular materials, nanowires, nanoribbons, nanotubes, and 2D atomic crystal structured materials, significant progress has been made in the general area of such electronics. However, high volume manufacturing, reliability and performance per cost remain elusive goals for wide commercialization of these electronics. On the other hand, highly sophisticated but extremely reliable, batch-fabrication-capable and mature complementary metal oxide semiconductor (CMOS)-based technology has facilitated tremendous growth of today\\'s digital world using thin-film-based electronics; in particular, bulk monocrystalline silicon (100) which is used in most of the electronics existing today. However, one fundamental challenge is that state-of-the-art CMOS electronics are physically rigid and brittle. Therefore, in this work, how CMOS-technology-enabled flexible and stretchable electronics can be developed is discussed, with particular focus on bulk monocrystalline silicon (100). A comprehensive information base to realistically devise an integration strategy by rational design of materials, devices and processes for Internet of Everything electronics is offered. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  15. Cue-induced Behavioral and Neural Changes among Excessive Internet Gamers and Possible Application of Cue Exposure Therapy to Internet Gaming Disorder.

    Science.gov (United States)

    Zhang, Yongjun; Ndasauka, Yamikani; Hou, Juan; Chen, Jiawen; Yang, Li Zhuang; Wang, Ying; Han, Long; Bu, Junjie; Zhang, Peng; Zhou, Yifeng; Zhang, Xiaochu

    2016-01-01

    Internet gaming disorder (IGD) may lead to many negative consequences in everyday life, yet there is currently no effective treatment for IGD. Cue-reactivity paradigm is commonly used to evaluate craving for substance, food, and gambling; cue exposure therapy (CET) is applied to treating substance use disorders (SUDs) and some other psychological disorders such as pathological gambling (PG). However, no study has explored CET's application to the treatment of IGD except two articles having implied that cues' exposure may have therapeutic effect on IGD. This paper reviews studies on cue-induced behavioral and neural changes in excessive Internet gamers, indicating that behavioral and neural mechanisms of IGD mostly overlap with those of SUD. The CET's effects in the treatment of SUDs and PG are also reviewed. We finally propose an optimized CET paradigm, which future studies should consider and investigate as a probable treatment of IGD.

  16. Cue-induced Behavioral and Neural Changes among Excessive Internet Gamers and Possible Application of Cue Exposure Therapy to Internet Gaming Disorder

    Directory of Open Access Journals (Sweden)

    Yongjun eZhang

    2016-05-01

    Full Text Available Internet gaming disorder (IGD may lead to many negative consequences in everyday life, yet there is currently no effective treatment for IGD. Cue-reactivity paradigm is commonly used to evaluate craving for substance, food, and gambling; cue exposure therapy (CET is applied to treating substance use disorders (SUDs and some other psychological disorders such as pathological gambling (PG. However, no study has explored CET’s application to the treatment of IGD except two articles having implied that cues’ exposure may have therapeutic effect on IGD. This paper reviews studies on cue-induced behavioral and neural changes in excessive Internet gamers, indicating that behavioral and neural mechanisms of IGD mostly overlap with those of SUD. The CET’s effects in the treatment of SUDs and PG are also reviewed. We finally propose an optimized CET paradigm, which future studies should consider and investigate as a probable treatment of IGD.

  17. Scalable Multicasting over Next-Generation Internet Design, Analysis and Applications

    CERN Document Server

    Tian, Xiaohua

    2013-01-01

    Next-generation Internet providers face high expectations, as contemporary users worldwide expect high-quality multimedia functionality in a landscape of ever-expanding network applications. This volume explores the critical research issue of turning today’s greatly enhanced hardware capacity to good use in designing a scalable multicast  protocol for supporting large-scale multimedia services. Linking new hardware to improved performance in the Internet’s next incarnation is a research hot-spot in the computer communications field.   The methodical presentation deals with the key questions in turn: from the mechanics of multicast protocols to current state-of-the-art designs, and from methods of theoretical analysis of these protocols to applying them in the ns2 network simulator, known for being hard to extend. The authors’ years of research in the field inform this thorough treatment, which covers details such as applying AOM (application-oriented multicast) protocol to IPTV provision and resolving...

  18. Internet culture

    CERN Document Server

    Porter, David

    2013-01-01

    The internet has recently grown from a fringe cultural phenomenon to a significant site of cultural production and transformation. Internet Culture maps this new domain of language, politics and identity, locating it within the histories of communication and the public sphere. Internet Culture offers a critical interrogation of the sustaining myths of the virtual world and of the implications of the current mass migration onto the electronic frontier. Among the topics discussed in Internet Culture are the virtual spaces and places created by the citizens of the Net and their claims to the hotly contested notion of "virtual community"; the virtual bodies that occupy such spaces; and the desires that animate these bodies. The contributors also examine the communication medium behind theworlds of the Net, analyzing the rhetorical conventions governing online discussion, literary antecedents,and potential pedagogical applications.

  19. Influence of a Game-Based Application on Secondary School Students' Safe Internet Use

    Science.gov (United States)

    Durak, Gürhan; Cankaya, Serkan; Yünkül, Eyup; Taylan, Ufuk; Erten, Emine; Akpinar, Sükran

    2017-01-01

    The purpose of this study was to investigate the influence of a game called Wild Web Woods (WWW) designed by the European Council for safe Internet use on secondary school students' safe Internet use. In line with this purpose, for the purpose of determining the students' awareness of safe Internet use, a total of 504 students from different…

  20. Prioritizing the Applications of Internet of Things Technology in the Healthcare Sector in Iran: A Driver for Sustainable Development

    Directory of Open Access Journals (Sweden)

    Rohollah Ghasemi

    2016-03-01

    Full Text Available Pay attention to health care sector is one of the areas of sustainable development in the countries. Internet of Things technology in the health sector has wide variety of applications that was not investigated in Iran. This paper aims to prioritize the applications of internet of things in the healthcare sector in Iran in order to achieve sustainable development. This research is applied and its research method is descriptive. Because of using Fuzzy AHP for ranking alternatives, our research is a single cross-survey. After collecting the agreement paired comparisons questionnaires, weights of criteria were determined and applications of Internet of things in healthcare were prioritized. Our findings show that economic prosperity and quality of life are the most important criteria for sustainable development of Internet of things in healthcare sector in Iran. Also, “Chronic disease management”,“patient surveillance”, “hygienic hand control”, and “fall detection” are the most important priorities for the use of internet of things in healthcare sector in Iran.

  1. Development of a Mobile Application for People with Panic Disorder as augmentation for an Internet-based Intervention

    OpenAIRE

    Kleine Stegemann, Stefan; Ebenfeld, Lara; Lehr, Dirk; Berking, Matthias; Funk, Burkhardt

    2013-01-01

    Smartphone technology has recently gained attention in the field of E-Mental Health research and mobile applications for measuring health-related aspects as well as mobile mental health interventions have emerged. However, little work has been done on leveraging mobile technology in combination with internet-based interventions. We argue, that mobile applications can not only enrich mental health treatments but also foster the commercial success of E-Mental Health applications. To this end, w...

  2. Design theory, modelling and the application for the Internet of Things service

    Science.gov (United States)

    Shang, Xiaopu; Zhang, Runtong; Zhu, Xiaomin; Zhou, Quan

    2016-03-01

    The Internet of Things (IoT) makes it possible for us to sense the physical world and locate objects in it using the enabling technologies associated with IoT. Compared with traditional information systems, IoT enabling technologies can help acquire real-time data necessary for managing enterprise business process. An IoT system should have an ability beyond integrating enabling technologies and traditional information systems that are only used to access environmental data. This paper begins with a literature review of IoT-related issues and a discussion of the difference between traditional information service and IoT service. Three principles for IoT service design from the perceptive of service classification, coordination and compatibility are proposed. The paper also proposes a utility model for resource allocation in order to improve IoT service performance, and an application involving a cold chain visibility platform is given to illustrate our research.

  3. A Self-Assessment Stereo Capture Model Applicable to the Internet of Things

    Science.gov (United States)

    Lin, Yancong; Yang, Jiachen; Lv, Zhihan; Wei, Wei; Song, Houbing

    2015-01-01

    The realization of the Internet of Things greatly depends on the information communication among physical terminal devices and informationalized platforms, such as smart sensors, embedded systems and intelligent networks. Playing an important role in information acquisition, sensors for stereo capture have gained extensive attention in various fields. In this paper, we concentrate on promoting such sensors in an intelligent system with self-assessment capability to deal with the distortion and impairment in long-distance shooting applications. The core design is the establishment of the objective evaluation criteria that can reliably predict shooting quality with different camera configurations. Two types of stereo capture systems—toed-in camera configuration and parallel camera configuration—are taken into consideration respectively. The experimental results show that the proposed evaluation criteria can effectively predict the visual perception of stereo capture quality for long-distance shooting. PMID:26308004

  4. The MovieClassroom: An Internet Based Application for Students and Instructors to Create Captioned Animations.

    Science.gov (United States)

    Urbano, L.

    2005-12-01

    We have developed and tested an internet based application that facilitates the creation of animations for use in lectures and permits movie production by students in laboratory classes. Animation have been found to be extremely useful educational aids in the geosciences, particularly relating to topics requiring comprehension of geospatial relationships. With this program, instructors are able to assemble and caption animations using an online video clip catalogue and present these movies through a standard internet browser. Captioning increases student comprehension by increasing the multimodality of information delivery. For student use, we developed an exercise for introductory, undergraduate, laboratory class sections that was informed by learning pedagogy, particularly as related to game-based learning. Students were asked to assemble video clips and captions into a coherent movie to explain geospatial concepts, with questions such as "Explain why we have seasons?" The affinity of students to digital technology, particularly computer games and digital media, makes this type of exercise particularly captivating to the typical undergraduate. The opportunity to select and arrange video clips (and add background music) into a unique production offers students a greater degree of ownership of the learning process and allows unique non-linear pathways for accomplishing learning objectives. Use in a laboratory section permitted rapid feedback from the instructor. The application was created using open-sourced software and the database populated with video clips and music contributed by faculty and students under a non-commercial-use license. This tool has the potential to permit the wider dissemination of scientific research results given the increasing use animations for scientific visualization, because it eases the creation of multiple presentations targeted to various audiences and allows user participation in the creation of multimedia.

  5. Rich internet application system for patient-centric healthcare data management using handheld devices.

    Science.gov (United States)

    Constantinescu, L; Pradana, R; Kim, J; Gong, P; Fulham, Michael; Feng, D

    2009-01-01

    Rich Internet Applications (RIAs) are an emerging software platform that blurs the line between web service and native application, and is a powerful tool for handheld device deployment. By democratizing health data management and widening its availability, this software platform has the potential to revolutionize telemedicine, clinical practice, medical education and information distribution, particularly in rural areas, and to make patient-centric medical computing a reality. In this paper, we propose a telemedicine application that leverages the ability of a mobile RIA platform to transcode, organise and present textual and multimedia data, which are sourced from medical database software. We adopted a web-based approach to communicate, in real-time, with an established hospital information system via a custom RIA. The proposed solution allows communication between handheld devices and a hospital information system for media streaming with support for real-time encryption, on any RIA enabled platform. We demonstrate our prototype's ability to securely and rapidly access, without installation requirements, medical data ranging from simple textual records to multi-slice PET-CT images and maximum intensity (MIP) projections.

  6. A routing protocol based on energy and link quality for Internet of Things applications.

    Science.gov (United States)

    Machado, Kássio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A F; Neto, Augusto; Souza, José Neuman de

    2013-02-04

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  7. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    Directory of Open Access Journals (Sweden)

    Antonio A. F. Loureiro

    2013-02-01

    Full Text Available The Internet of Things (IoT is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  8. Front-End Intelligence for Large-Scale Application-Oriented Internet-of-Things

    KAUST Repository

    Bader, Ahmed; Ghazzai, Hakim; Kadri, Abdullah; Alouini, Mohamed-Slim

    2016-01-01

    The Internet-of-things (IoT) refers to the massive integration of electronic devices, vehicles, buildings, and other objects to collect and exchange data. It is the enabling technology for a plethora of applications touching various aspects of our lives such as healthcare, wearables, surveillance, home automation, smart manufacturing, and intelligent automotive systems. Existing IoT architectures are highly centralized and heavily rely on a back-end core network for all decision-making processes. This may lead to inefficiencies in terms of latency, network traffic management, computational processing, and power consumption. In this paper, we advocate the empowerment of front-end IoT devices to support the back-end network in fulfilling end-user applications requirements mainly by means of improved connectivity and efficient network management. A novel conceptual framework is presented for a new generation of IoT devices that will enable multiple new features for both the IoT administrators as well as end users. Exploiting the recent emergence of software-defined architecture, these smart IoT devices will allow fast, reliable, and intelligent management of diverse IoT-based applications. After highlighting relevant shortcomings of the existing IoT architectures, we outline some key design perspectives to enable front-end intelligence while shedding light on promising future research directions.

  9. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    Science.gov (United States)

    Machado, Kassio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A. F.; Neto, Augusto; de Souza, José Neuman

    2013-01-01

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare,environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols. PMID:23385410

  10. Industrial Internet of Things: (IIoT) applications in underground coal mines.

    Science.gov (United States)

    Zhou, C; Damiano, N; Whisner, B; Reyes, M

    2017-12-01

    The Industrial Internet of Things (IIoT), a concept that combines sensor networks and control systems, has been employed in several industries to improve productivity and safety. U.S. National Institute for Occupational Safety and Health (NIOSH) researchers are investigating IIoT applications to identify the challenges of and potential solutions for transferring IIoT from other industries to the mining industry. Specifically, NIOSH has reviewed existing sensors and communications network systems used in U.S. underground coal mines to determine whether they are capable of supporting IIoT systems. The results show that about 40 percent of the installed post-accident communication systems as of 2014 require minimal or no modification to support IIoT applications. NIOSH researchers also developed an IIoT monitoring and control prototype system using low-cost microcontroller Wi-Fi boards to detect a door opening on a refuge alternative, activate fans located inside the Pittsburgh Experimental Mine and actuate an alarm beacon on the surface. The results of this feasibility study can be used to explore IIoT applications in underground coal mines based on existing communication and tracking infrastructure.

  11. Front-End Intelligence for Large-Scale Application-Oriented Internet-of-Things

    KAUST Repository

    Bader, Ahmed

    2016-06-14

    The Internet-of-things (IoT) refers to the massive integration of electronic devices, vehicles, buildings, and other objects to collect and exchange data. It is the enabling technology for a plethora of applications touching various aspects of our lives such as healthcare, wearables, surveillance, home automation, smart manufacturing, and intelligent automotive systems. Existing IoT architectures are highly centralized and heavily rely on a back-end core network for all decision-making processes. This may lead to inefficiencies in terms of latency, network traffic management, computational processing, and power consumption. In this paper, we advocate the empowerment of front-end IoT devices to support the back-end network in fulfilling end-user applications requirements mainly by means of improved connectivity and efficient network management. A novel conceptual framework is presented for a new generation of IoT devices that will enable multiple new features for both the IoT administrators as well as end users. Exploiting the recent emergence of software-defined architecture, these smart IoT devices will allow fast, reliable, and intelligent management of diverse IoT-based applications. After highlighting relevant shortcomings of the existing IoT architectures, we outline some key design perspectives to enable front-end intelligence while shedding light on promising future research directions.

  12. Evaluation of reinitialization-free nonvolatile computer systems for energy-harvesting Internet of things applications

    Science.gov (United States)

    Onizawa, Naoya; Tamakoshi, Akira; Hanyu, Takahiro

    2017-08-01

    In this paper, reinitialization-free nonvolatile computer systems are designed and evaluated for energy-harvesting Internet of things (IoT) applications. In energy-harvesting applications, as power supplies generated from renewable power sources cause frequent power failures, data processed need to be backed up when power failures occur. Unless data are safely backed up before power supplies diminish, reinitialization processes are required when power supplies are recovered, which results in low energy efficiencies and slow operations. Using nonvolatile devices in processors and memories can realize a faster backup than a conventional volatile computer system, leading to a higher energy efficiency. To evaluate the energy efficiency upon frequent power failures, typical computer systems including processors and memories are designed using 90 nm CMOS or CMOS/magnetic tunnel junction (MTJ) technologies. Nonvolatile ARM Cortex-M0 processors with 4 kB MRAMs are evaluated using a typical computing benchmark program, Dhrystone, which shows a few order-of-magnitude reductions in energy in comparison with a volatile processor with SRAM.

  13. Internet Sexualities

    Science.gov (United States)

    Döring, Nicola

    The term “internet sexuality” (or OSA, online sexual activities) refers to sexual-related content and activities observable on the internet (cf. Adams, Oye, & Parker, 2003; Cooper, McLoughlin, & Campbell, 2000; Leiblum & Döring, 2002). It designates a variety of sexual phenomena (e.g., pornography, sex education, sexual contacts) related to a wide spectrum of online services and applications (e.g., websites, online chat rooms, peer-to-peer networks). If an even broader range of computer networks - such as the Usenet or bulletin board systems - is included in this extensional definition, one speaks of “online sexuality” or “cybersexuality.”

  14. The Sensing Internet

    DEFF Research Database (Denmark)

    Heller, Alfred

    2015-01-01

    . Sensor networks can be seen as an important part of the Internet of Things and may even constitute an Internet of Sensors, since the communication layers can differ from the Internet standards. The current paper describes the case for application, followed by a discussion of the observed adaptive...

  15. Positioning internet of things application, and associated human behavioural changes in a developing context

    CSIR Research Space (South Africa)

    Coetzee, L

    2012-05-01

    Full Text Available Internet of Things (IoT) is an evolutionary development with the potential to greatly influence and impact society, economy and environment. Through IoT, all devices become Internet connected. These connected devices are controlled by largescale...

  16. Management and control applications in Agriculture domain via a Future Internet Business-to-Business platform

    Directory of Open Access Journals (Sweden)

    Sokratis Barmpounakis

    2015-05-01

    Full Text Available The Agriculture business domain, as a vital part of the overall supply chain, is expected to highly evolve in the upcoming years via the developments, which are taking place on the side of the Future Internet. This paper presents a novel Business-to-Business collaboration platform from the agri-food sector perspective, which aims to facilitate the collaboration of numerous stakeholders belonging to associated business domains, in an effective and flexible manner. The contemporary B2B collaboration schemes already place the requirements for swift deployment of cloud applications, capable of both integrating diverse legacy systems, as well as developing in a rapid way new services and systems, which will be able to instantly communicate and provide complete, “farm-to-fork” solutions for farmers, agri-food and logistics service providers, ICT companies, end-product producers, etc. To this end, this conceptual paper describes how these requirements are addressed via the FIspace B2B platform, focusing on the Greenhouse Management & Control scenarios.

  17. Optimal Network QoS over the Internet of Vehicles for E-Health Applications

    Directory of Open Access Journals (Sweden)

    Di Lin

    2016-01-01

    Full Text Available Wireless technologies are pervasive to support ubiquitous healthcare applications. However, a critical issue of using wireless communications under a healthcare scenario is the electromagnetic interference (EMI caused by RF transmission, and a high level of EMI may lead to a critical malfunction of medical sensors. In consideration of EMI on medical sensors, we study the optimization of quality of service (QoS within the whole Internet of vehicles for E-health and propose a novel model to optimize the QoS by allocating the transmit power of each user. Our results show that the optimal power control policy depends on the objective of optimization problems: a greedy policy is optimal to maximize the summation of QoS of each user, whereas a fair policy is optimal to maximize the product of QoS of each user. Algorithms are taken to derive the optimal policies, and numerical results of optimizing QoS are presented for both objectives and QoS constraints.

  18. Virtual Wireless Sensor Networks: Adaptive Brain-Inspired Configuration for Internet of Things Applications

    Science.gov (United States)

    Toyonaga, Shinya; Kominami, Daichi; Murata, Masayuki

    2016-01-01

    Many researchers are devoting attention to the so-called “Internet of Things” (IoT), and wireless sensor networks (WSNs) are regarded as a critical technology for realizing the communication infrastructure of the future, including the IoT. Against this background, virtualization is a crucial technique for the integration of multiple WSNs. Designing virtualized WSNs for actual environments will require further detailed studies. Within the IoT environment, physical networks can undergo dynamic change, and so, many problems exist that could prevent applications from running without interruption when using the existing approaches. In this paper, we show an overall architecture that is suitable for constructing and running virtual wireless sensor network (VWSN) services within a VWSN topology. Our approach provides users with a reliable VWSN network by assigning redundant resources according to each user’s demand and providing a recovery method to incorporate environmental changes. We tested this approach by simulation experiment, with the results showing that the VWSN network is reliable in many cases, although physical deployment of sensor nodes and the modular structure of the VWSN will be quite important to the stability of services within the VWSN topology. PMID:27548177

  19. Virtual Wireless Sensor Networks: Adaptive Brain-Inspired Configuration for Internet of Things Applications.

    Science.gov (United States)

    Toyonaga, Shinya; Kominami, Daichi; Murata, Masayuki

    2016-08-19

    Many researchers are devoting attention to the so-called "Internet of Things" (IoT), and wireless sensor networks (WSNs) are regarded as a critical technology for realizing the communication infrastructure of the future, including the IoT. Against this background, virtualization is a crucial technique for the integration of multiple WSNs. Designing virtualized WSNs for actual environments will require further detailed studies. Within the IoT environment, physical networks can undergo dynamic change, and so, many problems exist that could prevent applications from running without interruption when using the existing approaches. In this paper, we show an overall architecture that is suitable for constructing and running virtual wireless sensor network (VWSN) services within a VWSN topology. Our approach provides users with a reliable VWSN network by assigning redundant resources according to each user's demand and providing a recovery method to incorporate environmental changes. We tested this approach by simulation experiment, with the results showing that the VWSN network is reliable in many cases, although physical deployment of sensor nodes and the modular structure of the VWSN will be quite important to the stability of services within the VWSN topology.

  20. Application of Liquid Hydrogen with SMES for Efficient Use of Renewable Energy in the Energy Internet

    Directory of Open Access Journals (Sweden)

    Xin Wang

    2017-02-01

    Full Text Available Considering that generally frequency instability problems occur due to abrupt variations in load demand growth and power variations generated by different renewable energy sources (RESs, the application of superconducting magnetic energy storage (SMES may become crucial due to its rapid response features. In this paper, liquid hydrogen with SMES (LIQHYSMES is proposed to play a role in the future energy internet in terms of its combination of the SMES and the liquid hydrogen storage unit, which can help to overcome the capacity limit and high investment cost disadvantages of SMES. The generalized predictive control (GPC algorithm is presented to be appreciatively used to eliminate the frequency deviations of the isolated micro energy grid including the LIQHYSMES and RESs. A benchmark micro energy grid with distributed generators (DGs, electrical vehicle (EV stations, smart loads and a LIQHYSMES unit is modeled in the Matlab/Simulink environment. The simulation results show that the proposed GPC strategy can reschedule the active power output of each component to maintain the stability of the grid. In addition, in order to improve the performance of the SMES, a detailed optimization design of the superconducting coil is conducted, and the optimized SMES unit can offer better technical advantages in damping the frequency fluctuations.

  1. NET-COMPUTER: Internet Computer Architecture and its Application in E-Commerce

    Directory of Open Access Journals (Sweden)

    P. O. Umenne

    2012-12-01

    Full Text Available Research in Intelligent Agents has yielded interesting results, some of which have been translated into commer­cial ventures. Intelligent Agents are executable software components that represent the user, perform tasks on behalf of the user and when the task terminates, the Agents send the result to the user. Intelligent Agents are best suited for the Internet: a collection of computers connected together in a world-wide computer network. Swarm and HYDRA computer architectures for Agents’ execution were developed at the University of Surrey, UK in the 90s. The objective of the research was to develop a software-based computer architecture on which Agents execution could be explored. The combination of Intelligent Agents and HYDRA computer architecture gave rise to a new computer concept: the NET-Computer in which the comput­ing resources reside on the Internet. The Internet computers form the hardware and software resources, and the user is provided with a simple interface to access the Internet and run user tasks. The Agents autonomously roam the Internet (NET-Computer executing the tasks. A growing segment of the Internet is E-Commerce for online shopping for products and services. The Internet computing resources provide a marketplace for product suppliers and consumers alike. Consumers are looking for suppliers selling products and services, while suppliers are looking for buyers. Searching the vast amount of information available on the Internet causes a great deal of problems for both consumers and suppliers. Intelligent Agents executing on the NET-Computer can surf through the Internet and select specific information of interest to the user. The simulation results show that Intelligent Agents executing HYDRA computer architecture could be applied in E-Commerce.

  2. Internet-based wide area measurement applications in deregulated power systems

    Science.gov (United States)

    Khatib, Abdel-Rahman Amin

    Since the deregulation of power systems was started in 1989 in the UK, many countries have been motivated to undergo deregulation. The United State started deregulation in the energy sector in California back in 1996. Since that time many other states have also started the deregulation procedures in different utilities. Most of the deregulation market in the United States now is in the wholesale market area, however, the retail market is still undergoing changes. Deregulation has many impacts on power system network operation and control. The number of power transactions among the utilities has increased and many Independent Power Producers (IPPs) now have a rich market for competition especially in the green power market. The Federal Energy Regulatory Commission (FERC) called upon utilities to develop the Regional Transmission Organization (RTO). The RTO is a step toward the national transmission grid. RTO is an independent entity that will operate the transmission system in a large region. The main goal of forming RTOs is to increase the operation efficiency of the power network under the impact of the deregulated market. The objective of this work is to study Internet based Wide Area Information Sharing (WAIS) applications in the deregulated power system. The study is the first step toward building a national transmission grid picture using information sharing among utilities. Two main topics are covered as applications for the WAIS in the deregulated power system, state estimation and Total Transfer Capability (TTC) calculations. As a first step for building this national transmission grid picture, WAIS and the level of information sharing of the state estimation calculations have been discussed. WAIS impacts to the TTC calculations are also covered. A new technique to update the TTC using on line measurements based on WAIS created by sharing state estimation is presented.

  3. Action Research on Development and Application of Internet of Things Services in Hospital.

    Science.gov (United States)

    Park, Arum; Chang, Hyejung; Lee, Kyoung Jun

    2017-01-01

    Services based on the Internet of Things (IoT) technologies have emerged in various business environments. To enhance health service quality and maximize benefits, this study applied an IoT technology based on NFC and iBeacon as an omni-channel service for patient care in hospitals. Application of the IoT technology based on NFC and iBeacon was conducted in a general hospital during August 2015 through June 2016, and the development and evaluation results were aligned to an action research framework. The five phases in the action research included diagnosing, planning action, taking action, evaluating action, and specifying learning phases. During the first two phases, problems of functional operations in a hospital were diagnosed and eight service models were designed by using iBeacon and NFC to solve the problems. Service models were applied to the hospital by installing beacons, wearable beacons, beacon scanners, and NFC tags during the third phase. During the fourth and fifth phases, the roles and benefits of stakeholders participating in the service models were evaluated, and issues and knowledge of the whole application process were derived and summarized from technological, economic, social and legal perspectives, respectively. From an action research perspective, IoT-based healthcare services were developed and verified. IoT-based services enable the hospital to acquire lifelog data for precision medicine and ultimately be able to go one step closer to precision medical care. The derived service models could provide patients more enhanced healthcare services and improve the work efficiency and effectiveness of the hospital.

  4. Safe and reliable solutions for Internet application in power sector. SAT automation

    International Nuclear Information System (INIS)

    Eichelburg, W. K.

    2004-01-01

    The requirements for communication of various information systems (control systems, EMS, ERP) continually increase. Internet is prevailingly a Universal communication device for interconnection of the distant systems at the present. However, the communication with the outside world is important, the internal system must be protected safely and reliably. The goal of the article is to inform the experienced participants with the verified solutions of the safe and reliable Internet utilization for interconnection of control systems on the superior level, the distant management, the diagnostic and for interconnection of information systems. An added value is represented by the solutions using Internet for image and sound transmission. (author)

  5. Beyond Social Media: A Cross-Sectional Survey of Other Internet and Mobile Phone Applications in a Community Psychiatry Population.

    Science.gov (United States)

    Colder Carras, Michelle; Mojtabai, Ramin; Cullen, Bernadette

    2018-03-01

    Popular media applications have been shown to benefit people with severe mental illness by facilitating communication and social support, helping patients cope with or manage symptoms, and providing a way to monitor or predict mental health states. Although many studies of technology use by individuals with severe mental illness have focused primarily on use of social media, this study provides additional information about use of Internet applications such as blogs, wikis (websites that allow collaborative editing of content and structure by users), video games, and Skype by a community psychiatry population. All English-speaking patients attending an outpatient program during a 4-week period in 2011 (N=274) were surveyed about their technology use and demographic information; 189 patients provided demographic data and comprised the sample. Among Internet users (n=112), rates of use of message boards, wikis, Skype, role-playing games, and blogs ranged from 26.8% to 34.8%. Among mobile phone users (n=162), 41.4% used their phones to access the Internet and 25.3% used Twitter on their phones. In multivariate analysis, patients who had attended or completed college had much greater odds of accessing the Internet on mobile phones. Older patients were much less likely to access the Internet or use Twitter. Our findings indicate that use of several popular forms of media is not uncommon in a community psychiatry population, but that rates of use differ on the basis of age and education. As the digital divide between people with severe mental illness and the general population is lessening, further research is needed to determine how to best leverage various types of media to support mental health recovery and complement clinical care.

  6. Chromhome: a rich internet application for accessing comparative chromosome homology maps.

    Science.gov (United States)

    Nagarajan, Sridevi; Rens, Willem; Stalker, James; Cox, Tony; Ferguson-Smith, Malcolm A

    2008-03-26

    Comparative genomics has become a significant research area in recent years, following the availability of a number of sequenced genomes. The comparison of genomes is of great importance in the analysis of functionally important genome regions. It can also be used to understand the phylogenetic relationships of species and the mechanisms leading to rearrangement of karyotypes during evolution. Many species have been studied at the cytogenetic level by cross species chromosome painting. With the large amount of such information, it has become vital to computerize the data and make them accessible worldwide. Chromhome http://www.chromhome.org is a comprehensive web application that is designed to provide cytogenetic comparisons among species and to fulfil this need. The Chromhome application architecture is multi-tiered with an interactive client layer, business logic and database layers. Enterprise java platform with open source framework OpenLaszlo is used to implement the Rich Internet Chromhome Application. Cross species comparative mapping raw data are collected and the processed information is stored into MySQL Chromhome database. Chromhome Release 1.0 contains 109 homology maps from 51 species. The data cover species from 14 orders and 30 families. The homology map displays all the chromosomes of the compared species as one image, making comparisons among species easier. Inferred data also provides maps of homologous regions that could serve as a guideline for researchers involved in phylogenetic or evolution based studies. Chromhome provides a useful resource for comparative genomics, holding graphical homology maps of a wide range of species. It brings together cytogenetic data of many genomes under one roof. Inferred painting can often determine the chromosomal homologous regions between two species, if each has been compared with a common third species. Inferred painting greatly reduces the need to map entire genomes and helps focus only on relevant

  7. Chromhome: A rich internet application for accessing comparative chromosome homology maps

    Directory of Open Access Journals (Sweden)

    Cox Tony

    2008-03-01

    Full Text Available Abstract Background Comparative genomics has become a significant research area in recent years, following the availability of a number of sequenced genomes. The comparison of genomes is of great importance in the analysis of functionally important genome regions. It can also be used to understand the phylogenetic relationships of species and the mechanisms leading to rearrangement of karyotypes during evolution. Many species have been studied at the cytogenetic level by cross species chromosome painting. With the large amount of such information, it has become vital to computerize the data and make them accessible worldwide. Chromhome http://www.chromhome.org is a comprehensive web application that is designed to provide cytogenetic comparisons among species and to fulfil this need. Results The Chromhome application architecture is multi-tiered with an interactive client layer, business logic and database layers. Enterprise java platform with open source framework OpenLaszlo is used to implement the Rich Internet Chromhome Application. Cross species comparative mapping raw data are collected and the processed information is stored into MySQL Chromhome database. Chromhome Release 1.0 contains 109 homology maps from 51 species. The data cover species from 14 orders and 30 families. The homology map displays all the chromosomes of the compared species as one image, making comparisons among species easier. Inferred data also provides maps of homologous regions that could serve as a guideline for researchers involved in phylogenetic or evolution based studies. Conclusion Chromhome provides a useful resource for comparative genomics, holding graphical homology maps of a wide range of species. It brings together cytogenetic data of many genomes under one roof. Inferred painting can often determine the chromosomal homologous regions between two species, if each has been compared with a common third species. Inferred painting greatly reduces the need to

  8. Change of Address Applications filed via the Internet - FY 2016 (53rd week)

    Data.gov (United States)

    Social Security Administration — This dataset provides monthly volumes at the national level from federal fiscal year 2016 for Internet Change of Address. This dataset includes data from the extra...

