WorldWideScience

Sample records for internet applications

  1. Adaptive Reactive Rich Internet Applications

    Science.gov (United States)

    Schmidt, Kay-Uwe; Stühmer, Roland; Dörflinger, Jörg; Rahmani, Tirdad; Thomas, Susan; Stojanovic, Ljiljana

    Rich Internet Applications significantly raise the user experience compared with legacy page-based Web applications because of their highly responsive user interfaces. Although this is a tremendous advance, it does not solve the problem of the one-size-fits-all approach1 of current Web applications. So although Rich Internet Applications put the user in a position to interact seamlessly with the Web application, they do not adapt to the context in which the user is currently working. In this paper we address the on-the-fly personalization of Rich Internet Applications. We introduce the concept of ARRIAs: Adaptive Reactive Rich Internet Applications and elaborate on how they are able to adapt to the current working context the user is engaged in. An architecture for the ad hoc adaptation of Rich Internet Applications is presented as well as a holistic framework and tools for the realization of our on-the-fly personalization approach. We divided both the architecture and the framework into two levels: offline/design-time and online/run-time. For design-time we explain how to use ontologies in order to annotate Rich Internet Applications and how to use these annotations for conceptual Web usage mining. Furthermore, we describe how to create client-side executable rules from the semantic data mining results. We present our declarative lightweight rule language tailored to the needs of being executed directly on the client. Because of the event-driven nature of the user interfaces of Rich Internet Applications, we designed a lightweight rule language based on the event-condition-action paradigm.2 At run-time the interactions of a user are tracked directly on the client and in real-time a user model is built up. The user model then acts as input to and is evaluated by our client-side complex event processing and rule engine.

  2. Compulsive Internet use: the role of online gaming and other internet applications.

    Science.gov (United States)

    van Rooij, Antonius J; Schoenmakers, Tim M; van de Eijnden, Regina J J M; van de Mheen, Dike

    2010-07-01

    Increasing research on Internet addiction makes it necessary to distinguish between the medium of Internet and its specific applications. This study explores the relationship between time spent on various Internet applications (including online gaming) and Compulsive Internet Use in a large sample of adolescents. The 2007 (N=4,920) and 2008 (N=4,753) samples of a longitudinal survey study among adolescents were used, as well as the 2007-2008 cohort subsample (N=1421). Compulsive Internet Use was predicted from the time spent on the various Internet applications in two cross-sectional multiple linear regression models and one longitudinal regression model in which changes in behavior were related to changes in Compulsive Internet Use. In both samples, downloading, social networking, MSN use, Habbo Hotel, chatting, blogging, online games, and casual games were shown to be associated with Compulsive Internet Use. Off these, online gaming was shown to have the strongest association with Compulsive Internet Use. Moreover, changes in online gaming were most strongly associated with changes in Compulsive Internet Use over time for the longitudinal cohort. A clear relationship was shown between online gaming and Compulsive Internet Use. It is further argued that a subgroup of compulsive Internet users should be classified as compulsive online gamers. Copyright (c) 2010 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  3. Internet of Things novel advances and envisioned applications

    CERN Document Server

    Geetha, M

    2017-01-01

    This book focuses on a combination of theoretical advances in the Internet of Things, cloud computing and its real-life applications to serve society. The book discusses technological innovations, authentication, mobility support and security, group rekeying schemes and a range of concrete applications. The Internet has restructured not only global interrelations, but also an unbelievable number of personal characteristics. Machines are increasingly able to control innumerable autonomous gadgets via the Internet, creating the Internet of Things, which facilitates intelligent communication between humans and things, and among things. The Internet of Things is an active area of current research, and technological advances have been supported by real-life applications to establish their soundness. The material in this book includes concepts, figures, graphs, and tables to guide researchers through the Internet of Things and its applications for society. .

  4. Validation of Internet Application: Study, Analysis and Evaluation

    OpenAIRE

    Dinesh Kumar

    2012-01-01

    Today, testing applications for Internet (web sites and other applications) is being verified using proprietary test solutions. The Internet Security became a very important and complex field of researches in our present time, especially if we apply this to the discussion of Internet protocols as basic interfaces for exchanging sensitive data over the Internet and finding appropriate and trustworthy algorithms for their validation. Test Competence Centre at Ericsson AB has expertise on tes...

  5. Addictive Potential of Internet Applications and Differential Correlates of Problematic Use in Internet Gamers versus Generalized Internet Users in a Representative Sample of Adolescents.

    Science.gov (United States)

    Rosenkranz, Tabea; Müller, Kai W; Dreier, Michael; Beutel, Manfred E; Wölfling, Klaus

    2017-01-01

    This paper examines the addictive potential of 8 different Internet applications, distinguishing male and female users. Moreover, differential correlates of problematic use are investigated in Internet gamers (IG) and generalized Internet users (GIU). In a representative sample of 5,667 adolescents aged 12-19 years, use of Internet applications, problematic Internet use, psychopathologic symptoms (emotional problems, hyperactivity/inattention, and psychosomatic complaints), personality (conscientiousness and extraversion), psychosocial correlates (perceived stress and self-efficacy), and coping strategies were assessed. The addictive potential of Internet applications was examined in boys and girls using regression analysis. MANOVAs were conducted to examine differential correlates of problematic Internet use between IG and GIU. Chatting and social networking most strongly predicted problematic Internet use in girls, while gaming was the strongest predictor in boys. Problematic IG exhibited multiple psychosocial problems compared to non-problematic IG. In problematic Internet users, GIU reported even higher psychosocial burden and displayed dysfunctional coping strategies more frequently than gamers. The results extend previous findings on the addictive potential of Internet applications and validate the proposed distinction between specific and generalized problematic Internet use. In addition to Internet gaming disorder, future studies should also focus on other highly addictive Internet applications, that is, chatting or social networking, regarding differential correlates of problematic use. © 2017 S. Karger AG, Basel.

  6. Research on Application of Internet of Things in the Disposal of Environmental Emergency

    Directory of Open Access Journals (Sweden)

    Zhu Yanju

    2015-01-01

    Full Text Available Internet of things is an important part of a new generation of information technology and also an important stage of Information Age. Application of Internet of things in the disposal of environmental emergency is an inevitable trend of application of Internet of things in the field of environmental protection. This paper summarizes the principle, process and application field of Internet of things, and focuses on the general frame-work of environmental emergency disposal system based on Internet of things and further analyses the factors of restricting application of Internet of things in the disposal of environmental emergency. At last, the suggestions and countermeasures to optimize environmental emergency disposal system are proposed.

  7. Internet applications in nuclear power plant operation management

    International Nuclear Information System (INIS)

    Munoz, M.

    2000-01-01

    The use of the Internet is quickly becoming widespread in practically all areas of business and industry. The nuclear industry should not remain indifferent to this new trend. This paper analyses some of the Internet applications that can be easily adapted to nuclear power plant operation management, including. (Author)

  8. Application of Internet in Road Traffic Engineering

    Directory of Open Access Journals (Sweden)

    Ivan Dadić

    2012-10-01

    Full Text Available The paper deals with the implementation of Internet in trafficengineering with the purpose of improving the professionaland scientific research development of the traffic system in theRepublic of Croatia.Fast growth of the world computer network, Internet, andits applications in almost all the fields of human activities,change the picture of the modern world. The current exchangeof data in all their forms and the daily growth of the network,supplemented by almost incredible amounts of data that can bealmost instantly accessible, indicates that Internet is not just theinfomwtion technology revolution, but that it is a revolutionper se. More than 100 million computers are estimated to benetworked beginning of the 21" century.Internet seems almost as if it were created for the purposesof knowledge and expe1ience exchange in traffic, a relativelyyoung scientific branch. 11 can be concluded that the presenceof traffic engineers in Internet is today's reality and tomon·ow'snecessity.

  9. Computer and internet use in vascular outpatients--ready for interactive applications?

    Science.gov (United States)

    Richter, J G; Schneider, M; Klein-Weigel, P

    2009-11-01

    Exploring patients' computer and internet use, their expectations and attitudes is mandatory for successful introduction of interactive online health-care applications in Angiology. We included 165 outpatients suffering from peripheral arterial disease (PAD; n = 62) and chronic venous and / or lymphatic disease (CVLD; n = 103) in a cross-sectional-study. Patients answered a paper-based questionnaire. Patients were predominantly female (54.5%). 142 (86.1%) reported regular computer use for 9.7 +/- 5.8 years and 134 (81.2 %) used the internet for 6.2 +/- 3.6 years. CVLD-patients and internet-user were younger and higher educated, resulting in a significant difference in computer and internet use between the disease groups (p internet users without significant differences between the groups. The topics retrieved from the internet covered a wide spectrum and searches for health information were mentioned by 41.2 %. Although confidence in the internet (3.3 +/- 1.1 on a 1-6 Likert scale) and reliability in information retrieved from the internet (3.1 +/- 1.1) were relatively low, health-related issues were of high actual and future interest. 42.8% of the patients were even interested in interactive applications like health educational programs, 37.4% in self-reported assessments and outcome questionnaires and 26.9% in chatforums; 50% demanded access to their medical data on an Internetserver. Compared to older participants those internet more often for shopping, chatting, and e-mailing, but not for health information retrieval and interactive applications. Computers are commonly used and the internet has been adopted as an important source of information by patients suffering from PAD and CVLD. Besides, the internet offers great potentials and new opportunities for interactive disease (self-)management in angiology. To increase confidence and reliability in the medium a careful introduction and evaluation of these new online applications is mandatory.

  10. Internet tomography an introduction to concepts, techniques, tools and applications

    CERN Document Server

    Moloisane, Abia; O’Droma, Máirtín

    2013-01-01

    Internet tomography, introduced from basic principles through to techniques, tools and applications, is the subject of this book. The design of Internet Tomography Measurement Systems (ITMS) aimed at mapping the Internet performance profile spatially and temporally over paths between probing stations is a particular focus.The Internet Tomography Measurement System design criteria addressed include:Minimally-invasive, independent and autonomous, active or passive measurement;Flexibility and scalability;Capability of targeting local, regional and global Internet paths and underlying IP networks;

  11. Creation of web applications by Rich Internet Application Adobe Flex

    OpenAIRE

    PEKA, Karel

    2011-01-01

    Bachelor work focuses on explaining the functions and development of interactive applications in Adobe Flex RIA also compared to similar web technologies such as AJAX, Microsoft Silverlight or Adobe Flash. Explain the difference between "ordinary" sites and Rich Internet Application (RIA) and the difference shows a series of demonstration examples were processed in Adobe Flash Builder (environment for building Flex applications). Also will be created large-scale application for comprehensive ...

  12. Word of mouth marketing applications on the internet

    OpenAIRE

    Gülmez, Mustafa

    2011-01-01

    Word of mouth marketing, also called WOMM in English, is a marketing strategyform via oral or written in which consumers share&spread other people aboutproduct or firm. Word of mouth marketing is an extremely important factor in theconsumer’s final purchase decision in the conscious societies on the internet. Thispaper aims to evaluate word of mouth marketing applications on the internet.

  13. Internet of Things and Artificial Vision, Performance and Applications: Literature Review

    Directory of Open Access Journals (Sweden)

    Vanessa Alvear-Puertas

    2017-02-01

    Full Text Available Internet of Things (or also known as IoT is one of the technologies most named today because of the ability it envisages to connect all kinds of devices to the Internet. If to the potentialities of IoT we add another technology of high impact as It is the Artificial Vision we have a wide field of innovative applications, where the processing of images and video in real time allow the visualization of large amounts of data on the Internet. The main applications developed with IoT and Artificial Vision can be implemented in education, medicine, intelligent buildings, surveillance systems of people and vehicles, among others. This type of applications improves the quality of life of users, however, for their development an infrastructure is required that allows the convergence of different protocols and devices, but in a special way that can handle the different phases of the acquisition of images. In this work, a review of the beginnings, concepts, technologies and applications related to the Artificial Vision with the Internet of Things has been carried out to be able to understand in a precise way the impact of its application in daily life.

  14. Designing Privacy-aware Internet of Things Applications

    OpenAIRE

    Perera, Charith; Barhamgi, Mahmoud; Bandara, Arosha K.; Ajmal, Muhammad; Price, Blaine; Nuseibeh, Bashar

    2017-01-01

    Internet of Things (IoT) applications typically collect and analyse personal data that can be used to derive sensitive information about individuals. However, thus far, privacy concerns have not been explicitly considered in software engineering processes when designing IoT applications. In this paper, we explore how a Privacy-by-Design (PbD) framework, formulated as a set of guidelines, can help software engineers to design privacy-aware IoT applications. We studied the utility of our propos...

  15. IoF2020 - the Internet of Meat: towards applications of Internet of Things in the meat supply chain

    NARCIS (Netherlands)

    Maselyne, Jarissa; Mertens, Kristof; Nuffel, Annelies Van; Scholten, Huub; Athanasiadis, Ioannis N.; Larrañaga, Mikel; Fernández, Izaskun

    2017-01-01

    To enable all actors in the meat supply chain to monitor, manage and optimise their production process, Internet of Things applications create multiple opportunities. In the IoF2020 project (Internet of Food and Farm 2020), starting early 2017, 11 partners from five countries focus on large-scale

  16. Internet of Things, Blockchain and Shared Economy Applications

    OpenAIRE

    Huckle, Steve; Bhattacharya, Rituparna; White, Martin; Beloff, Natalia

    2016-01-01

    This paper explores how the Internet of Things and blockchain technology can benefit shared economy applications. The focus of this research is understanding how blockchain can be exploited to create decentralised, shared economy applications that allow people to monetise, securely, their things to create more wealth. Shared economy applications such as Airbnb and Uber are well-known applications, but there are many other opportunities to share in the digital economy. With the recent interest...

  17. Preschool Teachers' Attitudes toward Internet Applications for Professional Development in Taiwan

    Science.gov (United States)

    Chen, Ru-Si

    2016-01-01

    This study focuses on preschool teachers' attitudes toward integrated Internet applications for professional development by a survey in Taiwan. The researcher developed a survey questionnaire consisting of five factors: usefulness, effectiveness, behavioral intention, Internet connection, and professional competence. This study analyzed the survey…

  18. Freeform Compliant CMOS Electronic Systems for Internet of Everything Applications

    KAUST Repository

    Shaikh, Sohail F.; Ghoneim, Mohamed T.; Sevilla, Galo T.; Nassar, Joanna M.; Hussain, Aftab M.; Hussain, Muhammad Mustafa

    2017-01-01

    of flexibility and stretchability in electronics for emerging Internet of Everything application can unleash smart application horizon in unexplored areas, such as robotics, healthcare, smart cities, transport, and entertainment systems. While flexible

  19. TIME TO ABANDON INTERNET ADDICTION? PREDICTING PROBLEMATIC INTERNET, GAME, AND SOCIAL MEDIA USE FROM PSYCHOSOCIAL WELL-BEING AND APPLICATION USE

    OpenAIRE

    van Rooij, Antonius J.; Ferguson, Christopher J.; van de Mheen, Dike; Schoenmakers, Tim M.

    2017-01-01

    Objective: There have long been indications that those with problems controlling their Internet use manifest those problems in relation to specific applications. The current study empirically explores the option of abandoning a unified approach to problematic ‘Internet use’, by splitting the concept into more specific application level measurement. Method: The current study used self-report survey data, collected from Dutch adolescents (aged 12-15, N=3945). Two Structural Equation Models p...