  9. Enhancing prospective chemistry teachers cognitive structures in the topics of bonding and hybridization by internet-assisted chemistry applications

    Directory of Open Access Journals (Sweden)

    Özge Özyalçın Oskay, Sinem Dinçol

    2011-08-01

    Full Text Available The purpose of this study is to determine the effects of internet-assisted chemistry applications on prospective chemistry teachers’ cognitive structures in the topics of bonding and hybridization. The sample of the study consisted of 36 prospective chemistry teachers attending Hacettepe University, Faculty of Education, the Department of Chemistry Education in 2010-2011 academic year and taking Basic Chemistry I lesson. In the study, students were separated into experimental and control groups according to their pre-cognitive structures. Students were requested to answer two open ended questions. Answers by each student were gathered and evaluated by flow map method. “Bonding and hybridization” topics were taught to control group with traditional teaching method and to experimental group besides traditional method internet-assisted applications were conducted. The same open-ended questions were given to both groups and their cognitive structures were examined once more. The differences between control and experimental groups’ cognitive structures were examined. A significant difference was identified in favour of experimental group (p<0, 05. The mean score of the Experimental group was X=19.94, and the mean score of the Control group was X=13.88. In addition, subsequent to internet assisted chemistry applications differences in terms of concepts and descriptions in prospective chemistry teachers’ in experimental and control group cognitive structure have been determined. When post flow maps of prospective chemistry teachers in experimental group, on whom internet assisted chemistry applications were made, are formed, it has been determined that there are more statements about hybridization, hybridization types, molecule geometry and bond angles compared to control grou

  10. Enhancing prospective chemistry teachers cognitive structures in the topics of bonding and hybridization by internet-assisted chemistry applications

    OpenAIRE

    Özge Özyalçın Oskay, Sinem Dinçol

    2011-01-01

    The purpose of this study is to determine the effects of internet-assisted chemistry applications on prospective chemistry teachers’ cognitive structures in the topics of bonding and hybridization. The sample of the study consisted of 36 prospective chemistry teachers attending Hacettepe University, Faculty of Education, the Department of Chemistry Education in 2010-2011 academic year and taking Basic Chemistry I lesson. In the study, students were separated into experimental and control gr...

  11. CISCO SYSTEM’S STRATEGIC USE OF THE INTERNET AND BUSINESS APPLICATIONS

    OpenAIRE

    Abdurrahman Celebi; Raju Vijaya

    2011-01-01

    Information systems are the key decision component of a firm’s business strategy. Cisco made use of internet and its information systems to accomplish its following strategies: to create a business ecology market its technology to networking world; to create a virtual organization and outsourcing many operational and customer services and focusing its resources on its own core product innovation strategy; to showcase its own internet use as a marketing tool. Cisco’s strategy enabl...

  12. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire (IRSN), 92 - Fontenay-aux-Roses (France)

    2009-07-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection, and environment shared by sites in France, Europe, big agencies and non-ionizing radiations. (N.C.)

  13. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Societe Francaise de Radioprotection, 75 - Paris (France)

    2008-04-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  14. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2010-01-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  15. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire, IRSN, 92 - Fontenay aux Roses (France)

    2009-10-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear medicine and ionizing radiation, nuclear activity, radiation protection for populations, radioactive waste management in France and Europe. (N.C.)

  16. An application of the TODIM method to the evaluation of Broadband Internet plans

    Directory of Open Access Journals (Sweden)

    Luís Alberto Duncan Rangel

    2011-08-01

    Full Text Available This article presents a case study of the evaluation of the various types of access to the Broadband Internet available to a small company, located in Volta Redonda, in the state of Rio de Janeiro. This small company needs to implement Broadband Internet in its establishment and sought an evaluation of the companies which work providing this type of service. With the aim of carrying out a technical evaluation of the provision of the Broadband Internet service and, considering the diverse points of view and needs of this small company, a Multicriteria Decision Aiding Method, the TODIM method, was used. By means of this research, the power of this Operational Research tool was verified in the search for the solution to the problem of ranking the services offered in the city, according to the criteria chosen by this small company.

  17. Development, management and benefit from Internet-based geospatial data sources through knowledge management for GIS-based regional geography applications

    International Nuclear Information System (INIS)

    Thunemann, H.G.

    2009-01-01

    The provision of data and information on the Internet is growing daily. For geoscientific applications, especially using geographic information systems (GIS), changing geospacial data are often needed, and thus possibly different data sources. Geospatial data should be easily available. As an increasingly important medium for exchange of geospatial data is the internet. The problem of finding appropriate datasources on the Internet remains to the user. The Internet as a technical basis, which was designed as a tool for information exchange, has changed the practice of dealing with knowledge and information on fundamental and not previously foreseeable manner. From the many individual acts social consequences result, concerning the production and disposal of knowledge. These determine the development of different solutions significantly, which also includes the production, deployment and use of geospatial data, with all its strengths and problems. Various solutions to the provision of geospatial data are available on the Internet, the targeted searching of this geodata sources on the Internet remains a shortcoming. The options of knowledge management, among other solutions, could be a possibility to ease the compilation, storage, connection, popularization and ultimately the application of geodata sources on the Internet. Communication, as a central element of the use of knowledge management, should be used in the form of a communication platform. The present study describes the variety of deployment options of geospatial data and the problems of finding data sources on the Internet. Potential hazards of geospatial data provision (also) via the Internet as well as an option to manage, update and use them for various applications on the Internet are are pointed out. (author) [de

  18. Design and Implement AN Interoperable Internet of Things Application Based on AN Extended Ogc Sensorthings Api Standard

    Science.gov (United States)

    Huang, C. Y.; Wu, C. H.

    2016-06-01

    The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring and physical mashup applications can be constructed to improve people's daily life. However, IoT devices created by different manufacturers follow different proprietary protocols and cannot communicate with each other. This heterogeneity issue causes different products to be locked in multiple closed ecosystems that we call IoT silos. In order to address this issue, a common industrial solution is the hub approach, which implements connectors to communicate with IoT devices following different protocols. However, with the growing number of proprietary protocols proposed by device manufacturers, IoT hubs need to support and maintain a lot of customized connectors. Hence, we believe the ultimate solution to address the heterogeneity issue is to follow open and interoperable standard. Among the existing IoT standards, the Open Geospatial Consortium (OGC) SensorThings API standard supports comprehensive conceptual model and query functionalities. The first version of SensorThings API mainly focuses on connecting to IoT devices and sharing sensor observations online, which is the sensing capability. Besides the sensing capability, IoT devices could also be controlled via the Internet, which is the tasking capability. While the tasking capability was not included in the first version of the SensorThings API standard, this research aims on defining the tasking capability profile and integrates with the SensorThings API standard, which we call the extended-SensorThings API in this paper. In general, this research proposes a lightweight JSON-based web service description, the "Tasking Capability Description", allowing device owners and manufacturers to describe different IoT device protocols. Through the extended- SensorThings API, users and applications can follow a coherent protocol to control Io

  19. The Application Research of Modern Intelligent Cold Chain Distribution System Based on Internet of Things Technology

    Science.gov (United States)

    Fan, Dehui; Gao, Shan

    This paper implemented an intelligent cold chain distribution system based on the technology of Internet of things, and took the protoplasmic beer logistics transport system as example. It realized the remote real-time monitoring material status, recorded the distribution information, dynamically adjusted the distribution tasks and other functions. At the same time, the system combined the Internet of things technology with weighted filtering algorithm, realized the real-time query of condition curve, emergency alarming, distribution data retrieval, intelligent distribution task arrangement, etc. According to the actual test, it can realize the optimization of inventory structure, and improve the efficiency of cold chain distribution.

  20. Obtaining Application-based and Content-based Internet Traffic Statistics

    DEFF Research Database (Denmark)

    Bujlow, Tomasz; Pedersen, Jens Myrup

    2012-01-01

    the Volunteer-Based System for Research on the Internet, developed at Aalborg University, is capable of providing detailed statistics of Internet usage. Since an increasing amount of HTTP traffic has been observed during the last few years, the system also supports creating statistics of different kinds of HTTP...... traffic, like audio, video, file transfers, etc. All statistics can be obtained for individual users of the system, for groups of users, or for all users altogether. This paper presents results with real data collected from a limited number of real users over six months. We demonstrate that the system can...

  1. Internet Alternatifs

    OpenAIRE

    Dulong de Rosnay , Melanie; Musiani , Francesca

    2015-01-01

    International audience; L'Internet est constitué de différents éléments et couches, qui peuvent être développés, façonnés et organisés de plusieurs manières : le réseau, l'hébergement, les applications, la connexion locale, les contenus. Si le concept de décentralisation est en quelque sorte inscrit dans le principe même de l'Internet – et notamment dans l'organisation de la circulation des flux – son urbanisme actuel semble n'intégrer ce principe que de manière limitée, et certains des risqu...

  2. Development of applications in Internet for the calculation of solar control devices; Desarrollo de una aplicacion en Internet para el calculo de dispositivos de control solar

    Energy Technology Data Exchange (ETDEWEB)

    Perez V, Jesus B; Robles G, Saul; Villa M, Hector A; Cabanillas L, Rafael E [Universidad de Sonora, Hermosillo, Sonora (Mexico)

    2000-07-01

    In this work the development of an interactive software, visible over the World Wide Web, is presented to support the basic calculation required to control the solar gain inside buildings and houses. The site has two main parts: one part describes in a very required parameters to design devices for the control of the illumination inside the buildings, like overhangs and wingwalls for shading. The other part has the routines and procedures to calculate the sun position for any date and position over the earth, and the horizontal and vertical protection angles. The part to implement the calculations has been developed as a Java applet which can run on any platform and let the users, in an interactive way, to get the results. This software makes possible that any Internet user can run the application from his/her own computer without having to compile of use sophisticated procedures as it happens with traditional languages. With this web site it is intended to cover the necessity of having simple and reliable means for architects and civil engineers to support the use of solar energy and the saving of energy in bioclimatic design of buildings. [Spanish] En este trabajo se presenta el desarrollo de un sitio interactivo visible en el World Wide Web (WWW) que pretende servir de apoyo para los calculos basicos de control de asoleamiento en viviendas y edificios. El sitio esta conformado por dos partes principales: una parte cubre el aspecto informativo, donde en forma sencilla y clara, se explican los conceptos y parametros necesarios para disenar los dispositivos de control, alerones y parteluces. La otra parte contiene los procedimientos y las rutinas de calculo para la determinacion de la posicion solar para cualquier fecha del ano desde cualquier punto sobre la tierra, asi como los angulos de sombreado vertical y horizontal. Para la realizacion de los calculos se ha construido un applet de Java, el cual puede ejecutarse desde cualquier plataforma de computacion y

  3. Widespread use of internet, applications, and social media in the professional life of urology residents.

    Science.gov (United States)

    Salem, Johannes; Borgmann, Hendrik; Baunacke, Martin; Boehm, Katharina; Hanske, Julian; Macneily, Andrew; Meyer, Christian; Nestler, Tim; Schmid, Marianne; Huber, Johannes

    2017-09-01

    Digital media have revolutionized communication and information dissemination in healthcare. We aimed to quantify and evaluate professional digital media use among urology residents. We designed a 17-item survey to assess usage and perceived usefulness of digital media, as well as communication type and device type and distributed it via email to 143 Canadian and 721 German urology residents. In total, 58 (41% response rate) residents from Canada and 170 (24% response rate) from Germany reported professional usage rates of 100% on the internet, 89% on apps, and 46% on social media (SoMe). For professional use, residents spent a median of 30 minutes per day on the internet, 10 minutes on apps, and 15 minutes on SoMe. 100% rated the internet, 89% apps, and 31% SoMe as useful for clinical practice. Most (94%) used digital media for communication with colleagues and 23% for communication with patients. Digital media use was allocated to desktop computers (55%) and mobile devices (45%). Canadian residents had higher usage rates of apps (96% vs. 86%; p=0.042) and SoMe (65% vs. 39%; p=0.002) and longer daily usage times for the internet, apps, and SoMe than German residents (pmedia are an integral part of the daily professional practice of urology residents, reflected by high usage rates and perceived usefulness of the internet and apps, and the growing importance of SoMe. Urologists should strive to progressively exhaust the vast potential of digital media for academic and clinical practice.

  4. Widespread use of internet, applications, and social media in the professional life of urology residents

    Science.gov (United States)

    Salem, Johannes; Borgmann, Hendrik; Baunacke, Martin; Boehm, Katharina; Hanske, Julian; MacNeily, Andrew; Meyer, Christian; Nestler, Tim; Schmid, Marianne; Huber, Johannes

    2017-01-01

    Introduction Digital media have revolutionized communication and information dissemination in healthcare. We aimed to quantify and evaluate professional digital media use among urology residents. Methods We designed a 17-item survey to assess usage and perceived usefulness of digital media, as well as communication type and device type and distributed it via email to 143 Canadian and 721 German urology residents. Results In total, 58 (41% response rate) residents from Canada and 170 (24% response rate) from Germany reported professional usage rates of 100% on the internet, 89% on apps, and 46% on social media (SoMe). For professional use, residents spent a median of 30 minutes per day on the internet, 10 minutes on apps, and 15 minutes on SoMe. 100% rated the internet, 89% apps, and 31% SoMe as useful for clinical practice. Most (94%) used digital media for communication with colleagues and 23% for communication with patients. Digital media use was allocated to desktop computers (55%) and mobile devices (45%). Canadian residents had higher usage rates of apps (96% vs. 86%; p=0.042) and SoMe (65% vs. 39%; p=0.002) and longer daily usage times for the internet, apps, and SoMe than German residents (pmedia are an integral part of the daily professional practice of urology residents, reflected by high usage rates and perceived usefulness of the internet and apps, and the growing importance of SoMe. Urologists should strive to progressively exhaust the vast potential of digital media for academic and clinical practice. PMID:29382458

  5. Seeking sex partners through the internet and mobile phone applications among men who have sex with men in Taiwan.

    Science.gov (United States)

    Ko, Nai-Ying; Tseng, Po-Chia; Huang, Yu-Chao; Chen, Yen-Chin; Hsu, Su-Ting

    2016-07-01

    It has become popular for men who have sex with men (MSM) to use mobile-phone geosocial networking applications (mobile apps) to find sex partners. A cross-sectional online survey was conducted in Taiwan to compare the sexual and substance-use behaviors of MSM seeking sex partners through the internet and mobile apps. Of the 1060 participants, 65.8% used the internet via computer and 37.7% used a mobile app to find sexual partners, while 30.3% used recreational drugs or alcohol in the previous 6 months. MSM who exclusively used mobile apps to seek sex partners were significantly more likely than MSM seeking sex via computer to be older, to have used recreational drugs or alcohol, and to have sex with HIV-positive partners. Additionally, using mobile apps to seek sex partners was significantly associated with having sex with online partners through either mobile apps or computer-based internet use (adjusted odds ratio (AOR), 7.12 [3.87-13.11]), self-reporting as HIV-positive (AOR, 2.24 [1.12-4.12]), using recreational drugs (AOR, 1.67 [1.21-2.32]), having disclosed HIV status to sexual partners (AOR, 1.44 [1.03-2.02]), and having sex with HIV-positive partners (AOR, 1.81 [1.06-3.10]). In conclusion, the mobile apps may serve as a feasible platform for HIV-positive MSM to find other HIV-positive partners.

  6. Astronomy from the chair - the application of the Internet in promoting of Astronomy

    Science.gov (United States)

    Tomic, Zoran

    2014-05-01

    Internet and modern communication technologies are an indispensable part of modern life. The use of the Internet makes it possible to enhance the education and expand opportunities for acquiring new knowledge. One example is Astronomy, where today thanks to the Internet, we can control telescopes that are distant from us and listen to lectures from Universities in other countries. "Astronomy from the chair" is the name for a concept where amateur astronomers can deal with astronomy from their homes using the Internet. The concept can be divided into four sections depending on the content being offered: Robotic Observatory, Virtual Observatory, Online astronomy broadcasting and Online courses. Robotic observatory is defined as an astronomical instrument and detection system that enables efficient observation without the need of a person's physical intervention. Virtual Observatory is defined as a collection of databases and software tools that use the Internet as a platform for scientific research. Online astronomy broadcasting is part of concept "Astronomy from the chair" which gives users the opportunity to get directly involved in astronomical observation organized by an amateur astronomer from somewhere in the world. Online courses are groups of sites and organizations that provide the opportunity to amateur astronomers to attend lectures, save and watch video materials from lectures, do homework, communicate with other seminar participants and in that way become familiar with the various areas of Astronomy. This paper discusses a new concept that describes how the Internet can be applied in modern education. In this paper will be described projects that allows a large number of astronomy lovers to do their own research without the need to own a large and expensive set of astronomical equipment (Virtual Telescope from Italy, Observatory "Night Hawk" from Serbia and project "Astronomy from an armchair" at Faculty of Sciences and Mathematics in Nis), to help

  7. A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications

    OpenAIRE

    Sikder, Amit Kumar; Petracca, Giuseppe; Aksu, Hidayet; Jaeger, Trent; Uluagac, A. Selcuk

    2018-01-01

    The concept of Internet of Things (IoT) has become more popular in the modern era of technology than ever before. From small household devices to large industrial machines, the vision of IoT has made it possible to connect the devices with the physical world around them. This increasing popularity has also made the IoT devices and applications in the center of attention among attackers. Already, several types of malicious activities exist that attempt to compromise the security and privacy of...

  8. Big Data, Internet of Things and Cloud Convergence--An Architecture for Secure E-Health Applications.

    Science.gov (United States)

    Suciu, George; Suciu, Victor; Martian, Alexandru; Craciunescu, Razvan; Vulpe, Alexandru; Marcu, Ioana; Halunga, Simona; Fratu, Octavian

    2015-11-01

    Big data storage and processing are considered as one of the main applications for cloud computing systems. Furthermore, the development of the Internet of Things (IoT) paradigm has advanced the research on Machine to Machine (M2M) communications and enabled novel tele-monitoring architectures for E-Health applications. However, there is a need for converging current decentralized cloud systems, general software for processing big data and IoT systems. The purpose of this paper is to analyze existing components and methods of securely integrating big data processing with cloud M2M systems based on Remote Telemetry Units (RTUs) and to propose a converged E-Health architecture built on Exalead CloudView, a search based application. Finally, we discuss the main findings of the proposed implementation and future directions.

  9. Application of an internet web-site of medical images in tele-radiology

    International Nuclear Information System (INIS)

    Wang Weizhong; Wang Hua; Xie Jingxia; Wang Songzhang; Li Xiangdong; Qian Min; Cao Huixia

    2000-01-01

    Objective: To build and Internet web-site of medical images for tele-education and tele-consultation. Methods: Collecting medical images of cases that fulfilled diagnostic standards for teaching and were pathologically proved. The images were digitized using digital camera and scanner. Frontpage 98, Homesite 2.5 and text editors were used for programming. Results: The web site encompasses many useful cases and was update every week. With smart and friendly interface, easy used navigation, the site runs reliably in TCP/IP environment. The site's URL is http://imager.163.net. At present, the site has received about 100 visits per week. Conclusion: The well-designed and programmed internet web site of medical images would be easily acceptable and is going to play an important role in tele-education and tele-consultation

  10. Knowledge Management Application of Internet of Things in Construction Waste Logistics with RFID Technology

    OpenAIRE

    ZHANG, Lizong; ATKINS, Anthony; YU, Hongnian

    2012-01-01

    The Internet of Things (IoT) is an emerging concept and that is currently under creation and\\ud development. However, it has already made an impact on many research domains by providing new solutions and ideas particularly in waste management and recycling. The IoT concept has provided a new research path that is conducive with public awareness of environmental protection considerations and improving recycling rates. This paper focuses on plasterboard waste as an example to propose a smart wa...

  11. NET-COMPUTER: Internet Computer Architecture and its Application in E-Commerce

    OpenAIRE

    P. O. Umenne; M. O. Odhiambo

    2012-01-01

    Research in Intelligent Agents has yielded interesting results, some of which have been translated into commer­cial ventures. Intelligent Agents are executable software components that represent the user, perform tasks on behalf of the user and when the task terminates, the Agents send the result to the user. Intelligent Agents are best suited for the Internet: a collection of computers connected together in a world-wide computer network. Swarm and HYDRA computer architectures for Agents’ ex...

  12. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [IRSN, 92 - Fontenay-aux-Roses (France)

    2010-04-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection in nuclear medicine, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  13. A Practical Application Combining Wireless Sensor Networks and Internet of Things: Safety Management System for Tower Crane Groups

    Directory of Open Access Journals (Sweden)

    Dexing Zhong

    2014-07-01

    Full Text Available The so-called Internet of Things (IoT has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC, is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE installed in the driver’s operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP through General Packet Radio Service (GPRS. Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things.

  14. A Practical Application Combining Wireless Sensor Networks and Internet of Things: Safety Management System for Tower Crane Groups

    Science.gov (United States)

    Zhong, Dexing; Lv, Hongqiang; Han, Jiuqiang; Wei, Quanrui

    2014-01-01

    The so-called Internet of Things (IoT) has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC), is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE) installed in the driver's operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT) at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP) through General Packet Radio Service (GPRS). Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC) or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things. PMID:25196106

  15. A practical application combining wireless sensor networks and Internet of Things: Safety Management System for Tower Crane Groups.

    Science.gov (United States)

    Zhong, Dexing; Lv, Hongqiang; Han, Jiuqiang; Wei, Quanrui

    2014-07-30

    The so-called Internet of Things (IoT) has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC), is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE) installed in the driver's operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT) at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP) through General Packet Radio Service (GPRS). Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC) or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things.

  16. Internet of Things (IoT) Applicability in a Metropolitan City

    OpenAIRE

    Dr. D Mohammed

    2015-01-01

    Internet of Things (IoT)is defined here as a network of interconnected objects. These objects can include several technological systems. This paper examines the wireless communication systems and IoT sensors. IoT is technically feasible today, allowing people and things to be connected anytime, anyplace, with anything and anyone. IoT privacy is a concern but security solutions exist today to solve these issues. A proposal is made to use secure IoT solutions in supporting the metropolitan need...

  17. A Survey on Application Layer Protocols for the Internet of Things

    OpenAIRE

    Karagiannis, Vasileios; Chatzimisios, Periklis; Vázquez-Gallego, Francisco; Alonso-Zárate, Jesús

    2015-01-01

    It has been more than fifteen years since the term Internet of Things (IoT) was introduced to the public. However, despite the efforts of research groups and innovative corporations, still today it is not possible to say that IoT is upon us. This is mainly due to the fact that a unified IoT architecture has not been yet clearly defined and there is no common agreement in defining protocols and standards for all IoT parts. The framework that current IoT platforms use consists mostly in technol...

  18. Internet Addiction: A Current Review

    Directory of Open Access Journals (Sweden)

    Hasan Bozkurt

    2016-09-01

    Full Text Available Internet addiction, which has become a global social issue, can be broadly conceptualized as an inability to control ones use of the Internet which leads to negative consequences in daily life. Only Internet Gaming Disorder has been included in the appendix of the diagnostic and statistical manual of mental disorders fifth edition (DSM-5, but it has already been argued that Internet addiction could also comprise problematic use of other Internet applications developing an addictive behavior. This paper aims to give a current review of the gradually evolving body of literature on Internet addiction. [J Contemp Med 2016; 6(3.000: 235-247

  19. Applicability of internet search index for asthma admission forecast using machine learning.

    Science.gov (United States)

    Luo, Li; Liao, Chengcheng; Zhang, Fengyi; Zhang, Wei; Li, Chunyang; Qiu, Zhixin; Huang, Debin

    2018-04-15

    This study aimed to determine whether a search index could provide insight into trends in asthma admission in China. An Internet search index is a powerful tool to monitor and predict epidemic outbreaks. However, whether using an internet search index can significantly improve asthma admissions forecasts remains unknown. The long-term goal is to develop a surveillance system to help early detection and interventions for asthma and to avoid asthma health care resource shortages in advance. In this study, we used a search index combined with air pollution data, weather data, and historical admissions data to forecast asthma admissions using machine learning. Results demonstrated that the best area under the curve in the test set that can be achieved is 0.832, using all predictors mentioned earlier. A search index is a powerful predictor in asthma admissions forecast, and a recent search index can reflect current asthma admissions with a lag-effect to a certain extent. The addition of a real-time, easily accessible search index improves forecasting capabilities and demonstrates the predictive potential of search index. Copyright © 2018 John Wiley & Sons, Ltd.

  20. Development of internet-based information systems using software components with the emphasis on the application in the military organization

    Directory of Open Access Journals (Sweden)

    Miloš J. Pejanović

    2011-01-01

    Full Text Available The development of personal computers and Internet technology causes continuous changes in methodological approaches and concepts of development of information systems. Most existing information systems, due to their heterogeneity, have a problem of integration of subsystems. In order to overcome this problem, software vendors offer different solutions. In this work we explore different approaches and propose an optimal way, with a special emphasis on its application in the military organization. By applying modern approaches in the development of information systems on the concept of distributed component systems, we come to the set of proposed solutions from different manufacturers. The solutions are related to the mechanisms which should ensure that components written in different languages cooperate with each other in heterogeneous systems that are in different nodes in the computer network. This work describes the concept of component distributed information systems of Internet technology and their capabilities and offers a solution specifying the implementation environment in the military organization. Access to the development of information systems In the development of information systems, an important role is given to the choice of appropriate methods and tools. For large systems such as military organizations, standardized procedures and methodologies for the development of information systems are recommended. There are different methodological approaches in the development of information systems: a systematic integrated approach to development (from design, implementation to implementation and maintenance and development of information systems as technical - technological structures (standard computer and network service. The combination of these two approaches leads to the concept of 'open systems' that allow different standards and IT services to operate on these systems. The UML system description of the process of software

  1. Study on data compression algorithm and its implementation in portable electronic device for Internet of Things applications

    Directory of Open Access Journals (Sweden)

    Khairi Nor Asilah

    2017-01-01

    Full Text Available An Internet of Things (IoT device is usually powered by a small battery, which does not last long. As a result, saving energy in IoT devices has become an important issue when it comes to this subject. Since power consumption is the primary cause of radio communication, some researchers have proposed several compression algorithms with the purpose of overcoming this particular problem. Several data compression algorithms from previous reference papers are discussed in this paper. The description of the compression algorithm in the reference papers was collected and summarized in a table form. From the analysis, MAS compression algorithm was selected as a project prototype due to its high potential for meeting the project requirements. Besides that, it also produced better performance regarding energy-saving, better memory usage, and data transmission efficiency. This method is also suitable to be implemented in WSN. MAS compression algorithm will be prototyped and applied in portable electronic devices for Internet of Things applications.

  2. Study on data compression algorithm and its implementation in portable electronic device for Internet of Things applications

    Science.gov (United States)

    Asilah Khairi, Nor; Bahari Jambek, Asral

    2017-11-01

    An Internet of Things (IoT) device is usually powered by a small battery, which does not last long. As a result, saving energy in IoT devices has become an important issue when it comes to this subject. Since power consumption is the primary cause of radio communication, some researchers have proposed several compression algorithms with the purpose of overcoming this particular problem. Several data compression algorithms from previous reference papers are discussed in this paper. The description of the compression algorithm in the reference papers was collected and summarized in a table form. From the analysis, MAS compression algorithm was selected as a project prototype due to its high potential for meeting the project requirements. Besides that, it also produced better performance regarding energy-saving, better memory usage, and data transmission efficiency. This method is also suitable to be implemented in WSN. MAS compression algorithm will be prototyped and applied in portable electronic devices for Internet of Things applications.

  3. Infinite horizon optimal impulsive control with applications to Internet congestion control

    Science.gov (United States)

    Avrachenkov, Konstantin; Habachi, Oussama; Piunovskiy, Alexey; Zhang, Yi

    2015-04-01

    We investigate infinite-horizon deterministic optimal control problems with both gradual and impulsive controls, where any finitely many impulses are allowed simultaneously. Both discounted and long-run time-average criteria are considered. We establish very general and at the same time natural conditions, under which the dynamic programming approach results in an optimal feedback policy. The established theoretical results are applied to the Internet congestion control, and by solving analytically and nontrivially the underlying optimal control problems, we obtain a simple threshold-based active queue management scheme, which takes into account the main parameters of the transmission control protocols, and improves the fairness among the connections in a given network.

  4. Accessibility and preferred use of online Web applications among WIC participants with Internet access.

    Science.gov (United States)

    Bensley, Robert J; Hovis, Amanda; Horton, Karissa D; Loyo, Jennifer J; Bensley, Kara M; Phillips, Diane; Desmangles, Claudia

    2014-01-01

    This study examined the current technology use of clients in the western Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) region and the preferences these current clients have for using new technologies to interact with WIC. Cross-sectional convenience sample for online survey of WIC clients over 2 months in 2011. A weighted sample of 8,144 participants showed that the majority of WIC clients have access to the Internet using a computer or mobile phone. E-mail, texting, and Facebook were technologies most often used for communication. Significant differences (P video chat. Technologies should be considered for addressing WIC clients' needs, including use of text messaging and smartphone apps for appointments, education, and other WIC services; online scheduling and nutrition education; and a stronger Facebook presence for connecting with WIC clients and breastfeeding support. Published by Elsevier Inc.

  5. Internet Economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1998-01-01

    Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing.......Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing....

  6. Internet economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1997-01-01

    A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect.......A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect....

  7. Internet marketing

    OpenAIRE

    Zelený, Martin

    2009-01-01

    In the bachelor thesis are introduced theoretical concepts of the Internet and marketing, accented the need of marketing mix along with its specifics of the internet environment. Next is interpreted which tools can be used for marketing of firms and which marketing instruments are to be deployed. Final chapter illustrates socio-demographics of Czech internet users along with media market allocation from the perspective of all media as well as in the segment of the Internet.

  8. Wireless, battery-operated data acquisition system for mobile spectrometry applications and (potentially) for the Internet of things

    Science.gov (United States)

    Fitzgerald, Ryan; Karanassios, Vassili

    2017-05-01

    There are many applications requiring chemical analysis in the field and analytical results in (near) real-time. For example, when accidental spills occur. In others, collecting samples in the field followed by analysis in a lab increases costs and introduces time-delays. In such cases, "bring part of the lab to the sample" would be ideal. Toward this ideal (and to further reduce size and weight), we developed a relatively inexpensive, battery-operated, wireless data acquisition hardware system around an Arduino nano micro-controller and a 16-bit ADC (Analog-to- Digital Converter) with a max sampling rate of 860 samples/s. The hardware communicates the acquired data using low-power Bluetooth. Software for data acquisition and data display was written in Python. Potential ways of making the hardware-software approach described here a part of the Internet-of-Things (IoT) are presented.

  9. Internet accounting

    NARCIS (Netherlands)

    Pras, Aiko; van Beijnum, Bernhard J.F.; Sprenkels, Ron; Parhonyi, R.

    2001-01-01

    This article provides an introduction to Internet accounting and discusses the status of related work within the IETF and IRTF, as well as certain research projects. Internet accounting is different from accounting in POTS. To understand Internet accounting, it is important to answer questions like

  10. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  11. Application of Docker Swarm cluster for testing programs, developed for system of devices within paradigm of Internet of things

    Science.gov (United States)

    Shichkina, Y. A.; Kupriyanov, M. S.; Moldachev, S. O.

    2018-05-01

    Today, a description of various Internet devices very often appears on the Internet. For the efficient operation of the Industrial Internet of things, it is necessary to provide a modern level of data processing starting from getting them from devices ending with returning them to devices in a processed form. Current solutions of the Internet of Things are mainly focused on the development of centralized decisions, projecting the Internet of Things on the set of cloud-based platforms that are open, but limit the ability of participants of the Internet of Things to adapt these systems to their own problems. Therefore, it is often necessary to create specialized software for specific areas of the Internet of Things. This article describes the solution of the problem of virtualization of the system of devices based on the Docker system. This solution allows developers to test any software on any number of devices forming a mesh.

  12. Modern tools for development of interactive web map applications for visualization spatial data on the internet

    Directory of Open Access Journals (Sweden)

    Horáková Bronislava

    2009-11-01

    Full Text Available In the last few years has begun the development of dynamic web applications, often called Web2.0. From this development wascreated a technology called Mashups. Mashups may easily combine huge amounts of data sources and functionalities of existing as wellas future web applications and services. Therefore they are used to develop a new device, which offers new possibilities of informationusage. This technology provides possibilities of developing basic as well as robust web applications not only for IT or GIS specialists,but also for common users. Software companies have developed web projects for building mashup application also called mashupeditors.

  13. Disability Insurance Applications Filed via the Internet - FY 2008-2011

    Data.gov (United States)

    Social Security Administration — This dataset provides monthly data at the national level from federal fiscal year 2008 - 2011 for initial Social Security Disability Insurance (SSDI) applications...

  14. Internet Astrometry

    Science.gov (United States)

    Caballero, Rafael; Argyle, R. W.

    Amateur astronomers can carry out scientific research in many different ways. Some activities require expensive telescopes, cameras, and often access to dark skies. But those who live in highly polluted areas, or do not have access to very specialized equipment, still have many possibilities; amongst which is using the online resources available from the internet. In this chapter we explore Aladin, Simbad, and VizieR, three resources created and maintained by the Centre de Données astronomiques de Strasbourg (CDS). Although these applications are intended for professional astronomers, they are also freely available for amateurs. They allow us to find and measure old neglected difficult pairs, discover new double stars, and in general have a better understanding of those tiny pairs of points of light that we love to observe, photograph and measure.

  15. Internet of Things based on smart objects technology, middleware and applications

    CERN Document Server

    Trunfio, Paolo

    2014-01-01

    The Internet of Things (IoT) usually refers to a world-wide network of interconnected heterogeneous objects (sensors, actuators, smart devices, smart objects, RFID, embedded computers, etc) uniquely addressable, based on standard communication protocols. Beyond such a definition, it is emerging a new definition of IoT seen as a loosely coupled, decentralized system of cooperating smart objects (SOs). A SO is an autonomous, physical digital object augmented with sensing/actuating, processing, storing, and networking capabilities. SOs are able to sense/actuate, store, and interpret information created within themselves and around the neighbouring external world where they are situated, act on their own, cooperate with each other, and exchange information with other kinds of electronic devices and human users. However, such SO-oriented IoT raises many in-the-small and in-the-large issues involving SO programming, IoT system architecture/middleware and methods/methodologies for the development of SO-based applica...

  16. Classification Based on Pruning and Double Covered Rule Sets for the Internet of Things Applications

    Science.gov (United States)

    Zhou, Zhongmei; Wang, Weiping

    2014-01-01

    The Internet of things (IOT) is a hot issue in recent years. It accumulates large amounts of data by IOT users, which is a great challenge to mining useful knowledge from IOT. Classification is an effective strategy which can predict the need of users in IOT. However, many traditional rule-based classifiers cannot guarantee that all instances can be covered by at least two classification rules. Thus, these algorithms cannot achieve high accuracy in some datasets. In this paper, we propose a new rule-based classification, CDCR-P (Classification based on the Pruning and Double Covered Rule sets). CDCR-P can induce two different rule sets A and B. Every instance in training set can be covered by at least one rule not only in rule set A, but also in rule set B. In order to improve the quality of rule set B, we take measure to prune the length of rules in rule set B. Our experimental results indicate that, CDCR-P not only is feasible, but also it can achieve high accuracy. PMID:24511304

  17. Identifying the Applications of Internet of Things in the Smart Home by Using Meta synthesis Method

    Directory of Open Access Journals (Sweden)

    manochehr ansari

    2017-12-01

    Full Text Available There is quite huge annual energy consumption in Iran in household, commercial, and public sectors. In addition, the index of population aging manifests a great increase in recent years. Concurrent to all these, smart houses which are equipped with Internet of Things (IoT can help us maintain sustainable developments with functionalities such as improvements in energy consumption and health, to name but a few. Accordingly, in this thesis, we aimed to identify the usage and functions of IoT in smart houses. This research is an applied research in nature and it would be classified as qualitative regarding data collection. In order to identify the usages of IoT in smart houses with the help of meta-synthesis approach, we have examined 371 researches among which only 85 have been selected for the final analysis. 122 factors have been extracted based on these 85 researches which have been combined into 7 main usages of “electricity consumption management”, “Heating, ventilation and air conditioning System”, “water consumption control”, “security empowerment for the buildings and the neighborhood”, “health monitoring”, “crisis management”, and home appliance automation.

  18. Classification based on pruning and double covered rule sets for the internet of things applications.

    Science.gov (United States)

    Li, Shasha; Zhou, Zhongmei; Wang, Weiping

    2014-01-01

    The Internet of things (IOT) is a hot issue in recent years. It accumulates large amounts of data by IOT users, which is a great challenge to mining useful knowledge from IOT. Classification is an effective strategy which can predict the need of users in IOT. However, many traditional rule-based classifiers cannot guarantee that all instances can be covered by at least two classification rules. Thus, these algorithms cannot achieve high accuracy in some datasets. In this paper, we propose a new rule-based classification, CDCR-P (Classification based on the Pruning and Double Covered Rule sets). CDCR-P can induce two different rule sets A and B. Every instance in training set can be covered by at least one rule not only in rule set A, but also in rule set B. In order to improve the quality of rule set B, we take measure to prune the length of rules in rule set B. Our experimental results indicate that, CDCR-P not only is feasible, but also it can achieve high accuracy.

  19. Combining wireless sensor networks and semantic middleware for an Internet of Things-based sportsman/woman monitoring application.

    Science.gov (United States)

    Rodríguez-Molina, Jesús; Martínez, José-Fernán; Castillejo, Pedro; López, Lourdes

    2013-01-31

    Wireless Sensor Networks (WSNs) are spearheading the efforts taken to build and deploy systems aiming to accomplish the ultimate objectives of the Internet of Things. Due to the sensors WSNs nodes are provided with, and to their ubiquity and pervasive capabilities, these networks become extremely suitable for many applications that so-called conventional cabled or wireless networks are unable to handle. One of these still underdeveloped applications is monitoring physical parameters on a person. This is an especially interesting application regarding their age or activity, for any detected hazardous parameter can be notified not only to the monitored person as a warning, but also to any third party that may be helpful under critical circumstances, such as relatives or healthcare centers. We propose a system built to monitor a sportsman/woman during a workout session or performing a sport-related indoor activity. Sensors have been deployed by means of several nodes acting as the nodes of a WSN, along with a semantic middleware development used for hardware complexity abstraction purposes. The data extracted from the environment, combined with the information obtained from the user, will compose the basis of the services that can be obtained.

  20. Combining Wireless Sensor Networks and Semantic Middleware for an Internet of Things-Based Sportsman/Woman Monitoring Application

    Science.gov (United States)

    Rodríguez-Molina, Jesús; Martínez, José-Fernán; Castillejo, Pedro; López, Lourdes

    2013-01-01

    Wireless Sensor Networks (WSNs) are spearheading the efforts taken to build and deploy systems aiming to accomplish the ultimate objectives of the Internet of Things. Due to the sensors WSNs nodes are provided with, and to their ubiquity and pervasive capabilities, these networks become extremely suitable for many applications that so-called conventional cabled or wireless networks are unable to handle. One of these still underdeveloped applications is monitoring physical parameters on a person. This is an especially interesting application regarding their age or activity, for any detected hazardous parameter can be notified not only to the monitored person as a warning, but also to any third party that may be helpful under critical circumstances, such as relatives or healthcare centers. We propose a system built to monitor a sportsman/woman during a workout session or performing a sport-related indoor activity. Sensors have been deployed by means of several nodes acting as the nodes of a WSN, along with a semantic middleware development used for hardware complexity abstraction purposes. The data extracted from the environment, combined with the information obtained from the user, will compose the basis of the services that can be obtained. PMID:23385405

  1. Combining Wireless Sensor Networks and Semantic Middleware for an Internet of Things-Based Sportsman/Woman Monitoring Application

    Directory of Open Access Journals (Sweden)

    Lourdes López

    2013-01-01

    Full Text Available Wireless Sensor Networks (WSNs are spearheading the efforts taken to build and deploy systems aiming to accomplish the ultimate objectives of the Internet of Things. Due to the sensors WSNs nodes are provided with, and to their ubiquity and pervasive capabilities, these networks become extremely suitable for many applications that so-called conventional cabled or wireless networks are unable to handle. One of these still underdeveloped applications is monitoring physical parameters on a person. This is an especially interesting application regarding their age or activity, for any detected hazardous parameter can be notified not only to the monitored person as a warning, but also to any third party that may be helpful under critical circumstances, such as relatives or healthcare centers. We propose a system built to monitor a sportsman/woman during a workout session or performing a sport-related indoor activity. Sensors have been deployed by means of several nodes acting as the nodes of a WSN, along with a semantic middleware development used for hardware complexity abstraction purposes. The data extracted from the environment, combined with the information obtained from the user, will compose the basis of the services that can be obtained.

  2. Pro HTML 5 programming powerful APIs for richer internet application development

    CERN Document Server

    Lubbers, Peter; Salim, Frank

    2010-01-01

    HTML5 is here, and with it, web applications take on a power, ease, scalability, and responsiveness like never before. In this book, developers will learn how to use the latest cutting-edge HTML5 web technology - available in the most recent versions of modern browsers - to build web applications with unparalleled functionality, speed, and responsiveness. * Explains how you can create real-time HTML5 applications that tap the full potential of modern browsers * Provides practical, real-world examples of HTML5 features in action * Shows which HTML5 features are supported in current browsers * C

  3. Developing an Internet Oriented Platform for Earthquake Engineering Application and Web-based Virtual Reality Simulation System for Seismic hazards: Towards Disaster Mitigation in Metropolises

    Directory of Open Access Journals (Sweden)

    Ali Alaghehbandian

    2003-04-01

    Full Text Available This paper reviews the state of the art on risk communication to the public, with an emphasis on simulation of seismic hazards using VRML. Rapid growth computer technologies, especially the Internet provide human beings new measures to deal with engineering and social problems which were hard to solve in traditional ways. This paper presents a prototype of an application platform based on the Internet using VR (Virtual Reality for civil engineering considering building an information system of risk communication for seismic hazards and at the moment in the case of bridge structure.

  4. Internet of things

    OpenAIRE

    Salazar Soler, Jorge; Silvestre Bergés, Santiago

    2015-01-01

    This is an introductory course to the IoT (Internet of things). In the early chapters the basics about the IoT are introduced. Then basics of IPv6 internet protocol that is the most used in IoT environment as well as main applications, the current state of the market and the technologies that enable the existence of the IoT are described. Finally the future challenges that are considered most important are discussed. Peer Reviewed

  5. Learning Flex 4 Getting Up to Speed with Rich Internet Application Design and Development

    CERN Document Server

    Cole, Alaric

    2010-01-01

    Learn Adobe Flex 4 in a fun and engaging way with this book's unique, hands-on approach. Using clear examples and step-by-step coaching from two experts, you'll create four applications that demonstrate fundamental Flex programming concepts. Throughout the course of this book, you'll learn how to enhance user interaction with ActionScript, and create and skin a user interface with Flex's UI components (MXML) and Adobe's new FXG graphics format. You'll also be trained to manage dynamic data, connect to a database using server-side script, and deploy applications to both the Web and the deskto

  6. Internet piracy

    OpenAIRE

    Fiala, Jiří

    2012-01-01

    The main objective of this thesis is to describe the Internet piracy phenomenon and to define responsibility of individuals for copyright violations on the Internet from the view of valid Czech legislation. In order to prevent Internet piracy, countries are pushed to swiftly react on continuous development of new technologies used by pirates - these efforts of individual countries are described in several chapters of this thesis that are exploring the most significant court rulings. These rul...

  7. [Internet addiction].

    Science.gov (United States)

    Korkeila, Jyrki

    2012-01-01

    Internet addiction is defined as uncontrolled and harmful use of Internet, which manifests in three forms: gaming, various sexual activities and excessive use of emails, chats or SMS messaging. Several studies have found that abuse of alcohol and other substances, depression and other health problems are associated with Internet addiction. In boys and men depression may be more a consequence of the addiction than a cause for it. ADHD seems to be a significant background factor for developing the condition. Because it is almost impossible to lead a life without Internet and computers nowadays, it is unrealistic to aim towards full abstinence. Treatment has generally followed the guidelines adapted for pathological gambling.

  8. Internet Policy

    Science.gov (United States)

    Lehr, William H.; Pupillo, Lorenzo Maria

    The Internet is now widely regarded as essential infrastructure for our global economy and society. It is in our homes and businesses. We use it to communicate and socialize, for research, and as a platform for E-commerce. In the late 1990s, much was predicted about what the Internet has become at present; but now, we have actual experience living with the Internet as a critical component of our everyday lives. Although the Internet has already had profound effects, there is much we have yet to realize. The present volume represents a third installment in a collaborative effort to highlight the all-encompassing, multidisciplinary implications of the Internet for public policy. The first installment was conceived in 1998, when we initiated plans to organize an international conference among academic, industry, and government officials to discuss the growing policy agenda posed by the Internet. The conference was hosted by the European Commission in Brussels in 1999 and brought together a diverse mix of perspectives on what the pressing policy issues would be confronting the Internet. All of the concerns identified remain with us today, including how to address the Digital Divide, how to modify intellectual property laws to accommodate the new realities of the Internet, what to do about Internet governance and name-space management, and how to evolve broadcast and telecommunications regulatory frameworks for a converged world.

  9. Internet-based hardware/software co-design framework for embedded 3D graphics applications

    Directory of Open Access Journals (Sweden)

    Wong Weng-Fai

    2011-01-01

    Full Text Available Abstract Advances in technology are making it possible to run three-dimensional (3D graphics applications on embedded and handheld devices. In this article, we propose a hardware/software co-design environment for 3D graphics application development that includes the 3D graphics software, OpenGL ES application programming interface (API, device driver, and 3D graphics hardware simulators. We developed a 3D graphics system-on-a-chip (SoC accelerator using transaction-level modeling (TLM. This gives software designers early access to the hardware even before it is ready. On the other hand, hardware designers also stand to gain from the more complex test benches made available in the software for verification. A unique aspect of our framework is that it allows hardware and software designers from geographically dispersed areas to cooperate and work on the same framework. Designs can be entered and executed from anywhere in the world without full access to the entire framework, which may include proprietary components. This results in controlled and secure transparency and reproducibility, granting leveled access to users of various roles.

  10. Space technology, sustainable development and community applications: Internet as a facilitator

    Science.gov (United States)

    Peter, Nicolas; Afrin, Nadia; Goh, Gérardine; Chester, Ed

    2006-07-01

    Among other approaches, space technologies are currently being deployed for disaster management, environmental monitoring, urban planning, health applications, communications, etc. Although space-based applications have tremendous potential for socioeconomic development, they are primarily technology driven and the requirements from the end-users (i.e. the development community) are rarely taken into consideration during the initial development stages. This communication gap between the "space" and "development" communities can be bridged with the help of the web-based knowledge sharing portal focused on space applications for development. This online community uses the development gateway foundation's sophisticated content management system. It is modeled after the development gateway's knowledge sharing portals ( http://topics.developmentgateway.org) and draws from their expertise in knowledge management, partnership building and marketing. These types of portal are known to facilitate broad-based partnerships across sectors, regions and the various stakeholders but also to facilitate North-South and South-South cooperation. This paper describes the initiative "Space for Development" ( http://topics.developmentgateway.org/space) started in 2004 which aims to demonstrate how such a web-based portal can be structured to facilitate knowledge sharing in order to bridge the gap between the "space" and "development" communities in an innovative and global manner.

  11. Internet effects

    NARCIS (Netherlands)

    Valkenburg, P.M.; Peter, J.; Levesque, R.J.R.

    2011-01-01

    Adolescents’ extensive use of Internet communication and the uncertainty about its consequences call for an integrative perspective that helps to understand both the appeal of Internet communication and its risks and opportunities. The aim of this essay is to theorize, and if possible, substantiate

  12. Internet Databases of the Properties, Enzymatic Reactions, and Metabolism of Small Molecules—Search Options and Applications in Food Science

    Directory of Open Access Journals (Sweden)

    Piotr Minkiewicz

    2016-12-01

    Full Text Available Internet databases of small molecules, their enzymatic reactions, and metabolism have emerged as useful tools in food science. Database searching is also introduced as part of chemistry or enzymology courses for food technology students. Such resources support the search for information about single compounds and facilitate the introduction of secondary analyses of large datasets. Information can be retrieved from databases by searching for the compound name or structure, annotating with the help of chemical codes or drawn using molecule editing software. Data mining options may be enhanced by navigating through a network of links and cross-links between databases. Exemplary databases reviewed in this article belong to two classes: tools concerning small molecules (including general and specialized databases annotating food components and tools annotating enzymes and metabolism. Some problems associated with database application are also discussed. Data summarized in computer databases may be used for calculation of daily intake of bioactive compounds, prediction of metabolism of food components, and their biological activity as well as for prediction of interactions between food component and drugs.

  13. The research and application of green computer room environmental monitoring system based on internet of things technology

    Science.gov (United States)

    Wei, Wang; Chongchao, Pan; Yikai, Liang; Gang, Li

    2017-11-01

    With the rapid development of information technology, the scale of data center increases quickly, and the energy consumption of computer room also increases rapidly, among which, energy consumption of air conditioning cooling makes up a large proportion. How to apply new technology to reduce the energy consumption of the computer room becomes an important topic of energy saving in the current research. This paper study internet of things technology, and design a kind of green computer room environmental monitoring system. In the system, we can get the real-time environment data from the application of wireless sensor network technology, which will be showed in a creative way of three-dimensional effect. In the environment monitor, we can get the computer room assets view, temperature cloud view, humidity cloud view, microenvironment view and so on. Thus according to the condition of the microenvironment, we can adjust the air volume, temperature and humidity parameters of the air conditioning for the individual equipment cabinet to realize the precise air conditioning refrigeration. And this can reduce the energy consumption of air conditioning, as a result, the overall energy consumption of the green computer room will reduce greatly. At the same time, we apply this project in the computer center of Weihai, and after a year of test and running, we find that it took a good energy saving effect, which fully verified the effectiveness of this project on the energy conservation of the computer room.

  14. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire - IRSN, 92 - Clamart (France)

    2011-01-15

    This section gathers a selection of Internet links to online articles dealing with radiation protection issues. Below are the titles of the papers with their web site source: 1 - A mission of the European Commission verifies the proper enforcement by France of the EURATOM treaty dispositions relative to the control of radioactivity in the vicinity of uranium mines (http://www.asn.fr); 2 - tritium contamination at Saint-Maur-des-Fosses: new results from measurements performed by IRSN in the environment; 3 - status of radioactivity monitoring in French Polynesia in 2009 (http://www.irsn.fr); 4 - study of mortality and cancers impact near the Aube facility for low- and medium-activity waste storage (http://www.invs.sante.fr); 5 - Marcel Jurien de la Graviere appointed president of the guidance committee of the defense nuclear expertise of the Institute of radiation protection and nuclear safety (IRSN) (http://www.legifrance.gouv.fr); 6 - radiation protection 163: 'Childhood Leukaemia - Mechanisms and Causes'; 7- Radiation Protection 164: Radioactive effluents from nuclear power stations and nuclear fuel reprocessing sites in the European Union, 2004-08; 8 - Radiation Protection 165: Medical Effectiveness of Iodine Prophylaxis in a Nuclear Reactor Emergency Situation and Overview of European Practices Protection (http://ec.europa.eu); 9 - Report RIFE 15: Radioactivity in Food and the Environment - RIFE (SEPA - Scottish Environment Protection Agency, http://www.sepa.org.uk); 10 - HPA response statement: Advisory Group on Ionising Radiation's report on circulatory disease risk (HPA - Health Protection Agency, http://www.hpa.org.uk); 11 - launching of the national database for the voluntary registering of (quasi) incidents (AFCN - Federal agency of nuclear control, http://www.fanc.fgov.be); 12 - Radiation dose optimization in nuclear medicine (IAEA RPOP - Radiation Protection Of Patients, http://rpop.iaea.org); 13 - The government of Canada finances

  15. BOA Application on Internet of Vehicle%面向车联网技术的BOA应用研究

    Institute of Scientific and Technical Information of China (English)

    崔建明

    2012-01-01

    Traffic informatization has significantly improved the transport efficiency and the internet of things (IoT) bring more new technology and new methods for the development of traffic informatization. The internet of vehicles (IoV) is subsequently generated and is now under developing. However, it has some technical problems in the application process, such as monitoring the detail component of vehicle. In this paper, a technology is proposed that is accessible the small parts of traffic equipment through BOA technology. If the hardware itself has embedded control interface, can the remote monitor be used to revise the components parameters through integration BOA with the interface. By this way, the whole or parts of the equipments can be monitored and optimized by integrating with the CAN bus. It can even reach a wide range of remoting access and monitoring parameters by setting up separated virtual IPv6 address for the BOA. Finally, the example of the controlled video surveillance with the BOA technology is used to demonstrate the feasibility of this technology.%交通信息化提高了交通效率,物联网技术为交通信息化的发展带来更多新技术、新方法,由此产生了“车联网技术”.物联网技术是一种在发展的新技术,故此车联网技术在应用过程中存在一些技术障碍,如车辆细部部件的监控等.本文提出一种通过BOA技术进行交通设备部件访问的服务技术,如果硬件本身具有嵌入式控制接口,通过BOA技术与这种接口集成可以远程对部件进行监控与参数修改.这样BOA通过CAN总线集成的操作可以对设备整体进行全部部件监控和更多的优化操作,甚至可以对BOA设置单独的虚拟IPv6地址,达到更大范围内的远程参数获取与监控.最后,通过具有BOA技术的可控视频监控实例证明,此种技术可行.

  16. Admission Control Over Internet of Vehicles Attached With Medical Sensors for Ubiquitous Healthcare Applications.

    Science.gov (United States)

    Lin, Di; Labeau, Fabrice; Yao, Yuanzhe; Vasilakos, Athanasios V; Tang, Yu

    2016-07-01

    Wireless technologies and vehicle-mounted or wearable medical sensors are pervasive to support ubiquitous healthcare applications. However, a critical issue of using wireless communications under a healthcare scenario rests at the electromagnetic interference (EMI) caused by radio frequency transmission. A high level of EMI may lead to a critical malfunction of medical sensors, and in such a scenario, a few users who are not transmitting emergency data could be required to reduce their transmit power or even temporarily disconnect from the network in order to guarantee the normal operation of medical sensors as well as the transmission of emergency data. In this paper, we propose a joint power and admission control algorithm to schedule the users' transmission of medical data. The objective of this algorithm is to minimize the number of users who are forced to disconnect from the network while keeping the EMI on medical sensors at an acceptable level. We show that a fixed point of proposed algorithm always exists, and at the fixed point, our proposed algorithm can minimize the number of low-priority users who are required to disconnect from the network. Numerical results illustrate that the proposed algorithm can achieve robust performance against the variations of mobile hospital environments.

  17. Internet technologies and information services

    CERN Document Server

    Miller, Joseph

    2014-01-01

    Internet Technologies and Information Services: Second Edition is a vital asset to students preparing for careers in library and information science and provides expanded coverage to important new developments while still covering Internet foundations. In addition to networking, the Internet, HTML, web design, web programming, XML, and web searching, this new edition covers additional topics such as cloud computing, content management systems, eBook technologies, mobile technologies and applications, relational database management systems (RDMS), open source software, and virtual priva

  18. Internet printing

    Science.gov (United States)

    Rahgozar, M. Armon; Hastings, Tom; McCue, Daniel L.

    1997-04-01

    The Internet is rapidly changing the traditional means of creation, distribution and retrieval of information. Today, information publishers leverage the capabilities provided by Internet technologies to rapidly communicate information to a much wider audience in unique customized ways. As a result, the volume of published content has been astronomically increasing. This, in addition to the ease of distribution afforded by the Internet has resulted in more and more documents being printed. This paper introduces several axes along which Internet printing may be examined and addresses some of the technological challenges that lay ahead. Some of these axes include: (1) submission--the use of the Internet protocols for selecting printers and submitting documents for print, (2) administration--the management and monitoring of printing engines and other print resources via Web pages, and (3) formats--printing document formats whose spectrum now includes HTML documents with simple text, layout-enhanced documents with Style Sheets, documents that contain audio, graphics and other active objects as well as the existing desktop and PDL formats. The format axis of the Internet Printing becomes even more exciting when one considers that the Web documents are inherently compound and the traversal into the various pieces may uncover various formats. The paper also examines some imaging specific issues that are paramount to Internet Printing. These include formats and structures for representing raster documents and images, compression, fonts rendering and color spaces.

  19. Improvement of methodical approaches to higher schools' marketing activity assessment on the basis of Internet technologies application

    OpenAIRE

    Elizaveta E. Tarasova; Evgeny A. Shein

    2014-01-01

    The paper substantiates the necessity of higher schools marketing activity developing on the basis of Internet technologies; suggests the technique of comprehensive assessment of functioning and quality of the site as the main tool of marketing activity on the Internet, substantiates the stages of its implementation and provides the approbation results; suggests strategic directions for the improvement of functioning and quality improvement of a higher school site, which makes it possible to ...

  20. [Internet addiction].

    Science.gov (United States)

    Dannon, Pinhas Nadim; Iancu, Iulian

    2007-07-01

    The Internet provides inexpensive, interesting and comfortable recreation, but sometimes users get hooked. Thus, the computer-internet addiction concept has been proposed as an explanation for uncontrollable and damaging use. Symptoms of addiction could be compared to other addictive behaviors such as pathological gambling, kleptomania, trichotillomania, sex addiction and pyromania. Although criteria to diagnose this addiction have been proposed, methods of assessing excessive computer-internet use are limited. Early diagnosis could help the patient that suffers from this addiction before developing additional psychiatric diagnoses. A review of the proposed etiologies in the literature is summarized, together with recommendations for physicians and mental health officials.

  1. Internet Inquiry

    DEFF Research Database (Denmark)

    This collection of dialogues is the only textbook of its kind. Internet Inquiry: Conversations About Method takes students into the minds of top internet researchers as they discuss how they have worked through critical challenges as they research online social environments. Editors Annette N....... Markham and Nancy K. Baym illustrate that good research choices are not random but are deliberate, studied, and internally consistent. Rather than providing single "how to" answers, this book presents distinctive and divergent viewpoints on how to think about and conduct qualitative internet studies....

  2. Examining Internet Access and Social Media Application Use for Online Nutrition Education in SNAP-Ed Participants in Rural Illinois.

    Science.gov (United States)

    Loehmer, Emily; Smith, Sylvia; McCaffrey, Jennifer; Davis, Jeremy

    2018-01-01

    To examine Internet access and interest in receiving nutrition education via social media applications among low-income adults participating in the Supplemental Nutrition Assistance Program Education (SNAP-Ed). A cross-sectional survey was distributed during 25 SNAP-Ed classes throughout the 16 southernmost counties of Illinois. From 188 responses, the majority of participants had Internet access (76%). Among participants aged 18-32 years (n = 51), 92% owned a smartphone with Internet access and 57% indicated that they would use online nutrition education, with most interest in e-mail (41%), Facebook (40%), and text messaging (35%). There was little interest in using blogs, Vine, Twitter, Tumblr, and Pinterest. Overall, 49% of middle-aged adults aged 33-64 years and 87% of seniors aged ≥65 years reported they would not use online nutrition education. Results indicated similar Internet accessibility in southern Illinois among low-income populations compared with national rural rates. Interest in using online nutrition education varied among SNAP-Ed participants according to age. Young adults appeared to be the most captive audience regarding online nutrition education. Results may be useful to agencies implementing SNAP-Ed to supplement current curriculum with online nutrition education for audiences aged ≤32 years. Copyright © 2017 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  3. Towards Internet of Things: Survey and Future Vision

    OpenAIRE

    Omar Said; Mehedi Masud

    2013-01-01

    Internet of things is a promising research due to its importance in many commerce, industry, and education applications. Recently, new applications and research challenges in numerous areas of Internet of things are fired. In this paper, we discuss the history of Internet of things, different proposed architectures of Internet of things, research challenges and open problems related to the Internet of things. We also introduce the concept of Internet of things database and discuss about the f...

  4. Guided and unguided Acceptance and Commitment Therapy for social anxiety disorder and/or panic disorder provided via the Internet and a smartphone application: A randomized controlled trial.

    Science.gov (United States)

    Ivanova, Ekaterina; Lindner, Philip; Ly, Kien Hoa; Dahlin, Mats; Vernmark, Kristofer; Andersson, Gerhard; Carlbring, Per

    2016-12-01

    Acceptance and Commitment Therapy (ACT) can be effective in treating anxiety disorders, yet there has been no study on Internet-delivered ACT for social anxiety disorder (SAD) and panic disorder (PD), nor any study investigating whether therapist guidance is superior to unguided self-help when supplemented with a smartphone application. In the current trial, n=152 participants diagnosed with SAD and/or PD were randomized to therapist-guided or unguided treatment, or a waiting-list control group. Both treatment groups used an Internet-delivered ACT-based treatment program and a smartphone application. Outcome measures were self-rated general and social anxiety and panic symptoms. Treatment groups saw reduced general (d=0.39) and social anxiety (d=0.70), but not panic symptoms (d=0.05) compared to the waiting-list group, yet no differences in outcomes were observed between guided and unguided interventions. We conclude that Internet-delivered ACT is appropriate for treating SAD and potentially PD. Smartphone applications may partially compensate for lack of therapist support. Copyright © 2016. Published by Elsevier Ltd.

  5. Internet Connectivity

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet Connectivity. BSNL, SIFY, HCL in Guwahati; only BSNL elsewhere in NE (local player in Shillong). Service poor; All vendors lease BW from BSNL.

  6. Internet enlightens

    International Nuclear Information System (INIS)

    Figueiredo, S.

    2008-01-01

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  7. Internet enlightens

    International Nuclear Information System (INIS)

    Anon.

    2010-01-01

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  8. Internet Censorship

    Science.gov (United States)

    Jyotsna; Kapil; Aayush

    2012-09-01

    Censorship on Internet has always wet its hands in the water of controversies, It is said to go in with synonym of "FILTERING THE NET" i.e. Either done to protect minors or for nationís privacy, some take it as snatching their freedom over internet and some take it as an appropriate step to protect minor, It has its supporters as well as opponents.Google has reported a whooping number of requests from Governments of U.K, China, Poland, Spain, and Canada to remove videos and search links that led to harassment, sensitive issues or suspicious people. This paper deals with the cons of censorship on internet and to make people aware of the fact that Internet is not a single body owned by an org. but an open sky of information shared equally by all. Research done has found out many unseen aspects of different people's view point.

  9. A Novel Dual Ultrawideband CPW-Fed Printed Antenna for Internet of Things (IoT Applications

    Directory of Open Access Journals (Sweden)

    Qasim Awais

    2018-01-01

    Full Text Available This paper presents a dual-band coplanar waveguide (CPW fed printed antenna with rectangular shape design blocks having ultrawideband characteristics, proposed and implemented on an FR4 substrate. The size of the proposed antenna is just 25 mm × 35 mm. A novel rounded corners technique is used to enhance not only the impedance bandwidth but also the gain of the antenna. The proposed antenna design covers two ultrawide bands which include 1.1–2.7 GHz and 3.15–3.65 GHz, thus covering 2.4 GHz Bluetooth/Wi-Fi band and most of the bands of 3G, 4G, and a future expected 5G band, that is, 3.4–3.6 GHz. Being a very low-profile antenna makes it very suitable for the future 5G Internet of Things (IoT portable applications. A step-by-step design process is carried out to obtain an optimized design for good impedance matching in the two bands. The current densities and the reflection coefficients at different stages of the design process are plotted and discussed to get a good insight into the final proposed antenna design. This antenna exhibits stable radiation patterns on both planes, having low cross polarization and low back lobes with a maximum gain of 8.9 dB. The measurements are found to be in good accordance with the simulated results.

  10. Affordable and Scalable Manufacturing of Wearable Multi-Functional Sensory “Skin” for Internet of Everything Applications

    KAUST Repository

    Nassar, Joanna M.

    2017-10-01

    Demand for wearable electronics is expected to at least triple by 2020, embracing all sorts of Internet of Everything (IoE) applications, such as activity tracking, environmental mapping, and advanced healthcare monitoring, in the purpose of enhancing the quality of life. This entails the wide availability of free-form multifunctional sensory systems (i.e “skin” platforms) that can conform to the variety of uneven surfaces, providing intimate contact and adhesion with the skin, necessary for localized and enhanced sensing capabilities. However, current wearable devices appear to be bulky, rigid and not convenient for continuous wear in everyday life, hindering their implementation into advanced and unexplored applications beyond fitness tracking. Besides, they retail at high price tags which limits their availability to at least half of the World’s population. Hence, form factor (physical flexibility and/or stretchability), cost, and accessibility become the key drivers for further developments. To support this need in affordable and adaptive wearables and drive academic developments in “skin” platforms into practical and functional consumer devices, compatibility and integration into a high performance yet low power system is crucial to sustain the high data rates and large data management driven by IoE. Likewise, scalability becomes essential for batch fabrication and precision. Therefore, I propose to develop three distinct but necessary “skin” platforms using scalable and cost effective manufacturing techniques. My first approach is the fabrication of a CMOS-compatible “silicon skin”, crucial for any truly autonomous and conformal wearable device, where monolithic integration between heterogeneous material-based sensory platform and system components is a challenge yet to be addressed. My second approach displays an even more affordable and accessible “paper skin”, using recyclable and off-the-shelf materials, targeting environmental

  11. Internet technologies and requirements for telemedicine

    Science.gov (United States)

    Lamaster, H.; Meylor, J.; Meylor, F.