  20. Professional BlazeDS Creating Rich Internet Applications with Flex and Java

    CERN Document Server

    Tiwari, Shashank

    2009-01-01

    A hands-on guide to creating Rich Internet Applications (RIA) using BlazeDS. BlazeDS enables you to easily connect to back-end distributed data and push data in real time to Adobe Flex and Adobe AIR applications in order to garner more responsive Rich Internet Application (RIA) experiences. It is a scalable option for Flex and Java integration and allows you to create excellent RIAs with both Flex and Java. This informative resource provides you with detailed examples and walkthroughs that explain the best practices for creating RIAs using BlazeDS. You'll begin with the essentials of BlazeDS a

  1. The monitoring and managing application of cloud computing based on Internet of Things.

    Science.gov (United States)

    Luo, Shiliang; Ren, Bin

    2016-07-01

    Cloud computing and the Internet of Things are the two hot points in the Internet application field. The application of the two new technologies is in hot discussion and research, but quite less on the field of medical monitoring and managing application. Thus, in this paper, we study and analyze the application of cloud computing and the Internet of Things on the medical field. And we manage to make a combination of the two techniques in the medical monitoring and managing field. The model architecture for remote monitoring cloud platform of healthcare information (RMCPHI) was established firstly. Then the RMCPHI architecture was analyzed. Finally an efficient PSOSAA algorithm was proposed for the medical monitoring and managing application of cloud computing. Simulation results showed that our proposed scheme can improve the efficiency about 50%. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  2. TIME TO ABANDON INTERNET ADDICTION? PREDICTING PROBLEMATIC INTERNET, GAME, AND SOCIAL MEDIA USE FROM PSYCHOSOCIAL WELL-BEING AND APPLICATION USE

    Directory of Open Access Journals (Sweden)

    Antonius J. van Rooij

    2017-02-01

    Full Text Available Objective: There have long been indications that those with problems controlling their Internet use manifest those problems in relation to specific applications. The current study empirically explores the option of abandoning a unified approach to problematic ‘Internet use’, by splitting the concept into more specific application level measurement. Method: The current study used self-report survey data, collected from Dutch adolescents (aged 12-15, N=3945. Two Structural Equation Models predicted either problematic Internet use (model 1 or both problematic game use and problematic social media use (model 2. Problematic use of the Internet/games/social media was assessed with three abbreviated 6-item versions of the CIUS. Predictors included computer-activity use type in hours per week, depressive mood, loneliness, social anxiety, negative self-esteem, and general life-satisfaction. Results: Problematic Internet use was associated with both social and gaming activities, as well as depressive mood. In the split model, problematic social media use was associated with three types of social, Internet behavior (social networking, Twitter, and instant messenger and depressive mood, while problematic gaming was associated with both online (Internet and offline gaming, as well as by gender (male and depressive mood. Conclusions: The more specific problematic social media use and problematic game use measures provide a less ambiguous and clearer picture that also reveals the role of gender within problematic game use. This provides some evidence to support splitting up measures of problematic Internet use into more specific measures in the future.

  3. Internet of Things: Architectures, Protocols, and Applications

    OpenAIRE

    Sethi, Pallavi; Sarangi, Smruti R.

    2017-01-01

    The Internet of Things (IoT) is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose. In this paper, we survey state-of-the-art methods, protocols, and applications in this new emerging area. This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human ...

  4. Principles and Application of Geographic Information Systems and Internet/Intranet Technology

    Science.gov (United States)

    2001-04-01

    technology enables the introduction of GIS based services which can be used in Intranets and in the Internet. For these services recently also eCommerce ...114 Figure 5: GIS and Internet example of USGS (screenshot) Some of these application are using eCommerce techniques and products to allow for a more

  5. Adobe AIR, Bringing Rich Internet Applications to the Desktop

    OpenAIRE

    Vieriu, Valentin; Tuican, Catalin

    2009-01-01

    Rich Internet Applications are the new trend in software development today. Adobe AIR offers the possibility to create cross-platform desktop applications using popular Web technologies like HTML, JavaScript, Flash and Flex. This article is focused on presenting the advantages that this new environment has to offer for the web development community and how quickly you can develop a desktop application using Adobe AIR.

  6. Internet applications in nuclear power plant operation management; Aplicaciones de internet en la gestion de la explotacion de centrales nucleares

    Energy Technology Data Exchange (ETDEWEB)

    Munoz, M. [Empresarios Agrupados, A. I. E. Madrid (Spain)

    2000-07-01

    The use of the Internet is quickly becoming widespread in practically all areas of business and industry. The nuclear industry should not remain indifferent to this new trend. This paper analyses some of the Internet applications that can be easily adapted to nuclear power plant operation management, including. (Author)

  7. 77 FR 74278 - Proposed Information Collection (Internet Student CPR Web Registration Application); Comment Request

    Science.gov (United States)

    2012-12-13

    ... (Internet Student CPR Web Registration Application); Comment Request AGENCY: Veterans Health Administration.... Title: Internet Student CPR Web Registration Application, VA Form 10-0468. OMB Control Number: 2900-0746... Minneapolis VA Medical Center Education Service. Students will be able to identify and register for a training...

  8. Adobe AIR, Bringing Rich Internet Applications to the Desktop

    Directory of Open Access Journals (Sweden)

    Valentin Vieriu

    2009-01-01

    Full Text Available Rich Internet Applications are the new trend in software development today. Adobe AIR offers the possibility to create cross-platform desktop applications using popular Web technologies like HTML, JavaScript, Flash and Flex. This article is focused on presenting the advantages that this new environment has to offer for the web development community and how quickly you can develop a desktop application using Adobe AIR.

  9. The Internet of Things Technology Development and Application -- Zhengzhou Airport as An Example

    Directory of Open Access Journals (Sweden)

    Hu Songlin

    2017-01-01

    Full Text Available In order to understand the trend of the development of the Internet of things, and the role of development and construction in the future,this article introduces the developing situation of the Internet of things at home and abroad. Summarizes the architecture and key technologies of iot, this paper expounds the application of the Internet of things, the last development of the Internet of things industry of our country is prospected. Combining with the development of the Internet of things industry area, zhengzhou air port development makes us on the Internet of things has a comprehensive and accurate understanding and awareness.

  10. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  11. Internet applications in radiation safety

    International Nuclear Information System (INIS)

    Hill, P.; Geisse, C.; Wuest, E.

    1998-01-01

    As a means of effective communication the Internet is presently becoming more and more important in German speaking countries, too. Its possibilities to exchange and to obtain information efficiently and rapidly are excellent. Internet and email access are available now in most institutions for professional use. Internet services of importance to radiation safety professionals are described. (orig.) [de

  12. Research on the Orientation and Application of Distributed Energy Storage in Energy Internet

    Science.gov (United States)

    Zeng, Ming; Zhou, Pengcheng; Li, Ran; Zhou, Jingjing; Chen, Tao; Li, Zhe

    2018-01-01

    Energy storage is indispensable resources to achieve a high proportion of new energy power consumption in electric power system. As an important support to energy Internet, energy storage system can achieve a variety of energy integration operation to ensure maximum energy efficiency. In this paper, firstly, the SWOT analysis method is used to express the internal and external advantages and disadvantages of distributed energy storage participating in the energy Internet. Secondly, the function orientation of distributed energy storage in energy Internet is studied, based on which the application modes of distributed energy storage in virtual power plant, community energy storage and auxiliary services are deeply studied. Finally, this paper puts forward the development strategy of distributed energy storage which is suitable for the development of China’s energy Internet, and summarizes and prospects the application of distributed energy storage system.

  13. Application on Internet of Things Technology Using in Library Management

    Science.gov (United States)

    Liu, Xueqing; Sheng, Wenwen

    Following the computer, Internet and mobile communication network, the Internet of Things (IOT) will bring a new development of information industry, and moreover is a global technology revolution that is bound to have a profound impact on the economic development and social life. This paper analyzes the key technology and working principle of IOT, its development at home and abroad, its application in the library management, and proposes its development direction in the field of library management and promotion programs.

  14. Internet Factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  15. Internet factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  16. The Mobile Application Social Mode of Manufacturing Enterprise under the Environment of Mobile Internet

    Directory of Open Access Journals (Sweden)

    Zuo Cen

    2017-01-01

    Full Text Available The rapid development of the mobile internet, mobile communication technology and mobile terminal stimulate demand of mobile application in manufacturing enterprises, which makes the enterprise implement the mobile ERP. The implementation of mobile ERP changes the internal application management of manufacturing enterprises to social applications. We analyse the driving factors of implementing the mobile application social mode considering the complexity of organization relations and business processes of manufacturing enterprise. And then the mobile application social mode of the manufacturing enterprise is built based on mobile internet. Finally, we present the management strategies of the mobile application social network to provide references for the manufacturing enterprise.

  17. Designing Interaction Spaces for Rich Internet Applications with UML

    DEFF Research Database (Denmark)

    Dolog, Peter; Stage, Jan

    2007-01-01

    In this paper, we propose a new method for designing rich internet applications. The design process uses results from an object-oriented analysis and employs interaction spaces as the basic abstraction mechanism. State diagrams are employed as refinements of interaction spaces and task models...

  18. CMOS-Technology-Enabled Flexible and Stretchable Electronics for Internet of Everything Applications

    KAUST Repository

    Hussain, Aftab M.; Hussain, Muhammad Mustafa

    2015-01-01

    Flexible and stretchable electronics can dramatically enhance the application of electronics for the emerging Internet of Everything applications where people, processes, data and devices will be integrated and connected, to augment quality of life

  19. A STUDY ON INTERNET OF THINGS APPLICATIONS AND RELATED ISSUES

    OpenAIRE

    Sandeep Kumar; Hemlata Dalmia

    2017-01-01

    Day by day Internet of Things (IoT) has gained a great attention from research community because of the importance of IoT technology in human life. IoT is a smart system which consists of different type of sensors and real world application connected with each other through internet via wired or wireless network structure. The IoT makes the world smart in every aspects means IoT gives the information regarding the surrounding condition of things with the help of technology i.e. smart home, sm...

  20. Smartphone applications for immersive virtual reality therapy for internet addiction and internet gaming disorder.

    Science.gov (United States)

    Zhang, Melvyn W B; Ho, Roger C M

    2017-01-01

    There have been rapid advances in technologies over the past decade and virtual reality technology is an area which is increasingly utilized as a healthcare intervention in many disciplines including that of Medicine, Surgery and Psychiatry. In Psychiatry, most of the current interventions involving the usage of virtual reality technology is limited to its application for anxiety disorders. With the advances in technology, Internet addiction and Internet gaming disorders are increasingly prevalent. To date, these disorders are still being treated using conventional psychotherapy methods such as cognitive behavioural therapy. However, there is an increasing number of research combining various other therapies alongside with cognitive behavioural therapy, as an attempt possibly to reduce the drop-out rates and to make such interventions more relevant to the targeted group of addicts, who are mostly adolescents. To date, there has been a prior study done in Korea that has demonstrated the comparable efficacy of virtual reality therapy with that of cognitive behavioural therapy. However, the intervention requires the usage of specialized screens and devices. It is thus the objective of the current article to highlight how smartphone applications could be designed and be utilized for immersive virtual reality treatment, alongside low cost wearables.

  1. Application Use, Online Relationship Types, Self-Disclosure, and Internet Abuse among Children and Youth: Implications for Education and Internet Safety Programs

    Science.gov (United States)

    Blau, Ina

    2011-01-01

    This study explores the relationships between Internet abuse (IA)--self-disclosure, online application usage, and relationship types--traditional long-distance, purely virtual, and migratory mixed-mode. An online questionnaire was administered to 2884 children and youth. According to the hypotheses, applications differed in their relationships…

  2. Application Platforms for the Internet of Things: Theory, Architecture, Protocols, Data Formats, and Privacy

    OpenAIRE

    Collina, Matteo

    2014-01-01

    The Internet of Things (IoT) is the next industrial revolution: we will interact naturally with real and virtual devices as a key part of our daily life. This technology shift is expected to be greater than the Web and Mobile combined. As extremely different technologies are needed to build connected devices, the Internet of Things field is a junction between electronics, telecommunications and software engineering. Internet of Things application development happens in silos, often using p...

  3. Pavlovian-to-instrumental transfer: A new paradigm to assess pathological mechanisms with regard to the use of Internet applications.

    Science.gov (United States)

    Vogel, Verena; Kollei, Ines; Duka, Theodora; Snagowski, Jan; Brand, Matthias; Müller, Astrid; Loeber, Sabine

    2018-07-16

    At present, there is a considerable lack of human studies that investigated the impact of conditioned cues on instrumental responding although these processes are considered as core mechanisms contributing to the development and maintenance of addictive behaviours. No studies are available that assessed these processes with regard to Internet gaming or Internet shopping applications. We thus developed a Pavlovian-to-instrumental transfer (PIT)-Paradigm implementing appetitive stimuli related to Internet gaming and Internet shopping applications and investigated whether an outcome-specific PIT-Effect is observed. In addition, we assessed whether the problematic use of gaming or shopping applications, personality traits and stress would affect the acquisition of knowledge of the experimental contingencies during Pavlovian training and the impact of conditioned stimuli on instrumental responding. A PIT-Paradigm, screenings for Internet gaming disorder and Internet shopping disorder (s-IAT), and questionnaires on personality traits (NEO-FFI, BIS-15) and perceived stress (PSQ20) were administered to sixty-six participants. The PIT-Paradigm demonstrated the effects of stimuli conditioned to rewards related to Internet gaming and Internet shopping applications on instrumental responding to obtain such rewards. Findings also indicated that severity of problematic Internet gaming, but not Internet shopping, contributed to the acquisition of knowledge of the experimental contingencies. Stress, extraversion, neuroticism and gender emerged as further predictors. The strength of expectancy of the different reinforcers affected the 'gaming PIT'-Effect; however, none of the variables assessed in the present study showed any effect on the 'shopping PIT'-Effect. Future studies including participants with pathological use patterns that can be classified as internet use disorder are warranted to extend these findings. Copyright © 2018 Elsevier B.V. All rights reserved.

  4. Direct Deposit Applications filed via the Internet - FY 2016 (53rd week)

    Data.gov (United States)

    Social Security Administration — This dataset provides monthly volumes at the national level from federal fiscal year 2016 for Internet Direct Deposit applications. This dataset includes data from...

  5. Research on the application of the internet of things in reverse logistics information management

    Directory of Open Access Journals (Sweden)

    Yuexia Gu

    2013-09-01

    Full Text Available Objective: Combined the current situation with the development trend of reverse logistics, the article focus on the research of Internet of Things application in the reverse logistics information management, starts with the study of reverse logistics information system, and describes the system structure and system process in applying Internet of Things in reverse logistics information management, finally brings forward the constraints like management and economic ones in applying the technology to the system. Research methods: By analyzing the current situation of reverse logistics information system, utilizing literature research methods to put forward characters of reverse logistics information system, and expanding the previous studies on Internet information transmission, we gradually establish the reverse logistics management information system on the basis of the application of Internet of Things. Research Results: Through applying the Internet of Things in the reverse logistics system, we can build a complete close-loop logistics system by linking both extreme ends of positive and negative logistics. Besides, the system will be engaged in data mining in backflow prediction data and re-processing data at regular and irregular intervals. Moreover, advice will be provided to design, purchase, manufacturing and customer service departments for their reference so as to promote respective business. Research Application and Limits: This paper focuses on how the enterprise should apply the Internet of Things technology in reverse logistics, and how to build this system in detail and what the flow planning is made. This thesis is only limited to the analysis of constraints impeding the development of the reverse logistics MIS, including management constraints, economic constraints, hardware technology, data security and rights management constraints. Detailed solutions to address these problems will be put forward in the further research.

  6. Research on Application of Automatic Weather Station Based on Internet of Things

    Science.gov (United States)

    Jianyun, Chen; Yunfan, Sun; Chunyan, Lin

    2017-12-01

    In this paper, the Internet of Things is briefly introduced, and then its application in the weather station is studied. A method of data acquisition and transmission based on NB-iot communication mode is proposed, Introduction of Internet of things technology, Sensor digital and independent power supply as the technical basis, In the construction of Automatic To realize the intelligent interconnection of the automatic weather station, and then to form an automatic weather station based on the Internet of things. A network structure of automatic weather station based on Internet of things technology is constructed to realize the independent operation of intelligent sensors and wireless data transmission. Research on networking data collection and dissemination of meteorological data, through the data platform for data analysis, the preliminary work of meteorological information publishing standards, networking of meteorological information receiving terminal provides the data interface, to the wisdom of the city, the wisdom of the purpose of the meteorological service.

  7. The Sensing Internet

    DEFF Research Database (Denmark)

    Heller, Alfred

    2015-01-01

    . Sensor networks can be seen as an important part of the Internet of Things and may even constitute an Internet of Sensors, since the communication layers can differ from the Internet standards. The current paper describes the case for application, followed by a discussion of the observed adaptive...

  8. Potential applications of the Internet of Things in sustainable rural development in South Africa

    CSIR Research Space (South Africa)

    Dlodlo, N

    2012-05-01

    Full Text Available Conference of Information Science and Computer Applications (ICISCA), Bali, Indonesia, 19-20 November 2012 Potential applications of the Internet of Things in sustainable rural development in South Africa Nomusa Dlodlo and Mofolo Mofolo CSIR...

  9. The Development of Key Technologies in Applications of Vessels Connected to the Internet

    Directory of Open Access Journals (Sweden)

    Zhe Tian

    2017-10-01

    Full Text Available With the development of science and technology, traffic perception, communication, information processing, artificial intelligence and the shipping information system have become important in supporting the realization of intelligent shipping transportation. Against this background, the Internet of Vessels (IoV is proposed to integrate all these advanced technologies into a platform to meet the requirements of international and regional transportations. The purpose of this paper is to analyze how to benefit from the Internet of Vessels to improve the efficiency and safety of shipping, and promote the development of world transportation. In this paper, the IoV is introduced and its main architectures are outlined. Furthermore, the characteristics of the Internet of Vessels are described. Several important applications that illustrate the interaction of the Internet of Vessels’ components are proposed. Due to the development of the Internet of Vessels still being in its primary stage, challenges and prospects are identified and addressed. Finally, the main conclusions are drawn and future research priorities are provided for reference and as professional suggestions for future researchers in this field.

  10. Internet and smartphone application usage in eating disorders: A descriptive study in Singapore.

    Science.gov (United States)

    Tan, Tina; Kuek, Angeline; Goh, Shih Ee; Lee, Ee Lian; Kwok, Victor

    2016-02-01

    Eating disorders are associated with significant morbidity and mortality. The Internet is a popular medium for individuals with eating disorders to discuss and reinforce their affliction. However, the available literature on Internet usage and eating disorders is scarce, especially in the area of social media and smartphone application ("app") usage. This study looked at the Internet and smartphone app usage patterns of participants who presented with an eating disorder in Singapore, and whether it corresponded to severity of illness. Individuals who presented to the Eating Disorders clinic at the Singapore General Hospital completed a self-reported questionnaire on Internet and app usage. They also completed the EDE-Q, EAT-26 and CIA 3.0. 55 participants completed the study. 41.8% had anorexia nervosa, 34.5% had bulimia nervosa, and 9.1% were ED-NOS. 41.8% felt that apps helped to perpetuate their illness while 32.7% felt that the apps were helpful for recovery. Overall, any smartphone application usage was associated with younger age and greater eating disorder psychopathology and psychosocial impairment. While 30.9% had encountered eating disorder-related content on Facebook, only 12.7% visited Facebook groups related to eating disorders. For YouTube, "Cooking and Food" and "Beauty and Fashion" videos were among the top 3 types of videos that participants watched. In conclusion, Internet and smartphone app usage is significant, and they are associated with greater severity of illness. It is necessary to include interventions in this aspect as part of treatment of eating disorders. Copyright © 2015 Elsevier B.V. All rights reserved.

  11. Application of the Internet and its Association With Loneliness Among Retired Teachers

    Directory of Open Access Journals (Sweden)

    Malihe Saboor

    2014-04-01

    Full Text Available Objectives: The social engagement and participation of older adults in society are seen as indicators of healthy ageing. With the changing nature of society over recent years, many elderly people are at risk of being lonely. Evidence shows that loneliness has an adverse effect on older adults. Therefore, it is important to find some ways to overcome this problem. This study aimed to assess the level of loneliness among Iranian retired teachers and the impact of Internet application on the sense of loneliness and depression in this group. Methods & Materials: This Cross-sectional study was conducted among 445 retired teachers which 43 of them were Internet user. Data collected by a questionnaire consisted of three sections including demographic questions, 15 questions of Social and Emotional Loneliness Scale (SELSA, and 5 GDS questions. Results: from a Principle Component Factor Analysis reduced SELSA items to a three-factor model including Social, Family and Romantic Subscales. For Internet users one more section was used including 3 parts: frequency, history and nature of Internet application. Data was analyzed by SPSS. Results T, 37% of the non-user respondents reported social loneliness compared to 18.6% of users (P=0.002 However prevalence of family loneliness in those who were non-user was significantly lower (P=0.001. Living alone, being widowed or separated were predictors of loneliness (P<0.05. Findings showed that, the level of depression in users were significantly lower than that of non-users (P=0.002 (27.9% followed by 39.2%.  Conclusion: These findings in combination suggest that the level of loneliness and depression among non-user retired people is almost higher than users. Therefore, it is important to identify and implement strategies such as using the Internet to overcome the loneliness experienced by elderly people.

  12. Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications

    Science.gov (United States)

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2014-05-01

    Mobile cloud computing is receiving world-wide momentum for ubiquitous on-demand cloud services for mobile users provided by Amazon, Google etc. with low capital cost. However, Internet-centric clouds introduce wide area network (WAN) delays that are often intolerable for real-time applications such as video streaming. One promising approach to addressing this challenge is to deploy decentralized mini-cloud facility known as cloudlets to enable localized cloud services. When supported by local wireless connectivity, a wireless cloudlet is expected to offer low cost and high performance cloud services for the users. In this work, we implement a realistic framework that comprises both a popular Internet cloud (Amazon Cloud) and a real-world cloudlet (based on Ubuntu Enterprise Cloud (UEC)) for mobile cloud users in a wireless mesh network. We focus on real-time video streaming over the HTTP standard and implement a typical application. We further perform a comprehensive comparative analysis and empirical evaluation of the application's performance when it is delivered over the Internet cloud and the cloudlet respectively. The study quantifies the influence of the two different cloud networking architectures on supporting real-time video streaming. We also enable movement of the users in the wireless mesh network and investigate the effect of user's mobility on mobile cloud computing over the cloudlet and Amazon cloud respectively. Our experimental results demonstrate the advantages of the cloudlet paradigm over its Internet cloud counterpart in supporting the quality of service of real-time applications.

  13. Pro Internet Explorer 8 & 9 Development Developing Powerful Applications for the Next Generation of IE

    CERN Document Server

    Crowley, Matthew

    2010-01-01

    This book is an in-depth guide to writing applications that embrace and extend the new features and capabilities of Windows Internet Explorer 8 and 9. With solid instruction, hands-on examples, and expert insight direct from the source into extending the browser, you'll learn how to create and maintain powerful applications for Microsoft's next-generation Internet platform. Join author Matthew Crowley as you discover how to take advantage of new features like accelerators, WebSlices, and search providers, and create intense web experiences for the browser that ships by default with the popular

  14. Applications of Scalable Multipoint Video and Audio Using the Public Internet

    Directory of Open Access Journals (Sweden)

    Robert D. Gaglianello

    2000-01-01

    Full Text Available This paper describes a scalable multipoint video system, designed for efficient generation and display of high quality, multiple resolution, multiple compressed video streams over IP-based networks. We present our experiences using the system over the public Internet for several “real-world” applications, including distance learning, virtual theater, and virtual collaboration. The trials were a combined effort of Bell Laboratories and the Gertrude Stein Repertory Theatre (TGSRT. We also present current advances in the conferencing system since the trials, new areas for application and future applications.

  15. Online-specific fear of missing out and Internet-use expectancies contribute to symptoms of Internet-communication disorder.

    Science.gov (United States)

    Wegmann, Elisa; Oberst, Ursula; Stodt, Benjamin; Brand, Matthias

    2017-06-01

    Some of the most frequently used online applications are Facebook, WhatsApp, and Twitter. These applications allow individuals to communicate with other users, to share information or pictures, and to stay in contact with friends all over the world. However, a growing number of users suffer from negative consequences due to their excessive use of these applications, which can be referred to as Internet-communication disorder. The frequent use and easy access of these applications may also trigger the individual's fear of missing out on content when not accessing these applications. Using a sample of 270 participants, a structural equation model was analyzed to investigate the role of psychopathological symptoms and the fear of missing out on expectancies towards Internet-communication applications in the development of symptoms of an Internet-communication disorder. The results suggest that psychopathological symptoms predict higher fear of missing out on the individual's Internet-communication applications and higher expectancies to use these applications as a helpful tool to escape from negative feelings. These specific cognitions mediate the effect of psychopathological symptoms on Internet-communication disorder. Our results are in line with the theoretical model by Brand et al. (2016) as they show how Internet-related cognitive bias mediates the relationship between a person's core characteristics (e.g., psychopathological symptoms) and Internet-communication disorder. However, further studies should investigate the role of the fear of missing out as a specific predisposition, as well as specific cognition in the online context.

  16. Online-specific fear of missing out and Internet-use expectancies contribute to symptoms of Internet-communication disorder

    Directory of Open Access Journals (Sweden)

    Elisa Wegmann

    2017-06-01

    Full Text Available Some of the most frequently used online applications are Facebook, WhatsApp, and Twitter. These applications allow individuals to communicate with other users, to share information or pictures, and to stay in contact with friends all over the world. However, a growing number of users suffer from negative consequences due to their excessive use of these applications, which can be referred to as Internet-communication disorder. The frequent use and easy access of these applications may also trigger the individual's fear of missing out on content when not accessing these applications. Using a sample of 270 participants, a structural equation model was analyzed to investigate the role of psychopathological symptoms and the fear of missing out on expectancies towards Internet-communication applications in the development of symptoms of an Internet-communication disorder. The results suggest that psychopathological symptoms predict higher fear of missing out on the individual's Internet-communication applications and higher expectancies to use these applications as a helpful tool to escape from negative feelings. These specific cognitions mediate the effect of psychopathological symptoms on Internet-communication disorder. Our results are in line with the theoretical model by Brand et al. (2016 as they show how Internet-related cognitive bias mediates the relationship between a person's core characteristics (e.g., psychopathological symptoms and Internet-communication disorder. However, further studies should investigate the role of the fear of missing out as a specific predisposition, as well as specific cognition in the online context.

  17. Current experiences with internet telepathology and possible evolution in the next generation of Internet services.

    Science.gov (United States)

    Della Mea, V; Beltrami, C A

    2000-01-01

    The last five years experience has definitely demonstrated the possible applications of the Internet for telepathology. They may be listed as follows: (a) teleconsultation via multimedia e-mail; (b) teleconsultation via web-based tools; (c) distant education by means of World Wide Web; (d) virtual microscope management through Web and Java interfaces; (e) real-time consultations through Internet-based videoconferencing. Such applications have led to the recognition of some important limits of the Internet, when dealing with telemedicine: (i) no guarantees on the quality of service (QoS); (ii) inadequate security and privacy; (iii) for some countries, low bandwidth and thus low responsiveness for real-time applications. Currently, there are several innovations in the world of the Internet. Different initiatives have been aimed at an amelioration of the Internet protocols, in order to have quality of service, multimedia support, security and other advanced services, together with greater bandwidth. The forthcoming Internet improvements, although induced by electronic commerce, video on demand, and other commercial needs, are of real interest also for telemedicine, because they solve the limits currently slowing down the use of Internet. When such new services will be available, telepathology applications may switch from research to daily practice in a fast way.

  18. Development, management and benefit from Internet-based geospatial data sources through knowledge management for GIS-based regional geography applications

    International Nuclear Information System (INIS)

    Thunemann, H.G.

    2009-01-01

    The provision of data and information on the Internet is growing daily. For geoscientific applications, especially using geographic information systems (GIS), changing geospacial data are often needed, and thus possibly different data sources. Geospatial data should be easily available. As an increasingly important medium for exchange of geospatial data is the internet. The problem of finding appropriate datasources on the Internet remains to the user. The Internet as a technical basis, which was designed as a tool for information exchange, has changed the practice of dealing with knowledge and information on fundamental and not previously foreseeable manner. From the many individual acts social consequences result, concerning the production and disposal of knowledge. These determine the development of different solutions significantly, which also includes the production, deployment and use of geospatial data, with all its strengths and problems. Various solutions to the provision of geospatial data are available on the Internet, the targeted searching of this geodata sources on the Internet remains a shortcoming. The options of knowledge management, among other solutions, could be a possibility to ease the compilation, storage, connection, popularization and ultimately the application of geodata sources on the Internet. Communication, as a central element of the use of knowledge management, should be used in the form of a communication platform. The present study describes the variety of deployment options of geospatial data and the problems of finding data sources on the Internet. Potential hazards of geospatial data provision (also) via the Internet as well as an option to manage, update and use them for various applications on the Internet are are pointed out. (author) [de

  19. THE MAIN APPLICATIONS OF THE INTERNET IN TOURISM MARKETING

    OpenAIRE

    Beatrice Sion; Cezar Mihălcescu

    2010-01-01

    The Internet as a marketing media can be of great benefit to virtual all areas of marketing, from marketing research, through market segmentation, targeting and positioning, to the effective use of the marketing mix, and marketing organisation and control. The following discussion does not attempt to provide an exhaustive list of the Net's use in tourism; rather, it simply intends to exemplify its common applications in and main implications for tourism marketing.

  20. Semantic Reasoning for Context-aware Internet of Things Applications

    OpenAIRE

    Maarala, Altti Ilari; Su, Xiang; Riekki, Jukka

    2016-01-01

    Advances in ICT are bringing into reality the vision of a large number of uniquely identifiable, interconnected objects and things that gather information from diverse physical environments and deliver the information to a variety of innovative applications and services. These sensing objects and things form the Internet of Things (IoT) that can improve energy and cost efficiency and automation in many different industry fields such as transportation and logistics, health care and manufacturi...

  1. Prioritizing the Applications of Internet of Things Technology in the Healthcare Sector in Iran: A Driver for Sustainable Development

    Directory of Open Access Journals (Sweden)

    Rohollah Ghasemi

    2016-03-01

    Full Text Available Pay attention to health care sector is one of the areas of sustainable development in the countries. Internet of Things technology in the health sector has wide variety of applications that was not investigated in Iran. This paper aims to prioritize the applications of internet of things in the healthcare sector in Iran in order to achieve sustainable development. This research is applied and its research method is descriptive. Because of using Fuzzy AHP for ranking alternatives, our research is a single cross-survey. After collecting the agreement paired comparisons questionnaires, weights of criteria were determined and applications of Internet of things in healthcare were prioritized. Our findings show that economic prosperity and quality of life are the most important criteria for sustainable development of Internet of things in healthcare sector in Iran. Also, “Chronic disease management”,“patient surveillance”, “hygienic hand control”, and “fall detection” are the most important priorities for the use of internet of things in healthcare sector in Iran.