    1997-01-01

    Internet technologies are briefly introduced and those applicable for telemedicine are reviewed. Multicast internet technologies are described. The National Aeronautics and Space Administration (NASA) 'Telemedicine Space-bridge to Russia' project is described and used to derive requirements for internet telemedicine. Telemedicine privacy and Quality of Service (QoS) requirements are described.

  12. 76 FR 74721 - Preserving the Open Internet

    Science.gov (United States)

    2011-12-01

    ...; Report No. 2936] Preserving the Open Internet AGENCY: Federal Communications Commission. ACTION: Final... for broadband service to preserve and reinforce Internet freedom and openness. DATES: Oppositions to... applicability. Subject: In the Matter of Preserving the Open Internet, Broadband Industry Practices, published...

  13. An Internet Application To Relieve Constraints in the Flow of Technical Information--The Virtual Technology Market (VTM).

    Science.gov (United States)

    Beverly, James E.; Xue, Lan; Lee, Chung-Shing

    1996-01-01

    Reports on the use of the Internet and World Wide Web as a virtual technology market (VTM) for information and technology transfer. The project focuses on creating awareness of technology demand (problems) and linking it to technology supply (solutions) in the field of particle technology and multiphase processes in the chemical industry. Benefits…

  14. Predictors of Internet Use for the Professional Development of Teachers: An Application of the Theory of Planned Behaviour

    Science.gov (United States)

    Demir, Kamile

    2010-01-01

    This study examined teachers' internet use behaviour for professional development using the theory of planned behaviour. Data for this study were collected via a survey of 221 teachers who completed self-reported measures of attitude, subjective norm, perceived behavioural control, intention, and behaviour. The planned behaviour model was…

  15. Everyone's Internet

    Institute of Scientific and Technical Information of China (English)

    YAO BIN

    2010-01-01

    @@ After more than 20 years, the Internet in China has become a big success. The country has the world's largest Intemet population that topped 420 million at the end of June. In the first six months of this year, China's Internet market reached 74.3 billion yuan ($10.9 billion), the equivalent of 2009's total. Local businesses have risen to leaders on the Chinese market, as Chinese language search, instant messaging and online auction service providers have overwhelming advantages over foreign rivals.

  16. Internet bullying.

    Science.gov (United States)

    Donnerstein, Ed

    2012-06-01

    There is substantial literature on the impact of the mass media on children's and adolescents' health and development. The question of what role new technology plays in the media's influence is now a subject of both review and discussion, particularly regarding health risks and intervention. This article takes a brief look at online usage and the theoretical mechanisms that might make Internet access more problematic in terms of risks, compared with more traditional media such as television and film. One of these risks, known today as cyberbullying or Internet harassment, is scrutinized in detail. Copyright © 2012 Elsevier Inc. All rights reserved.

  17. Security Challenges of the Internet of Things

    OpenAIRE

    Goeke, Lisa

    2017-01-01

    The ‘Internet of Things’ is the buzz phrase that describes a new era of computation. Briefly, the Internet of Things can be defined as the interaction of smart objects that are connected to the Internet. These objects can sense, share and process information, upload them in the cloud, and make them available to the user via a large amount of different applications. Despite all of these promising innovations, the Internet of Things, as every other technology, faces multiple security...

  18. The Internet of things connecting objects

    CERN Document Server

    Chaouchi, Hakima

    2013-01-01

    Internet of Things: Connecting Objects… puts forward the technologies and the networking architectures which make it possible to support the Internet of Things. Amongst these technologies, RFID, sensor and PLC technologies are described and a clear view on how they enable the Internet of Things is given. This book also provides a good overview of the main issues facing the Internet of Things such as the issues of privacy and security, application and usage, and standardization.

  19. PELUANG DAN STRATEGI PENJUALAN MELALUI INTERNET MARKETING

    Directory of Open Access Journals (Sweden)

    Munawaroh

    2011-08-01

    Full Text Available The purpose of this journal is to mention of how the opportunity of Internet marketing and the strategy of selling via Internet marketing, The community of Indonesian now become the potential buyer because more than 30 million users of Internet in Indonesia now. So that, this is the challenge for us to make the business based on e-commerce and application the strategy of selling via Internet marketing.

  20. Internet Policy

    Science.gov (United States)

    1999-11-17

    equipment, including information technology , includes, but is not limited to, personal computers and related peripheral equipment and software, office...classified or Sensitive Unclassified Information through the Internet unless the Designated Approving Authority has approved the method of transmission in...writing. 2. Government office equipment, including Information Technology (IT), shall only be used for official purposes, except as specifically

  1. Internet Shopping

    Institute of Scientific and Technical Information of China (English)

    刘洪毓

    2004-01-01

    Nowadays you no longer need to walk round hundreds of shops looking for the items you need. You can shop for just about anything from your armchair. All you need is a computer and access(进入) to the Internet.

  2. [Internet addiction].

    Science.gov (United States)

    Nakayama, Hideki; Higuchi, Susumu

    2015-09-01

    Internet technologies have made a rapid progress, bringing convenience to daily life. On the other hand, internet use disorder and internet addiction (IA) have become reportedly serious health and social problems. In 2013, internet gaming disorder criteria have been proposed in the section of Conditions for Further Study of DSM-5. Existing epidemiological studies by questionnaire methods have reported that the prevalence of IA ranges between 2.8% and 9.9% among youths in Japan. Attention deficit hyperactivity disorder (ADHD), sleeping disorders, depression, obsessive compulsive disorder, and phobic anxiety disorder are extremely common comorbid mental disorders with IA. Some psychotherapies (e.g., cognitive behavioral therapy, motivational interviewing) and medical treatments (e.g., antidepressant drugs, methylphenidate) for comorbid mental disorders as well as rehabilitation (e.g., treatment camp) are effective for IA remission. However, some serious cases of IA may be difficult to treat, and prevention is very important. In future, the prevention, rehabilitations and treatments for IA will be more required in Japan.

  3. High-tech tools for exercise motivation: use and role of technologies such as the internet, mobile applications, social media, and video games.

    Science.gov (United States)

    Tate, Deborah F; Lyons, Elizabeth J; Valle, Carmina G

    2015-01-01

    IN BRIEF The majority of patients with type 2 diabetes are not active at recommended levels, and many do not have access to behavior change programs to support lifestyle change. Thus, tools and programs designed to promote the adoption and maintenance of physical activity using technology may be helpful. This article reviews the evidence regarding the use of technology tools such as the Internet, mobile applications, social media, and video games and provides suggestions for evaluating the potential benefit of such tools for behavior change.

  4. High-Tech Tools for Exercise Motivation: Use and Role of Technologies Such as the Internet, Mobile Applications, Social Media, and Video Games

    Science.gov (United States)

    Lyons, Elizabeth J.; Valle, Carmina G.

    2015-01-01

    IN BRIEF The majority of patients with type 2 diabetes are not active at recommended levels, and many do not have access to behavior change programs to support lifestyle change. Thus, tools and programs designed to promote the adoption and maintenance of physical activity using technology may be helpful. This article reviews the evidence regarding the use of technology tools such as the Internet, mobile applications, social media, and video games and provides suggestions for evaluating the potential benefit of such tools for behavior change. PMID:25717278

  5. Internet Technology on Spacecraft

    Science.gov (United States)

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Powers, Edward I. (Technical Monitor)

    2000-01-01

    approaches. The cost to implement is much less than current approaches due to the availability of highly reliable and standard Internet tools. Use of standard Internet applications onboard reduces the risk of obsolescence inherent in custom protocols due to extremely wide use across all domains. These basic building blocks provide the framework for building onboard software to support direct user communication with payloads including payload control. Other benefits are payload to payload communication from dissimilar spacecraft, constellations of spacecraft, and reconfigurability on orbit. This work is funded through contract with the National Aeronautics and Space Administration (NASA) Goddard Space Flight Center (GSFC).

  6. [Application of " Internet Plus" AIDS prevention services among men who have sex with men in Guangzhou, China: results from 2010 to 2015].

    Science.gov (United States)

    Cheng, W B; Xu, H F; Zhong, F; Cai, Y S; Chen, X B; Meng, G; Lu, Y H; Han, Z G; Fan, L R; Zhao, Y T; Chen, X; Liang, C Y; Wu, H; Gao, K; Mai, H X; Tang, C

    2016-10-06

    Objective: To introduce the development strategy of " Internet Plus" AIDS prevention services and its implementation results from 2010 to 2015 in Guangzhou, China. Methods: A gay men's health column was created for an active website aimed at men who have sex with men(MSM), in collaboration with local community organizations and the Guangzhou CDC. We designed intervention tools(including scenario-based applications and HIV risk self-assessment systems)and an online HIV testing service platform, integrated with applied psychology and behavioral theory as well as the " Internet Plus" concept, to intervene in HIV infection risk factors among MSM. Data of clients who accessed the " Internet Plus" AIDS services from 2010 to 2015 were used to evaluate service operation. Six-year consecutive surveys, conducted between April and July of each service year, were collected using a national AIDS sentinel surveillance questionnaire. For each year of surveillance, information on HIV prevalence, HIV interventions received during the past year, unprotected anal intercourse in the past 6 months, and HIV testing in the past year were compared using the chi-squared(χ 2 )test, to roughly reflect the effect of"Internet Plus" AIDS prevention services. Results: As of 31 December 2015, a total of 34 395 MSM had received " Internet Plus" services and HIV testing. The number of MSM tested increased from 2 338 in 2010 to 8 054 in 2015. From 2010 to 2015, newly identified HIV cases in each year were 59, 166, 312, 283, 291, and 270, which accounted for 25.0%, 32.8%, 38.8%, 35.1%, 30.5%, and 23.2% of MSM HIV cases of Guangzhou, respectively. Sentinel surveillance data showed that during the study period, 3 047 MSM were investigated, with 405, 400, 401, 633, 608, and 600 each year, respectively. The proportion of participants who had received any HIV intervention during the past year was 74.3%(301), 70.8%(283), 83.3%(334), 85.0%(538), 69.1%(420), and 83.8%(503)each year, respectively(trend χ 2

  7. Internet quality management

    International Nuclear Information System (INIS)

    Park, Yeong Taek; Song, Hae Geun

    2000-09-01

    This book guides the useful application of internet quality management. It mentions understanding of modern quality management, which includes basics of quality management, six sigma quality innovation, best system, search way of quality information, consideration for effective information search, establishment of quality information center using bookmark, sites related quality by fields, journal sites related quality, sites related quality award,and web sites of the highest business.

  8. Internet Banking integration within the banking system

    OpenAIRE

    Constantin Marian MATEI; Catalin Ionut SILVESTRU; Dragos Stefan SILVESTRU

    2008-01-01

    Internet Banking developed due to increasing demand of online banking transactions. The biggest advantages of Internet Banking consist of complex banking solutions, 24 hours availability, quick and secure access to the back-end application through Internet. These advantages are due to the use of SOA (service-oriented architecture). SOA appeared as a necessity of companies to integrate big and independent portions of applications, in order to obtain an homogeneous functionality of the system....

  9. INTERNET ADVERTISING: A PRIMER

    OpenAIRE

    Matthew N. O. Sadiku*, Shumon Alam, Sarhan M. Musa

    2017-01-01

    Internet advertising (IA) is using the Internet to market products and services to a large audience. In the current era of Internet commerce, companies have chosen to use Internet advertising and the trend is irreversible. The goal of Internet advertising is to drive customers to your website. Understanding some key concepts of Internet advertising is crucial to creating a strategy that will suit one’s business. This paper provides a brief introduction to Internet or online advertising.

  10. Internet Telephony

    OpenAIRE

    Perri, Richard.

    1999-01-01

    During the mid 90s, data and voice began to merge, propelled by advances in compression technology. The ubiquity of routed Internet Protocol (IP) networks, and the desire to trim telephony costs are the major driving forces of the deployment of Voice over IP (VoIP). One advantage of VoIP technologies is that they leverage existing network resources and dramatically reduce, or major eliminate telephone costs. If there is an existing Wide Area Network (WAN) then VoIP could be employed over the ...

  11. Development and evaluation of an internet-based blended-learning module in biomedicine for university applicants--Education as a challenge for the future.

    Science.gov (United States)

    Klümper, Christian; Neunzehn, Jörg; Wegmann, Ute; Kruppke, Benjamin; Joos, Ulrich; Wiesmann, Hans Peter

    2016-03-25

    Biomedical science, especially biomaterials, is an expanding field in medicine. Universities are being challenged to gain the best students for a later academic career. Pre-university assessment of pupils has become crucial to reach this aim. Blended learning is an emerging paradigm for science education even though it has not yet been rigorously assessed, especially in the pupil/undergraduate situation. The aim of the study was to develop and preliminarily test a blended-learning system in biomedicine for university applicants. An internet-based blended-learning module in material science was developed in close collaboration between a university (Biomaterials Department, Dresden TU), a German Gymnasium and an internationally oriented medical college (IMC®, Münster). Forty pre-university students were taught by this learning module composed of school education and internet-based knowledge transfer and involved in the evaluation of the utility of this learning tool. Finally, the students took first-year university examinations in order to evaluate the success of this kind of education. The internet-based blended-learning module as a combination of e-learning tutorials and live online lectures which was applied in phase 3 of this study was developed on the basis of the findings of both pre-university studies. The results of the learning behavior regarding the number of invokes and the dwell time of the individual pages of the pre-university learning material, the results of the online evaluation and the results of the pre-phase examination were successively used to optimize the next phase. At the end of the pre-university learning, seven of eight participants were able to pass the first-year university examination followed by nationally accepted credit award. Internet-based blended-learning module proved to be suitable to prepare students for biomedical university education while also giving them the possibility to assess their qualifications for studying

  12. Internet dynamics

    Science.gov (United States)

    Lukose, Rajan Mathew

    The World Wide Web and the Internet are rapidly expanding spaces, of great economic and social significance, which offer an opportunity to study many phenomena, often previously inaccessible, on an unprecedented scale and resolution with relative ease. These phenomena are measurable on the scale of tens of millions of users and hundreds of millions of pages. By virtue of nearly complete electronic mediation, it is possible in principle to observe the time and ``spatial'' evolution of nearly all choices and interactions. This cyber-space therefore provides a view into a number of traditional research questions (from many academic disciplines) and creates its own new phenomena accessible for study. Despite its largely self-organized and dynamic nature, a number of robust quantitative regularities are found in the aggregate statistics of interesting and useful quantities. These regularities can be understood with the help of models that draw on ideas from statistical physics as well as other fields such as economics, psychology and decision theory. This thesis develops models that can account for regularities found in the statistics of Internet congestion and user surfing patterns and discusses some practical consequences. practical consequences.

  13. Internet-Based Communication

    Science.gov (United States)

    Gernsbacher, Morton Ann

    2014-01-01

    Google the question, "How is the Internet changing the way we communicate?," and you will find no shortage of opinions, or fears, about the Internet altering the way we communicate. Although the Internet is not necessarily making communication briefer (neither is the Internet making communication less formal), the Internet is manifesting…

  14. Internet congestion control

    CERN Document Server

    Varma, Subir

    2015-01-01

    Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms. The field of congestion control has seen many notable advances in recent years and the purpose of this book, which is targeted towards the advanced and intermediate reader, is to inform about the most important developments in this area. The book should enable the reader to gain a good understanding of the application of congestion control theory to a number of applic

  15. STUDY ON GEOGRAPHY STUDENTS’ INTERNET USE

    Directory of Open Access Journals (Sweden)

    MARIA ELIZA DULAMĂ

    2015-01-01

    Full Text Available In this study we analyze the behavior of a sample of 30 third-year students of various majors of the Faculty of Geography, “Babeş-Bolyai” University of ClujNapoca, Romania, regarding the Internet use. We applied a questionnaire containing 15 items related to: Internet activities performed; length of time students spend on the Internet; devices used to access the Internet; types of materials that students downloaded, read, viewed, forwarded or posted on the Internet; types of applications used. Taking into account the time students spent daily on the Internet and correlated with other responses we concluded that their concerns were closely related to the Internet, whether it was about communication, career, or personal life.

  16. Playing with the internet through world wide web

    International Nuclear Information System (INIS)

    Kim, Seon Tae; Jang, Jin Seok

    1995-07-01

    This book describes how to use the internet with world wide web. It is divided into six chapters, which are Let's go to the internet ocean, the internet in information superhighway are, connecting the world with a telephone wire such as link with the internet cable and telephone modem, internet service providers, text mode connection, Domain and IP address, the principle and use of world wide web ; business, music, fashion, movie and photo, internet news and e-mail, making internet map with web language, and from installation to application of base program such as TCP/IP, SLIP/PPP 3270 Emulator, Finger and NCSA Mosaic.

  17. Poultry Internet

    Science.gov (United States)

    Cheok, Adrian David

    Poultry are one of the most badly treated animals in the modern world. It has been shown that they have high levels of both cognition and feelings, and as a result there has been a recent trend of promoting poultry welfare. There is also a tradition of keeping poultry as pets in some parts of the world. However, in modern cities and societies, it is often difficult to maintain contact with pets, particularly for office workers. We propose and describe a novel cybernetics system to use mobile and Internet technology to improve human-pet interaction. It can also be used for people who are allergic to touching animals and thus cannot stroke them directly. This interaction encompasses both visualization and tactile sensation of real objects.

  18. PENGGUNAAN TEKNOLOGI INTERNET DALAM BISNIS

    Directory of Open Access Journals (Sweden)

    Oviliani Yuliana

    2000-01-01

    Full Text Available The uses of internet in business are for information exchange, product catalog, promotion media, electronic mail, bulletin boards, electronic questioner, and mailing list. Internet can also be used for dialog, discussion, and consultation with customer online, therefore consumer can be proactively and interactively involved in designing, developing, marketing, and selling products. There are 2 methods for marketing products via internet, which are push and pull marketing. The advantages of internet in business strategy are global and interactive communication, information supply; consumer based service; increased cooperation; possibility to open new marketplace, product or services; and integrated the activity on-line. There are 2 applications in electronic commerce, which are business-to-business and business-to-consumer commerce. Electronic commerce payment transaction is arranged by Electronic Funds Transfer system, whereas the data security is governed by Secure Socket Layer, which then be developed to Secure Electronic Transaction. Abstract in Bahasa Indonesia : Internet dalam bisnis digunakan untuk pertukaran informasi, katalog produk, media promosi, surat elektronik, bulletin boards, kuesioner elektronik, dan mailing list. Internet juga bisa digunakan untuk berdialog, berdiskusi, dan konsultasi dengan konsumen secara on-line, sehingga konsumen dapat dilibatkan secara proaktif dan interaktif dalam perancangan, pengembangan, pemasaran, dan penjualan produk. Pemasaran lewat internet ada 2 metode, yaitu push dan pull marketing. Keunggulan strategi bisnis yang dapat diperoleh dari internet adalah komunikasi global dan interaktif; menyediakan informasi dan pelayanan sesuai dengan kebutuhan konsumen; meningkatkan kerja sama; memungkinkan untuk membuka pasar, produk, atau pelayanan baru; serta mengintegrasikan aktivitas secara on-line. Aplikasi Electronic Commerce ada 2, yaitu: Business-to-Consumer dan Business-to-Business Commerce. Pembayaran

  19. Peer attachment, specific patterns of internet use and problematic internet use in male and female adolescents.

    Science.gov (United States)

    Reiner, Iris; Tibubos, Ana N; Hardt, Jochen; Müller, Kai; Wölfling, Klaus; Beutel, Manfred E

    2017-10-01

    Problematic internet use may lead to serious psychosocial dysfunction. Recent studies have found comparable prevalence in both male and female adolescents. We pursue the neglected questions how male and female adolescents differ regarding their patterns of internet use and how gender, peer attachment and patterns of use are related to pathological internet use. In 2410 adolescents (1307 girls and 1103 boys) aged 12-18 years from different types of school we assessed peer attachment, frequency and use of eight specific applications and indicators of pathological internet use. Three patterns of internet use, 'social'; 'sex and games" and 'functional' were identified and connections between variables were modeled by ordered sequences of regression. We found that problematic internet use-sex and games as well as social usage-was more prevalent in boys. Insecure peer attachment predicted problematic internet use in both sexes. Also, excessive usage of internet games and sex mediated the influence of peer attachment insecurity on problematic internet use, but only for boys. Our study identified that adolescents with insecure peer attachment are at higher risk for problematic internet use. With regard to specific types of internet use, the consumption of online games and sex was identified as risk factor in boys with increasing age. Further studies are needed to understand and possibly subgroup problematic internet use behavior in girls. Our findings suggest that increasing the quality of peer relationships may be promising approach in the prevention and treatment of problematic internet use.

  20. Internet Banking integration within the banking system

    Directory of Open Access Journals (Sweden)

    Constantin Marian MATEI

    2008-01-01

    Full Text Available Internet Banking developed due to increasing demand of online banking transactions. The biggest advantages of Internet Banking consist of complex banking solutions, 24 hours availability, quick and secure access to the back-end application through Internet. These advantages are due to the use of SOA (service-oriented architecture. SOA appeared as a necessity of companies to integrate big and independent portions of applications, in order to obtain an homogeneous functionality of the system. For the Internet Banking applications, SOA proved to be the optimal architectural solution, for a smoth integration between banking services from the front-end to the back-end.This paper intend to offer an insite analyse of the Internet Banking applications architecture integrated with other banking systems. A SOA oriented analyse will establish the scope of the integration architecture.

  1. An internet enabled impact limiter material database

    Energy Technology Data Exchange (ETDEWEB)

    Wix, S.; Kanipe, F.; McMurtry, W. [Sandia National Labs., Albuquerque, NM (United States)

    1998-07-01

    This paper presents a detailed explanation of the construction of an internet enabled database, also known as a database driven web site. The data contained in the internet enabled database are impact limiter material and seal properties. The techniques used in constructing the internet enabled database presented in this paper are applicable when information that is changing in content needs to be disseminated to a wide audience. (authors)

  2. An internet enabled impact limiter material database

    International Nuclear Information System (INIS)

    Wix, S.; Kanipe, F.; McMurtry, W.

    1998-01-01

    This paper presents a detailed explanation of the construction of an internet enabled database, also known as a database driven web site. The data contained in the internet enabled database are impact limiter material and seal properties. The techniques used in constructing the internet enabled database presented in this paper are applicable when information that is changing in content needs to be disseminated to a wide audience. (authors)

  3. Internet of things – promise for the future? An introduction

    CSIR Research Space (South Africa)

    Coetzee, L

    2011-01-01

    Full Text Available The Internet is a living entity, always changing and evolving. New applications and businesses are created continuously. In addition to an evolving Internet, technology is also changing the landscape. Broadband connectivity is becoming cheap...

  4. INTERNET & INTRANET

    Institute of Scientific and Technical Information of China (English)

    刘硬

    1999-01-01

    <正> 一、什么是INTERNET,INTRANET 说起INTERNET大家都知道它是我们平时接触最多的国际互联网。而INTRANET是最近两年才发展起来的新事物,被企业界称为企业内部网。 INTERNET是一组全球范围内信息资源的名字。这些资源非常巨大,不是一般人所能想象的。它于20世纪70年代创建。他们从一称为ARPANET的网络开始,是由美国国防部发起的用于军事情报的调查与军队之间的联络。原来的ARPANET早已被扩展与替代了,今天它已成为我们所说的INTERNET的全球主干网。

  5. An Internet-Based Course And The Application Of Employment-Based Methods In Civil Engineering Projects

    NARCIS (Netherlands)

    de Boer, S.J.; van de Vis, Dimitri; van de Vis, Dimitri; Mosch, Lars P.J.; Taylor Perkins, F.

    2001-01-01

    The paper addresses the question of how educational activities in civil engineering in the Netherlands can contribute to the application of employment-based programs in developing countries. National policy makers and international donor representatives acknowledge the various advantages of

  6. Internet addiction or excessive internet use.

    Science.gov (United States)

    Weinstein, Aviv; Lejoyeux, Michel

    2010-09-01

    Problematic Internet addiction or excessive Internet use is characterized by excessive or poorly controlled preoccupations, urges, or behaviors regarding computer use and Internet access that lead to impairment or distress. Currently, there is no recognition of internet addiction within the spectrum of addictive disorders and, therefore, no corresponding diagnosis. It has, however, been proposed for inclusion in the next version of the Diagnostic and Statistical Manual of Mental Disorder (DSM). To review the literature on Internet addiction over the topics of diagnosis, phenomenology, epidemiology, and treatment. Review of published literature between 2000-2009 in Medline and PubMed using the term "internet addiction. Surveys in the United States and Europe have indicated prevalence rate between 1.5% and 8.2%, although the diagnostic criteria and assessment questionnaires used for diagnosis vary between countries. Cross-sectional studies on samples of patients report high comorbidity of Internet addiction with psychiatric disorders, especially affective disorders (including depression), anxiety disorders (generalized anxiety disorder, social anxiety disorder), and attention deficit hyperactivity disorder (ADHD). Several factors are predictive of problematic Internet use, including personality traits, parenting and familial factors, alcohol use, and social anxiety. Although Internet-addicted individuals have difficulty suppressing their excessive online behaviors in real life, little is known about the patho-physiological and cognitive mechanisms responsible for Internet addiction. Due to the lack of methodologically adequate research, it is currently impossible to recommend any evidence-based treatment of Internet addiction.

  7. Towards a quantum internet

    Science.gov (United States)

    Dür, Wolfgang; Lamprecht, Raphael; Heusler, Stefan

    2017-07-01

    A long-range quantum communication network is among the most promising applications of emerging quantum technologies. We discuss the potential of such a quantum internet for the secure transmission of classical and quantum information, as well as theoretical and experimental approaches and recent advances to realize them. We illustrate the involved concepts such as error correction, teleportation or quantum repeaters and consider an approach to this topic based on catchy visualizations as a context-based, modern treatment of quantum theory at high school.

  8. Examining the Application of the DC-IA-A Diagnostic Criteria for Internet Addiction Disorder in At-Risk College Students.

    Science.gov (United States)

    Hsu, Wen-Yu; Chang, Shan-Mei; Chiu, Nan-Ying; Lin, Sunny S J; Tseng, Yin-Hsing

    2015-01-01

    Internet addiction disorder is a relatively new condition, and the criteria for its diagnosis have been developed only over the last several years. The criteria for Internet addiction remain controversial. We strive to further elucidate the clinical validity of the diagnostic criteria for Internet addiction. To test items of the diagnostic criteria for Internet addiction among adolescents, we conducted a clinical interview study of college students based on longitudinal data on their risky use of the Internet. Forty-one high-risk cases were selected from a 3-year 5-time point longitudinal survey of 716 college freshmen. We examined disputes relevant to symptoms and impairment in the DC-IA-A (Diagnostic Criteria for Internet Addiction among Taiwanese Adolescents). Of the 41 cases, 21 were diagnosed with Internet addiction via a psychiatric interview. In the Internet addiction disorder group, 23.8% of cases had a diagnosis of depression, whereas only 15.0% of the cases in the non-Internet addiction group had a diagnosis of depression. Two major criteria (A8 and A3) had low incidences in these high-risk college students and thus did not help provide a differential diagnosis between the groups. We suggest that A8, 'excessive effort spent on activities necessary to obtain access to the Internet', should be omitted, and that A3, 'tolerance: a marked increase in the duration of Internet use needed to achieve satisfaction', should be modified. A1 and A9 should be discussed regarding their role in the diagnosis of Internet addiction disorder. Additional well-designed studies examining the diagnostic criteria and the relationship between factors are needed. © 2015 S. Karger AG, Basel.

  9. Responsible Internet Use.

    Science.gov (United States)

    Truett, Carol; And Others

    1997-01-01

    Provides advice for making school Internet-use guidelines. Outlines responsible proactive use of the Internet for educators and librarians, discusses strengths and weaknesses of Internet blocking software and rating systems, and describes acceptable-use policies (AUP). Lists resources for creating your own AUP, Internet filtering software, and…

  10. The Internet and tourism

    OpenAIRE

    Verner, Zbyněk

    2012-01-01

    This work concentrates on Internet and its influence on tourism. It describes history of Internet, tourism and interactions among them. Next this work deals with the newest trends of Internet and their influence on tourism. Last but not least, it analyzes the influence of Internet on demand in tourism in Czech Republic.

  11. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  12. Internet Economics IV

    Science.gov (United States)

    2004-08-01

    edts.): Internet Economics IV Technical Report No. 2004-04, August 2004 Information Systems Laboratory IIS, Departement of Computer Science University of...level agreements (SLA), Information technology (IT), Internet address, Internet service provider 16. PRICE CODE 17. SECURITY CLASSIFICATION 18... technology and its economic impacts in the Internet world today. The second talk addresses the area of AAA protocol, summarizing authentication

  13. Internet security technologies

    CERN Multimedia

    CERN. Geneva

    2003-01-01

    The three pillars of Internet Security are Infrastructure, Applications and People. In this series of lectures we will examine those three pillars and how vital it is for individuals to understand the vulnerabilities of this technology so they can made informed decisions about risks and how they can reduce those risks for themselves and their colleagues.First we will focus on the infrastructure: network; servers; operating systems and all those things that are mostly invisible. Moving up a level, into the visible realm, we discuss the application and see things like buffer overflows, viruses and how as application developers and users we can protect ourselves. Finally, it's all about people. The strongest security technology in the world is easily defeated if people don't understand their role in the whole system.

  14. Internet-kulttuuri nykytaiteessa

    OpenAIRE

    Höyssä, Timo

    2016-01-01

    Internet-kulttuuri nykytaiteessa Tutkimuksessa tarkastellaan internet-taiteen historiaa ja nykyisiä esityskäytäntöjä sekä sitä miten globaali internet-kulttuuri on muokannut nykytaidetta sekä galleriassa että webissä. Tutkimuksessa kysytään miten internetin kehitys on vaikuttanut internet-taiteeseen sekä post-internet-taiteen syntyyn? Mikä on internetin paikka nykytaiteessa sekä populaarikulttuurissa? Internet culture in contemporary art A study on the history of Internet art and it’...

  15. Rethinking Marketing Curricula in the Internet Age

    Science.gov (United States)

    Bevan-Dye, A. L.; Venter, P. F.

    2008-01-01

    The aim of this research is to identify an inventory of topics pertaining to the Internet-driven marketing principles that have emerged from the Internet's implication to and application in marketing that bear relevance to the study field of mainstream marketing. Empirical research was conducted to measure South African marketing educators' and…

  16. Trends in Internet Marketing

    OpenAIRE

    Panchanathan, Nitin

    2005-01-01

    Internet marketing involves the usage of the Internet to market and sell goods or services. In this thesis we wished to seek answers for the following questions with the help of web, email surveys taking into consideration consumer perspective, company perspective and 3rd party internet marketing agency perspective. Our survey sample was based on a small set of companies, consumers and internet marketing agencies. The survey results helped us in predicting the trends in internet marketing. We...

  17. Internet of Things in agriculture

    NARCIS (Netherlands)

    Verdouw, C.N.; Wolfert, Jacques; Tekinerdogan, B.

    2016-01-01

    This literature review on Internet of Things (IoT) in agriculture and food, provides an overview of existing applications, enabling technologies and main challenges ahead. The results of the review show that this subject received attention by the scientific community from 2010 on and the number of

  18. Commercial Security on the Internet.

    Science.gov (United States)

    Liddy, Carrie

    1996-01-01

    Discusses commercial security on the Internet and explains public key technology as successfully melding the conflicting requirements of openness for practical business applications and isolation and confidentiality for protection of data. Examples of public key value-added products are described, including encryption, digital signature and…

  19. Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things

    OpenAIRE

    Abdmeziem , Mohammed Riyadh; Tandjaoui , Djamel; Romdhani , Imed

    2017-01-01

    E-health applications have emerged as a promising approach to provide unobtrusive and customizable support to elderly and frail people based on their situation and circumstances. However, due to limited resources available in such systems and data privacy concerns, security issues constitute a major obstacle to their safe deployment. To secure e-health communications, key management protocols play a vital role in the security process. Nevertheless, current e-health systems are unable to run e...

  20. 75 FR 55297 - Further Inquiry Into Two Under-Developed Issues in the Open Internet Proceeding

    Science.gov (United States)

    2010-09-10

    ...). The second is the application of open Internet rules to mobile wireless Internet access services...). The second is the application of open Internet rules to mobile wireless Internet access services... in the market. (B) Truth in Advertising: Prohibit broadband providers from marketing specialized...

  1. Qupe--a Rich Internet Application to take a step forward in the analysis of mass spectrometry-based quantitative proteomics experiments.