  2. Increasing self-regulatory energy using an Internet-based training application delivered by smartphone technology.

    Science.gov (United States)

    Cranwell, Jo; Benford, Steve; Houghton, Robert J; Golembewski, Michael; Golembewksi, Michael; Fischer, Joel E; Hagger, Martin S

    2014-03-01

    Self-control resources can be defined in terms of "energy." Repeated attempts to override desires and impulses can result in a state of reduced self-control energy termed "ego depletion" leading to a reduced capacity to regulate future self-control behaviors effectively. Regular practice or "training" on self-control tasks may improve an individual's capacity to overcome ego depletion effectively. The current research tested the effectiveness of training using a novel Internet-based smartphone application to improve self-control and reduce ego depletion. In two experiments, participants were randomly assigned to either an experimental group, which received a daily program of self-control training using a modified Stroop-task Internet-based application delivered via smartphone to participants over a 4-week period, or a no-training control group. Participants assigned to the experimental group performed significantly better on post-training laboratory self-control tasks relative to participants in the control group. Findings support the hypothesized training effect on self-control and highlight the effectiveness of a novel Internet-based application delivered by smartphone as a practical means to administer and monitor a self-control training program. The smartphone training application has considerable advantages over other means to train self-control adopted in previous studies in that it has increased ecological validity and enables effective monitoring of compliance with the training program.

  3. Future internet applications: The next trillion to be connected

    CSIR Research Space (South Africa)

    Coetzee, L

    2012-10-01

    Full Text Available Constrained network Application IoT platform: management services, access control, resource management, security, Open API Constrained network ? Platform manages resources and provides enabling services and open APIs ? Provides for software...://popsci.typepad.com/popsci/2007/09/rfid-implants-m.html http://www.weathershop.co.uk/shop/replacement-temp-sensor-thr228n-sensor IoT == Phenomenon This phenomenon is called... The Internet of Things ? CSIR 2012 Slide 4 Imagine the Possibilities.. ...when Any-one, Any...

  4. Characteristics of the Application of the Criminal Law for Crimes, Committed in the Internet

    Directory of Open Access Journals (Sweden)

    Anton A. Komarov

    2016-11-01

    Full Text Available The article analyzes the basic postulates of the principle of territorial application of criminal law in space in relation to the global computer network – Internet. As part of the comparative legal method various approaches of American, German, Russian forensic scientists to the resolution of conflicts regarding the infrastructure of the Internet, computer information and features of the action of the national criminal law in these countries are analyzed.

  5. [Design and Application of High-risk Pregnancy Monitoring & Warning Internet Platform Based on Internet of Things].

    Science.gov (United States)

    Lu, Heqing; Zhang, Xiaofeng; Li, Bin

    2017-09-30

    Through illustrating the designing of high-risk pregnancy maternal-fetal monitoring system based on the internet of things, this paper introduced the specific application of using wearable medical devices to provide maternal-fetal mobile medical services. With the help of big data and cloud obstetrics platform, the monitoring and warning network was further improved, the level-to-level administration of high-risk pregnancy was realized, the level of perinatal health care was enhanced and the risk of critical emergency of pregnancy decreased.

  6. Research on Key Technology and Applications for Internet of Things

    Science.gov (United States)

    Chen, Xian-Yi; Jin, Zhi-Gang

    The Internet of Things (IOT) has been paid more and more attention by the academe, industry, and government all over the world. The concept of IOT and the architecture of IOT are discussed. The key technologies of IOT, including Radio Frequency Identification technology, Electronic Product Code technology, and ZigBee technology are analyzed. The framework of digital agriculture application based on IOT is proposed.

  7. Adobe AIR 15 Cookbook Solutions and Examples for Rich Internet Application Developers

    CERN Document Server

    Tucker, David; DeWeggheleire, Koen

    2008-01-01

    The hands-on recipes in this cookbook help you solve a variety of tasks and scenarios often encountered when using Adobe AIR to build Rich Internet Applications for the desktop. Thoroughly vetted by Adobe's AIR development team, Adobe AIR 1.5 Cookbook addresses fundamentals, best practices, and more. If you want to learn the nuances of Adobe AIR to build innovative applications, this is the book you've been waiting for.

  8. INTERNET OF THINGS (IOT) - APPLICATIONS AND CHALLENGES

    OpenAIRE

    K. Lathika

    2016-01-01

    The internet of things (IoT) as the new influence to the human world and machine world is emerging as a new high tide wave in the development of internet. Internet of things is expected to have massive impact on the customer of electric equipment’s, business which will all be integrated and synchronized and also the fact is these are the early days. Looking at the potential of the wide suitability to all most all the vectors of the core areas like business, industries, manufacturing consumer...

  9. Internet of things cognitive transformation technology research trends and applications

    OpenAIRE

    Vermesan, Ovidiu; Eisenhauer, Markus; Sundmaeker, Harald; Guillemin, Patrick; Serrano, Martin; Tragos, Elias Z.; Valino, Javier; van der Wees, Arthur; Gluhak, Alex; Bahr, Roy

    2017-01-01

    The Internet of Things (IoT) is changing how industrial and consumer markets are developing. Robotic devices, drones and autonomous vehicles, blockchains, augmented and virtual reality, digital assistants and machine learning (artificial intelligence or AI) are the technologies that will provide the next phase of development of IoT applications. The combination of these disciplines makes possible the development of autonomous systems combining robotics and machine learning for designing simil...

  10. Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture

    Directory of Open Access Journals (Sweden)

    Francisco Javier Ferrández-Pastor

    2016-07-01

    Full Text Available The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water; however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols, the evolution of Internet technologies (Internet of Things and ubiquitous computing (Ubiquitous Sensor Networks allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists when a project is launched.

  11. Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture.

    Science.gov (United States)

    Ferrández-Pastor, Francisco Javier; García-Chamizo, Juan Manuel; Nieto-Hidalgo, Mario; Mora-Pascual, Jerónimo; Mora-Martínez, José

    2016-07-22

    The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched.

  12. Internet Banking integration within the banking system

    Directory of Open Access Journals (Sweden)

    Constantin Marian MATEI

    2008-01-01

    Full Text Available Internet Banking developed due to increasing demand of online banking transactions. The biggest advantages of Internet Banking consist of complex banking solutions, 24 hours availability, quick and secure access to the back-end application through Internet. These advantages are due to the use of SOA (service-oriented architecture. SOA appeared as a necessity of companies to integrate big and independent portions of applications, in order to obtain an homogeneous functionality of the system. For the Internet Banking applications, SOA proved to be the optimal architectural solution, for a smoth integration between banking services from the front-end to the back-end.This paper intend to offer an insite analyse of the Internet Banking applications architecture integrated with other banking systems. A SOA oriented analyse will establish the scope of the integration architecture.

  13. Towards Internet of Things: Survey and Future Vision

    OpenAIRE

    Omar Said; Mehedi Masud

    2013-01-01

    Internet of things is a promising research due to its importance in many commerce, industry, and education applications. Recently, new applications and research challenges in numerous areas of Internet of things are fired. In this paper, we discuss the history of Internet of things, different proposed architectures of Internet of things, research challenges and open problems related to the Internet of things. We also introduce the concept of Internet of things database and discuss about the f...

  14. On Internet and Internet of things%论 Internet与 Internet of Things

    Institute of Scientific and Technical Information of China (English)

    曾华燊

    2012-01-01

    从Internet发展历史及应用环境变化的角度讨论IoT( Internet of Things)提出背景、内涵、组成结构和体系结构等关键问题.在分析对IoT的典型定义的基础上,笔者认为“ITU把IoT作为Internet平台在应用领域实现人、机、和智能化物理对象(SPO)信息全方位互通和实践普适计算理念的下一代Internet及其应用系统的概括”是对IoT更为合理的广义定义.以该定义为基础,全面地分析了“由多个用户域网(CPN)通过骨干通信子网互联”的基本组成结构,讨论了两类SPO-CPN的基本组成结构及其支撑技术;指出SPO的引入主要影响CPN资源网络中的接入部分,属于应用系统的范畴,对Internet基本技术影响甚微.笔者不赞同以欧盟为代表的把IoT定义为联物专用网的狭义定义,指出其IoT模型和体系结构研究混淆了网络平台与应用系统,实质上是网络应用系统模型和体系结构.%Based on the analysis of development history and application environment changes of Internet, this paper provided a comprehensive discussion on the incentive, connotation, organization, and some key issues of the Internet of Things (IoT). On the basis of the analysis of the typical definition of IoT, the author believed that " the full range of information interoperability ITU to IoT as an Internet platform in the application areas of human, machine, and intelligent physical objects (SPO) and the next generation Internet applications generalization of Pervasive Computing (Ubiquitous Computing) concept " is a more reasonable broad definition of the IoT. Based on this definition, the author analyzed the basic organization of IoT, which consisted of interconnected multiple Customer Premises Network (CPN) via backbone Subnetworks, and examined two types of components of SPO-CPN and their supporting techniques. It was also pointed out that introduction of SPO has little impact on Internet technology, except on access part of

  15. Broadband wireless communications for railway applications for onboard internet access and other applications

    CERN Document Server

    Masson, Émilie

    2017-01-01

    This book focuses on the needs of railway operators in terms of wireless communications, divided in two main categories: the commercial services and the operational needs. Then, all available technologies that can be used to provide Internet access on board trains and all the other operational applications requiring high capacity are detailed. Finally, challenges and trends in railway telecommunications are highlighted, through the presentation of the future and emerging technologies, the current discussions and works in the different authorities, and the key challenges and scientific barriers.

  16. The adaptive internet application for interpretation of the transformer oil gas chromatographic analysis results

    Directory of Open Access Journals (Sweden)

    Polužanski Vladimir

    2015-01-01

    Full Text Available This paper describes an adaptive Internet application for the interpretation of the transformer oil gas chromatographic analysis results. The first version of the application is developed by following an evolutionary software development concept. The most important software development risks and the appropriate solutions are described. An open-source web framework named Bootstrap is used for an application implementation. The application is developed by using ASP.NET and MS SQL server.

  17. Tracking the Evolution of the Internet of Things Concept Across Different Application Domains

    Science.gov (United States)

    Ibarra-Esquer, Jorge E.; González-Navarro, Félix F.; Flores-Rios, Brenda L.; Burtseva, Larysa; Astorga-Vargas, María A.

    2017-01-01

    Both the idea and technology for connecting sensors and actuators to a network to remotely monitor and control physical systems have been known for many years and developed accordingly. However, a little more than a decade ago the concept of the Internet of Things (IoT) was coined and used to integrate such approaches into a common framework. Technology has been constantly evolving and so has the concept of the Internet of Things, incorporating new terminology appropriate to technological advances and different application domains. This paper presents the changes that the IoT has undertaken since its conception and research on how technological advances have shaped it and fostered the arising of derived names suitable to specific domains. A two-step literature review through major publishers and indexing databases was conducted; first by searching for proposals on the Internet of Things concept and analyzing them to find similarities, differences, and technological features that allow us to create a timeline showing its development; in the second step the most mentioned names given to the IoT for specific domains, as well as closely related concepts were identified and briefly analyzed. The study confirms the claim that a consensus on the IoT definition has not yet been reached, as enabling technology keeps evolving and new application domains are being proposed. However, recent changes have been relatively moderated, and its variations on application domains are clearly differentiated, with data and data technologies playing an important role in the IoT landscape. PMID:28613238

  18. Tracking the Evolution of the Internet of Things Concept Across Different Application Domains

    Directory of Open Access Journals (Sweden)

    Jorge E. Ibarra-Esquer

    2017-06-01

    Full Text Available Both the idea and technology for connecting sensors and actuators to a network to remotely monitor and control physical systems have been known for many years and developed accordingly. However, a little more than a decade ago the concept of the Internet of Things (IoT was coined and used to integrate such approaches into a common framework. Technology has been constantly evolving and so has the concept of the Internet of Things, incorporating new terminology appropriate to technological advances and different application domains. This paper presents the changes that the IoT has undertaken since its conception and research on how technological advances have shaped it and fostered the arising of derived names suitable to specific domains. A two-step literature review through major publishers and indexing databases was conducted; first by searching for proposals on the Internet of Things concept and analyzing them to find similarities, differences, and technological features that allow us to create a timeline showing its development; in the second step the most mentioned names given to the IoT for specific domains, as well as closely related concepts were identified and briefly analyzed. The study confirms the claim that a consensus on the IoT definition has not yet been reached, as enabling technology keeps evolving and new application domains are being proposed. However, recent changes have been relatively moderated, and its variations on application domains are clearly differentiated, with data and data technologies playing an important role in the IoT landscape.

  19. Tracking the Evolution of the Internet of Things Concept Across Different Application Domains.

    Science.gov (United States)

    Ibarra-Esquer, Jorge E; González-Navarro, Félix F; Flores-Rios, Brenda L; Burtseva, Larysa; Astorga-Vargas, María A

    2017-06-14

    Both the idea and technology for connecting sensors and actuators to a network to remotely monitor and control physical systems have been known for many years and developed accordingly. However, a little more than a decade ago the concept of the Internet of Things (IoT) was coined and used to integrate such approaches into a common framework. Technology has been constantly evolving and so has the concept of the Internet of Things, incorporating new terminology appropriate to technological advances and different application domains. This paper presents the changes that the IoT has undertaken since its conception and research on how technological advances have shaped it and fostered the arising of derived names suitable to specific domains. A two-step literature review through major publishers and indexing databases was conducted; first by searching for proposals on the Internet of Things concept and analyzing them to find similarities, differences, and technological features that allow us to create a timeline showing its development; in the second step the most mentioned names given to the IoT for specific domains, as well as closely related concepts were identified and briefly analyzed. The study confirms the claim that a consensus on the IoT definition has not yet been reached, as enabling technology keeps evolving and new application domains are being proposed. However, recent changes have been relatively moderated, and its variations on application domains are clearly differentiated, with data and data technologies playing an important role in the IoT landscape.

  20. Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms

    OpenAIRE

    Perera , Charith; Mccormick , Ciaran; Bandara , Arosha K.; Price , Blaine A.; Nuseibeh , Bashar

    2016-01-01

    International audience; The Internet of Things (IoT) systems are designed and developed either as standalone applications from the ground-up or with the help of IoT middleware platforms. They are designed to support different kinds of scenarios, such as smart homes and smart cities. Thus far, privacy concerns have not been explicitly considered by IoT applications and middleware platforms. This is partly due to the lack of systematic methods for designing privacy that can guide the software d...

  1. Measurement and Statistics of Application Business in Complex Internet

    Science.gov (United States)

    Wang, Lei; Li, Yang; Li, Yipeng; Wu, Shuhang; Song, Shiji; Ren, Yong

    Owing to independent topologies and autonomic routing mechanism, the logical networks formed by Internet application business behavior cause the significant influence on the physical networks. In this paper, the backbone traffic of TUNET (Tsinghua University Networks) is measured, further more, the two most important application business: HTTP and P2P are analyzed at IP-packet level. It is shown that uplink HTTP and P2P packets behavior presents spatio-temporal power-law characteristics with exponents 1.25 and 1.53 respectively. Downlink HTTP packets behavior also presents power-law characteristics, but has more little exponents γ = 0.82 which differs from traditional complex networks research result. Moreover, downlink P2P packets distribution presents an approximate power-law which means that flow equilibrium profits little from distributed peer-to peer mechanism actually.

  2. Flex 4 Cookbook Real-world recipes for developing Rich Internet Applications

    CERN Document Server

    Noble, Joshua; Braithwaite, Garth; Casario, Marco; Tretola, Rich

    2010-01-01

    With this collection of proven recipes, you have the ideal problem-solving guide for developing interactive Rich Internet Applications on the Adobe Flash Platform. You'll find answers to hundreds of common problems you may encounter when using Adobe Flex, Flex 4 Framework, or Flash Builder, Adobe's GUI-based development tool. Flex 4 Cookbook has hands-on recipes for everything from Flex basics to solutions for working with visual components and data access, as well as tips on application development, unit testing, and Adobe AIR. Each recipe provides an explanation of how and why it works, an

  3. Internet culture

    CERN Document Server

    Porter, David

    2013-01-01

    The internet has recently grown from a fringe cultural phenomenon to a significant site of cultural production and transformation. Internet Culture maps this new domain of language, politics and identity, locating it within the histories of communication and the public sphere. Internet Culture offers a critical interrogation of the sustaining myths of the virtual world and of the implications of the current mass migration onto the electronic frontier. Among the topics discussed in Internet Culture are the virtual spaces and places created by the citizens of the Net and their claims to the hotly contested notion of "virtual community"; the virtual bodies that occupy such spaces; and the desires that animate these bodies. The contributors also examine the communication medium behind theworlds of the Net, analyzing the rhetorical conventions governing online discussion, literary antecedents,and potential pedagogical applications.

  4. Internet of Things: Concept, Building blocks, Applications and Challenges

    OpenAIRE

    Abdmeziem, Riad; Tandjaoui, Djamel

    2014-01-01

    Internet of things (IoT) constitutes one of the most important technology that has the potential to affect deeply our way of life, after mobile phones and Internet. The basic idea is that every objet that is around us will be part of the network (Internet), interacting to reach a common goal. In another word, the Internet of Things concept aims to link the physical world to the digital one. Technology advances along with popular demand will foster the wide spread deployement of IoT's services...

  5. Internet application: production-technical information system MoNET

    International Nuclear Information System (INIS)

    Tomiga, J.

    2004-01-01

    MoNET is the production-technical information system supporting engineering, operational and maintenance processes of distribution network administrator. It utilizes the model of distribution network that is situated in the geo-space relational database. The geo-space database represents an information base of operational-technical processes. It contains elements and equipment s of the distribution network, failures, operational events, maintenance records, but also, parcels, reference planimetry, e.g. and other subjects for which is relevant the positional datum - geo-space information. MoNET is typically exploited in the fields: - evidence of the subjects and equipment of network, technical documentation; - property administration; - planning of network development, support of designing and construction; - technical calculation; - breakdown controller centre; - maintenance management. MoNET can be implemented as the desktop application, however its first benefit is derived from its usage as the intranet application MoNET WEB for the whole enterprise or organisation. This version enables an unrestricted number of end-users to enter this system. The end-users don't need any special software to enter the data of MoNet WEB application, the pre-installed Internet Explorer will do. (author)

  6. Internet Addiction: A Current Review

    Directory of Open Access Journals (Sweden)

    Hasan Bozkurt

    2016-09-01

    Full Text Available Internet addiction, which has become a global social issue, can be broadly conceptualized as an inability to control ones use of the Internet which leads to negative consequences in daily life. Only Internet Gaming Disorder has been included in the appendix of the diagnostic and statistical manual of mental disorders fifth edition (DSM-5, but it has already been argued that Internet addiction could also comprise problematic use of other Internet applications developing an addictive behavior. This paper aims to give a current review of the gradually evolving body of literature on Internet addiction. [J Contemp Med 2016; 6(3.000: 235-247

  7. Internet Banking integration within the banking system

    OpenAIRE

    Constantin Marian MATEI; Catalin Ionut SILVESTRU; Dragos Stefan SILVESTRU

    2008-01-01

    Internet Banking developed due to increasing demand of online banking transactions. The biggest advantages of Internet Banking consist of complex banking solutions, 24 hours availability, quick and secure access to the back-end application through Internet. These advantages are due to the use of SOA (service-oriented architecture). SOA appeared as a necessity of companies to integrate big and independent portions of applications, in order to obtain an homogeneous functionality of the system....

  8. Internet technologies and requirements for telemedicine

    Science.gov (United States)

    Lamaster, H.; Meylor, J.; Meylor, F.

    1997-01-01

    Internet technologies are briefly introduced and those applicable for telemedicine are reviewed. Multicast internet technologies are described. The National Aeronautics and Space Administration (NASA) 'Telemedicine Space-bridge to Russia' project is described and used to derive requirements for internet telemedicine. Telemedicine privacy and Quality of Service (QoS) requirements are described.

  9. Internet-communication disorder: It’s a matter of social aspects, coping, and Internet-use expectancies

    Directory of Open Access Journals (Sweden)

    Elisa Wegmann

    2016-11-01

    Full Text Available Online communication applications such as Facebook, WhatsApp, and Twitter are some of the most frequently used Internet applications. There is a growing amount of individuals suffering diminished control over their use of online communication applications which leads to diverse negative consequences in offline life. This could be referred to as Internet-communication disorder. The current study investigates the role of individual characteristics (e.g., psychopathological symptoms, feelings of loneliness and specific cognitions assessing the contribution of an Internet-communication disorder (ICD. In a sample of 485 participants a structural equation model was tested to investigate predictors and mediators which may predict an excessive use. The results emphasize that a higher level of social loneliness and less perceived social support enhance the risk of a pathological use. The effects of psychopathological symptoms (depression and social anxiety as well as individual characteristics (self-esteem, self-efficacy, and stress vulnerability on ICD symptoms are mediated by Internet-use expectancies and dysfunctional coping mechanisms. The results illustrate mediation effects which are in line with the theoretical model by Brand et al. (2016. As suggested in the model social aspects seem to be key predictors of ICD symptoms. Further research should investigate convergent and divergent factors of other types of specific Internet-use disorders.

  10. Knowledge-Based Control Systems via Internet Part I. Applications in Biotechnology

    Directory of Open Access Journals (Sweden)

    Georgi Georgiev

    2005-04-01

    Full Text Available An extensive approach towards the dissemination of expert knowledge and coordination efforts to distributed points and seamless integration of control strategies applied to distributed yet identical systems is crucial to enhance overall efficiency and operational costs. Application of Knowledge-Based Control System via Internet will be very efficient especially in biotechnology, because many industrial bioprocesses, based on the same technological principles, are distributed in the whole world. Brewing industry oriented practical solutions illustrate this approach.

  11. 76 FR 74721 - Preserving the Open Internet

    Science.gov (United States)

    2011-12-01

    ...; Report No. 2936] Preserving the Open Internet AGENCY: Federal Communications Commission. ACTION: Final... for broadband service to preserve and reinforce Internet freedom and openness. DATES: Oppositions to... applicability. Subject: In the Matter of Preserving the Open Internet, Broadband Industry Practices, published...

  12. Scalable video on demand adaptive Internet-based distribution

    CERN Document Server

    Zink, Michael

    2013-01-01

    In recent years, the proliferation of available video content and the popularity of the Internet have encouraged service providers to develop new ways of distributing content to clients. Increasing video scaling ratios and advanced digital signal processing techniques have led to Internet Video-on-Demand applications, but these currently lack efficiency and quality. Scalable Video on Demand: Adaptive Internet-based Distribution examines how current video compression and streaming can be used to deliver high-quality applications over the Internet. In addition to analysing the problems

  13. A Survey on Challenges of Semantics Application in the Internet of Things Domain

    Directory of Open Access Journals (Sweden)

    Harlamova Marina

    2017-05-01

    Full Text Available The Internet of Things (IoT, a global Internet-based system of computing devices and machines, is one of the most significant trends in the information technology area. An accepted unified communication approach would be a prerequisite for its mass adoption. Semantic technologies (Semantic Web have been advocated as enablers of unified communication. However, while there are particular advancements in research on application of Semantic Web in the IoT domain, the dynamic and complex nature of the IoT often requires case specific solutions hard to be applied widely. In the present survey, the semantic technology challenges in the IoT domain are amalgamated to provide background for further studies in the use of semantic technologies in the IoT.

  14. Freeform Compliant CMOS Electronic Systems for Internet of Everything Applications

    KAUST Repository

    Shaikh, Sohail F.

    2017-01-17

    The state-of-the-art electronics technology has been an integral part of modern advances. The prevalent rise of the mobile device and computational technology in the age of information technology offers exciting applications that are attributed to sophisticated, enormously reliable, and most mature CMOS-based electronics. We are accustomed to high performance, cost-effective, multifunctional, and energy-efficient scaled electronics. However, they are rigid, bulky, and brittle. The convolution of flexibility and stretchability in electronics for emerging Internet of Everything application can unleash smart application horizon in unexplored areas, such as robotics, healthcare, smart cities, transport, and entertainment systems. While flexible and stretchable device themes are being remarkably chased, the realization of the fully compliant electronic system is unaddressed. Integration of data processing, storage, communication, and energy management devices complements a compliant system. Here, a comprehensive review is presented on necessity and design criteria for freeform (physically flexible and stretchable) compliant high-performance CMOS electronic systems.

  15. STUDY ON GEOGRAPHY STUDENTS’ INTERNET USE

    Directory of Open Access Journals (Sweden)

    MARIA ELIZA DULAMĂ

    2015-01-01

    Full Text Available In this study we analyze the behavior of a sample of 30 third-year students of various majors of the Faculty of Geography, “Babeş-Bolyai” University of ClujNapoca, Romania, regarding the Internet use. We applied a questionnaire containing 15 items related to: Internet activities performed; length of time students spend on the Internet; devices used to access the Internet; types of materials that students downloaded, read, viewed, forwarded or posted on the Internet; types of applications used. Taking into account the time students spent daily on the Internet and correlated with other responses we concluded that their concerns were closely related to the Internet, whether it was about communication, career, or personal life.

  16. EBLAST: an efficient high-compression image transformation 3. application to Internet image and video transmission

    Science.gov (United States)

    Schmalz, Mark S.; Ritter, Gerhard X.; Caimi, Frank M.

    2001-12-01

    A wide variety of digital image compression transforms developed for still imaging and broadcast video transmission are unsuitable for Internet video applications due to insufficient compression ratio, poor reconstruction fidelity, or excessive computational requirements. Examples include hierarchical transforms that require all, or large portion of, a source image to reside in memory at one time, transforms that induce significant locking effect at operationally salient compression ratios, and algorithms that require large amounts of floating-point computation. The latter constraint holds especially for video compression by small mobile imaging devices for transmission to, and compression on, platforms such as palmtop computers or personal digital assistants (PDAs). As Internet video requirements for frame rate and resolution increase to produce more detailed, less discontinuous motion sequences, a new class of compression transforms will be needed, especially for small memory models and displays such as those found on PDAs. In this, the third series of papers, we discuss the EBLAST compression transform and its application to Internet communication. Leading transforms for compression of Internet video and still imagery are reviewed and analyzed, including GIF, JPEG, AWIC (wavelet-based), wavelet packets, and SPIHT, whose performance is compared with EBLAST. Performance analysis criteria include time and space complexity and quality of the decompressed image. The latter is determined by rate-distortion data obtained from a database of realistic test images. Discussion also includes issues such as robustness of the compressed format to channel noise. EBLAST has been shown to perform superiorly to JPEG and, unlike current wavelet compression transforms, supports fast implementation on embedded processors with small memory models.

  17. A Comprehensive Study on the Internet of Underwater Things: Applications, Challenges, and Channel Models.

    Science.gov (United States)

    Kao, Chien-Chi; Lin, Yi-Shan; Wu, Geng-De; Huang, Chun-Ju

    2017-06-22

    The Internet of Underwater Things (IoUT) is a novel class of Internet of Things (IoT), and is defined as the network of smart interconnected underwater objects. IoUT is expected to enable various practical applications, such as environmental monitoring, underwater exploration, and disaster prevention. With these applications, IoUT is regarded as one of the potential technologies toward developing smart cities. To support the concept of IoUT, Underwater Wireless Sensor Networks (UWSNs) have emerged as a promising network system. UWSNs are different from the traditional Territorial Wireless Sensor Networks (TWSNs), and have several unique properties, such as long propagation delay, narrow bandwidth, and low reliability. These unique properties would be great challenges for IoUT. In this paper, we provide a comprehensive study of IoUT, and the main contributions of this paper are threefold: (1) we introduce and classify the practical underwater applications that can highlight the importance of IoUT; (2) we point out the differences between UWSNs and traditional TWSNs, and these differences are the main challenges for IoUT; and (3) we investigate and evaluate the channel models, which are the technical core for designing reliable communication protocols on IoUT.

  18. Improving the Security of Internet Banking Applications by Using Multimodal Biometrics

    Directory of Open Access Journals (Sweden)

    Cătălin Lupu

    2015-03-01

    Full Text Available Online banking applications are used by more and more people all over the world. Most of the banks are providing these services to their customers. The authentication methods varies from the basic user and password to username and a onetime password (OTP generated by a virtual or a physical digipass. The common thing among authentication methods is that the login wepage is provided through a secure channel. Some banks have introduced (especially for testing purposes the authentication using common biometric characteristics, like fingerprint, voice or keystroke recognition. This paper will present some of the most common online banking authentication methods, together with basic biometric characteristics that could be used in these applications. The security in internet banking applications can be improved by using biometrics for the authentication process. Also, the authors have developed an application for authentication of users using fingerprint as the main characteristic, which will be presented at the end of this paper.

  19. A Middleware with Comprehensive Quality of Context Support for the Internet of Things Applications.

    Science.gov (United States)

    Gomes, Berto de Tácio Pereira; Muniz, Luiz Carlos Melo; da Silva E Silva, Francisco José; Dos Santos, Davi Viana; Lopes, Rafael Fernandes; Coutinho, Luciano Reis; Carvalho, Felipe Oliveira; Endler, Markus

    2017-12-08

    Context aware systems are able to adapt their behavior according to the environment in which the user is. They can be integrated into an Internet of Things (IoT) infrastructure, allowing a better perception of the user's physical environment by collecting context data from sensors embedded in devices known as smart objects. An IoT extension called the Internet of Mobile Things (IoMT) suggests new scenarios in which smart objects and IoT gateways can move autonomously or be moved easily. In a comprehensive view, Quality of Context (QoC) is a term that can express quality requirements of context aware applications. These requirements can be those related to the quality of information provided by the sensors (e.g., accuracy, resolution, age, validity time) or those referring to the quality of the data distribution service (e.g, reliability, delay, delivery time). Some functionalities of context aware applications and/or decision-making processes of these applications and their users depend on the level of quality of context available, which tend to vary over time for various reasons. Reviewing the literature, it is possible to verify that the quality of context support provided by IoT-oriented middleware systems still has limitations in relation to at least four relevant aspects: (i) quality of context provisioning; (ii) quality of context monitoring; (iii) support for heterogeneous device and technology management; (iv) support for reliable data delivery in mobility scenarios. This paper presents two main contributions: (i) a state-of-the-art survey specifically aimed at analyzing the middleware with quality of context support and; (ii) a new middleware with comprehensive quality of context support for Internet of Things Applications. The proposed middleware was evaluated and the results are presented and discussed in this article, which also shows a case study involving the development of a mobile remote patient monitoring application that was developed using the

  20. The Internet of things connecting objects

    CERN Document Server

    Chaouchi, Hakima

    2013-01-01

    Internet of Things: Connecting Objects… puts forward the technologies and the networking architectures which make it possible to support the Internet of Things. Amongst these technologies, RFID, sensor and PLC technologies are described and a clear view on how they enable the Internet of Things is given. This book also provides a good overview of the main issues facing the Internet of Things such as the issues of privacy and security, application and usage, and standardization.

  1. Cue-induced Behavioral and Neural Changes among Excessive Internet Gamers and Possible Application of Cue Exposure Therapy to Internet Gaming Disorder

    Directory of Open Access Journals (Sweden)

    Yongjun eZhang

    2016-05-01

    Full Text Available Internet gaming disorder (IGD may lead to many negative consequences in everyday life, yet there is currently no effective treatment for IGD. Cue-reactivity paradigm is commonly used to evaluate craving for substance, food, and gambling; cue exposure therapy (CET is applied to treating substance use disorders (SUDs and some other psychological disorders such as pathological gambling (PG. However, no study has explored CET’s application to the treatment of IGD except two articles having implied that cues’ exposure may have therapeutic effect on IGD. This paper reviews studies on cue-induced behavioral and neural changes in excessive Internet gamers, indicating that behavioral and neural mechanisms of IGD mostly overlap with those of SUD. The CET’s effects in the treatment of SUDs and PG are also reviewed. We finally propose an optimized CET paradigm, which future studies should consider and investigate as a probable treatment of IGD.