    Science.gov (United States)

    Albaum, Stefan P; Neuweger, Heiko; Fränzel, Benjamin; Lange, Sita; Mertens, Dominik; Trötschel, Christian; Wolters, Dirk; Kalinowski, Jörn; Nattkemper, Tim W; Goesmann, Alexander

    2009-12-01

    The goal of present -omics sciences is to understand biological systems as a whole in terms of interactions of the individual cellular components. One of the main building blocks in this field of study is proteomics where tandem mass spectrometry (LC-MS/MS) in combination with isotopic labelling techniques provides a common way to obtain a direct insight into regulation at the protein level. Methods to identify and quantify the peptides contained in a sample are well established, and their output usually results in lists of identified proteins and calculated relative abundance values. The next step is to move ahead from these abstract lists and apply statistical inference methods to compare measurements, to identify genes that are significantly up- or down-regulated, or to detect clusters of proteins with similar expression profiles. We introduce the Rich Internet Application (RIA) Qupe providing comprehensive data management and analysis functions for LC-MS/MS experiments. Starting with the import of mass spectra data the system guides the experimenter through the process of protein identification by database search, the calculation of protein abundance ratios, and in particular, the statistical evaluation of the quantification results including multivariate analysis methods such as analysis of variance or hierarchical cluster analysis. While a data model to store these results has been developed, a well-defined programming interface facilitates the integration of novel approaches. A compute cluster is utilized to distribute computationally intensive calculations, and a web service allows to interchange information with other -omics software applications. To demonstrate that Qupe represents a step forward in quantitative proteomics analysis an application study on Corynebacterium glutamicum has been carried out. Qupe is implemented in Java utilizing Hibernate, Echo2, R and the Spring framework. We encourage the usage of the RIA in the sense of the 'software as a

  2. The Industrial Internet of Things

    OpenAIRE

    Albano, Michele; Silva, José Bruno; Lino Ferreira, Luis

    2017-01-01

    Demo in 22º Seminário da Rede Temática de Comunicações Móveis (RTCM 2017). 18, Jan, 2017, Session III. Lisboa. The application of the Internet of Things to manufacturing is the driving force of the new industrial revolution (Industrie 4.0). In fact, most activities in the manufacturing industry can benefit from the data collected in the context of the industrial process. The Industrial Internet of Things (IIoT), whose pillars are the usage of IP communication between the devices and making...

  3. Predicting Compulsive Internet Use: It’s all about sex

    NARCIS (Netherlands)

    Meerkerk, G.J.; Eijnden, R.J.J.M. van den; Garretsen, H.F.L.

    2006-01-01

    The objective of this research was to assess the predictive power of various Internet applications on the development of compulsive Internet use (CIU). The study has a two-wave longitudinal design with an interval of 1 year. The first measurement contained 447 adult heavy Internet users who used the

  4. A Study about Using Internet in History Lessons

    Science.gov (United States)

    Ulusoy, Kadir

    2012-01-01

    Internet has become an important part in the field of education as it is in every area nowadays as well. Internet has become appealing among educators and students with its easy and quick access and wide opportunities. In this study, an application of using internet in the history course was done. 160 students who were enrolled in College of…

  5. 77 FR 1039 - Internet-Based Telecommunications Relay Service Numbering

    Science.gov (United States)

    2012-01-09

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 [WC Docket No. 10-191; Report No. 2939] Internet... toll-free numbers by users of Internet- based Telecommunications Relay Services (iTRS). DATES... any rules of particular applicability. Subject: Internet-Based Telecommunications Relay Service...

  6. Current Internet use and preferences of IVF and ICSI patients.

    NARCIS (Netherlands)

    Haagen, E.C.; Tuil, W.S.; Hendriks, J.H.C.L.; Bruijn, R.P. de; Braat, D.D.M.; Kremer, J.A.M.

    2003-01-01

    BACKGROUND: Nowadays, the Internet has a tremendous impact on modern society, including healthcare practice. The study aim was to characterize current Internet use by IVF and ICSI patients and to identify their preferences regarding Internet applications in fertility care. METHODS: A total of 163

  7. A Location-Based Interactive Model of Internet of Things and Cloud (IoT-Cloud) for Mobile Cloud Computing Applications.

    Science.gov (United States)

    Dinh, Thanh; Kim, Younghan; Lee, Hyukjoon

    2017-03-01

    This paper presents a location-based interactive model of Internet of Things (IoT) and cloud integration (IoT-cloud) for mobile cloud computing applications, in comparison with the periodic sensing model. In the latter, sensing collections are performed without awareness of sensing demands. Sensors are required to report their sensing data periodically regardless of whether or not there are demands for their sensing services. This leads to unnecessary energy loss due to redundant transmission. In the proposed model, IoT-cloud provides sensing services on demand based on interest and location of mobile users. By taking advantages of the cloud as a coordinator, sensing scheduling of sensors is controlled by the cloud, which knows when and where mobile users request for sensing services. Therefore, when there is no demand, sensors are put into an inactive mode to save energy. Through extensive analysis and experimental results, we show that the location-based model achieves a significant improvement in terms of network lifetime compared to the periodic model.

  8. A Location-Based Interactive Model of Internet of Things and Cloud (IoT-Cloud for Mobile Cloud Computing Applications

    Directory of Open Access Journals (Sweden)

    Thanh Dinh

    2017-03-01

    Full Text Available This paper presents a location-based interactive model of Internet of Things (IoT and cloud integration (IoT-cloud for mobile cloud computing applications, in comparison with the periodic sensing model. In the latter, sensing collections are performed without awareness of sensing demands. Sensors are required to report their sensing data periodically regardless of whether or not there are demands for their sensing services. This leads to unnecessary energy loss due to redundant transmission. In the proposed model, IoT-cloud provides sensing services on demand based on interest and location of mobile users. By taking advantages of the cloud as a coordinator, sensing scheduling of sensors is controlled by the cloud, which knows when and where mobile users request for sensing services. Therefore, when there is no demand, sensors are put into an inactive mode to save energy. Through extensive analysis and experimental results, we show that the location-based model achieves a significant improvement in terms of network lifetime compared to the periodic model.

  9. A Location-Based Interactive Model of Internet of Things and Cloud (IoT-Cloud) for Mobile Cloud Computing Applications

    Science.gov (United States)

    Dinh, Thanh; Kim, Younghan; Lee, Hyukjoon

    2017-01-01

    This paper presents a location-based interactive model of Internet of Things (IoT) and cloud integration (IoT-cloud) for mobile cloud computing applications, in comparison with the periodic sensing model. In the latter, sensing collections are performed without awareness of sensing demands. Sensors are required to report their sensing data periodically regardless of whether or not there are demands for their sensing services. This leads to unnecessary energy loss due to redundant transmission. In the proposed model, IoT-cloud provides sensing services on demand based on interest and location of mobile users. By taking advantages of the cloud as a coordinator, sensing scheduling of sensors is controlled by the cloud, which knows when and where mobile users request for sensing services. Therefore, when there is no demand, sensors are put into an inactive mode to save energy. Through extensive analysis and experimental results, we show that the location-based model achieves a significant improvement in terms of network lifetime compared to the periodic model. PMID:28257067

  10. Ultra-stable long distance optical frequency distribution using the Internet fiber network and application to high-precision molecular spectroscopy

    International Nuclear Information System (INIS)

    Lopez, O; Chanteau, B; Bercy, A; Argence, B; Darquié, B; Chardonnet, C; Amy-Klein, A; Nicolodi, D; Zhang, W; Abgrall, M; Haboucha, A; Kanj, A; Rovera, D; Achkar, J; Pottie, P-E; Coq, Y Le; Santarelli, G

    2013-01-01

    We report an optical link of 540 km for ultrastable frequency distribution over the Internet fiber network. The phase-noise compensated link shows a fractional frequency instability in full bandwidth of 3×10 −14 at one second measurement time and 2×10 −18 at 30 000 s. This work is a significant step towards a sustainable wide area ultrastable optical frequency distribution and comparison network. Time transfer was demonstrated simultaneously on the same link and led to an absolute time accuracy (250 ps) and long-term timing stability (20 ps) which outperform the conventional satellite transfer methods by one order of magnitude. Current development addresses the question of multiple users distribution in the same metropolitan area. We demonstrate on-line extraction and first results show frequency stability at the same level as with conventional link. We also report an application to coherent frequency transfer to the mid-infrared. We demonstrate the frequency stabilisation of a mid-infrared laser to the near-infrared frequency reference transferred through the optical link. Fractional stability better than 4×10 −14 at 1 s averaging time was obtained, opening the way to ultrahigh resolution spectroscopy of molecular rovibrational transitions

  11. Internet services in e-learning management

    Directory of Open Access Journals (Sweden)

    Вера Николаевна Бутова

    2013-12-01

    Full Text Available The article describes the issues of Internet services practical application in order to check correspondence of written works to their topics in terms of Human Sciences as well as checking of written texts on uniqueness.

  12. Internet: A place for patent retrieval

    African Journals Online (AJOL)

    GRACE

    2006-05-16

    May 16, 2006 ... Key words: Biotechnology, intellectual property rights, Patents, Internet application. INTRODUCTION. The principle objective of biotechnology is to produce ... Finland. France. Germany. Greek. Georgian. Hong Kong. Hungarian. Irsish. Italian. Japan. Korean. Luxemberg. Lithuania. Malaysian. Moldova.

  13. Automated Story Capture From Internet Weblogs

    National Research Council Canada - National Science Library

    Gordon, Andrew S; Cao, Qun; Swanson, Reid

    2007-01-01

    .... first-person narratives about real-life experiences. Millions of these stories appear in Internet weblogs, offering a potentially valuable resource for future knowledge management and training applications...

  14. Compact Planar Ultrawideband Antennas with 3.5/5.2/5.8 GHz Triple Band-Notched Characteristics for Internet of Things Applications.

    Science.gov (United States)

    Dong, Jian; Li, Qianqian; Deng, Lianwen

    2017-02-10

    Ultrawideband (UWB) antennas, as core devices in high-speed wireless communication, are widely applied to mobile handsets, wireless sensor networks, and Internet of Things (IoT). A compact printed monopole antenna for UWB applications with triple band-notched characteristics is proposed in this paper. The antenna has a very compact size of 10 x 16 mm2 and is composed of a square slotted radiation patch and a narrow rectangular ground plane on the back of the substrate. First, by etching a pair of inverted T-shaped slots at the bottom of the radiation patch, one notched band at 5-6 GHz for rejecting the Wireless Local Area Network (WLAN) is generated. Then, by cutting a comb-shaped slot on the top of the radiation patch, a second notched band for rejecting 3.5 GHz Worldwide Interoperability for Microwave Access (WiMAX) is obtained. Further, by cutting a pair of rectangular slots and a C-shaped slot as well as adding a pair of small square parasitic patches at the center of the radiating patch, two separate notched bands for rejecting 5.2 GHz lower WLAN and 5.8 GHz upper WLAN are realized, respectively. Additionally, by integrating the slotted radiation patch with the narrow rectangular ground plane, an enhanced impedance bandwidth can be achieved, especially at the higher band. The antenna consists of linear symmetrical sections only and is easy for fabrication and fine-tuning. The measured results show that the designed antenna provides a wide impedance bandwidth of 150% from 2.12 to 14.80 GHz for VSWR applications.

  15. Internet Commerce Managing Financial on the Internet

    Directory of Open Access Journals (Sweden)

    Chandra Wibowo Widhianto

    2001-03-01

    Full Text Available Article explain how to business through internet which are web business clarification, strategy effect, how to make profit, and business electronic changes consist of criptografy, EDI, signature, digital notarisation, file, payment, and how to get succes in internet business.

  16. Commercialisation of Internet

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik

    An anthology dealing with the commercialisation of Internet and the development of new services.......An anthology dealing with the commercialisation of Internet and the development of new services....

  17. Internet flash of lightning

    International Nuclear Information System (INIS)

    Anon.

    2005-01-01

    Seven Internet sites are given relative to European Research and IAEA; Three sites in relation with optimization of radiation protection and environment, Google scolar, medicine, radioecology, finally seventeen Internet sites are detailed in this article. (N.C.)

  18. Internet user behaviour

    Directory of Open Access Journals (Sweden)

    Radbâță, A.

    2011-01-01

    Full Text Available Internet is a useful tool for everybody in a technologically advanced world. As Internet appears and develops, it creates a totally new network environment. The development of commerce on the Internet based on virtual communities has become one of the most successful business models in the world. After analyzing the concept of internet, the e-commerce market and its marketing mix and the benefits and limitations of the Internet, we have presented a few studies on Internet user behaviour. Furthermore, the paper looks at a representative sample of Romanian internet users. The results reveal that the Romanians are using the Internet especially for information gathering, e-mail, entertainment and social networking.

  19. Internet Addiction and Antisocial Internet Behavior of Adolescents

    OpenAIRE

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued ...

  20. The internet for radiologists

    International Nuclear Information System (INIS)

    Caramella, D.; Pavone, P.

    1999-01-01

    This book provides information on all aspects of the Internet of interest to radiologists. It also provides non-experts with all the information necessary to profit from the Internet and to explore the different possibilities offered by the www. Its use should be recommended to all radiologists who use the Internet. (orig.)

  1. Advertising on the Internet.

    Science.gov (United States)

    Jugenheimer, Donald W.

    1996-01-01

    States that although many advertisers have intentions of utilizing the Internet for advertising, which can provide specific audience targeting and buyer/seller interactivity, few have been successful. Explains advantages and disadvantages of using the Internet for advertising purposes. Cites special problems with Internet advertising and successes…

  2. Impact of the Internet.

    Science.gov (United States)

    Balajthy, Ernest

    1997-01-01

    Discusses the impact and the potential of the Internet on education. Suggests that educators and parents need to deal with the lack of quality assurance of the Internet. Addresses readability and appropriateness for children. Notes that successful use of the Internet by children requires that teachers provide instruction in multiple sources and…

  3. Internet Bad Neighborhoods

    NARCIS (Netherlands)

    Moreira Moura, Giovane

    2013-01-01

    A significant part of current Internet attacks originates from hosts that are distributed all over the Internet. However, there is evidence that most of these hosts are, in fact, concentrated in certain parts of the Internet. This behavior resembles the crime distribution in the real world: it

  4. Internet Addiction in Adolescents

    Science.gov (United States)

    Rebisz, Slawomir; Sikora, Ilona

    2016-01-01

    The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the…

  5. Konsep Pemasaran Melalui Internet

    OpenAIRE

    Nurbasari, Anny

    2002-01-01

    Tulisan ini mencoba membuka wawasan kita untuk mengenal dan mendalami paradigma baru dalam manajemen pemasaran, yang berkaitan dengan kemajuan teknologi pemasaran khususnya pemasaran internet (internet marketing).Pemasaran lewat internet sebagai media komunikasi baru makin lazim dilakukan dan makin berpengaruh karena efisiensinya (lengkap, detail, akurat, cepat, mudah, hemat, murah, dan berjangkauan luas). Secara otomatis ini meningkatkan customer intimacy dan customer satisfaction.

  6. Internet from Above.

    Science.gov (United States)

    Sullivan, Laura

    1998-01-01

    Explains how fast and reliable Internet access can be obtained by using satellite communications based on experiences at a high school in Mississippi. Discusses Internet communications; how it was implemented in the media center; local area networks; the need for Ethernet-based connection to the Internet; and price. (LRW)

  7. Measuring the internet

    NARCIS (Netherlands)

    Zhou, X.

    2006-01-01

    The Internet is a collection of networks that use the TCP/IP suite of protocols. It has a huge impact on human activity. There are currently hundreds of millions of computers connected to the Internet, generating several petabytes traffic a day. Internet is still growing rapidly. However, the

  8. Internet Addiction and Psychopathology

    Science.gov (United States)

    Koc, Mustafa

    2011-01-01

    This study examined the relationships between university students' internet addiction and psychopathology in Turkey. The study was based on data drawn from a national survey of university students in Turkey. 174 university students completed the SCL-90-R scale and Addicted Internet Users Inventory. Results show that students who use internet six…

  9. The Application Reverie of Smart Bracelet Based on "Internet+"%基于互联网+智能手环应用遐想

    Institute of Scientific and Technical Information of China (English)

    习立瑀

    2017-01-01

    The smart bracelet as a wearable product has become the focus of attention.But a little careful observation is not difficult to find smart bracelet is just different in style and the price,and its function is similar.The majority of consumers said that in practice,due to the lack of practical function and attractive,it is no longer in use.This article through the questionnaire survey,understands people's present view and evaluation on smart bracelet,takes an application reverie of smart bracelet,and establishes the development direction of smart bracelet with function as a dominant,which is an important accessory as Internet+ life.%智能手环作为可穿戴产品已成为人们关注的热点.但稍微细心观察就不难发现智能手环只是在样式和价格上有不同,其功能却是大同小异,多数消费者表示在实际应用中,因功能缺乏实用性和吸引力等原因而不再使用.本文通过问卷调查的方式,了解现在人们对智能手环的看法与评价,展开了对智能手环应用的遐想,确立智能手环以功能为主导,作为互联网+生活的重要配件的发展方向.

  10. Compact Planar Ultrawideband Antennas with 3.5/5.2/5.8 GHz Triple Band-Notched Characteristics for Internet of Things Applications

    Directory of Open Access Journals (Sweden)

    Jian Dong

    2017-02-01

    Full Text Available Ultrawideband (UWB antennas, as core devices in high-speed wireless communication, are widely applied to mobile handsets, wireless sensor networks, and Internet of Things (IoT. A compact printed monopole antenna for UWB applications with triple band-notched characteristics is proposed in this paper. The antenna has a very compact size of 10 x 16 mm2 and is composed of a square slotted radiation patch and a narrow rectangular ground plane on the back of the substrate. First, by etching a pair of inverted T-shaped slots at the bottom of the radiation patch, one notched band at 5-6 GHz for rejecting the Wireless Local Area Network (WLAN is generated. Then, by cutting a comb-shaped slot on the top of the radiation patch, a second notched band for rejecting 3.5 GHz Worldwide Interoperability for Microwave Access (WiMAX is obtained. Further, by cutting a pair of rectangular slots and a C-shaped slot as well as adding a pair of small square parasitic patches at the center of the radiating patch, two separate notched bands for rejecting 5.2 GHz lower WLAN and 5.8 GHz upper WLAN are realized, respectively. Additionally, by integrating the slotted radiation patch with the narrow rectangular ground plane, an enhanced impedance bandwidth can be achieved, especially at the higher band. The antenna consists of linear symmetrical sections only and is easy for fabrication and fine-tuning. The measured results show that the designed antenna provides a wide impedance bandwidth of 150% from 2.12 to 14.80 GHz for VSWR < 2, except for three notched bands of 3.36–4.16, 4.92–5.36, and 5.68–6.0 GHz. Additionally, the antenna exhibits nearly omnidirectional radiation characteristics, low gain at the stopbands, and flat group delay over the whole UWB except at the stopbands. Simulated and experimental results show that the proposed antenna can provide good frequency-domain and time-domain performances at desired UWB frequencies and be an attractive candidate for

  11. 5G internet of things: A survey

    OpenAIRE

    Li, S.; Xu, L.; Zhao, S.

    2018-01-01

    The existing 4G networks have been widely used in the Internet of Things (IoT) and is continuously evolving to match the needs of the future Internet of Things (IoT) applications. The 5G networks are expected to massive expand today's IoT that can boost cellular operationgs, IoT security, and network challenges and driving the Internet future to the edge. The existing IoT solutions are facing a number of challenges such as large number of conneciton of nodes, security, and new standards. This...

  12. A survey of commercial frameworks for the Internet of Things

    OpenAIRE

    Derhamy, Hasan; Eliasson, Jens; Delsing, Jerker; Priller, Peter

    2015-01-01

    In 2011 Ericsson and Cisco estimated 50 billion Internet connected devices by 2020, encouraged by this industry is developing application frameworks to scale the Internet of Things. This paper presents a survey of commercial frameworks and platforms designed for developing and running Internet of Things applications. The survey covers frameworks supported by big players in the software and electronics industries. The frameworks are evaluated against criteria such as architectural approach, in...

  13. 4C理论在网络营销中的应用解析%Analysis of the Application of 4C Theory in Internet Marketing

    Institute of Scientific and Technical Information of China (English)

    刘生慧

    2012-01-01

    4C理论是在现代经济形势下以消费者为导向的网络营销理念,主要涉及消费者、成本、便利和沟通四个要素。4C理论可以给网络营销计划的制定、执行和完善带来较为全面的、系统的指导,有利于建立良好的网络营销策略。%4C theory is a consumer-oriented internet marketing concept in the modern economic situation,including consumer,cost,convenience and communication.it can be used to direct the development,implementation and improvement of the internet marketing project comprehensively and systematically,so that the favorable internet marketing strategy can be constructed.

  14. Analisis Perkembangan Internet Broadband di Daerah Perbatasan Sulawesi Utara

    Directory of Open Access Journals (Sweden)

    Riva'atul Adaniah Wahab

    2016-12-01

    infrastructure is still insufficient, the availability of high-quality internet broadband services with low rates are still difficult to realize. From the aspect of demand, stigma or the community perception that the internet is not important makes the people don't have internet access. The barriers is predominantly lack of knowledge in internet usage. This factor also causes community internet broadband literacy at level 0. As solutions, the preparation and establishment of policies and regulations such as the QoS service, interconnection, infrastructure sharing can provide high-quality internet broadband internet at a cheaper price. Besides the distribution of valuable mobile device (smartphone should also be encouraged by the application of local content level for the production of the device. No less important is the increase of community lietracy in internet broadband through socialization or training, both formal and informal.

  15. Tierless Programming for the Internet of Things

    Energy Technology Data Exchange (ETDEWEB)

    Decker, Brett [Brown Univ., Providence, RI (United States)

    2015-02-01

    The Internet of Things (IoT) is about Internet-addressability and connectivity for everyday devices. The goal of this project was to create a framework to allow developers to more easily control IoT devices and turn their interactions into meaningful applications. We leveraged a tierless approach for Software Defined Networking (SDN) to build this framework. We expanded Flowlog, a tierless programming language for SDN controllers, to support IoT devices developed by Spark IO to build this framework.

  16. An Internet enabled impact limiter material database

    Energy Technology Data Exchange (ETDEWEB)

    Wix, S.; Kanipe, F.; McMurtry, W.

    1998-09-01

    This paper presents a detailed explanation of the construction of an interest enabled database, also known as a database driven web site. The data contained in the internet enabled database are impact limiter material and seal properties. The technique used in constructing the internet enabled database presented in this paper are applicable when information that is changing in content needs to be disseminated to a wide audience.

  17. An Internet enabled impact limiter material database

    International Nuclear Information System (INIS)

    Wix, S.; Kanipe, F.; McMurtry, W.

    1998-01-01

    This paper presents a detailed explanation of the construction of an interest enabled database, also known as a database driven web site. The data contained in the internet enabled database are impact limiter material and seal properties. The technique used in constructing the internet enabled database presented in this paper are applicable when information that is changing in content needs to be disseminated to a wide audience

  18. Current experiences with internet telepathology and possible evolution in the next generation of Internet services.

    Science.gov (United States)

    Della Mea, V; Beltrami, C A

    2000-01-01

    The last five years experience has definitely demonstrated the possible applications of the Internet for telepathology. They may be listed as follows: (a) teleconsultation via multimedia e-mail; (b) teleconsultation via web-based tools; (c) distant education by means of World Wide Web; (d) virtual microscope management through Web and Java interfaces; (e) real-time consultations through Internet-based videoconferencing. Such applications have led to the recognition of some important limits of the Internet, when dealing with telemedicine: (i) no guarantees on the quality of service (QoS); (ii) inadequate security and privacy; (iii) for some countries, low bandwidth and thus low responsiveness for real-time applications. Currently, there are several innovations in the world of the Internet. Different initiatives have been aimed at an amelioration of the Internet protocols, in order to have quality of service, multimedia support, security and other advanced services, together with greater bandwidth. The forthcoming Internet improvements, although induced by electronic commerce, video on demand, and other commercial needs, are of real interest also for telemedicine, because they solve the limits currently slowing down the use of Internet. When such new services will be available, telepathology applications may switch from research to daily practice in a fast way.

  19. Security in the internet; Sicherheitsaspekte im Internet

    Energy Technology Data Exchange (ETDEWEB)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P. [Witten-Herdecke Univ., Witten (Germany). Inst. fuer Diagnostische und Interventionelle Radiologie

    2000-04-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [German] Ziele der Studie und Analyse: Es sollten die Fragen beantwortet werden, ob es moeglich ist, das Internet als sicheres Uebermittlungsmedium fuer Telemedizin zu nutzen und welche Sicherheitsrisiken bestehen. Dazu wurden die gaengigen Sicherheitsmethoden analysiert. Telemedizin im Internet ist mit Sicherheitsrisiken behaftet, die durch die Oeffnung eines Intranets mit der Moeglichkeit zur unberechtigten Manipulation von aussen bedingt sind. Schlussfolgerung: Diese Sicherheitsrisiken koennen durch eine Firewall weitgehend unterbunden werden. Chipkarten wie die Health professional card ermoeglichen eine hohe Sicherheit bei digitaler Signatur und sicherer Authentifikation der Sender und Empfaenger von Daten im Internet. Auch Standards wie Pretty good privacy sind inzwischen fuer sichere e-mails einfach einzusetzen. Wichtige Voraussetzung fuer die Reduktion von Sicherheitsrisiken ist unter Beruecksichtigung der gesetzlichen Vorgaben die exakte Planung aller Aktivitaeten im Internet, bei denen medizinische Patientendaten versandt werden sollen, in einem Team aus Aerzten und Informatikern. (orig.)

  20. Internet marketing global features

    Directory of Open Access Journals (Sweden)

    Rakita Branko

    2005-01-01

    Full Text Available Business environment incessantly bringing a yard of a new challenges to market entities. One of the greatest challenges that companies faced during the last couple of decades was development of information systems as well as a large scale usage of world's greatest computer network - Internet - no matter how big they were or what their activities included. There are many papers about Internet, its development, social and economic significance. However, there is no paper or article written by a local author that systematically and thoroughly treats marketing importance of Internet. This paper presents potentials and business importance of internet marketing in new millennium. It considers internet as a communication, trade and distribution channel. In addition, the paper highlights research potentials of Internet.

  1. A series of studies examining Internet treatment of obesity to inform Internet interventions for substance use and misuse.

    Science.gov (United States)

    Tate, Deborah F

    2011-01-01

    The feasibility and efficacy of Internet treatment programs for overweight and obese people have been demonstrated in a series of randomized trials. Initial studies examined various approaches to Internet behavioral treatment. Other studies have examined delivery of group behavioral counseling using Internet chat rooms, using the Internet for long-term maintenance of weight loss, and enhancing motivation in Internet programs. These interventions have produced weight losses of 4-7 kg over 6 months to 1 year when support via e-mail, automated messages, or chat rooms is provided. Outcomes and lessons learned with application to the treatment of substance use and misuse are provided.

  2. Internet Geo-Location

    Science.gov (United States)

    2017-12-01

    INTERNET GEO-LOCATION DUKE UNIVERSITY DECEMBER 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED STINFO COPY AIR...REPORT TYPE FINAL TECHNICAL REPORT 3. DATES COVERED (From - To) MAY 2014 – MAY 2017 4. TITLE AND SUBTITLE INTERNET GEO-LOCATION 5a. CONTRACT...of SpeedTest servers that are used by end users to measure the speed of their Internet connection. The servers log the IP address and the location

  3. INTERNET AND SENIORS

    OpenAIRE

    Rain, Tomáš; Ivana Švarcová

    2010-01-01

    The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize...

  4. International Mathematical Internet Olympiad

    Directory of Open Access Journals (Sweden)

    Alexander Domoshnitsky

    2012-10-01

    Full Text Available Modern Internet technologies open new possibilities in wide spectrum of traditional methods used in mathematical education. One of the areas, where these technologies can be efficiently used, is an organization of mathematical competitions. Contestants can stay at their schools or universities and try to solve as many mathematical problems as possible and then submit their solutions through Internet. Simple Internet technologies supply audio and video connection between participants and organizers.

  5. Everyone’s Internet

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    After more than 20 years,the Internet in China has become a big success.The country has the world’s largest Internet population that topped 420 million at the end of June.In the first six months of this year,China’s Internet market reached 74.3 billion yuan($10.9 billion),the equivalent of 2009’s total.Local businesses have risen to

  6. Privacy and internet services

    OpenAIRE

    Samec, Marek

    2010-01-01

    This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...

  7. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  8. Privacy driven internet ecosystem

    OpenAIRE

    Trinh, Tuan Anh; Gyarmati, Laszlo

    2012-01-01

    The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...

  9. Internet Addiction in Adolescents

    OpenAIRE

    Rębisz Sławomir; Sikora Ilona

    2016-01-01

    The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the twentieth century, usually appears in the literature in the context of young people who have been found to be most vulnerable. The phenomenon is known...

  10. INTERNET AND SENIORS

    Directory of Open Access Journals (Sweden)

    Rain, Tomáš

    2010-12-01

    Full Text Available The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize ways of using internet for helping seniors to better life. The authors describe terms e-senior. The authors suggest methodological approach to exercising user’s skills.

  11. Internet dalam Konteks Perpustakaan

    Directory of Open Access Journals (Sweden)

    Roni Rodhin

    2017-02-01

    Full Text Available The presence of internet would bring a variaty of effects in all areas of human life. The impac of bias could be both a positive and negative. On the other side for libraries it would bring a disparate impact, engaged  in the service and information. In the contect of libraries, the internet is very helpfull to disseminate information that is available in it. It means internet becomes a partner in the dissemination of information. Therefore, the existence of internet is very important for the library.

  12. Modeling the Internet.

    Energy Technology Data Exchange (ETDEWEB)

    Kelic, Andjelka; Mitchell, Michael David; Shirah, Donald N.

    2017-12-01

    The National Infrastructure Simulations and Analysis Center (NISAC) has developed a nationwide model of the Internet to study the potential impact of the loss of physical facilities on the network and on other infrastructures that depend on the Internet for services. The model looks at the Internet from the perspective of Internet Service Providers (ISPs) and their connectivity and can be used to determine how the network connectivity could be modified to assist in mitigating an event. In addition the model could be used to explore how portions of the network could be made more resilient to disruptive events.

  13. A systems of systems perspective on the internet of things

    NARCIS (Netherlands)

    Lukkien, J.J.

    2016-01-01

    The Internet of Things (IoT) refers to extending the reach of the Internet into the physical world. The realization of IoT applications involves the integrated operation of many subsystems that retain their private function. This makes IoT application deployment and integration a Systems of Systems

  14. Differential psychological impact of internet exposure on Internet addicts.

    Directory of Open Access Journals (Sweden)

    Michela Romano

    Full Text Available The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  15. Differential psychological impact of internet exposure on Internet addicts.

    Science.gov (United States)

    Romano, Michela; Osborne, Lisa A; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  16. What drives individuals to access the internet mostly using a cell phone?

    OpenAIRE

    Yook, Seungyun; Jung, Yumi

    2012-01-01

    Mobile Internet users can access content, applications, and services using their cell phones. Recent PEW Internet research shows that more than half of U.S. cell phone owners have smartphones. Among them, some people have adopted a mobile phone and use it as a major Internet access medium; they may use other devices such as a desktop computer, notebook, netbook, or tablet PC, but those are not included in their Internet access medium repertoire. This paper examines who accesses the Internet m...

  17. Factors Affecting Internet Banking Success: A Comparative Investigation between Indonesia and South Korea

    OpenAIRE

    Aries Susanto; Hwansoo Lee; Hangjung Zo; Andrew P. Ciganek

    2013-01-01

    Internet banking is a prominent example of Internet-based applications. Previous research has found that satisfaction, trust, commitment, and loyalty are important factors for Internet banking success. Resistance to adopt Internet banking is often attributed to the role of trust, security, and privacy in e-commerce systems. This study proposes a framework to examine behaviors toward Internet banking services in Indonesia and South Korea. A research model was empirically tested with data captu...

  18. IP Connected Low Power Wireless Personal Area Networks in the Future Internet

    DEFF Research Database (Denmark)

    Jacobsen, Rune Hylsberg; Toftegaard, Thomas Skjødeberg; Kjærgaard, Jens Kristian

    2012-01-01

    The Internet of Things is a key concept of the Future Internet. The Internet of Things potentially interconnects billions of small devices in a large ubiquitous infrastructure based on the Internet Protocol (IP). Typically, these devices will be limited in computational capacity, memory......WPANs). The authors address the key mechanisms from network aspects down to device design aspects and discuss how technologies interplay to make real application deployment practical for the Internet of Things....

  19. Differential Psychological Impact of Internet Exposure on Internet Addicts

    OpenAIRE

    Romano, Michela; Osborne, Lisa A.; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and aut...