  2. Cue-induced Behavioral and Neural Changes among Excessive Internet Gamers and Possible Application of Cue Exposure Therapy to Internet Gaming Disorder.

    Science.gov (United States)

    Zhang, Yongjun; Ndasauka, Yamikani; Hou, Juan; Chen, Jiawen; Yang, Li Zhuang; Wang, Ying; Han, Long; Bu, Junjie; Zhang, Peng; Zhou, Yifeng; Zhang, Xiaochu

    2016-01-01

    Internet gaming disorder (IGD) may lead to many negative consequences in everyday life, yet there is currently no effective treatment for IGD. Cue-reactivity paradigm is commonly used to evaluate craving for substance, food, and gambling; cue exposure therapy (CET) is applied to treating substance use disorders (SUDs) and some other psychological disorders such as pathological gambling (PG). However, no study has explored CET's application to the treatment of IGD except two articles having implied that cues' exposure may have therapeutic effect on IGD. This paper reviews studies on cue-induced behavioral and neural changes in excessive Internet gamers, indicating that behavioral and neural mechanisms of IGD mostly overlap with those of SUD. The CET's effects in the treatment of SUDs and PG are also reviewed. We finally propose an optimized CET paradigm, which future studies should consider and investigate as a probable treatment of IGD.

  3. Enhancing prospective chemistry teachers cognitive structures in the topics of bonding and hybridization by internet-assisted chemistry applications

    Directory of Open Access Journals (Sweden)

    Özge Özyalçın Oskay, Sinem Dinçol

    2011-08-01

    Full Text Available The purpose of this study is to determine the effects of internet-assisted chemistry applications on prospective chemistry teachers’ cognitive structures in the topics of bonding and hybridization. The sample of the study consisted of 36 prospective chemistry teachers attending Hacettepe University, Faculty of Education, the Department of Chemistry Education in 2010-2011 academic year and taking Basic Chemistry I lesson. In the study, students were separated into experimental and control groups according to their pre-cognitive structures. Students were requested to answer two open ended questions. Answers by each student were gathered and evaluated by flow map method. “Bonding and hybridization” topics were taught to control group with traditional teaching method and to experimental group besides traditional method internet-assisted applications were conducted. The same open-ended questions were given to both groups and their cognitive structures were examined once more. The differences between control and experimental groups’ cognitive structures were examined. A significant difference was identified in favour of experimental group (p<0, 05. The mean score of the Experimental group was X=19.94, and the mean score of the Control group was X=13.88. In addition, subsequent to internet assisted chemistry applications differences in terms of concepts and descriptions in prospective chemistry teachers’ in experimental and control group cognitive structure have been determined. When post flow maps of prospective chemistry teachers in experimental group, on whom internet assisted chemistry applications were made, are formed, it has been determined that there are more statements about hybridization, hybridization types, molecule geometry and bond angles compared to control grou

  4. Internet: Education and Application for the Knowledge Warrior

    Science.gov (United States)

    1995-05-01

    Demonstrate the ability to execute basic Telnet and FTP actions on the seminar computer . INTERNET / INFORMATION TECHNOLOGY (IT) COURSE OBJECTIVES: 1...and FTP actions on the seminar computer . INTERNET / INFORMATION TECHNOLOGY (IT) COURSE OBJECTIVES: 1. Comprehend the concept and capabilities of...have information on demand for future conflicts.9 As computer and telecommunications technologies continue to expand, they are redefining the way

  5. Affordable and Scalable Manufacturing of Wearable Multi-Functional Sensory “Skin” for Internet of Everything Applications

    KAUST Repository

    Nassar, Joanna M.

    2017-01-01

    Demand for wearable electronics is expected to at least triple by 2020, embracing all sorts of Internet of Everything (IoE) applications, such as activity tracking, environmental mapping, and advanced healthcare monitoring, in the purpose

  6. The internet of things and the development of network technology in China

    Science.gov (United States)

    Wang, Ruxin; Zhao, Jianzhen; Ma, Hangtong

    2018-04-01

    The English name of the Internet of Things the Internet of Things, referred to as: the IOT. Internet of Things through the pass, radio frequency identification technology, global positioning system technology, real-time acquisition of any monitoring, connectivity, interactive objects or processes, collecting their sound, light, heat, electricity, mechanics, chemistry, biology, the location of a variety of the information you need network access through a variety of possible things and things, objects and people in the Pan-link intelligent perception of items and processes, identification and management. The Internet of Things IntelliSense recognition technology and pervasive computing, ubiquitous network integration application, known as the third wave of the world's information industry development following the computer, the Internet. Not so much the Internet of Things is a network, as Internet of Things services and applications, Internet of Things is also seen as Internet application development. Therefore, the application of innovation is the core of the development of Internet of Things, and 2.0 of the user experience as the core innovation is the soul of Things.

  7. Internet-Communication Disorder: It's a Matter of Social Aspects, Coping, and Internet-Use Expectancies.

    Science.gov (United States)

    Wegmann, Elisa; Brand, Matthias

    2016-01-01

    Online communication applications such as Facebook, WhatsApp, and Twitter are some of the most frequently used Internet applications. There is a growing amount of individuals suffering diminished control over their use of online communication applications which leads to diverse negative consequences in offline life. This could be referred to as Internet-communication disorder (ICD). The current study investigates the role of individual characteristics (e.g., psychopathological symptoms, feelings of loneliness) and specific cognitions. In a sample of 485 participants a structural equation model was tested to investigate predictors and mediators which may predict an excessive use. The results emphasize that a higher level of social loneliness and less perceived social support enhance the risk of a pathological use. The effects of psychopathological symptoms (depression and social anxiety) as well as individual characteristics (self-esteem, self-efficacy, and stress vulnerability) on ICD symptoms are mediated by Internet-use expectancies and dysfunctional coping mechanisms. The results illustrate mediation effects which are in line with the theoretical model by Brand et al. (2016). As suggested in the model social aspects seem to be key predictors of ICD symptoms. Further research should investigate convergent and divergent factors of other types of specific Internet-use disorders.

  8. Internet-Communication Disorder: It's a Matter of Social Aspects, Coping, and Internet-Use Expectancies

    Science.gov (United States)

    Wegmann, Elisa; Brand, Matthias

    2016-01-01

    Online communication applications such as Facebook, WhatsApp, and Twitter are some of the most frequently used Internet applications. There is a growing amount of individuals suffering diminished control over their use of online communication applications which leads to diverse negative consequences in offline life. This could be referred to as Internet-communication disorder (ICD). The current study investigates the role of individual characteristics (e.g., psychopathological symptoms, feelings of loneliness) and specific cognitions. In a sample of 485 participants a structural equation model was tested to investigate predictors and mediators which may predict an excessive use. The results emphasize that a higher level of social loneliness and less perceived social support enhance the risk of a pathological use. The effects of psychopathological symptoms (depression and social anxiety) as well as individual characteristics (self-esteem, self-efficacy, and stress vulnerability) on ICD symptoms are mediated by Internet-use expectancies and dysfunctional coping mechanisms. The results illustrate mediation effects which are in line with the theoretical model by Brand et al. (2016). As suggested in the model social aspects seem to be key predictors of ICD symptoms. Further research should investigate convergent and divergent factors of other types of specific Internet-use disorders. PMID:27891107

  9. Internet of things

    OpenAIRE

    Salazar Soler, Jorge; Silvestre Bergés, Santiago

    2015-01-01

    This is an introductory course to the IoT (Internet of things). In the early chapters the basics about the IoT are introduced. Then basics of IPv6 internet protocol that is the most used in IoT environment as well as main applications, the current state of the market and the technologies that enable the existence of the IoT are described. Finally the future challenges that are considered most important are discussed. Peer Reviewed

  10. PELUANG DAN STRATEGI PENJUALAN MELALUI INTERNET MARKETING

    Directory of Open Access Journals (Sweden)

    Munawaroh

    2011-08-01

    Full Text Available The purpose of this journal is to mention of how the opportunity of Internet marketing and the strategy of selling via Internet marketing, The community of Indonesian now become the potential buyer because more than 30 million users of Internet in Indonesia now. So that, this is the challenge for us to make the business based on e-commerce and application the strategy of selling via Internet marketing.

  11. An application of TOPSIS for ranking internet web browsers

    Directory of Open Access Journals (Sweden)

    Shahram Rostampour

    2012-07-01

    Full Text Available Web browser is one of the most important internet facilities for surfing the internet. A good web browser must incorporate literally tens of features such as integrated search engine, automatic updates, etc. Each year, ten web browsers are formally introduced as top best reviewers by some organizations. In this paper, we propose the implementation of TOPSIS technique to rank ten web browsers. The proposed model of this paper uses five criteria including speed, features, security, technical support and supported configurations. In terms of speed, Safari is the best web reviewer followed by Google Chrome and Internet Explorer while Opera is the best web reviewer when we look into 20 different features. We have also ranked these web browsers using all five categories together and the results indicate that Opera, Internet explorer, Firefox and Google Chrome are the best web browsers to be chosen.

  12. Innovative Second Language Speaking Practice with Interactive Videos in a Rich Internet Application Environment

    Science.gov (United States)

    Pereira, Juan A.; Sanz-Santamaría, Silvia; Montero, Raúl; Gutiérrez, Julián

    2012-01-01

    Attaining a satisfactory level of oral communication in a second language is a laborious process. In this action research paper we describe a new method applied through the use of interactive videos and the Babelium Project Rich Internet Application (RIA), which allows students to practice speaking skills through a variety of exercises. We present…

  13. A Comprehensive Study on the Internet of Underwater Things: Applications, Challenges, and Channel Models

    Directory of Open Access Journals (Sweden)

    Chien-Chi Kao

    2017-06-01

    Full Text Available The Internet of Underwater Things (IoUT is a novel class of Internet of Things (IoT, and is defined as the network of smart interconnected underwater objects. IoUT is expected to enable various practical applications, such as environmental monitoring, underwater exploration, and disaster prevention. With these applications, IoUT is regarded as one of the potential technologies toward developing smart cities. To support the concept of IoUT, Underwater Wireless Sensor Networks (UWSNs have emerged as a promising network system. UWSNs are different from the traditional Territorial Wireless Sensor Networks (TWSNs, and have several unique properties, such as long propagation delay, narrow bandwidth, and low reliability. These unique properties would be great challenges for IoUT. In this paper, we provide a comprehensive study of IoUT, and the main contributions of this paper are threefold: (1 we introduce and classify the practical underwater applications that can highlight the importance of IoUT; (2 we point out the differences between UWSNs and traditional TWSNs, and these differences are the main challenges for IoUT; and (3 we investigate and evaluate the channel models, which are the technical core for designing reliable communication protocols on IoUT.

  14. Internet Sexualities

    Science.gov (United States)

    Döring, Nicola

    The term “internet sexuality” (or OSA, online sexual activities) refers to sexual-related content and activities observable on the internet (cf. Adams, Oye, & Parker, 2003; Cooper, McLoughlin, & Campbell, 2000; Leiblum & Döring, 2002). It designates a variety of sexual phenomena (e.g., pornography, sex education, sexual contacts) related to a wide spectrum of online services and applications (e.g., websites, online chat rooms, peer-to-peer networks). If an even broader range of computer networks - such as the Usenet or bulletin board systems - is included in this extensional definition, one speaks of “online sexuality” or “cybersexuality.”

  15. Internet technologies and information services

    CERN Document Server

    Miller, Joseph

    2014-01-01

    Internet Technologies and Information Services: Second Edition is a vital asset to students preparing for careers in library and information science and provides expanded coverage to important new developments while still covering Internet foundations. In addition to networking, the Internet, HTML, web design, web programming, XML, and web searching, this new edition covers additional topics such as cloud computing, content management systems, eBook technologies, mobile technologies and applications, relational database management systems (RDMS), open source software, and virtual priva

  16. The application of the Internet of Things and Physical Internet in Norwegian aquaculture supply chains

    OpenAIRE

    Ødegaard, Andreas; Dåvøy, Simon

    2016-01-01

    Master's thesis in Strategy and Management The topic for this master thesis is Supply Chain Management within the Norwegian aquaculture industry. The thesis aims to examine how the industry can make use of aspects within the Internet of Things and Physical Internet in order to improve their supply chains. Moreover, the thesis identifies and defines three main factors affecting the customers purchasing decision; namely quality, time, and price. These factors are interconnected, and inf...

  17. CMOS-Technology-Enabled Flexible and Stretchable Electronics for Internet of Everything Applications

    KAUST Repository

    Hussain, Aftab M.

    2015-11-26

    Flexible and stretchable electronics can dramatically enhance the application of electronics for the emerging Internet of Everything applications where people, processes, data and devices will be integrated and connected, to augment quality of life. Using naturally flexible and stretchable polymeric substrates in combination with emerging organic and molecular materials, nanowires, nanoribbons, nanotubes, and 2D atomic crystal structured materials, significant progress has been made in the general area of such electronics. However, high volume manufacturing, reliability and performance per cost remain elusive goals for wide commercialization of these electronics. On the other hand, highly sophisticated but extremely reliable, batch-fabrication-capable and mature complementary metal oxide semiconductor (CMOS)-based technology has facilitated tremendous growth of today\\'s digital world using thin-film-based electronics; in particular, bulk monocrystalline silicon (100) which is used in most of the electronics existing today. However, one fundamental challenge is that state-of-the-art CMOS electronics are physically rigid and brittle. Therefore, in this work, how CMOS-technology-enabled flexible and stretchable electronics can be developed is discussed, with particular focus on bulk monocrystalline silicon (100). A comprehensive information base to realistically devise an integration strategy by rational design of materials, devices and processes for Internet of Everything electronics is offered. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  18. Trust-based Service Management of Internet of Things Systems and Its Applications

    OpenAIRE

    Guo, Jia

    2018-01-01

    A future Internet of Things (IoT) system will consist of a huge quantity of heterogeneous IoT devices, each capable of providing services upon request. It is of utmost importance for an IoT device to know if another IoT service is trustworthy when requesting it to provide a service. In this dissertation research, we develop trust-based service management techniques applicable to distributed, centralized, and hybrid IoT environments. For distributed IoT systems, we develop a trust protocol...

  19. User Requirements for Internet Of Things (IoT) Applications : An Observational study

    OpenAIRE

    Namirimu, Victoria

    2015-01-01

    Context. Internet of Things (IoT) is a new trending phase of technology. IoT refers to communication and connectivity between things such as technological devices, actuators, sensors, and people or processes with unique identifiers. The importance of IoT is to improve the daily living standards of an average user. IoT is made for the people and used by the people for many reasons such as improved health, business innovations, and personal health trackers. Examples of IoT applications and serv...

  20. Internet of Things Applications on Supply Chain Management

    OpenAIRE

    B. Cortés; A. Boza; D. Pérez; L. Cuenca

    2015-01-01

    The Internet of Things (IoT) field has been applied in industries with different purposes. Sensing Enterprise (SE) is an attribute of an enterprise or a network that allows it to react to business stimuli originating on the Internet. These fields have come into focus recently on the enterprises, and there is some evidence of the use and implications in supply chain management, while finding it as an interesting aspect to work on. This paper presents a revision and proposa...