  20. Scalable video on demand adaptive Internet-based distribution

    CERN Document Server

    Zink, Michael

    2013-01-01

    In recent years, the proliferation of available video content and the popularity of the Internet have encouraged service providers to develop new ways of distributing content to clients. Increasing video scaling ratios and advanced digital signal processing techniques have led to Internet Video-on-Demand applications, but these currently lack efficiency and quality. Scalable Video on Demand: Adaptive Internet-based Distribution examines how current video compression and streaming can be used to deliver high-quality applications over the Internet. In addition to analysing the problems

  1. Piecing together the Internet

    CERN Multimedia

    Rae-Dupree, J

    2002-01-01

    No one group or person can take credit for inventing the Internet. Key ideas came from both military and academic researchers, DOE money got it up and running. Article giving a chronological timeline of the development of the internet from the 1960s to the present day (2 PC screens).

  2. Interlinguistics and the Internet.

    Science.gov (United States)

    Fettes, Mark

    1997-01-01

    Argues that the Internet offers new opportunities for the development, use, and study of planned languages. Notes that while most Web pages on "constructed" languages are the work of individual hobbyists, a few projects have small communities of users. The paper concludes that the use of Esperanto on the Internet reflects increased socialization…

  3. Creating Pupils' Internet Magazine

    Science.gov (United States)

    Bognar, Branko; Šimic, Vesna

    2014-01-01

    This article presents an action research, which aimed to improve pupils' literary creativity and enable them to use computers connected to the internet. The study was conducted in a small district village school in Croatia. Creating a pupils' internet magazine appeared to be an excellent way for achieving the educational aims of almost all…

  4. The Internet Erlang Formula

    DEFF Research Database (Denmark)

    Iversen, Villy Bæk

    2012-01-01

    This paper presents a robust and efficient algorithm for evaluating multi-service multi-rate queueing systems, including finite buffer systems and loss systems. Vint Cerf listed in 2007 seven research problems concerning the Internet. This paper responds to the second problem: an Internet Erlang...

  5. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...

  6. Teaching on the Internet.

    Science.gov (United States)

    Kubala, Tom

    1998-01-01

    Discusses Internet graduate teaching experiences at the University of Central Florida and explores the pros and cons of online instruction. Describes Internet courses as asynchronous, allowing students to participate at any time and place. States that faculty must be excellent teachers, able to translate their styles into effective,…

  7. The Internet Debate.

    Science.gov (United States)

    Wampler, Angela Mallicote

    1996-01-01

    Examines whether the Internet will be an equalizer or will increase social stratification, whether the Internet will be a boon to rural areas, and how it can be made more appealing or acceptable to rural areas. Discusses the "missionary movement" model of economic change and rural issues related to access to infrastructure, censorship,…

  8. Internet Bad Neighborhoods Aggregation

    NARCIS (Netherlands)

    Moreira Moura, Giovane; Sadre, R.; Sperotto, Anna; Pras, Aiko; Paschoal Gaspary, L.; De Turk, Filip

    Internet Bad Neighborhoods have proven to be an innovative approach for fighting spam. They have also helped to understand how spammers are distributed on the Internet. In our previous works, the size of each bad neighborhood was fixed to a /24 subnetwork. In this paper, however, we investigate if

  9. Ethics and Internet Measurements

    NARCIS (Netherlands)

    van der Ham, Jeroen; van Rijswijk, Roland M.

    2017-01-01

    Over the past decade the Internet has changed from a helpful tool to an important part of our daily lives for most of the world’s population. Where in the past the Internet mostly served to look up and exchange information, it is now used to stay in touch with friends, perform financial transactions

  10. Internet accounting dictionaries

    DEFF Research Database (Denmark)

    Nielsen, Sandro; Mourier, Lise

    2005-01-01

    An examination of existing accounting dictionaries on the Internet reveals a general need for a new type of dictionary. In contrast to the dictionaries now accessible, the future accounting dictionaries should be designed as proper Internet dictionaries based on a functional approach so they can...

  11. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  12. LIFE ON THE INTERNET

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The fast development of the Internet has not only changed people’s lifestyles but also had a deep impact on social structure the rapidly growing Internet has not only changed ways of collecting and using information,but also exerted a farreaching influence on social

  13. Internet and information

    Institute of Scientific and Technical Information of China (English)

    王文龙

    2001-01-01

    As the society develops, information becomesmore important than ever before. Computers willgradually be familiar to more and more people andbe used in more and more ways. Internet makes theworld integrated(合并) as a whole. So, it is important to learn how to make use of the Internet.

  14. Measuring internet skills

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; van Dijk, Johannes A.G.M.

    2010-01-01

    Research that considers Internet skills often lacks theoretical justifications and does not go beyond basic button knowledge. There is a strong need for a measurement framework that can guide future research. In this article, operational definitions for measuring Internet skills are proposed,

  15. Banking on the Internet.

    Science.gov (United States)

    Internet Research, 1996

    1996-01-01

    Electronic ground was broken in 1995 with the development of the completely Internet-based bank Security First Network Bank. This article discusses the need for developing online services, outlines the reasons for the formation of an Internet-based bank and argues that to remain competitive financial services providers must provide easier customer…

  16. Australian internet policy

    Directory of Open Access Journals (Sweden)

    Angela Daly

    2017-03-01

    Full Text Available This special issue focussing on internet policy in Australia provides a snapshot of developments on various topics (access, privacy, censorship as a means of understanding better the state of play in Australia, and also how this compares to internet policy in other parts of the world, especially Europe and North America. Given changing geopolitics, the influence of internet policy in the rest of the Asia Pacific through vehicles such as the Regional Comprehensive Economic Partnership (RCEP may become increasingly important in Australia in the coming years. This leaves Australia, and its internet policy, at a crossroads, which may reflect broader dynamics in internet policy internationally, and makes this an interesting time in which to explore what is happening in this particular country.

  17. The Internet drag race

    CERN Document Server

    Fitchard, Kevin

    2004-01-01

    The Internet2 consortium members from California Institute of Technology and CERN developed effective fiber optic network, sending data upto 11,000 kilometers between Caltech's LA laboratories and CERN's campus in Geneva at a rate of 6.25 Gb/s. The 68,431 terabit- meters per second data transfer was accomplished using the IPv4 protocols that power the public Internet. Network run by Internet2, called Abilene maintains the highest capacities in the world, connecting dozens of GigaPOP's with OC-192c 10 Gb/s Ip backbone. The member institutions of Internet2 keep Abilene 10% to 15% full, but the researchers also use the network as a base for the latest Internet technologies and experiments, which include development of IPv6. (Edited abstract).

  18. Internet versus mail

    DEFF Research Database (Denmark)

    Olsen, Søren Bøye

    In a choice experiment setup, this paper suggests that internet surveys can be a viable alternative to traditional mail surveys when gathering feedback from a sample of respondents. In a study concerning preferences for avoiding encroachment of nature areas in future motorway planning in Denmark......, two samples of respondents are surveyed – one by internet and one by mail. Results suggest that additional self-selection mechanisms in the internet survey mode lead to the internet sample being less representative of the survey population than is the case for the mail sample. Similar response rates...... are obtained in the two samples, but the internet sample is apparently less prone to protest bidding. A thorough parametric analysis cannot reject that stated preferences elicited by use of the two different modes of sampling are identical. This suggests that the fear of a potential survey mode effect...

  19. Internet Use for Health Information

    Science.gov (United States)

    ... Health Services Utilization > Internet use for Health Information Internet use for Health Information Narrative Due in part ... adults in the United States who use the Internet has increased substantially, from 47 percent in 2000 ...

  20. Causes of Internet Addiction Disorder

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The Internet Addiction Disorder diagnostic manual approved by psychologists on November 8 divides Internet addiction into five categories,which are addiction to online games,pornography,social networking,Internet information and Internetshopping.

  1. Suicide and Self-Harm Related Internet Use.

    Science.gov (United States)

    Padmanathan, Prianka; Biddle, Lucy; Carroll, Robert; Derges, Jane; Potokar, John; Gunnell, David

    2018-05-31

    The rise in Internet use adds a new dimension to suicide prevention. We investigated suicide/self-harm (S/Sh)-related Internet use among patients presenting to hospital with self-harm. We asked 1,198 adult and 315 child and adolescent patients presenting to hospital following self-harm in a city in South West England about Internet use associated with their hospital presentation. Associations between Internet use and sociodemographic and clinical characteristics were investigated using multivariable logistic regression models. Focus groups with clinicians explored the acceptability and utility of asking about Internet use. The prevalence of S/Sh-related Internet use was 8.4% (95% CI: 6.8-10.1%) among adult hospital presentations and 26.0% (95% CI = 21.3-31.2%) among children's hospital presentations. In both samples, S/Sh-related Internet use was associated with higher levels of suicidal intent. Mostly, clinicians found it acceptable to ask about Internet use during psychosocial assessments and believed this could inform perceptions of risk and decision-making. It is unclear whether the findings in this study are applicable to the general self-harm patient population because only those who had psychosocial assessments were included. S/Sh-related Internet use is likely to become increasingly relevant as the Internet-native generation matures. Furthermore, Internet use may be a proxy marker for intent.

  2. Internet Addiction in Adolescents

    Directory of Open Access Journals (Sweden)

    Rębisz Sławomir

    2016-08-01

    Full Text Available The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the twentieth century, usually appears in the literature in the context of young people who have been found to be most vulnerable. The phenomenon is known as Adolescent Internet Addiction. Compulsive use of the Internet is a complex phenomenon, its effects being visible in almost all aspects of a young person’s social life. It is manifested in a variety of pathological behaviors and emotional states grouped into several major psycho-physical and social effects that may appear simultaneously, e.g. anger, depression, loneliness or anxiety associated with the lack of access to the network, the weakening of social ties, withdrawal from real life, lack of educational achievement, chronic fatigue or deteriorating health. The authors of this study aim to assess the level of Internet addiction among adolescents in Poland and indicate its main behavioral manifestations, in the students surveyed, which influence their pathological use of the Internet. Our study involved a total of 505 students from three high schools located in Rzeszow (N = 505 and was carried out by questionnaires, including, among others, The Problematic Use of the Internet (PUI which is the Polish adaptation of Kimberly Young’s Internet Addiction Test (IAT (Cronbach’s α = 0.89. Statistical analysis of responses from the PUI test allowed us to determine (1 the level of Internet addiction among these adolescents, whereas the univariate (ANOVA analysis enabled us (2 to verify the hypothesis of the existence of differences in the level of Internet addiction among the investigated groups as far as gender, place of residence or grade are concerned

  3. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Directory of Open Access Journals (Sweden)

    Hing Keung Ma

    2011-01-01

    Full Text Available Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1 the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2 the use of Internet to bully others (i.e., cyberbullying such as distributing libelous statements against a certain person, (3 the use of Internet to cheat others, and (4 the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail.

  4. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Science.gov (United States)

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1) the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2) the use of Internet to bully others (i.e., cyberbullying) such as distributing libelous statements against a certain person, (3) the use of Internet to cheat others, and (4) the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail. PMID:22125466

  5. The Future Internet

    Directory of Open Access Journals (Sweden)

    Andrew Hudson-Smith

    2009-07-01

    Full Text Available In 1995 technology analyst Gartner [1] developed a hype cycle model for the adoption of technology. The cycle comprises five stages from the initial technology trigger through to a final plateau of productivity along a with a peak of inflated expectations, a tough of disillusionment and the slope of enlightenment. The hype cycle is notable technique for plotting and identifying waves of innovation and hype in technology and digital communications. Yet, from where we stand, we can see the waves of innovation becoming increasingly shorter, the troughs less deep and the peaks of expectations higher. The read-write revolution, that is arguably known as Web 2.0, has transformed our experience of using the Internet from a source of information to a means of communication and participation. It has introduced mirror worlds, the cloud, wikitecture, social shaping, connected places, folksonomies and many other terms that I am sure many of us have used in recent grant applications and papers. This is the here and now, all of these technologies are past the technology trigger point and rising up the peak of inflated expectations with a few already heading towards the trough before becoming mainstream and approaching mass adoption. [...

  6. Freemium Internet: Next Generation Business Model to connect next billion

    OpenAIRE

    Esselaar, Steve; Song, Steve; Stork, Christoph

    2017-01-01

    This paper analyses a business model for providing free basic-rate Internet to everyone with a data capable phone, living in mobile coverage areas. The model is called Freemium Internet. The term "freemium" refers to a well-known business model for digital services, where free services or applications provide basic functions and more advanced functions are available by paying a fee. We examine the impact of applying the freemium business model to the provision of mobile Internet access and di...

  7. Effect of internet marketing, increase customer hotels in Kermanshah city

    OpenAIRE

    A. Zarrabi; K. Nazari; P. Akbari

    2014-01-01

    Today, Internet marketing and advertising is an important channel. The tourism and hospitality industry associated with it, has a good position to exploit the potential of the Internet. The study also aimed to consider the application of research methods, descriptive survey - analysis, to examine the impact of Internet marketing on hotel clients in Kermanshah city has increased. Results indicate that, of the three options awareness, provide quick service and attitude can increase customer acq...

  8. Towards Marxian Internet Studies

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2012-05-01

    Full Text Available This article gives an overview of example approaches of Critical Internet Studies and points out key concepts of this field. Critical Cyberculture Studies and Critical Political Economy/Critical Theory of the Internet are identified as two approaches in Critical Internet Studies. The paper also discusses the role of 11 Marxian concepts for Critical Internet Studies. Marxian concepts that have been reflected in Critical Internet Studies include: dialectics, capitalism, commodification, surplus value/exploitation/alienation/class, globalization, ideology, class struggle, commons, public sphere, communism, and aesthetics. The paper points out the importance of explicitly acknowledging the importance of Karl Marx’s thinking in Critical Internet Studies. Marx’s concepts are today frequently used implicitly, without acknowledging and engaging with their roots. A critique of the approach of “Critical” Cyberculture Studies is advanced. This approach is compared to the approaches of Critical Theory and Critical Political Economy of the Internet. The difference between these two approaches reflects the debate about class exploitation and non-class domination between Cultural Studies and Critical Political Economy in Media and Communication Studies.

  9. SEGMENTASI LAYANAN INTERNET BANKING

    Directory of Open Access Journals (Sweden)

    Ellen Theresia Sihotang

    2017-04-01

    Full Text Available The purpose of this study is to analyze internet banking�s users based on their experiences. It can be used to set marketing program of internet banking that appropriate with customers needs, in order to anticipate tight competition. This research methods starts with focus group discussion and clustering analysis to classify 312 respondents of internet banking users based on demographic, benefit and behavioral segmentation. The sampling method uses purposive sampling and snowball sampling. K-Means Clustering method�s produces four optimal clusters. The benefit orientation of the first cluster in on time saving. Second cluster, concern on the ease of getting and operating internet banking so this cluster does not need auxiliary features such as video guide to use internet banking. The third cluster�s orientation is on the modern lifestyle and the ease of getting and operating internet banking service with detailed daily mutation transaction The fourth cluster, concerns on the detailed daily mutation transaction but they are not sure with the security of personal data via internet banking. �

  10. Information on radionuclides on the Internet. http://www.tue.nl/sbd/nvsnucleair.htm

    International Nuclear Information System (INIS)

    Franken, Y.

    1997-01-01

    A selection from Internet information sources on the subjects of radiation protection, dosimetry and medical radiation applications are discussed. The article is also available through the Internet (see title) including links to the discussed sites

  11. On Internet and Internet of things%论 Internet与 Internet of Things

    Institute of Scientific and Technical Information of China (English)

    曾华燊

    2012-01-01

    从Internet发展历史及应用环境变化的角度讨论IoT( Internet of Things)提出背景、内涵、组成结构和体系结构等关键问题.在分析对IoT的典型定义的基础上,笔者认为“ITU把IoT作为Internet平台在应用领域实现人、机、和智能化物理对象(SPO)信息全方位互通和实践普适计算理念的下一代Internet及其应用系统的概括”是对IoT更为合理的广义定义.以该定义为基础,全面地分析了“由多个用户域网(CPN)通过骨干通信子网互联”的基本组成结构,讨论了两类SPO-CPN的基本组成结构及其支撑技术;指出SPO的引入主要影响CPN资源网络中的接入部分,属于应用系统的范畴,对Internet基本技术影响甚微.笔者不赞同以欧盟为代表的把IoT定义为联物专用网的狭义定义,指出其IoT模型和体系结构研究混淆了网络平台与应用系统,实质上是网络应用系统模型和体系结构.%Based on the analysis of development history and application environment changes of Internet, this paper provided a comprehensive discussion on the incentive, connotation, organization, and some key issues of the Internet of Things (IoT). On the basis of the analysis of the typical definition of IoT, the author believed that " the full range of information interoperability ITU to IoT as an Internet platform in the application areas of human, machine, and intelligent physical objects (SPO) and the next generation Internet applications generalization of Pervasive Computing (Ubiquitous Computing) concept " is a more reasonable broad definition of the IoT. Based on this definition, the author analyzed the basic organization of IoT, which consisted of interconnected multiple Customer Premises Network (CPN) via backbone Subnetworks, and examined two types of components of SPO-CPN and their supporting techniques. It was also pointed out that introduction of SPO has little impact on Internet technology, except on access part of

  12. Internet firewalls: questions and answers

    Science.gov (United States)

    Ker, Keith

    1996-03-01

    As organizations consider connecting to the Internet, the issue of internetwork security becomes more important. There are many tools and components that can be used to secure a network, one of which is a firewall. Modern firewalls offer highly flexible private network security by controlling and monitoring all communications passing into or out of the private network. Specifically designed for security, firewalls become the private network's single point of attack from Internet intruders. Application gateways (or proxies) that have been written to be secure against even the most persistent attacks ensure that only authorized users and services access the private network. One-time passwords prevent intruders from `sniffing' and replaying the usernames and passwords of authorized users to gain access to the private network. Comprehensive logging permits constant and uniform system monitoring. `Address spoofing' attacks are prevented. The private network may use registered or unregistered IP addresses behind the firewall. Firewall-to-firewall encryption establishes a `virtual private network' across the Internet, preventing intruders from eavesdropping on private communications, eliminating the need for costly dedicated lines.

  13. Safety in the Internet

    Directory of Open Access Journals (Sweden)

    Semenko T.V.

    2016-11-01

    Full Text Available the modern world is the world of computer technology, and the children living in this world feel comfortable in it, they master the computer, mobile devices, new-fangled gadgets easily and use them skillfully. However, their knowledge of the safety in the Internet lags behind their ability to develop new devices. The number of the Internet users is increased every year, so the problem of children safety in the Internet is very urgent. It is necessary for parents, educators and teachers to conduct explanatory conversations and activities for explanation and consolidation the rules of “The Safe Internet”.

  14. Are internet prices sticky?

    OpenAIRE

    Lünnemann, Patrick; Wintr, Ladislav

    2006-01-01

    This paper studies the behaviour of Internet prices. It compares price rigidities on the Internet and in traditional brick-and-mortar stores and provides a cross-country perspective. The data set covers a broad range of items typically sold over the Internet. It includes more than 5 million daily price quotes downloaded from price comparison web sites in France, Germany, Italy, the UK and the US. The following results emerge from our analysis. First, and contrary to the recent findings for co...

  15. Internet plan and planning

    Directory of Open Access Journals (Sweden)

    Kahriman Emina

    2008-01-01

    Full Text Available Paper discuss specific features of internet plan as well as planning as management process in general in the contemporary environment. No need to stress out that marketing plan and marketing planning is core activity in approaching to market. At the same time, there are a lot specific c request in preparing marketing plan comparing to business planning due to marketing plan is an essential part. The importance of internet plan and planning rely on specific features of the internet network but as a part of general corporate as well as marketing strategy.

  16. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  17. INTERNET AND PIRACY

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Internet has penetrated into all the aspects of our life and work.We can study and work by it;we can find a job by it;we can communicate by it;we can entertain by it;we can buy and sell by it.We can do almost everything on the Internet,and almost anywhere anytime. However,at the same time Internet provides services for us,it is inevitably invading our privacy to some degree.The services on most websites require our registering. If we want to enjoy these services,we have to provide much private informa-

  18. Towards the Tactile Internet

    DEFF Research Database (Denmark)

    Szabó, Dávid; Gulyás, András; Fitzek, Frank

    2015-01-01

    5G communication networks enable the steering and control of Internet of Things and therefore require extreme low latency communication referred to as the tactile Internet. In this paper we show that the massive use of network coding throughout the network significantly improves latency and reduce...... the frequency of packet re-transmission, so an architecture built around network coding may be a feasible road towards realizing the tactile internet vision. Our contribution is threefold: (i) we show how network coding improves latency and reduces packet re-transmission with respect to other coding schemes...

  19. Rumors and Internet

    Directory of Open Access Journals (Sweden)

    RENARD, Jean-Bruno

    2011-12-01

    Full Text Available This paper will address the rumors and the Internet in two ways: rumors as the subject of the Internet and the Internet as a channel of dissemination of rumors. We define rumors in a broadly way as an unverified information circulating within a social group. In a strict sense, rumors can be understand as false information that people believe. A rumor is an urban myth, a legend, a hoax, or a contemporary narrative, a tale of everyday life, false or dubious, but in which we believed because it is likely, and it conveys a moral message.

  20. Privacidad en internet

    OpenAIRE

    Rodríguez Gómez, José Luis

    2010-01-01

    Análisis de la privacidad en internet, y, en particular, en las redes sociales y la blogosfera. Se parte del concepto jurídico de privacidad y se analizan los riesgos crecientes que la acosan. Anàlisi de la privacitat a Internet, i, en particular, en les xarxes socials i la blogosfera. Es parteix del concepte jurídic de privacitat i s'analitzen els riscos creixents que l'assetgen. Analysis of Internet privacy, and in particular, social networks and the blogosphere. It begins with legal ...

  1. Online-specific fear of missing out and Internet-use expectancies contribute to symptoms of Internet-communication disorder.

    Science.gov (United States)

    Wegmann, Elisa; Oberst, Ursula; Stodt, Benjamin; Brand, Matthias

    2017-06-01

    Some of the most frequently used online applications are Facebook, WhatsApp, and Twitter. These applications allow individuals to communicate with other users, to share information or pictures, and to stay in contact with friends all over the world. However, a growing number of users suffer from negative consequences due to their excessive use of these applications, which can be referred to as Internet-communication disorder. The frequent use and easy access of these applications may also trigger the individual's fear of missing out on content when not accessing these applications. Using a sample of 270 participants, a structural equation model was analyzed to investigate the role of psychopathological symptoms and the fear of missing out on expectancies towards Internet-communication applications in the development of symptoms of an Internet-communication disorder. The results suggest that psychopathological symptoms predict higher fear of missing out on the individual's Internet-communication applications and higher expectancies to use these applications as a helpful tool to escape from negative feelings. These specific cognitions mediate the effect of psychopathological symptoms on Internet-communication disorder. Our results are in line with the theoretical model by Brand et al. (2016) as they show how Internet-related cognitive bias mediates the relationship between a person's core characteristics (e.g., psychopathological symptoms) and Internet-communication disorder. However, further studies should investigate the role of the fear of missing out as a specific predisposition, as well as specific cognition in the online context.

  2. Online-specific fear of missing out and Internet-use expectancies contribute to symptoms of Internet-communication disorder

    Directory of Open Access Journals (Sweden)

    Elisa Wegmann

    2017-06-01

    Full Text Available Some of the most frequently used online applications are Facebook, WhatsApp, and Twitter. These applications allow individuals to communicate with other users, to share information or pictures, and to stay in contact with friends all over the world. However, a growing number of users suffer from negative consequences due to their excessive use of these applications, which can be referred to as Internet-communication disorder. The frequent use and easy access of these applications may also trigger the individual's fear of missing out on content when not accessing these applications. Using a sample of 270 participants, a structural equation model was analyzed to investigate the role of psychopathological symptoms and the fear of missing out on expectancies towards Internet-communication applications in the development of symptoms of an Internet-communication disorder. The results suggest that psychopathological symptoms predict higher fear of missing out on the individual's Internet-communication applications and higher expectancies to use these applications as a helpful tool to escape from negative feelings. These specific cognitions mediate the effect of psychopathological symptoms on Internet-communication disorder. Our results are in line with the theoretical model by Brand et al. (2016 as they show how Internet-related cognitive bias mediates the relationship between a person's core characteristics (e.g., psychopathological symptoms and Internet-communication disorder. However, further studies should investigate the role of the fear of missing out as a specific predisposition, as well as specific cognition in the online context.

  3. Tagging: An Organization Scheme for the Internet

    Directory of Open Access Journals (Sweden)

    Marijke A. Visser

    2010-03-01

    Full Text Available How should the information on the Internet be organized? This question and the possible solutions spark debates among people concerned with how we identify, classify, and retrieve Internet content. This paper discusses the benefits and the controversies of using a tagging system to organize Internet resources. Tagging refers to a classification system where individual Internet users apply labels, or tags, to digital resources. Tagging increased in popularity with the advent of Web 2.0 applications that encourage interaction among users. As more information is available digitally, the challenge to find an organizational system scalable to the Internet will continue to require forward thinking. Trained to ensure access to a range of informational resources, librarians need to be concerned with access to Internet content. Librarians can play a pivotal role by advocating for a system that supports the user at the moment of need. Tagging may just be the necessary system.

  4. Grid to supersede internet

    CERN Multimedia

    Goodard, A

    2000-01-01

    British scientists are developing a successor to the internet that will not only give researchers access to information but also raw computing power via seamless connections to the rest of the world (1 page).

  5. Race to replace internet

    CERN Multimedia

    Ahuja, A

    2000-01-01

    British scientists are urging the Government to support a project to build a computing 'Grid' to succeed the Internet. They believe that fortunes await the countries and companies who commit themselves from the very beginning (1 page).

  6. Scientists planning new internet

    CERN Multimedia

    Cookson, C

    2000-01-01

    British scientists are preparing to build the next generation internet - 'The Grid'. The government is expected to announce about 100 million pounds of funding for the project, to be done in collaboration with CERN (1/2 p).

  7. Internet research in psychology.

    Science.gov (United States)

    Gosling, Samuel D; Mason, Winter

    2015-01-03

    Today the Internet plays a role in the lives of nearly 40% of the world's population, and it is becoming increasingly entwined in daily life. This growing presence is transforming psychological science in terms of the topics studied and the methods used. We provide an overview of the literature, considering three broad domains of research: translational (implementing traditional methods online; e.g., surveys), phenomenological (topics spawned or mediated by the Internet; e.g., cyberbullying), and novel (new ways to study existing topics; e.g., rumors). We discuss issues (e.g., sampling, ethics) that arise when doing research online and point to emerging opportunities (e.g., smartphone sensing). Psychological research on the Internet comes with new challenges, but the opportunities far outweigh the costs. By integrating the Internet, psychological research has the ability to reach large, diverse samples and collect data on actual behaviors, which will ultimately increase the impact of psychological research on society.

  8. Nasionalisme di Era Internet

    Directory of Open Access Journals (Sweden)

    Danu Widhyatmoko

    2015-04-01

    Full Text Available Nationalism and nationality of a country life are moving into the new phase. Internet has become a new medium that opens up so many opportunities to create a sense of nationalism for the country. This paper contains a review of nationalism in the age of the Internet. This paper begins with understanding nationalism, the character of the Internet, social media and nationalism in the era of the Internet. Research method used in this paper is literature study, continued with reflective data analysis. With reflective analysis method, the authors analyzed data from the data collection has been carried out for comparison between the existing literature by circumstances or phenomena that occur, so that the conclusions of rational and scientific data can be obtained. 

  9. Countering Internet Extremism

    National Research Council Canada - National Science Library

    Thomas, Timothy L

    2009-01-01

    ... that. Extremists' use of the Internet has developed rapidly since the Chechen-Russian conflict. Now they are more creative, and more importantly, more persuasive in their methods to recruit members, gain financial support, and provide proof of success...

  10. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  11. Business and governance models for DTN-based internet access:Gender and cultural considerations and application cases using open source software and design principles for ICT commons

    OpenAIRE

    Fransson, Barbro

    2011-01-01

    Great effort is being made to get Europe out of its economic crisis and prepare the European economy for the next decade. The aims of the Digital Agenda are to give all Europeans basic broadband by 2013 and to ensure that by 2020 all Europeans have access to much higher internet speeds. Can DTN technology contribute to achieving these targets in rural and remote areas? In the N4C project DTN technology has taken a step toward these goals and been proven viable. This licentiate thesis is meant...

  12. Learning Internet of Things

    CERN Document Server

    Waher, Peter

    2015-01-01

    If you're a developer or electronics engineer who is curious about Internet of Things, then this is the book for you. With only a rudimentary understanding of electronics, Raspberry Pi, or similar credit-card sized computers, and some programming experience using managed code such as C# or Java, you will be taught to develop state-of-the-art solutions for Internet of Things in an instant.

  13. Saving the internet.

    Science.gov (United States)

    Zittrain, Jonathan

    2007-06-01

    The Internet goose has laid countless golden eggs, along with a growing number of rotten ones. But it's the rotten ones that now tempt commercial, governmental, and consumer interests to threaten the Internet's uniquely creative power. The expediently selected, almost accidentally generative properties of the Internet - its technical openness, ease of access and mastery, and adaptability - have combined, especially when coupled with those of the PC, to produce an unsurpassed environment for innovative experiment. Those same properties, however, also make the Internet hospitable to various forms of wickedness: hacking, porn, spam, fraud, theft, predation, and attacks on the network itself. As these undesirable phenomena proliferate, business, government, and many users find common cause for locking down Internet and PC architecture in the interests of security and order. PC and Internet security vulnerabilities are a legitimate menace. However, the most likely reactions - if they are not forestalled - will be at least as unfortunate as the security problems themselves. Consider the growing profusion of "tethered appliances" - devices whose functions cannot readily be altered by their owners (think TiVo). Such appliances take Internet innovations and wrap them up in a neat, easy-to-use package, which is good - but only if the Internet and PC can remain sufficiently in the center of the digital ecosystem to produce the next round of innovations and to generate competition. People buy these devices for their convenience or functionality and may appreciate the fact that they are safer to use (they limit the damage users can do through ignorance or carelessness). But the risk is that users, by migrating to such appliances, will unwittingly trade away the future benefits of generativity - a loss that will go unappreciated even as innovation tapers off.

  14. Internet and computer crimes

    OpenAIRE

    Janýšková, Zuzana

    2010-01-01

    INTERNET AND COMPUTER CRIME (SUMMARY) The purpose of this thesis is to provide an introduction to the basic problems of Internet and computer crime (furthermore also "cyber crime"), which is a type of crime that is still relatively new, but fast developing in a similar pace as the information technologies. The thesis contains seven substantial chapters. First chapter is an introduction of this thesis, which focuses on its structure and summary of the content. Second chapter presents the most ...

  15. Acne and the Internet.

    Science.gov (United States)

    Zeichner, Joshua A; Del Rosso, James Q

    2016-04-01

    The Internet provides both education and miseducation for acne patients. Although some sites provide disease background information and objective treatment guidance, support networks, and research findings, others may seem to be objective on the surface, but are in reality run by untrained, self-proclaimed experts or are promotional in nature. Providers must be aware of the potential benefits and pitfalls the Internet provides for those suffering with acne. Copyright © 2016 Elsevier Inc. All rights reserved.

  16. Disclosure on the Internet

    International Nuclear Information System (INIS)

    Kratz, M.P.J.

    1998-01-01

    The key issues surrounding regulatory enforcement of Internet disclosure in the petroleum industry were discussed under three headings, i.e. (1) content problems, such as intellectual property, trademarks, copyright, licence limitations, accuracy of promotional and other information; (2) disclosure problems, including web site information, employee disclosure, electronic mail, and third party disclosures; and (3) regulatory issues that range from the Internet as the vehicle for stock manipulation, to transnational aspects, lack of editorial oversight, and multi-jurisdictional enforcement issues

  17. Strategy and the Internet.

    Science.gov (United States)

    Porter, M E

    2001-03-01

    Many of the pioneers of Internet business, both dot-coms and established companies, have competed in ways that violate nearly every precept of good strategy. Rather than focus on profits, they have chased customers indiscriminately through discounting, channel incentives, and advertising. Rather than concentrate on delivering value that earns an attractive price from customers, they have pursued indirect revenues such as advertising and click-through fees. Rather than make trade-offs, they have rushed to offer every conceivable product or service. It did not have to be this way--and it does not have to be in the future. When it comes to reinforcing a distinctive strategy, Michael Porter argues, the Internet provides a better technological platform than previous generations of IT. Gaining competitive advantage does not require a radically new approach to business; it requires building on the proven principles of effective strategy. Porter argues that, contrary to recent thought, the Internet is not disruptive to most existing industries and established companies. It rarely nullifies important sources of competitive advantage in an industry; it often makes them even more valuable. And as all companies embrace Internet technology, the Internet itself will be neutralized as a source of advantage. Robust competitive advantages will arise instead from traditional strengths such as unique products, proprietary content, and distinctive physical activities. Internet technology may be able to fortify those advantages, but it is unlikely to supplant them. Porter debunks such Internet myths as first-mover advantage, the power of virtual companies, and the multiplying rewards of network effects. He disentangles the distorted signals from the marketplace, explains why the Internet complements rather than cannibalizes existing ways of doing business, and outlines strategic imperatives for dot-coms and traditional companies.

  18. Security in Internet

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2006-01-01

    Full Text Available A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.

  19. Internet Use among Retired Teachers

    Science.gov (United States)

    Demiray, Emine; Candemir, Özden

    2017-01-01

    Internet access tools and devices are developing with the prevalence of the Internet, which is considered revolutionary in information and communications technology. Beside the widespread use of the Internet among young people, statistics show that the number of older people that use the Internet is also on the rise. The purpose of the study is to…

  20. Internet Advertising. Google AdWords versus Facebook Ads

    OpenAIRE

    Paul PAŞCU

    2014-01-01

    This article describes how to use the applications for Internet advertising, Google AdWords and Facebook Ads. Our attempt is to present the advantages and disadvantages of each of them, the costs and benefits, a useful aspect for companies that plan to start advertising campaigns on the Internet.

  1. The internet, virtual communities and threats to confidentiality ...

    African Journals Online (AJOL)

    Internet list servers and chat groups gather doctors together in virtual space to exchange views on clinical and professional issues. This paper focuses on the last of these Internet applications, beginning with a description of the 'virtual community' that the list servers and chat groups constitute. It demonstrates how various ...

  2. The Review of Internet Marketing Use in Latvia's Companies

    Science.gov (United States)

    Sloka, Biruta; Kantane, Inara; Walczak, Renata

    2017-01-01

    Development of new technologies and increasing competition require new solutions in business applications in internet marketing and advertising. The paper deals with issues related to advertising activities in internet marketing. There were presented both theoretical findings and empirical analysis of the survey conducted among Latvia's companies.…

  3. Internet Advertising. Google AdWords versus Facebook Ads

    Directory of Open Access Journals (Sweden)

    Paul PAŞCU

    2014-05-01

    Full Text Available This article describes how to use the applications for Internet advertising, Google AdWords and Facebook Ads. Our attempt is to present the advantages and disadvantages of each of them, the costs and benefits, a useful aspect for companies that plan to start advertising campaigns on the Internet.

  4. Multimedia presentation of radiological image data using the internet

    International Nuclear Information System (INIS)

    Beier, J.; Sell, C.; Hosten, N.; Fleck, E.; Felix, R.

    1997-01-01

    Aim: Recent developments of the Internet (World Wide Web) allow the integration of audio, video, digital film sequences, and three-dimensional data. The applicability of these innovations for medical documentation is demonstrated. Methods: Our existing software for medical image processing and 3D reconstruction was extended to provide images, film sequences, and complex 3D models in an Internet-compatible data format. Results: The multimedia results of the image processing were integrated into Internet documents. Specialized programs are no longer necessary for visualization. The Internet software allows for user-friendly handling and interactive presentation of the 2D and 3D data. Conclusions: The Internet offers public-domain software for display of images, audio/video, and 3D data. Thus, the tools of the Internet represent an ideal basis for local hospital information systems, computer-aided medical education, and teleconferencing. (orig.) [de

  5. Estimation of Monetary Value of Information on the Internet

    Directory of Open Access Journals (Sweden)

    Mohsen Nazari

    2015-03-01

    Full Text Available This research estimates the monetary value of internet information for each type of information and services by using Hedonic pricing method. The statistic social of this research is high-speed internet users in Tehran. Based on the results, high speed internet users of Tehran consider a positive monetary value for some information types in the internet, in descendent respect, such as film downloading, gaming, News, social network, and music. Also, the results indicates that people with higher education level and people who are subscribed to high speed internet earlier than other people consider more monetary value to use the internet. For generalizing the result of this research, it’s suggested to do this research at other cities of Iran. At last, some applicable suggestions made.

  6. Kid's Privacy on the Internet : Collecting Children's Personal Data on the Internet and the Protection of Privacy

    NARCIS (Netherlands)

    Nouwt, J.

    2002-01-01

    The children of today are growing up with the Internet. At the same time, there is a lot of uncertainty and ignorance about collecting personal data from children on the Internet, for example for direct marketing purposes. There is also much uncertainty and ignorance about the applicability of data

  7. Hierarchical Broadcasting in the Future Mobile Internet

    NARCIS (Netherlands)

    Hesselman, C.E.W.; Eertink, E.H.; Fernandez, Milagros; Crnkovic, Ivica; Fohler, Gerhard; Griwodz, Carsten; Plagemann, Thomas; Gruenbacher, Paul

    2002-01-01

    We describe an architecture for the hierarchical distribution of multimedia broadcasts in the future mobile Internet. The architecture supports network as well as application-layer mobility solutions, and uses stream control functions that are influenced by available network resources, user-defined

  8. Future Internet: towards context information brokering

    NARCIS (Netherlands)

    Deventer, O.M. van; Tilanus, P.A.J.; Schenk, M.R.; Cramer, E.R.; Adriaanse, J.

    2009-01-01

    Future Internet is about combinations of communication, content and context services. Whereas the former two have achieved already a reasonable state of maturity, context information services are still at their infancy: at most stand-alone applications with limited on-line-or-off-line presence

  9. Audience, Elegance, and Learning via the Internet.

    Science.gov (United States)

    Lafer, Stephen

    1997-01-01

    Discusses the need for educational environments that allow for authentic learning. Shows how the Internet enables practice in which students are able to manipulate concepts for the sake of getting things done and receiving feedback regarding how well the application of an understanding worked. Provides examples of three learning activities on the…

  10. Interaction and Humans in Internet of Things

    DEFF Research Database (Denmark)

    Turunen, Markku; Sonntag, Daniel; Engelbrecht, Klaus-Peter

    2015-01-01

    Internet of Things is mainly about connected devices embedded in our everyday environment. Typically, ‘interaction’ in the context of IoT means interfaces which allow people to either monitor or configure IoT devices. Some examples include mobile applications and embedded touchscreens for control...

  11. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  12. Internet use in rheumatology outpatients in 2006: gender less important.

    Science.gov (United States)

    Richter, J G; Becker, A; Koch, T; Nixdorf, M; Schacher, B; Monser, R; Specker, C; Alten, R; Schneider, M

    2009-01-01

    Exploring patients' Internet use, their online needs and requirements, expectations and attitudes towards the Internet is mandatory to effectively provide interactive online applications and information. Within a prospective study, 153 consecutive outpatients with rheumatoid arthritis, systemic lupus erythematosus or spondyloarthritis answered a paper-based questionnaire investigating their Internet use, interests, pattern and degree of utilization. Sociodemographic and functional disability data were collected. The data were compared with our survey of 2001 and to the normal German population. Patients were predominantly female (69.3%; n.s.). Mean age was 45.7+/-14.4 years (n.s.). 68.6% (+18.6%, p=0.0027) reported regular Internet use for 5.0+/-2.6 yrs. Internet use in 2006 is still age- and education-dependent (pInternet use from 2.9 to 6.1 hours/week (p=0.001, p=0.0006). Searching for health-related information remained an important topic. Interest in e-communication and interactive applications strongly increased. Independently of gender and functional disability, patients' future online interests focussed on information on diseases, medications, health care providers and patient education. Confidence in the Internet and reliability of information were rated unchanged since 2001. Gender no longer has significant impact on Internet use. The great potentials of Internet services-well accepted by patients and contributing substantially to more effective and improved disease (self-) management strategies-should encourage rheumatologists to provide interactive applications and high-quality information on Internet platforms and in routine patient care. Continuous research to explore the effects of Internet-delivered information on patients' attitudes,expectations, behaviour and outcome is required.

  13. World tour through the internet

    International Nuclear Information System (INIS)

    Jang, Ji Hwan; Kang, Ho Seong; Kim, Jong Hun

    1994-03-01

    This book deals with basic knowledge and familiarity with internet use, which is composed of seven chapters ; the world of internet, the basic knowledge for internet use such as telnet, mail, talk, basic command on Unix and command for communication, to access to the internet, if you get on the internet for the first time, useful service of internet such as archie service, gopher service, who is service, Use net, IRC and Netiquette on IRC, interesting internet trip like Billboard charts, TV-Rating, Solar Report, Agricultural Info, CARL, Nat'l Education BBS, internet service in Sydney university FEDIX, CAIR, NOAA, SDDAS, Stock, MUD and international Go server. The last chapter is computer networks connected to the internet ; computer services, BITNET, and FidoNet.

  14. World tour through the internet

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Ji Hwan; Kang, Ho Seong; Kim, Jong Hun

    1994-03-15

    This book deals with basic knowledge and familiarity with internet use, which is composed of seven chapters ; the world of internet, the basic knowledge for internet use such as telnet, mail, talk, basic command on Unix and command for communication, to access to the internet, if you get on the internet for the first time, useful service of internet such as archie service, gopher service, who is service, Use net, IRC and Netiquette on IRC, interesting internet trip like Billboard charts, TV-Rating, Solar Report, Agricultural Info, CARL, Nat'l Education BBS, internet service in Sydney university FEDIX, CAIR, NOAA, SDDAS, Stock, MUD and international Go server. The last chapter is computer networks connected to the internet ; computer services, BITNET, and FidoNet.

  15. Radiology and the internet, basic principles and technical requirements

    International Nuclear Information System (INIS)

    Boegl, K.

    2000-01-01

    As a new communication media the Internet has revolutionized the global exchange of information which is one of the major sources of progress in medicine. This article reviews the history of the Internet's evolution and describes some fundamental technical concepts. The importance of Internet services for everyday professional work is examined with special consideration of radiology. Special emphasis is laid on the current technical limitations that have delayed a broad practical implementation of tele-medical applications. As a highly innovative medical speciality, radiology has always been at the forefront of research and development in the field of clinical Internet applications. By taking a look at recent innovations, the impact of the Internet on the radiologist's working environment of the future is highlighted. (orig.) [de

  16. Internet Congestion Control System

    Directory of Open Access Journals (Sweden)

    Pranoto Rusmin

    2010-10-01

    Full Text Available Internet congestion occurs when resource demands exceeds the network capacity. But, it is not the only reason. Congestion can happen on some users because some others user has higher sending rate. Then some users with lower sending rate will experience congestion. This partial congestion is caused by inexactly feedback. At this moment congestion are solved by the involvement of two controlling mechanisms. These mechanisms are flow/congestion control in the TCP source and Active Queue Management (AQM in the router. AQM will provide feedback to the source a kind of indication for the occurrence of the congestion in the router, whereas the source will adapt the sending rate appropriate with the feedback. These mechanisms are not enough to solve internet congestion problem completely. Therefore, this paper will explain internet congestion causes, weakness, and congestion control technique that researchers have been developed. To describe congestion system mechanisms and responses, the system will be simulated by Matlab.

  17. Trust in Internet Election

    DEFF Research Database (Denmark)

    Markussen, Randi; Ronquillo, Lorena; Schürmann, Carsten

    2014-01-01

    This paper discusses the Decryption and Counting Ceremony held in conjunction with the internet voting trial on election day in the Ministry of Local Government and Regional Development of Norway in 2013. We examine the organizers' ambition of making the decryption and counting of electronic votes...... public in order to sustain trust in internet voting. We introduce a pragmatic approach to trust that emphasises the inseparability of truth from witnessing it. Based on this and on a description of how the event was made observable and how the complexities in the counting process were disclosed, we...... discuss what we term economy of truth from the perspective of the IT community involved in the ceremony. We claim that broadening the economy of truth by including more explicitly social and political perspectives in the ceremony, and in internet elections in general, and how witnessing is brought about...

  18. Security in the internet

    International Nuclear Information System (INIS)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P.

    2000-01-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [de

  19. Internet Performance to Africa

    Energy Technology Data Exchange (ETDEWEB)

    Cottrell, L

    2003-10-01

    We report the first results ever for real-time Internet performance to Africa using the PingER methodology. Multiple monitoring hosts were used to enable comparisons with performance from different parts of the world. From these preliminary measurements, we have found that Internet packet losses to some African sites in recent months range from very poor to bad (> 12%), some getting better, others are holding steady or getting worse. This, together with the average monthly Round Trip Times, imply end-to-end maximum TCP throughputs that are order of magnitudes different between countries in the region. Africa is shown to be far from the Internet performance in industrialized nations due to the poor infrastructure in place today. These monitoring efforts can provide valuable information to analyze the relative rates of future improvement and today they help us to quantify the digital divide and can provide quantitative information to policy makers.

  20. Ethical Issues in Internet Research: International Good Practice and Irish Research Ethics Documents

    Science.gov (United States)

    Felzmann, Heike

    2013-01-01

    This chapter discusses the main research ethical concerns that arise in internet research and reviews existing research ethical guidance in the Irish context in relation to its application to internet research. The chapter begins with a brief outline of high profile cases in the early history of the internet that highlighted specific emerging…

  1. Machine Perception for Identification and Interaction in the Internet of Things

    DEFF Research Database (Denmark)

    Tan, Zheng-Hua

    2010-01-01

    The most significant step from the Internet towards the Internet of Things (IoT) is to embrace a vast amount of objects in the global system. This first presents a nontrivial challenge to identification due to the limited applicability of Internet Protocol (IP) to these objects. They are therefore...

  2. Architectural and Mobility Management Designs in Internet-Based Infrastructure Wireless Mesh Networks

    Science.gov (United States)

    Zhao, Weiyi

    2011-01-01

    Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…

  3. Internet resource pricing models

    CERN Document Server

    Xu, Ke; He, Huan

    2013-01-01

    This brief guides the reader through three basic Internet resource pricing models using an Internet cost analysis. Addressing the evolution of service types, it presents several corresponding mechanisms which can ensure pricing implementation and resource allocation. The authors discuss utility optimization of network pricing methods in economics and underline two classes of pricing methods including system optimization and entities' strategic optimization. The brief closes with two examples of the newly proposed pricing strategy helping to solve the profit distribution problem brought by P2P

  4. Interpretation of Internet technology

    DEFF Research Database (Denmark)

    Madsen, Charlotte Øland

    2001-01-01

    Research scope: The topic of the research project is to investigate how new internet technologies such as e-trade and customer relation marketing and management are implemented in Danish food processing companies. The aim is to use Weick's (1995) sensemaking concept to analyse the strategic...... processes leading to the use of internet marketing technologies and to investigate how these new technologies are interpreted into the organisation. Investigating the organisational socio-cognitive processes underlying the decision making processes will give further insight into the socio...

  5. Kids rules the internet

    DEFF Research Database (Denmark)

    Sørensen, Birgitte Holm

    2006-01-01

    ?Power users? are children who explore the cutting edge of new media and develop their competencies at a level where few adults can follow. Adults concerns over children?s and adolescents? activities on the Internet can often be ascribed to the fact that the children master the new media faster...... than their parents and their teachers. Adults who take the time to familiarise themselves with common practice on the Internet will usually abandon their concerns in favour of a more positive and supportive attitude....

  6. Identity Management Framework for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.

    -configuring capability and is termed as Internet of Things (IoT). The vision of IoT is to connect every object with computing, communication and sensing ability to the Internet. IoT contains varied range of devices from RFID tags, sensor nodes to the even shoes. Thus, IoT enable nomadic collaboration and communication...... between users and devices, between devices themselves and devices to services. Due to rapid technological advancements in the wireless communications, information coming from uncountable applications and services converged on user devices, communication infrastructure and the Internet are integral part...... that are public can be part of the personal space of multiple users at the same time. Secure interaction in and with IoT, secure data management and exchange, authentication, distributed access control and IdM of the devices are the main challenges. The work carried out in the scope of this thesis addresses...

  7. Perceptions of Internet Usefulness amongst Non-Traditional ...

    African Journals Online (AJOL)

    ... Ghanaian NTEs with the highest internationalisation (80% - 99%) reckoned the ... Wholly owned local exporting firms believed the most that, the Internet was key ... knowledge about the technology and the use of its applications can be more ...

  8. Networking Foundations for Collaborative Computing at Internet Scope

    National Research Council Canada - National Science Library

    Dommel, H-Peter; Garcia-Luna-Aceves, J. J

    2006-01-01

    ... and at various levels of granularity. This aspect stands in contrast to legacy client-server applications such as Internet radio broadcast or video-on-demand, and to asynchronous, document-centric collaboration tools like email, instant...

  9. Internet skills, sources of support, and benefiting from internet use

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; Courtois, Cédric; van Dijk, Johannes A.G.M.

    2014-01-01

    This study added communication Internet skills to an existing skill framework of operational, formal, information, and strategic skills. The study investigated how people deal with inadequate skill levels by identifying support sources. Furthermore, we investigated which of the Internet skills

  10. The Internet and Ethiopia's IP Law, Internet Governance and Legal ...

    African Journals Online (AJOL)

    KM_Yilma & HH_Abraha

    3 Ian Lloyd (2014), Information Technology Law, 7th Edition, Oxford ..... private sector, in the global Internet governance forums has indeed been quite .... Ethiopian government is completely absent from the global internet governance.

  11. MULTIFUNCTION OF INTERNET IN TRANSLATION

    Directory of Open Access Journals (Sweden)

    Bayu Budiharjo

    2017-04-01

    Full Text Available Technology affects almost all areas, including translation. Many products of technology have made translational works easier, one of which is internet. Despite the wide use of internet, the potentials it has are sometimes unnoticed. While web-based dictionaries or thesaurus often serve as translators’ assistants and online Machine Translation issues become topics of many researches, other uses of internet related to translation may not be known by many. Internet can help disseminate newborn ideas, theories and findings worldwide to enhance translation theories. Besides, the contact between internet and translation generates new areas to examine. Internet also provides helping hand in the area of translation research. Researcher or anyone conducting research in the field of translation can find a range of research gaps as well as reference. Those who need group discussions to collect required data from informants, or researchers of the same interest coming from all over the world can meet and conduct Focus Group Discussion (FGD on virtual world. Furthermore, internet offers various forms of assistance for translation practitioners. The commonly used internet assistance consists of dictionaries, thesaurus and Machine Translations available on the internet. Other forms of aid provided by internet take form of parallel texts, images, and videos, which can be very helpful. Internet provides many things which can be utilized for the purpose of translation. Internet keeps on providing more as it develops from time to time in line with the development of technology. Internet awaits utilization of theorists, researchers, practitioners and those having concern on translation.

  12. Educational Uses Of Internet In The World and Turkey (A Comparative Review)

    OpenAIRE

    USUN, Salih

    2015-01-01

    This paper focuses on the educational uses and major technologies of the Internet in the World and Turkey; Compares eachother; reviews of the literature; examines the uses of the Internet in Primary, Secondary and Higher education in Turkey a developing country; exposes and discusses applications, studies and problems on the educational uses of the Internet in Turkey comparing with the developed countries ; number of suggestions presents on the effective using of the Internet in Turkish educa...

  13. HMIoT: A New Healthcare Model Based on Internet of Things

    OpenAIRE

    Suraki, Mohsen Yaghoubi; Suraki, Morteza Yaghoubi; SourakiAzad, Leila

    2015-01-01

    In recent century, with developing of equipment, using of the internet and things connected to the internet is growing. Therefore, the need for informing in the process of expanding the scope of its application is very necessary and important. These days, using intelligent and autonomous devices in our daily lives has become commonplace and the Internet is the most important part of the relationship between these tools and even at close distances also. Things connected to the Internet that ar...

  14. ROLE OF MIDDLEWARE FOR INTERNET OF THINGS: A STUDY

    OpenAIRE

    Soma Bandyopadhyay; Munmun Sengupta; Souvik Maiti; Subhajit Dutta

    2011-01-01

    Internet of Things (IoT) has been recognized as a part of future internet and ubiquitous computing. Itcreates a true ubiquitous or smart environment. It demands a complex distributed architecture withnumerous diverse components, including the end devices and application and association with theircontext. This article provides the significance of middleware system for (IoT). The middleware for IoTacts as a bond joining the heterogeneous domains of applications communicating over heterogeneousi...

  15. Internet Abuse and Internet Addiction in the Workplace

    Science.gov (United States)

    Griffiths, Mark

    2010-01-01

    Purpose: This paper seeks to overview the issues, concerns and challenges relating to internet abuse and internet addiction in the workplace. Design/methodology/approach: Using psychological literature, the paper outlines a number of important and inter-related areas including brief overviews of internet abuse, and the most extreme form of…

  16. Internet-kriminalitet

    DEFF Research Database (Denmark)

    Langsted, Lars Bo; Tranberg, Charlotte Bagger

    2008-01-01

     Kapitlet om internet-kriminalitet rummer, udover en kort indføring i strafferettens almindelige del, bl.a. beskrivelser af de nye værnetingsregler for internetkriminalitet, reglerne om hacking, virusangreb, Denial-of-service, uretmæssig anvendelse af PIN-koder m.v. og identitetstyveri. Bogen er en...

  17. Internet-kriminalitet

    DEFF Research Database (Denmark)

    Langsted, Lars Bo; Tranberg, Charlotte Bagger

    2012-01-01

    Kapitlet om internet-kriminalitet rummer, udover en kort indføring i strafferettens almindelige del, bl.a. beskrivelser af de nye værnetingsregler for internetkriminalitet, reglerne om hacking, virusangreb, Denial-of-service, uretmæssig anvendelse af PIN-koder m.v. og identitetstyveri. Bogen er en...

  18. Modeling Internet Topology Dynamics

    NARCIS (Netherlands)

    Haddadi, H.; Uhlig, S.; Moore, A.; Mortier, R.; Rio, M.

    Despite the large number of papers on network topology modeling and inference, there still exists ambiguity about the real nature of the Internet AS and router level topology. While recent findings have illustrated the inaccuracies in maps inferred from BGP peering and traceroute measurements,

  19. Internet censorship in Turkey

    Directory of Open Access Journals (Sweden)

    Mustafa Akgül

    2015-06-01

    Full Text Available Turkey passed an internet censorship law in 2007 with the declared objective of protecting families and minors (Akdeniz, 2010. It established a unit within the regulator BTK (Information and Communication Technologies Authority responsible for imposing bans and blocks on websites based on nine catalogue crimes defined by other national laws (Akgül 2008, 2009a, 2009b. As of May 2015, 80,000 websites were banned based on civil code related complaints and intellectual property rights violations, reports the independent website Engelliweb. Blocking decisions rendered by penal courts are enforced even when they are based on grounds other that the nine catalogue crimes - such as terrorism, organised crime and crime against the state. Passed in parliament while ignoring the pleas of NGOs and of the internet sector, the Internet Law No. 5651 has since been used to temporarily ban popular platforms such as Blogger, Last.fm, Vimeo, Wordpress and YouTube. At the same time, some blocking decisions by the courts (e.g., Google and Facebook were not enforced by the authorities. Since its introduction, the European Court of Human Rights has ruled that Law No. 5651 (Council of Europe, 2011 is against the European Convention on Human Rights (ECHR, 2013. This article provides an overview of internet censorship and its social background in Turkey.

  20. China on the Internet

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    The big news on the Web in 2009 No more mobile porn The problem of cellphone pornography has been on the rise with more and more mobile phones that are equipped to surf the Internet coming into the market. Online sites accessible only through mobile phones are becoming a popular new method for distributing porn,

  1. Internet based benchmarking

    DEFF Research Database (Denmark)

    Bogetoft, Peter; Nielsen, Kurt

    2005-01-01

    We discuss the design of interactive, internet based benchmarking using parametric (statistical) as well as nonparametric (DEA) models. The user receives benchmarks and improvement potentials. The user is also given the possibility to search different efficiency frontiers and hereby to explore...

  2. The Global Internet Pandemic

    Science.gov (United States)

    Carter, Deborah Joy

    2009-01-01

    The global rise of Internet-based education is discussed in relation to models drawn from social studies and epidemiology. Experiential and data density models are highlighted, also the capacity for technological change, and phenomena observed in the spread of disease. The lesson of these illustrations is that even apparently permanent phenomena…

  3. Internet Search Engines

    OpenAIRE

    Fatmaa El Zahraa Mohamed Abdou

    2004-01-01

    A general study about the internet search engines, the study deals main 7 points; the differance between search engines and search directories, components of search engines, the percentage of sites covered by search engines, cataloging of sites, the needed time for sites appearance in search engines, search capabilities, and types of search engines.

  4. Internet flash of lightning

    International Nuclear Information System (INIS)

    Anon.

    2004-01-01

    Five internet sites are given relative to European Research and IAEA in relation with the I.D.E.A.S. project, intercomparison exercise about the internal dose from individual measurements of radioactive contamination surveillance; European Research in oncology; Electromagnetic fields and human health and a site about the use of lead 210 to determine the date of a death. (N.C.)

  5. Internet, Cybersex and Infidelity

    Directory of Open Access Journals (Sweden)

    Verda Tuzer

    2011-03-01

    Full Text Available Increasing use of internet has numerous reflections on relationships. Within the range of chatroom friendship and flirting to shared sexuality, cybersex addiction and criminal behaviours are among the most intriguing. Searching for sexual satisfaction on internet may have a number of functions such as decreasing anxiety and distress; expressing emotions such as loneliness, depression, anger and disappointment; or providing support to not being able to judge the level of intimacy in a realtionship. The incredible ease with which one obtains sexual content on the internet, at home, at the work place or even through mobile phones is one of the most important reason for its widespread prevalence. Another important allure of the cybersex is its anonimity, the relative ease to disguise normally disturbing characteristics and its being mostly ignored by others. It is also low-cost. On the other hand it causes increased social isolation, damages trust in relationships, and causes the individual to seek for help due to dramatic consequences following a period of virtual mirroring, when the feeling of finding a soulmate causes mutual adoration and idealization. This review examines the definition of infidelity in the context of internet use, its characteristics, types and various aspects; its negative consequences on relationships; its effects on couples and families; and treatment alternatives. The problems caused by increasing compulsivity of cybersex are also highlighted.

  6. STUDYING ON THE INTERNET

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    正Nowadays the Internet is more and more popular.I think it is a good way of learning. First,the Intemet enables people to study whenever and wherever it is convenient. They can also choose to study whatever they are interested in.However,a traditional school doesn't provide such great freedom.Students have to study given sub-

  7. Internet of Things

    Science.gov (United States)

    Ritz, John; Knaack, Zane

    2017-01-01

    In the 21st century, electronic connectivity is a major component of everyday life. One expects to have mobile phone coverage and to have access to log a computer or tablet onto the internet. This connectivity enables users to keep track of personal affairs and conduct work from remote locations. Designers and manufacturers are also connecting…

  8. Internet of Things

    DEFF Research Database (Denmark)

    Shim, J. P.; Avital, Michel; Dennis, Alan R.

    2017-01-01

    Recent research reports illustrate that Internet of things (IoT) is projected to be a multi-trillion dollar opportunity by 2020, with 50 billion devices connected by then. The IoT is a leading-edge topic in Information Systems (IS). In a hyperconnected economy, IoT can transform a business...

  9. The Future of the Internet

    National Research Council Canada - National Science Library

    Komaroff, Mitchell

    2008-01-01

    .... While the DoD no longer controls Internet decision making, its unique perspective deriving from its multiple roles as Internet user, operator, and research center is important to the development and protection of U.S. national interests...

  10. Internet Journal of Medical Update

    African Journals Online (AJOL)

    admin

    Internet Journal of Medical Update 2010 July;5(2):8-14. Internet Journal ... hospitalizations. This study of Nigerian patients with diabetes examined the adequacy of ..... Physicians need .... relationship between patient education and glycaemic ...

  11. Internet pornography viewing preference as a risk factor for adolescent Internet addiction: The moderating role of classroom personality factors.

    Science.gov (United States)

    Alexandraki, Kyriaki; Stavropoulos, Vasileios; Burleigh, Tyrone L; King, Daniel L; Griffiths, Mark D

    2018-05-23

    Background and aims Adolescent Internet pornography viewing has been significantly increased in the last decade with research highlighting its association with Internet addiction (IA). However, there is little longitudinal data on this topic, particularly in relation to peer context effects. This study aimed to examine age- and context-related variations in the Internet pornography-IA association. Methods A total of 648 adolescents, from 34 classrooms, were assessed at 16 years and then at 18 years to examine the effect of Internet pornography preference on IA in relation to the classroom context. IA was assessed using the Internet Addiction Test (Young, 1998), Internet pornography preference (over other Internet applications) was assessed with a binary (yes/no) question, and classroom introversion and openness to experience (OTE) with the synonymous subscales within the Five Factor Questionnaire (Asendorpf & Van Aken, 2003). Results Three-level hierarchical linear models were calculated. Findings showed that viewing Internet pornography exacerbates the risk of IA over time, while classroom factors, such as the average level of OTE and introversion, differentially moderate this relationship. Discussion and conclusion The study demonstrated that the contribution of Internet pornography preference (as an IA risk factor) might be increased in more extroverted classrooms and decreased in OTE classrooms.

  12. Application of Fault Tree Analysis and Fuzzy Neural Networks to Fault Diagnosis in the Internet of Things (IoT) for Aquaculture.

    Science.gov (United States)

    Chen, Yingyi; Zhen, Zhumi; Yu, Huihui; Xu, Jing

    2017-01-14

    In the Internet of Things (IoT) equipment used for aquaculture is often deployed in outdoor ponds located in remote areas. Faults occur frequently in these tough environments and the staff generally lack professional knowledge and pay a low degree of attention in these areas. Once faults happen, expert personnel must carry out maintenance outdoors. Therefore, this study presents an intelligent method for fault diagnosis based on fault tree analysis and a fuzzy neural network. In the proposed method, first, the fault tree presents a logic structure of fault symptoms and faults. Second, rules extracted from the fault trees avoid duplicate and redundancy. Third, the fuzzy neural network is applied to train the relationship mapping between fault symptoms and faults. In the aquaculture IoT, one fault can cause various fault symptoms, and one symptom can be caused by a variety of faults. Four fault relationships are obtained. Results show that one symptom-to-one fault, two symptoms-to-two faults, and two symptoms-to-one fault relationships can be rapidly diagnosed with high precision, while one symptom-to-two faults patterns perform not so well, but are still worth researching. This model implements diagnosis for most kinds of faults in the aquaculture IoT.

  13. Application of Fault Tree Analysis and Fuzzy Neural Networks to Fault Diagnosis in the Internet of Things (IoT for Aquaculture

    Directory of Open Access Journals (Sweden)

    Yingyi Chen

    2017-01-01

    Full Text Available In the Internet of Things (IoT equipment used for aquaculture is often deployed in outdoor ponds located in remote areas. Faults occur frequently in these tough environments and the staff generally lack professional knowledge and pay a low degree of attention in these areas. Once faults happen, expert personnel must carry out maintenance outdoors. Therefore, this study presents an intelligent method for fault diagnosis based on fault tree analysis and a fuzzy neural network. In the proposed method, first, the fault tree presents a logic structure of fault symptoms and faults. Second, rules extracted from the fault trees avoid duplicate and redundancy. Third, the fuzzy neural network is applied to train the relationship mapping between fault symptoms and faults. In the aquaculture IoT, one fault can cause various fault symptoms, and one symptom can be caused by a variety of faults. Four fault relationships are obtained. Results show that one symptom-to-one fault, two symptoms-to-two faults, and two symptoms-to-one fault relationships can be rapidly diagnosed with high precision, while one symptom-to-two faults patterns perform not so well, but are still worth researching. This model implements diagnosis for most kinds of faults in the aquaculture IoT.

  14. Extending the Internet of Things to the Future Internet Through IPv6 Support

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2014-01-01

    Full Text Available Emerging Internet of Things (IoT/Machine-to-Machine (M2M systems require a transparent access to information and services through a seamless integration into the Future Internet. This integration exploits infrastructure and services found on the Internet by the IoT. On the one hand, the so-called Web of Things aims for direct Web connectivity by pushing its technology down to devices and smart things. On the other hand, the current and Future Internet offer stable, scalable, extensive, and tested protocols for node and service discovery, mobility, security, and auto-configuration, which are also required for the IoT. In order to integrate the IoT into the Internet, this work adapts, extends, and bridges using IPv6 the existing IoT building blocks (such as solutions from IEEE 802.15.4, BT-LE, RFID while maintaining backwards compatibility with legacy networked embedded systems from building and industrial automation. Specifically, this work presents an extended Internet stack with a set of adaptation layers from non-IP towards the IPv6-based network layer in order to enable homogeneous access for applications and services.