  1. Internet of Things Technology and its Applications in Smart Grid

    OpenAIRE

    Liu Hua; Zhang Junguo; Lin Fantao

    2013-01-01

    Smart grid is the latest trend of development and reform in today’s world, and it is also a major technological innovation and development trend in the 21st century. Internet of Things technology is a new information processing and acquisition method, and it has been widely used in intelligent transportation, environmental monitoring and other fields. Internet of Things is an important technical mean to promote the development of smart grid. Using Internet of Things technology can effectively...

  2. Internet Alternatifs

    OpenAIRE

    Dulong de Rosnay , Melanie; Musiani , Francesca

    2015-01-01

    International audience; L'Internet est constitué de différents éléments et couches, qui peuvent être développés, façonnés et organisés de plusieurs manières : le réseau, l'hébergement, les applications, la connexion locale, les contenus. Si le concept de décentralisation est en quelque sorte inscrit dans le principe même de l'Internet – et notamment dans l'organisation de la circulation des flux – son urbanisme actuel semble n'intégrer ce principe que de manière limitée, et certains des risqu...

  3. Development of a Mobile Application for People with Panic Disorder as augmentation for an Internet-based Intervention

    OpenAIRE

    Kleine Stegemann, Stefan; Ebenfeld, Lara; Lehr, Dirk; Berking, Matthias; Funk, Burkhardt

    2013-01-01

    Smartphone technology has recently gained attention in the field of E-Mental Health research and mobile applications for measuring health-related aspects as well as mobile mental health interventions have emerged. However, little work has been done on leveraging mobile technology in combination with internet-based interventions. We argue, that mobile applications can not only enrich mental health treatments but also foster the commercial success of E-Mental Health applications. To this end, w...

  4. Scalable Multicasting over Next-Generation Internet Design, Analysis and Applications

    CERN Document Server

    Tian, Xiaohua

    2013-01-01

    Next-generation Internet providers face high expectations, as contemporary users worldwide expect high-quality multimedia functionality in a landscape of ever-expanding network applications. This volume explores the critical research issue of turning today’s greatly enhanced hardware capacity to good use in designing a scalable multicast  protocol for supporting large-scale multimedia services. Linking new hardware to improved performance in the Internet’s next incarnation is a research hot-spot in the computer communications field.   The methodical presentation deals with the key questions in turn: from the mechanics of multicast protocols to current state-of-the-art designs, and from methods of theoretical analysis of these protocols to applying them in the ns2 network simulator, known for being hard to extend. The authors’ years of research in the field inform this thorough treatment, which covers details such as applying AOM (application-oriented multicast) protocol to IPTV provision and resolving...

  5. Security Challenges of the Internet of Things

    OpenAIRE

    Goeke, Lisa

    2017-01-01

    The ‘Internet of Things’ is the buzz phrase that describes a new era of computation. Briefly, the Internet of Things can be defined as the interaction of smart objects that are connected to the Internet. These objects can sense, share and process information, upload them in the cloud, and make them available to the user via a large amount of different applications. Despite all of these promising innovations, the Internet of Things, as every other technology, faces multiple security...

  6. Playing with the internet through world wide web

    International Nuclear Information System (INIS)

    Kim, Seon Tae; Jang, Jin Seok

    1995-07-01

    This book describes how to use the internet with world wide web. It is divided into six chapters, which are Let's go to the internet ocean, the internet in information superhighway are, connecting the world with a telephone wire such as link with the internet cable and telephone modem, internet service providers, text mode connection, Domain and IP address, the principle and use of world wide web ; business, music, fashion, movie and photo, internet news and e-mail, making internet map with web language, and from installation to application of base program such as TCP/IP, SLIP/PPP 3270 Emulator, Finger and NCSA Mosaic.

  7. A series of studies examining Internet treatment of obesity to inform Internet interventions for substance use and misuse.

    Science.gov (United States)

    Tate, Deborah F

    2011-01-01

    The feasibility and efficacy of Internet treatment programs for overweight and obese people have been demonstrated in a series of randomized trials. Initial studies examined various approaches to Internet behavioral treatment. Other studies have examined delivery of group behavioral counseling using Internet chat rooms, using the Internet for long-term maintenance of weight loss, and enhancing motivation in Internet programs. These interventions have produced weight losses of 4-7 kg over 6 months to 1 year when support via e-mail, automated messages, or chat rooms is provided. Outcomes and lessons learned with application to the treatment of substance use and misuse are provided.

  8. Radiology and the internet, basic principles and technical requirements

    International Nuclear Information System (INIS)

    Boegl, K.

    2000-01-01

    As a new communication media the Internet has revolutionized the global exchange of information which is one of the major sources of progress in medicine. This article reviews the history of the Internet's evolution and describes some fundamental technical concepts. The importance of Internet services for everyday professional work is examined with special consideration of radiology. Special emphasis is laid on the current technical limitations that have delayed a broad practical implementation of tele-medical applications. As a highly innovative medical speciality, radiology has always been at the forefront of research and development in the field of clinical Internet applications. By taking a look at recent innovations, the impact of the Internet on the radiologist's working environment of the future is highlighted. (orig.) [de

  9. 77 FR 1039 - Internet-Based Telecommunications Relay Service Numbering

    Science.gov (United States)

    2012-01-09

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 [WC Docket No. 10-191; Report No. 2939] Internet... toll-free numbers by users of Internet- based Telecommunications Relay Services (iTRS). DATES... any rules of particular applicability. Subject: Internet-Based Telecommunications Relay Service...

  10. Extending the Internet of Things to the Future Internet Through IPv6 Support

    Directory of Open Access Journals (Sweden)

    Antonio J. Jara

    2014-01-01

    Full Text Available Emerging Internet of Things (IoT/Machine-to-Machine (M2M systems require a transparent access to information and services through a seamless integration into the Future Internet. This integration exploits infrastructure and services found on the Internet by the IoT. On the one hand, the so-called Web of Things aims for direct Web connectivity by pushing its technology down to devices and smart things. On the other hand, the current and Future Internet offer stable, scalable, extensive, and tested protocols for node and service discovery, mobility, security, and auto-configuration, which are also required for the IoT. In order to integrate the IoT into the Internet, this work adapts, extends, and bridges using IPv6 the existing IoT building blocks (such as solutions from IEEE 802.15.4, BT-LE, RFID while maintaining backwards compatibility with legacy networked embedded systems from building and industrial automation. Specifically, this work presents an extended Internet stack with a set of adaptation layers from non-IP towards the IPv6-based network layer in order to enable homogeneous access for applications and services.

  11. Peer attachment, specific patterns of internet use and problematic internet use in male and female adolescents.

    Science.gov (United States)

    Reiner, Iris; Tibubos, Ana N; Hardt, Jochen; Müller, Kai; Wölfling, Klaus; Beutel, Manfred E

    2017-10-01

    Problematic internet use may lead to serious psychosocial dysfunction. Recent studies have found comparable prevalence in both male and female adolescents. We pursue the neglected questions how male and female adolescents differ regarding their patterns of internet use and how gender, peer attachment and patterns of use are related to pathological internet use. In 2410 adolescents (1307 girls and 1103 boys) aged 12-18 years from different types of school we assessed peer attachment, frequency and use of eight specific applications and indicators of pathological internet use. Three patterns of internet use, 'social'; 'sex and games" and 'functional' were identified and connections between variables were modeled by ordered sequences of regression. We found that problematic internet use-sex and games as well as social usage-was more prevalent in boys. Insecure peer attachment predicted problematic internet use in both sexes. Also, excessive usage of internet games and sex mediated the influence of peer attachment insecurity on problematic internet use, but only for boys. Our study identified that adolescents with insecure peer attachment are at higher risk for problematic internet use. With regard to specific types of internet use, the consumption of online games and sex was identified as risk factor in boys with increasing age. Further studies are needed to understand and possibly subgroup problematic internet use behavior in girls. Our findings suggest that increasing the quality of peer relationships may be promising approach in the prevention and treatment of problematic internet use.

  12. NET-COMPUTER: Internet Computer Architecture and its Application in E-Commerce

    Directory of Open Access Journals (Sweden)

    P. O. Umenne

    2012-12-01

    Full Text Available Research in Intelligent Agents has yielded interesting results, some of which have been translated into commer­cial ventures. Intelligent Agents are executable software components that represent the user, perform tasks on behalf of the user and when the task terminates, the Agents send the result to the user. Intelligent Agents are best suited for the Internet: a collection of computers connected together in a world-wide computer network. Swarm and HYDRA computer architectures for Agents’ execution were developed at the University of Surrey, UK in the 90s. The objective of the research was to develop a software-based computer architecture on which Agents execution could be explored. The combination of Intelligent Agents and HYDRA computer architecture gave rise to a new computer concept: the NET-Computer in which the comput­ing resources reside on the Internet. The Internet computers form the hardware and software resources, and the user is provided with a simple interface to access the Internet and run user tasks. The Agents autonomously roam the Internet (NET-Computer executing the tasks. A growing segment of the Internet is E-Commerce for online shopping for products and services. The Internet computing resources provide a marketplace for product suppliers and consumers alike. Consumers are looking for suppliers selling products and services, while suppliers are looking for buyers. Searching the vast amount of information available on the Internet causes a great deal of problems for both consumers and suppliers. Intelligent Agents executing on the NET-Computer can surf through the Internet and select specific information of interest to the user. The simulation results show that Intelligent Agents executing HYDRA computer architecture could be applied in E-Commerce.

  13. Gender, internet experience, Internet identification, and internet anxiety: a ten-year followup.

    Science.gov (United States)

    Joiner, Richard; Gavin, Jeff; Brosnan, Mark; Cromby, John; Gregory, Helen; Guiller, Jane; Maras, Pam; Moon, Amy

    2012-07-01

    In 2002, we found gender differences in the use of the Internet. Since then, however, the Internet has changed considerably. We therefore conducted a follow-up study in 2012. The study involved 501 students (389 females and 100 males, 12 participants unspecified gender) and we measured Internet use, Internet anxiety, and Internet identification. We found that males had a greater breadth of Internet use; they used the Internet more for games and entertainment than females. The differentiation between males and females in terms of Internet use is evident, and in some ways is even more distinct than 10 years ago. In our previous research we had found no gender differences in the use of the Internet for communication, whereas in the current study we have found that females use the Internet for communication than males and were using social network sites more than males. We also found, consistent with our previous study, that Internet identification and Internet anxiety were related to Internet use.

  14. Kid's Privacy on the Internet : Collecting Children's Personal Data on the Internet and the Protection of Privacy

    NARCIS (Netherlands)

    Nouwt, J.

    2002-01-01

    The children of today are growing up with the Internet. At the same time, there is a lot of uncertainty and ignorance about collecting personal data from children on the Internet, for example for direct marketing purposes. There is also much uncertainty and ignorance about the applicability of data

  15. Internet pricing: una breve rassegna critica (Internet Pricing: A Short Critical Survey

    Directory of Open Access Journals (Sweden)

    Claudio Sardoni

    2001-03-01

    Full Text Available In the article, some recent literature on Internet pricing is surveyed. The author looks at the topic by setting it in the more general framework of the analysis of activities that can be regarded as similar to Internet from the technological and economic point of view. In particular, attention is focused on the problem of the divergence between private and social costs when there occurs network congestion and the problem of efficient prices in activities characterized by the existence of peak-loads. The author argues that dealing with such issues in the context of Internet cannot be reduced to a straightforward application of traditional results of welfare economics and the literature on peak-load pricing. In a competitive market with similar features to the market for Internet services, it is well possible that there do not exist incentives that induce firms to adopt price systems such as to prevent and/or eliminate congestion. Further theoretical and analytical developments are then in order.

  16. Internet use in rheumatology outpatients in 2006: gender less important.

    Science.gov (United States)

    Richter, J G; Becker, A; Koch, T; Nixdorf, M; Schacher, B; Monser, R; Specker, C; Alten, R; Schneider, M

    2009-01-01

    Exploring patients' Internet use, their online needs and requirements, expectations and attitudes towards the Internet is mandatory to effectively provide interactive online applications and information. Within a prospective study, 153 consecutive outpatients with rheumatoid arthritis, systemic lupus erythematosus or spondyloarthritis answered a paper-based questionnaire investigating their Internet use, interests, pattern and degree of utilization. Sociodemographic and functional disability data were collected. The data were compared with our survey of 2001 and to the normal German population. Patients were predominantly female (69.3%; n.s.). Mean age was 45.7+/-14.4 years (n.s.). 68.6% (+18.6%, p=0.0027) reported regular Internet use for 5.0+/-2.6 yrs. Internet use in 2006 is still age- and education-dependent (pInternet use from 2.9 to 6.1 hours/week (p=0.001, p=0.0006). Searching for health-related information remained an important topic. Interest in e-communication and interactive applications strongly increased. Independently of gender and functional disability, patients' future online interests focussed on information on diseases, medications, health care providers and patient education. Confidence in the Internet and reliability of information were rated unchanged since 2001. Gender no longer has significant impact on Internet use. The great potentials of Internet services-well accepted by patients and contributing substantially to more effective and improved disease (self-) management strategies-should encourage rheumatologists to provide interactive applications and high-quality information on Internet platforms and in routine patient care. Continuous research to explore the effects of Internet-delivered information on patients' attitudes,expectations, behaviour and outcome is required.

  17. Mobile internet technologies and their application to intelligent transportation systems

    Science.gov (United States)

    2003-01-01

    The worlds of mobile communication and the Internet are rapidly converging. This new domain, which is being touted as the "Wireless Web" or "Mobile Internet", is in its infancy and will require a number of complex technologies to mature and converge ...

  18. Addictive use of social networking sites can be explained by the interaction of Internet use expectancies, Internet literacy, and psychopathological symptoms

    Science.gov (United States)

    Wegmann, Elisa; Stodt, Benjamin; Brand, Matthias

    2015-01-01

    Background and Aims Most people use the Internet in a functional way to achieve certain goals and needs. However, there is an increasing number of people who experience negative consequences like loss of control and distress based on an excessive use of the Internet and its specific online applications. Some approaches postulate similarities with behavioral addictions as well as substance dependencies. They differentiate between a generalized and a specific Internet addiction, such as the pathological use of social networking sites (SIA–SNS). Prior studies particularly identified the use of applications, personal characteristics, and psychopathological symptoms as significant predictors for the development and maintenance of this phenomenon. So far, it remains unclear how psychopathological symptoms like depression and social anxiety interact with individual expectancies of Internet use and capabilities of handling the Internet, summarized as Internet literacy. Methods The current study (N = 334) investigated the interaction of these components in a structural equation model. Results The results indicate that the effects of depression and social anxiety on SIA–SNS were mediated by Internet use expectancies and self-regulation. Discussion Thus, Internet use expectancies seem to be crucial for SIA–SNS, which is in line with prior models. Conclusions SNS use may be reinforced by experienced gratification and relief from negative feelings. Individual competences in handling the Internet may be preventive for the development of SIA–SNS. PMID:26551905

  19. Addictive use of social networking sites can be explained by the interaction of Internet use expectancies, Internet literacy, and psychopathological symptoms.

    Science.gov (United States)

    Wegmann, Elisa; Stodt, Benjamin; Brand, Matthias

    2015-09-01

    Most people use the Internet in a functional way to achieve certain goals and needs. However, there is an increasing number of people who experience negative consequences like loss of control and distress based on an excessive use of the Internet and its specific online applications. Some approaches postulate similarities with behavioral addictions as well as substance dependencies. They differentiate between a generalized and a specific Internet addiction, such as the pathological use of social networking sites (SIA-SNS). Prior studies particularly identified the use of applications, personal characteristics, and psychopathological symptoms as significant predictors for the development and maintenance of this phenomenon. So far, it remains unclear how psychopathological symptoms like depression and social anxiety interact with individual expectancies of Internet use and capabilities of handling the Internet, summarized as Internet literacy. The current study (N = 334) investigated the interaction of these components in a structural equation model. The results indicate that the effects of depression and social anxiety on SIA-SNS were mediated by Internet use expectancies and self-regulation. Thus, Internet use expectancies seem to be crucial for SIA-SNS, which is in line with prior models. SNS use may be reinforced by experienced gratification and relief from negative feelings. Individual competences in handling the Internet may be preventive for the development of SIA-SNS.