  15. MARKETING COMMUNICATION IN THE INTERNET

    Directory of Open Access Journals (Sweden)

    Simona Duhalm

    2008-12-01

    Full Text Available Currently, communication becomes more complex, faster and more dynamic every day. In this context, communication switches channels on traditional media to online applications. Thus, the electronic communication threatens, if not take the physical communication. We live in the era of information and the information they seek more ways than quick, cheap and accessible spread. Among the most common methods of electronic communication including website, electronic newsletter, blog and email custom. Online marketing has its roots in traditional marketing, but branch out and in a very obvious due to a unique features: interactivity. On the Internet, communication takes place in two directions and not just one, as in traditional marketing. At the same time, sellers and buyers can complete transactions from their homes or offices, at any time of day or night. Online marketing offers the advantage of presenting the interactive promotional materials that can meet the expectations of each type of buyer. Instead of creating a single message, as happens in the promotion of mass, marketing online allows the creation of "interactive brochure" that allow potential customers to choose the information that they want to see and when they want to see. Changing consumer behavior have had thoughts of marketing people who understand that the Internet is a very effective tool to attract, retain and loyalty the customer.

  16. Adopting Internet Banking in Ghana

    OpenAIRE

    G.O. Ofori-Dwumfuo; Betty A. Dankwah

    2013-01-01

    This study looks at the benefits, challenges and barriers in adopting Internet banking at a major bank in Ghana. The development of the Internet is changing the way financial services are provided in Ghana. The Internet banking facility has resulted in new ways of delivering banking services. The research is a case study based on the staffs that has worked with the bank for more than three years. In evaluating benefits, challenges and barriers to the bank in adopting Internet banking, intervi...

  17. Pemanfaatan Teknologi Internet Dalam Pendidikan

    OpenAIRE

    Aziz, Nurazzmi

    2013-01-01

    Internet technology keeps on developing and touching various aspects of human daily life. Starting from the very simple utilization of internet, such as the use of email for communication purposes, browsing varied information, up to the relatively advanced one, such as designing and developing homepage or the use of internet for shopping purposes (e-shopping). Some initiatives, either individually or in collaboration, to utilize internet for learning has been conducted by some Secondary Schoo...

  18. Gender, internet experience, Internet identification, and internet anxiety: a ten-year followup.

    Science.gov (United States)

    Joiner, Richard; Gavin, Jeff; Brosnan, Mark; Cromby, John; Gregory, Helen; Guiller, Jane; Maras, Pam; Moon, Amy

    2012-07-01

    In 2002, we found gender differences in the use of the Internet. Since then, however, the Internet has changed considerably. We therefore conducted a follow-up study in 2012. The study involved 501 students (389 females and 100 males, 12 participants unspecified gender) and we measured Internet use, Internet anxiety, and Internet identification. We found that males had a greater breadth of Internet use; they used the Internet more for games and entertainment than females. The differentiation between males and females in terms of Internet use is evident, and in some ways is even more distinct than 10 years ago. In our previous research we had found no gender differences in the use of the Internet for communication, whereas in the current study we have found that females use the Internet for communication than males and were using social network sites more than males. We also found, consistent with our previous study, that Internet identification and Internet anxiety were related to Internet use.

  19. The Effect of Internet-Based Education on Student Success in Teaching of 8th Grade Triangles Subject

    Science.gov (United States)

    Kaya, Deniz; Kesan, Cenk; Izgiol, Dilek

    2013-01-01

    In the study, it was researched the effect of internet-based application on student success. Internet-based application was used at the teaching of triangles subject which is included in 8th grade units of triangles and algebra. The study was carried out over the internet with a computer software program: Vitamin Program. The study was carried out…

  20. Reports on internet traffic statistics

    NARCIS (Netherlands)

    Hoogesteger, Martijn; de Oliveira Schmidt, R.; Sperotto, Anna; Pras, Aiko

    2013-01-01

    Internet traffic statistics can provide valuable information to network analysts and researchers about the way nowadays networks are used. In the past, such information was provided by Internet2 in a public website called Internet2 NetFlow: Weekly Reports. The website reported traffic statistics

  1. Some Aspects Regarding Internet Advertising

    Directory of Open Access Journals (Sweden)

    Chiţu I.

    2009-12-01

    Full Text Available The aim of this paper is to examine internet advertising, to understand its strengths and weaknesses, to compare the content and potential of traditional media with Web sites and to describe the specific types of internet advertising. The paper also tries to present some facts and figures regarding internet advertising.

  2. Internet Advertising: Ethics and Etiquette.

    Science.gov (United States)

    Machovec, George S.

    1994-01-01

    Discusses the growth of the Internet and the attitudes of users toward advertising, provides examples of kinds of advertising used on electronic networks, and lists several companies that help advertisers use the Internet. Fifteen guidelines are suggested to help advertisers use the Internet in a reasonable and appropriate way. (Contains 11…

  3. ITSA: Internet Traffic Statistics Archive

    NARCIS (Netherlands)

    Hoogesteger, Martijn; de Oliveira Schmidt, R.; Pras, Aiko

    Motivated by the fact that comprehensive and long term Internet traffic measurements can be hard to obtain, we have proposed and developed the Internet Traffic Statistics Archive (ITSA). Since 2013, ITSA concentrates reports on high-level statistics of Internet traffic worldwide. Examples of

  4. The Future Potential of Internet of Things

    Directory of Open Access Journals (Sweden)

    Aelita Skaržauskienė

    2012-07-01

    Full Text Available Purpose: To define the Internet of things and to analyze it as a background for the internet of services.Design/methodology/approach: The article discusses potential possibilities and problematic issues concerning the Internet of things (IoT and Internet of services (IoS. The debates concerning IoT and its possible application fields have continued for more than ten years. The technological background is there and the fields of application are broad. However, there is still a lack of understanding about the possible benefits that technology could give to various bodies if applied correctly. This article is based on comparison and analysis of scientific articles, research papers and case studies related to the potential for IoT and its implementation in IoS.Theoretical findings: IoT is a logical evolutionary step for the internet. Despite the technological background, the concept of objects which are aware of their surroundings, allow to manipulate them by defining different rule patterns and ensuring interaction possibilities with other objects or human beings. The necessity for web-based services is increasing along with the technological gadgets which support them. Applying things, which are connected in a network, could revolutionize many industry and service sectors and create new service provision and administration methods based on information technology. However, there are many problematic issues and research challenges related to the IoT. Few of the most significant are related to standardization of technology, legal regulation and ethical aspects concerning the IoT technology.Research limitations/implications: The IoT is a popular trend promoted by the business sector and governmental bodies. There are few comprehensive studies and projects which talk about the benefits that business and society could gain from the IoT. There is a lot less information about the possible risk and problematic aspects, and a lack of agreements between the

  5. Understanding who benefits at each step in an internet-based diabetes self-management program: application of a recursive partitioning approach.

    Science.gov (United States)

    Glasgow, Russell E; Strycker, Lisa A; King, Diane K; Toobert, Deborah J

    2014-02-01

    Efforts to predict success in chronic disease management programs have been generally unsuccessful. To identify patient subgroups associated with success at each of 6 steps in a diabetes self-management (DSM) program. Using data from a randomized trial, recursive partitioning with signal detection analysis was used to identify subgroups associated with 6 sequential steps of program success: agreement to participate, completion of baseline, initial website engagement, 4-month behavior change, later engagement, and longer-term maintenance. The study was conducted in 5 primary care clinics within Kaiser Permanente Colorado. Different numbers of patients participated in each step, including 2076, 544, 270, 219, 127, and 89. All measures available were used to address success at each step. Intervention. Participants were randomized to receive either enhanced usual care or 1 of 2 Internet-based DSM programs: 1) self-administered, computer-assisted self-management and 2) the self-administered program with the addition of enhanced social support. Two sets of potential predictor variables and 6 dichotomous outcomes were created. Signal detection analysis differentiated successful and unsuccessful subgroups at all but the final step. Different patient subgroups were associated with success at these different steps. Demographic factors (education, ethnicity, income) were associated with initial participation but not with later steps, and the converse was true of health behavior variables. Analyses were limited to one setting, and the sample sizes for some of the steps were modest. Signal detection and recursive partitioning methods may be useful for identifying subgroups that are more or less successful at different steps of intervention and may aid in understanding variability in outcomes.

  6. Ultrabroadband photonic internet: safety aspects

    Science.gov (United States)

    Kalicki, Arkadiusz; Romaniuk, Ryszard

    2008-11-01

    Web applications became most popular medium in the Internet. Popularity, easiness of web application frameworks together with careless development results in high number of vulnerabilities and attacks. There are several types of attacks possible because of improper input validation. SQL injection is ability to execute arbitrary SQL queries in a database through an existing application. Cross-site scripting is the vulnerability which allows malicious web users to inject code into the web pages viewed by other users. Cross-Site Request Forgery (CSRF) is an attack that tricks the victim into loading a page that contains malicious request. Web spam in blogs. There are several techniques to mitigate attacks. Most important are web application strong design, correct input validation, defined data types for each field and parameterized statements in SQL queries. Server hardening with firewall, modern security policies systems and safe web framework interpreter configuration are essential. It is advised to keep proper security level on client side, keep updated software and install personal web firewalls or IDS/IPS systems. Good habits are logging out from services just after finishing work and using even separate web browser for most important sites, like e-banking.

  7. Recent Progress in Data Engineering and Internet Technology Volume 1

    CERN Document Server

    Gaol, Ford Lumban

    2013-01-01

    The latest inventions in internet technology influence most of business and daily activities. Internet security, internet data management, web search, data grids, cloud computing, and web-based applications play vital roles, especially in business and industry, as more transactions go online and mobile. Issues related to ubiquitous computing are becoming critical.   Internet technology and data engineering should reinforce efficiency and effectiveness of business processes. These technologies should help people make better and more accurate decisions by presenting necessary information and possible consequences for the decisions. Intelligent information systems should help us better understand and manage information with ubiquitous data repository and cloud computing.   This book is a compilation of some recent research findings in Internet Technology and Data Engineering. This book provides state-of-the-art accounts in computational algorithms/tools, database management and database technologies,  intelli...

  8. Recent Progress in Data Engineering and Internet Technology Volume 2

    CERN Document Server

    Gaol, Ford Lumban

    2012-01-01

    The latest inventions in internet technology influence most of business and daily activities. Internet security, internet data management, web search, data grids, cloud computing, and web-based applications play vital roles, especially in business and industry, as more transactions go online and mobile. Issues related to ubiquitous computing are becoming critical.   Internet technology and data engineering should reinforce efficiency and effectiveness of business processes. These technologies should help people make better and more accurate decisions by presenting necessary information and possible consequences for the decisions. Intelligent information systems should help us better understand and manage information with ubiquitous data repository and cloud computing.   This book is a compilation of some recent research findings in Internet Technology and Data Engineering. This book provides state-of-the-art accounts in computational algorithms/tools, database management and database technologies,  intelli...

  9. Narcissism and Internet pornography use.

    Science.gov (United States)

    Kasper, Thomas Edward; Short, Mary Beth; Milam, Alex Clinton

    2015-01-01

    This study examined the relation between Internet pornography use and narcissism. Participants (N=257) completed an online survey that included questions on Internet pornography use and 3 narcissism measures (i.e., Narcissistic Personality Inventory, Pathological Narcissistic Inventory, and the Index of Sexual Narcissism). The hours spent viewing Internet pornography was positively correlated to participants' narcissism level. In addition, those who have ever used Internet pornography endorsed higher levels of all 3 measures of narcissism than did those who have never used Internet pornography.

  10. LANGUAGE AWARENESS IN AN INTERNET CHAT ROOM

    Directory of Open Access Journals (Sweden)

    Leszek Szymański

    2013-10-01

    Full Text Available When communicating on the Internet, the participants, so to say, mingle two traditional modes of communication: writing and speech. The phenomenon appears to be most noticeable in chat room interactions. This suggestion is based on the fact that users try to behave as though they are engaged in a spoken act of communication, though the actual medium of communication employs written language forms. Therefore, Internet users need to know what conventions to employ and how to perform such actions in order to express the desired meanings, all with the aim of driving the interaction as close as possible to speech. Such implementations of certain language-related customs require a specific kind of language awareness from the users. This concept, plus the applied conventions, constitute the essence of this article. The discussion begins with an introduction to the research problem, in this case the intentional utilization by Internet chat participants of the graphic mode of communication in order to express their desired meanings. Second, the reader becomes acquainted with the terminology used in the paper, which includes: language awareness, (Internet chat, and (language corpus. Moreover, the source of the studied language material—a corpus of Internet chats—is presented. The said description additionally includes the informants’ characteristics, as well as the topicality of their conversations. The further sections of the paper discus the application of selected non-normative spelling conventions and word-formation processes, with the support of examples taken from the corpus. Based on the discussion, an attempt is made to indicate which features comprise certain values to the participants of Internet chats.

  11. Internet de las cosas

    OpenAIRE

    Salazar Soler, Jorge; Silvestre Bergés, Santiago

    2016-01-01

    Este es un curso de introducción a la IoT (Internet de las cosas). En los capítulos primeros capítulos se introducen los conceptos básicos sobre la IoT. Seguidamente se presentan nociones básicas sobre el protocolo de internet IPv6 que es el más utilizado en el entorno de la IoT y se describen las principales aplicaciones, el estado actual del mercado y las tecnologías que permiten la existencia de la IoT. Finalmente se analizan los retos de futuro que se consideran más importa...

  12. Internet and Advertisement.

    Science.gov (United States)

    Moustafa, Khaled

    2016-02-01

    The Internet has revolutionized the way knowledge is currently produced, stored and disseminated. A few finger clicks on a keyboard can save time and many hours of search in libraries or shopping in stores. Online trademarks with an (e-) prefix such as e-library, e-business, e-health etc., are increasingly part of our daily professional vocabularies. However, the Internet has also produced multiple negative side effects, ranging from an unhealthy dependency to a dehumanization of human relationships. Fraudulent, unethical and scam practices are also flourishing through for example misleading online advertising methods. Some social and professional networks gather users' profiles for selling and advertising purposes, sometimes by making it technically difficult to unsubscribe. Here, I discuss some of these unethical aspects and propose some potential solutions to reduce them.

  13. Mujeres en Internet

    Directory of Open Access Journals (Sweden)

    Sally Burch

    2015-01-01

    Full Text Available El potencial democratizador de las redes electrónicas dependerá de cómo se desarrollen y usen en un contexto social específico. El aparecimiento y fortalecimiento de espacios en Internet contribuirá a concretar ese potencial, si ello sucede como resultado de necesarias convergencias se logrará un mayor impacto. Así, el reto que presenta el ciberespacio es grande para las organizaciones de mujeres que quieren impulsar nuevas formas de comunicación de género. A las mujeres en la actualidad se les presenta un reto, buscar formas de incidir en la configuración de espacios en Internet para introducir un enfoque de género tanto en los contenidos como en los códigos y las estructuras

  14. Instability and internet design

    Directory of Open Access Journals (Sweden)

    Sandra Braman

    2016-09-01

    Full Text Available Instability - unpredictable but constant change in one’s environment and the means with which one deals with it - has replaced convergence as the focal problem for telecommunications policy in general and internet policy in particular. Those who designed what we now call the internet during the first decade of the effort (1969-1979, who in essence served simultaneously as its policy-makers, developed techniques for coping with instability of value for network designers today and for those involved with any kind of large-scale sociotechnical infrastructure. Analysis of the technical document series that was medium for and record of that design process reveals coping techniques that began with defining the problem and went on to include conceptual labour, social practices, and technical approaches.

  15. Internet en service pack

    Directory of Open Access Journals (Sweden)

    Máximo Lameiro

    2004-04-01

    Full Text Available En contra de los sueños románticos que, no hace tantos años, muchos albergamos, Internet se ha convertido en un inmenso mercado en el cual es cada vez más difícil encontrar alguna cosa genuina y del que es cada vez más improbable salir ileso. La Internet de hoy es tan distinta de lo que fue que poca gente recuerda cómo se gestó y cual era su 'espíritu' en los comienzos. La Red de redes fue el resultado de un proceso, no previsto, que empezó como red militar, siguió como red universitaria, luego alcanzó nivel intercontinental y finalmente se globalizó tanto como el mundo al que ella misma contribuyó a unificar.

  16. Internet use among Turkish adolescents.

    Science.gov (United States)

    Tahiroglu, Aysegul Yolga; Celik, Gonca G; Uzel, Mehtap; Ozcan, Neslihan; Avci, Ayse

    2008-10-01

    The aim of this study was to investigate Internet use habits and problematic Internet use (PIU) in Turkish adolescents. Participants were 3,975 undergraduate students, 7.6% of whom used the Internet for more than 12 hours weekly. The Online Cognition Scale (OCS) was used. The most common purpose for using the Internet was playing games, followed by general information search. Female users mostly preferred searching for general information; male users preferred playing games (p game was violent games. While preference for strategy and fantasy role-play (FRP) games increased with age, preference for other games decreased (p games, followed by FRP, strategy, and sports and motor racing games. Computers and the Internet are useful, important inventions, but like other inventions, if used improperly, they may be harmful. Risk of harm raises concerns about who should use the Internet and computers, and where, when, and why the Internet and computers should be used.

  17. Internet addiction: A case report

    Directory of Open Access Journals (Sweden)

    Pejović-Milovančević Milica

    2009-01-01

    Full Text Available Some addictions cannot be connected with substance abuse (pathological gambling, video games playing, binge eating, compulsive physical activity, emotional relationship addiction, TV addiction. Since 1995, Internet addiction has been accepted as a clinical entity with profound negative effect on social, familial, educational and economical personal functioning. The diagnosis of Internet addiction could be established if the person spends more than 38 hours per week on the Internet exempting online professional needs. Basic symptoms are the increased number of hours spent in front of the computer along with the Internet use, development of abstinent syndrome if the Internet access is prohibited, sleep inversion, neglect of basic social requirements and personal hygiene, many somatic symptoms developed due to prolonged sitting or monitor watching, dissocial behavior. In this paper, data about the Internet addiction are presented and a case report of an adolescent with developed Internet addiction.

  18. Internet Addiction and Its Treatment

    Directory of Open Access Journals (Sweden)

    Ozden Arisoy

    2009-07-01

    Full Text Available With the introduction of new technologies, computer and internet use have become an unavoidable necessity in our daily lives. Internet was originally designed to facilitate communication and research. However the dramatic increase in use of internet in recent years has led to its pathologic use. Turkey, as a developing country with an increasing rate of internet access and computer use is at high risk for this disorder. In our country, this disorder is especially seen in young people who are more skilled in internet and computer use. And because their excessive internet use has led to negative consequences in their academic, social and family lives, patients and their families began search of treatment for this disorder. So clinicians must be aware of this newly emerging disorder and they should be able to apply the appropriate therapeutic interventions. This paper aims to summarize the pharmacological and cognitive-behavioral treatment of internet addiction.

  19. Internet addiction in young people.

    Science.gov (United States)

    Ong, Say How; Tan, Yi Ren

    2014-07-01

    In our technology-savvy population, mental health professionals are seeing an increasing trend of excessive Internet use or Internet addiction. Researchers in China, Taiwan and Korea have done extensive research in the field of Internet addiction. Screening instruments are available to identify the presence of Internet addiction and its extent. Internet addiction is frequently associated with mental illnesses such as anxiety, depression, conduct disorder and attention deficit hyperactivity disorder (ADHD). Treatment modalities include individual and group therapies, cognitive behavioural therapy (CBT), family therapy and psychotropic medications. A significant proportion of Singapore adolescents engaging in excessive Internet use are also diagnosed to have concomitant Internet addiction. Despite the presence of a variety of treatment options, future research in this area is needed to address its growing trend and to minimise its negative psychological and social impact on the individuals and their families.

  20. An Internet of Cars

    OpenAIRE

    Speed, Chris; Shingleton, D; Cherrett, T

    2013-01-01

    Despite describing the transport infrastructure as a ‘network’, most road and transport users see little similarity between the ‘transport network’ and the internet. This paper suggests that overcoming this difference is key to a new paradigm of transport in which connections, flow and sharing are synonymous with both social networking and travel behaviour.In order to demonstrate the potentials, this paper presents an experimental platform that combines data gathered from Automatic Number Pla...

  1. From Internet to Posthuman

    Directory of Open Access Journals (Sweden)

    Alberto Giovanni Biuso

    2015-04-01

    Full Text Available The social-interactive nature of the human being has produced different political, ethical, and technological structures. The Internet is one of them. A thorough understanding of the World Wide Web’s role, potentiality and risks surely requires sound sociological, psychological and cognitive paradigms but it always and above all requires a radical theoretical look at human and posthuman exists and acts on the web and its devices.

  2. Unified Internet Messaging

    OpenAIRE

    Healy, Paul; Barber, Declan

    2015-01-01

    As telephony services, mobile services and internet services continue to converge, the prospect of providing Unified Messaging and even Unified Communications becomes increasingly achievable. This paper discusses the growing importance of IP-based networks to Unified Messaging developments and examines some of the key services and protocols that are likely to make Unified Messaging more widely available. In this initial paper, we limit ourselves initially to the unification of text-based mess...

  3. Internet: alternativa educativa

    Directory of Open Access Journals (Sweden)

    José Francisco Amador Montaño

    2015-02-01

    Full Text Available RESUMEN Este artículo presenta una propuesta sobre la utilización de las potencialidades de Internet en la educación. Es una reflexión sobre el qué hacer y la responsabilidad d elas instituciones educativas y de los docentes frente a los retos cotnemporáneos que ofrece la tecnología y la ciencia.

  4. The Internet of Things

    CERN Document Server

    Greengard, Samuel

    2015-01-01

    We turn on the lights in our house from a desk in an office miles away. Our refrigerator alerts us to buy milk on the way home. A package of cookies on the supermarket shelf suggests that we buy it, based on past purchases. The cookies themselves are on the shelf because of a "smart" supply chain. When we get home, the thermostat has already adjusted the temperature so that it's toasty or bracing, whichever we prefer. This is the Internet of Things -- a networked world of connected devices, objects, and people. In this book, Samuel Greengard offers a guided tour through this emerging world and how it will change the way we live and work. Greengard explains that the Internet of Things (IoT) is still in its early stages. Smart phones, cloud computing, RFID (radio-frequency identification) technology, sensors, and miniaturization are converging to make possible a new generation of embedded and immersive technology. Greengard traces the origins of the IoT from the early days of personal computers and the Internet...

  5. Internet and Surveillance

    DEFF Research Database (Denmark)

    The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....

  6. Analisis Pemanfaatan Internet Di Pemerintah Kota Denpasar

    Directory of Open Access Journals (Sweden)

    made andyka

    2016-11-01

    Full Text Available The usage of the Internet can be described by the traffic characteristics, user behavior, and bandwidth. This research collected Internet traffic data at the government office of Denpasar city in October 2015, for study case of Dinas Perijinan. The result shows the average 90 % volume of TCP protocol and 10 % of others, such as UDP, GRE, and ICMP. There are average 95 % of application port’s volumes were used by IANA’s port, and 5 % by unsigned port, which means it may become a potential to be used as malware and file sharing application. The biggest domain’s volumes were accessed to Youtube and Facebook websites, and also to other malware domain. Based on the observation of user's behaviour, there are 3 of 12 sample users did not understand how to access good link from malware. From the analysis, a limitation access on youtube is one of recommendation actions besides closing malware port and user training.

  7. An Internet of Things Generic Reference Architecture

    DEFF Research Database (Denmark)

    Bhalerao, Dipashree M.; Riaz, Tahir; Madsen, Ole Brun

    2013-01-01

    Internet of things Network is a future application of Internet. This network has three major basic blocks as business process or Application, core network or internetwork and peripheral network as Things or objects. The assembly has the basic intention of connecting all physical and virtual things......, and keeping track of all these things for monitoring and controlling some information. IoT architecture is studied from software architecture, overall system architecture and network architecture point of view. Paper puts forward the requirements of software architecture along with, its component...... and deployment diagram, process and interface diagram at abstract level. Paper proposes the abstract generic IoT reference and concrete abstract generic IoT reference architectures. Network architecture is also put up as a state of the art. Paper shortly gives overviews of protocols used for IoT. Some...

  8. Discrimination of Arabic-named applicants in the Netherlands: An internet-based field experiment examining different phases in online recruitment procedures

    NARCIS (Netherlands)

    Blommaert, E.C.C.A.; Coenders, M.T.A.; Tubergen, F.A. van

    2014-01-01

    This study examines discrimination of Arabic-named applicants in online recruitment procedures in the Netherlands. We develop and implement a new field experiment approach, posting fictitious resumes (n = 636) on two online resume databases. Two phases of recruitment procedures are examined:

  9. Emerging opportunities: the internet, marketing and museums

    Directory of Open Access Journals (Sweden)

    Richani Evdoxia

    2016-01-01

    Full Text Available The tremendous impact of applying new technologies is obvious when it comes to museums. Internet forms an integral part of museums everyday life and decision making. Websites, online communities, social media, and mobile applications comprise elements of the modern museum’s digital self, which complements the real museum of permanent and temporary exhibitions, storage rooms, visitors’ facilities, laboratories and, most important, museum objects. This environment inevitably affects museum marketing strategies and creates relevant opportunities.

  10. Quality of service agents in the internet

    OpenAIRE

    Schelén, Olov

    1998-01-01

    The Internet is a multi-purpose communication network supporting users and applications with different service demands. To meet these demands, mechanisms for service differentiation in the network are proposed. This thesis presents an admission control architecture where clients can make resource reservations through agents. For each domain in the network there is an agent responsible for admission control. The architecture provides scalable resource reservations for virtual leased lines. Res...

  11. Combining internet technology and mobile phones for emergency response management

    International Nuclear Information System (INIS)

    Palsson, S.E.

    2002-12-01

    The report is intended for persons involved in radiological emergency response management. An introduction is given to the technical basis of the mobile Internet and ongoing development summarised. Examples are given describing how mobile Internet technology has been used to improve monitoring media coverage of incidents and events, and a test is described where web based information was selectively processed and made available to WAP enabled mobile phones. The report concludes with recommendations stressing the need for following mobile Internet developments and taking them into account when designing web applications for radiological response management. Doing so can make web based material accessible to mobile devices at minimal additional cost. (au)

  12. Energy management of internet data centers in smart grid

    CERN Document Server

    Jiang, Tao; Cao, Yang

    2015-01-01

    This book reports the latest findings on intelligent energy management of Internet data centers in smart-grid environments. The book gathers novel research ideas in Internet data center energy management, especially scenarios with cyber-related vulnerabilities, power outages and carbon emission constraints. The book will be of interest to university researchers, R&D engineers and graduate students in communication and networking areas who wish to learn the core principles, methods, algorithms, and applications of energy management of Internet data centers in smart grids.

  13. The internet as a tool in clinical pharmacology

    Science.gov (United States)

    Castel, Josep-Maria; Figueras, Albert; Vigo, Joan-Miquel

    2006-01-01

    The invention of the internet and the world-wide web was a landmark that has affected many aspects of everyday life, but is so recent and dynamic that many of its potential uses are still being explored. Aside from its purely commercial use as a virtual pharmacy (e-commerce), the internet is useful in at least three aspects related to clinical pharmacology: communication, training and research. In this paper we briefly review several internet applications related to clinical pharmacology and describe, as an example, the logistics of a multicentre research collaboration related to the promotion of rational drug use in the prevention of postpartum haemorrhage. PMID:16722847

  14. Approximate Networking for Universal Internet Access

    Directory of Open Access Journals (Sweden)

    Junaid Qadir

    2017-12-01

    Full Text Available Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost-efficient ways of provisioning high-performance, global Internet. In this paper, we argue that instead of an exclusive focus on a utopian goal of universally accessible “ideal networking” (in which we have a high throughput and quality of service as well as low latency and congestion, we should consider providing “approximate networking” through the adoption of context-appropriate trade-offs. In this regard, we propose to leverage the advances in the emerging trend of “approximate computing” that rely on relaxing the bounds of precise/exact computing to provide new opportunities for improving the area, power, and performance efficiency of systems by orders of magnitude by embracing output errors in resilient applications. Furthermore, we propose to extend the dimensions of approximate computing towards various knobs available at network layers. Approximate networking can be used to provision “Global Access to the Internet for All” (GAIA in a pragmatically tiered fashion, in which different users around the world are provided a different context-appropriate (but still contextually functional Internet experience.

  15. The Analysis of Research on Internet Marketing

    Directory of Open Access Journals (Sweden)

    Vida Davidavičienė

    2014-09-01

    Full Text Available The targeted development of internet marketing faces the dynamic environment and its alterations that occur both – in business terms and conditions and in the use of e­tools and applicable concepts. The growing importance of internet marketing is indicated by a growth in e­markets, an increasing number of new generation consumers, investments of organizations in e­based decisions, a strong interest of scientists representing different fields as well as by widening the base of knowledge related to the above introduced phenomenon. Despite a continuously increasing amount of scientific literature on Internet marketing, this area of research is still at the initial stage. The article is aimed at analysing the fields of ongoing researches into Internet marketing and at identifying the areas required for deeper examination. The article has applied for the methods such as a comparative analysis and summary of scientific literature, information comparison and techniques for grouping and the graphical visualization of information.

  16. JIP: Java image processing on the Internet

    Science.gov (United States)

    Wang, Dongyan; Lin, Bo; Zhang, Jun

    1998-12-01

    In this paper, we present JIP - Java Image Processing on the Internet, a new Internet based application for remote education and software presentation. JIP offers an integrate learning environment on the Internet where remote users not only can share static HTML documents and lectures notes, but also can run and reuse dynamic distributed software components, without having the source code or any extra work of software compilation, installation and configuration. By implementing a platform-independent distributed computational model, local computational resources are consumed instead of the resources on a central server. As an extended Java applet, JIP allows users to selected local image files on their computers or specify any image on the Internet using an URL as input. Multimedia lectures such as streaming video/audio and digital images are integrated into JIP and intelligently associated with specific image processing functions. Watching demonstrations an practicing the functions with user-selected input data dramatically encourages leaning interest, while promoting the understanding of image processing theory. The JIP framework can be easily applied to other subjects in education or software presentation, such as digital signal processing, business, mathematics, physics, or other areas such as employee training and charged software consumption.

  17. Insights into Motivating Internet Users towards Internet Banking

    OpenAIRE

    J. Ramola Premalatha

    2016-01-01

    Internet banking has evolved from helping customers meet their basic banking needs to meeting their sophisticated needs. In recent years, the number of internet banking users has been increasing exponentially. As customers get more and more educated, getting insight about internet banking has become a primary area of concern for all leading banks in India. Hence, the study is made to analyse the perception of customers specifically who are computer literate, in a semi-urban area about interne...

  18. The Internet Engineering Task Force and The Future of Internet

    OpenAIRE

    Baccelli , Emmanuel; Clausen , Thomas Heide; Jacquet , Philippe

    2009-01-01

    International audience; If one wants to identify where ideas and initiatives regarding the Internet are being confronted, the Internet Engineering Task Force (IETF) is unavoidable. Created in 1986 by US government agencies (DoD, Department of Energy, NASA, NSF) to supervise the design and deployment of Internet protocols, it was initially open only for US government funded researchers. Early 1987 saw a dozen of industry representatives invited, and in a matter of months, the IETF was opened t...

  19. Internet Freedom in Asia: Case of Internet Censorship in China

    OpenAIRE

    MONGGILO, ZAINUDDIN MUDA

    2016-01-01

    Internet can develop the communication and information freedom on society but unfortunately in some nations, especially in Asia, it cannot be fully accessed because of government censorship. This report explains the relationship between the practice of Internet censorship imposed by the Chinese government and the freedom of its citizens (in the internet surfing experience) as the realization of human rights in the freedom of expression and opinion (seek, receive-use, and communicate informati...

  20. Internet-Communication Disorder: It's a Matter of Social Aspects, Coping, and Internet-Use Expectancies.

    Science.gov (United States)

    Wegmann, Elisa; Brand, Matthias

    2016-01-01

    Online communication applications such as Facebook, WhatsApp, and Twitter are some of the most frequently used Internet applications. There is a growing amount of individuals suffering diminished control over their use of online communication applications which leads to diverse negative consequences in offline life. This could be referred to as Internet-communication disorder (ICD). The current study investigates the role of individual characteristics (e.g., psychopathological symptoms, feelings of loneliness) and specific cognitions. In a sample of 485 participants a structural equation model was tested to investigate predictors and mediators which may predict an excessive use. The results emphasize that a higher level of social loneliness and less perceived social support enhance the risk of a pathological use. The effects of psychopathological symptoms (depression and social anxiety) as well as individual characteristics (self-esteem, self-efficacy, and stress vulnerability) on ICD symptoms are mediated by Internet-use expectancies and dysfunctional coping mechanisms. The results illustrate mediation effects which are in line with the theoretical model by Brand et al. (2016). As suggested in the model social aspects seem to be key predictors of ICD symptoms. Further research should investigate convergent and divergent factors of other types of specific Internet-use disorders.