  20. Internet applications, sites, trends and happenings

    Directory of Open Access Journals (Sweden)

    David Raitt

    2003-01-01

    Full Text Available This column aims to draw your attention to various interesting Web sites that I have come across and that may appeal to you. It also aims to keep you up to date with news and views on Internet trends, developments and statistics. It offers essentially a personal selection rather than comprehensive coverage.

  1. A survey of commercial frameworks for the Internet of Things

    OpenAIRE

    Derhamy, Hasan; Eliasson, Jens; Delsing, Jerker; Priller, Peter

    2015-01-01

    In 2011 Ericsson and Cisco estimated 50 billion Internet connected devices by 2020, encouraged by this industry is developing application frameworks to scale the Internet of Things. This paper presents a survey of commercial frameworks and platforms designed for developing and running Internet of Things applications. The survey covers frameworks supported by big players in the software and electronics industries. The frameworks are evaluated against criteria such as architectural approach, in...

  2. An internet enabled impact limiter material database

    Energy Technology Data Exchange (ETDEWEB)

    Wix, S.; Kanipe, F.; McMurtry, W. [Sandia National Labs., Albuquerque, NM (United States)

    1998-07-01

    This paper presents a detailed explanation of the construction of an internet enabled database, also known as a database driven web site. The data contained in the internet enabled database are impact limiter material and seal properties. The techniques used in constructing the internet enabled database presented in this paper are applicable when information that is changing in content needs to be disseminated to a wide audience. (authors)

  3. An internet enabled impact limiter material database

    International Nuclear Information System (INIS)

    Wix, S.; Kanipe, F.; McMurtry, W.

    1998-01-01

    This paper presents a detailed explanation of the construction of an internet enabled database, also known as a database driven web site. The data contained in the internet enabled database are impact limiter material and seal properties. The techniques used in constructing the internet enabled database presented in this paper are applicable when information that is changing in content needs to be disseminated to a wide audience. (authors)

  4. A Study about Using Internet in History Lessons

    Science.gov (United States)

    Ulusoy, Kadir

    2012-01-01

    Internet has become an important part in the field of education as it is in every area nowadays as well. Internet has become appealing among educators and students with its easy and quick access and wide opportunities. In this study, an application of using internet in the history course was done. 160 students who were enrolled in College of…

  5. Application of a forum on the internet for risk communications

    International Nuclear Information System (INIS)

    Takizawa, Masayuki; Shobu, Nobuhiro

    2003-01-01

    A case of 'internet forum' that various kinds of person can exchange views on the theme of geological disposal on the internet is explained. It is managed by a third organization such as Mitsubishi Research Institute, Inc. To exchange views as fast as possible, on the basis of individual opinion, a private person or an acting partner can contribute to it without one's position. User ID and input password are need. Target is selected as the industries related to geological disposal in the nuclear power field, person interested in garbage problem, environmental problems, geological disposal and students in Japan. The construction of site has been modified on the basis of various viewpoints. The cumulative access number is increasing from 76 to 414 in the fiscal 1998 to 2000. The important factor on the internet forum is neutrality of site management, individual opinion, joining many participants. A questionnaire was carried out by 1000 person using internet. The results of questionnaire are reported. (S.Y.)

  6. Predicting Compulsive Internet Use: It’s all about sex

    NARCIS (Netherlands)

    Meerkerk, G.J.; Eijnden, R.J.J.M. van den; Garretsen, H.F.L.

    2006-01-01

    The objective of this research was to assess the predictive power of various Internet applications on the development of compulsive Internet use (CIU). The study has a two-wave longitudinal design with an interval of 1 year. The first measurement contained 447 adult heavy Internet users who used the

  7. Internet Dependence and Sensation Seeking in Youth With Moderate Cerebral Palsy

    Directory of Open Access Journals (Sweden)

    Saeed Rezayi

    2017-06-01

    Discussion: It seems that internet applications direct or indirectly motive users to be online for more hours than necessary. This is true for CP patients given their motor impairment. Based on this research result, it seems that persons with CP because of lack of physical activities, motive by internal stimulus and seeking their sensation from external stimulus like internet application as well as for person with CP surfing in internet world and spent too much time on the internet is leisure time not activity time.

  8. Appdaptivity: An Internet of Things Device-Decoupled System for Portable Applications in Changing Contexts

    Directory of Open Access Journals (Sweden)

    Cristian Martín

    2018-04-01

    Full Text Available Currently, applications in the Internet of Things (IoT are tightly coupled to the underlying physical devices. As a consequence, upon adding a device, device replacement or user’s relocation to a different physical space, application developers have to re-perform installation and configuration processes to reconfigure applications, which bears costs in time and knowledge of low-level details. In the emerging IoT field, this issue is even more challenging due to its current unpredictable growth in term of applications and connected devices. In addition, IoT applications can be personalised to each end user and can be present in different environments. As a result, IoT scenarios are very changeable, presenting a challenge for IoT applications. In this paper we present Appdaptivity, a system that enables the development of portable device-decoupled applications that can be adapted to changing contexts. Through Appdaptivity, application developers can intuitively create portable and personalised applications, disengaging from the underlying physical infrastructure. Results confirms a good scalability of the system in terms of connected users and components involved.

  9. Appdaptivity: An Internet of Things Device-Decoupled System for Portable Applications in Changing Contexts.

    Science.gov (United States)

    Martín, Cristian; Hoebeke, Jeroen; Rossey, Jen; Díaz, Manuel; Rubio, Bartolomé; Van den Abeele, Floris

    2018-04-26

    Currently, applications in the Internet of Things (IoT) are tightly coupled to the underlying physical devices. As a consequence, upon adding a device, device replacement or user’s relocation to a different physical space, application developers have to re-perform installation and configuration processes to reconfigure applications, which bears costs in time and knowledge of low-level details. In the emerging IoT field, this issue is even more challenging due to its current unpredictable growth in term of applications and connected devices. In addition, IoT applications can be personalised to each end user and can be present in different environments. As a result, IoT scenarios are very changeable, presenting a challenge for IoT applications. In this paper we present Appdaptivity, a system that enables the development of portable device-decoupled applications that can be adapted to changing contexts. Through Appdaptivity, application developers can intuitively create portable and personalised applications, disengaging from the underlying physical infrastructure. Results confirms a good scalability of the system in terms of connected users and components involved.

  10. 75 FR 55297 - Further Inquiry Into Two Under-Developed Issues in the Open Internet Proceeding

    Science.gov (United States)

    2010-09-10

    ...). The second is the application of open Internet rules to mobile wireless Internet access services...). The second is the application of open Internet rules to mobile wireless Internet access services... in the market. (B) Truth in Advertising: Prohibit broadband providers from marketing specialized...

  11. Beyond Social Media: A Cross-Sectional Survey of Other Internet and Mobile Phone Applications in a Community Psychiatry Population.

    Science.gov (United States)

    Colder Carras, Michelle; Mojtabai, Ramin; Cullen, Bernadette

    2018-03-01

    Popular media applications have been shown to benefit people with severe mental illness by facilitating communication and social support, helping patients cope with or manage symptoms, and providing a way to monitor or predict mental health states. Although many studies of technology use by individuals with severe mental illness have focused primarily on use of social media, this study provides additional information about use of Internet applications such as blogs, wikis (websites that allow collaborative editing of content and structure by users), video games, and Skype by a community psychiatry population. All English-speaking patients attending an outpatient program during a 4-week period in 2011 (N=274) were surveyed about their technology use and demographic information; 189 patients provided demographic data and comprised the sample. Among Internet users (n=112), rates of use of message boards, wikis, Skype, role-playing games, and blogs ranged from 26.8% to 34.8%. Among mobile phone users (n=162), 41.4% used their phones to access the Internet and 25.3% used Twitter on their phones. In multivariate analysis, patients who had attended or completed college had much greater odds of accessing the Internet on mobile phones. Older patients were much less likely to access the Internet or use Twitter. Our findings indicate that use of several popular forms of media is not uncommon in a community psychiatry population, but that rates of use differ on the basis of age and education. As the digital divide between people with severe mental illness and the general population is lessening, further research is needed to determine how to best leverage various types of media to support mental health recovery and complement clinical care.

  12. Safe and reliable solutions for Internet application in power sector

    International Nuclear Information System (INIS)

    Eichelburg, W. K.

    2004-01-01

    The requirements for communication of various information systems (control systems, EMS, ERP) continually increase. Internet is prevailingly a Universal communication device for interconnection of the distant systems at the present. However, the communication with the outside world is important, the internal system must be protected safely and reliably. The goal of the article is to inform the experienced participants with the verified solutions of the safe and reliable Internet utilization for interconnection of control systems on the superior level, the distant management, the diagnostic and for interconnection of information systems. An added value is represented by the solutions using Internet for image and sound transmission. (author)

  13. Review: Nicola Döring (2003. Sozialpsychologie des Internet. Die Bedeutung des Internet für Kommunikationsprozesse, Identitäten, soziale Beziehungen und Gruppen [Social Psychology of the Internet. The Importance of the Internet for Communication Processe

    Directory of Open Access Journals (Sweden)

    Gerald Kral

    2004-01-01

    Full Text Available This book is the second, completely revised and extended edition of the first publication from 1999 that soon became one of the most important publications about Internet research in the German-speaking world. The new edition takes into account new research findings and updates the book to the present state of research. It begins with the history and the development of the Internet, describes the various applications and services available over the Internet, presents theories of computer-mediated communication, and outlines methods and results of online-research into the impact of the Internet on identity and social relationships to individual users and groups of users. All relevant issues of this field of research are presented. The goal of the book is more a broad overview of current research, rather than extensively detailed information. The book represents a not-to-be-neglected guide for all scientists dealing with psychological aspects of Internet research. URN: urn:nbn:de:0114-fqs0401349

  14. A systems of systems perspective on the internet of things

    NARCIS (Netherlands)

    Lukkien, J.J.

    2016-01-01

    The Internet of Things (IoT) refers to extending the reach of the Internet into the physical world. The realization of IoT applications involves the integrated operation of many subsystems that retain their private function. This makes IoT application deployment and integration a Systems of Systems

  15. Current Internet use and preferences of IVF and ICSI patients.

    NARCIS (Netherlands)

    Haagen, E.C.; Tuil, W.S.; Hendriks, J.H.C.L.; Bruijn, R.P. de; Braat, D.D.M.; Kremer, J.A.M.

    2003-01-01

    BACKGROUND: Nowadays, the Internet has a tremendous impact on modern society, including healthcare practice. The study aim was to characterize current Internet use by IVF and ICSI patients and to identify their preferences regarding Internet applications in fertility care. METHODS: A total of 163

  16. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Directory of Open Access Journals (Sweden)

    Hing Keung Ma

    2011-01-01

    Full Text Available Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1 the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2 the use of Internet to bully others (i.e., cyberbullying such as distributing libelous statements against a certain person, (3 the use of Internet to cheat others, and (4 the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail.

  17. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Science.gov (United States)

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1) the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2) the use of Internet to bully others (i.e., cyberbullying) such as distributing libelous statements against a certain person, (3) the use of Internet to cheat others, and (4) the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail. PMID:22125466

  18. The application of the Internet of Things to animal ecology.

    Science.gov (United States)

    Guo, Songtao; Qiang, Min; Luan, Xiaorui; Xu, Pengfei; He, Gang; Yin, Xiaoyan; Xi, Luo; Jin, Xuelin; Shao, Jianbin; Chen, Xiaojiang; Fang, Dingyi; Li, Baoguo

    2015-11-01

    For ecologists, understanding the reaction of animals to environmental changes is critical. Using networked sensor technology to measure wildlife and environmental parameters can provide accurate, real-time and comprehensive data for monitoring, research and conservation of wildlife. This paper reviews: (i) conventional detection technology; (ii) concepts and applications of the Internet of Things (IoT) in animal ecology; and (iii) the advantages and disadvantages of IoT. The current theoretical limits of IoT in animal ecology are also discussed. Although IoT offers a new direction in animal ecological research, it still needs to be further explored and developed as a theoretical system and applied to the appropriate scientific frameworks for understanding animal ecology. © 2015 International Society of Zoological Sciences, Institute of Zoology/Chinese Academy of Sciences and Wiley Publishing Asia Pty Ltd.

  19. Industrial Internet of Things: (IIoT) applications in underground coal mines.

    Science.gov (United States)

    Zhou, C; Damiano, N; Whisner, B; Reyes, M

    2017-12-01

    The Industrial Internet of Things (IIoT), a concept that combines sensor networks and control systems, has been employed in several industries to improve productivity and safety. U.S. National Institute for Occupational Safety and Health (NIOSH) researchers are investigating IIoT applications to identify the challenges of and potential solutions for transferring IIoT from other industries to the mining industry. Specifically, NIOSH has reviewed existing sensors and communications network systems used in U.S. underground coal mines to determine whether they are capable of supporting IIoT systems. The results show that about 40 percent of the installed post-accident communication systems as of 2014 require minimal or no modification to support IIoT applications. NIOSH researchers also developed an IIoT monitoring and control prototype system using low-cost microcontroller Wi-Fi boards to detect a door opening on a refuge alternative, activate fans located inside the Pittsburgh Experimental Mine and actuate an alarm beacon on the surface. The results of this feasibility study can be used to explore IIoT applications in underground coal mines based on existing communication and tracking infrastructure.

  20. Internet addiction or excessive internet use.

    Science.gov (United States)

    Weinstein, Aviv; Lejoyeux, Michel

    2010-09-01

    Problematic Internet addiction or excessive Internet use is characterized by excessive or poorly controlled preoccupations, urges, or behaviors regarding computer use and Internet access that lead to impairment or distress. Currently, there is no recognition of internet addiction within the spectrum of addictive disorders and, therefore, no corresponding diagnosis. It has, however, been proposed for inclusion in the next version of the Diagnostic and Statistical Manual of Mental Disorder (DSM). To review the literature on Internet addiction over the topics of diagnosis, phenomenology, epidemiology, and treatment. Review of published literature between 2000-2009 in Medline and PubMed using the term "internet addiction. Surveys in the United States and Europe have indicated prevalence rate between 1.5% and 8.2%, although the diagnostic criteria and assessment questionnaires used for diagnosis vary between countries. Cross-sectional studies on samples of patients report high comorbidity of Internet addiction with psychiatric disorders, especially affective disorders (including depression), anxiety disorders (generalized anxiety disorder, social anxiety disorder), and attention deficit hyperactivity disorder (ADHD). Several factors are predictive of problematic Internet use, including personality traits, parenting and familial factors, alcohol use, and social anxiety. Although Internet-addicted individuals have difficulty suppressing their excessive online behaviors in real life, little is known about the patho-physiological and cognitive mechanisms responsible for Internet addiction. Due to the lack of methodologically adequate research, it is currently impossible to recommend any evidence-based treatment of Internet addiction.

  1. Computação de objetos distribuídos na era da internet

    Directory of Open Access Journals (Sweden)

    Désiré Nguessan

    2003-01-01

    Full Text Available In this paper, we discuss recent trends in distributed objects and the Internet computing technologies. Both technologies converge to create a paradigm for distributed computing. We provide an overview of CORBA (Common Object Request Broker Architecture, emphasizing its open architecture for distributed application based on distributed objects and the IIOP (Internet Inter-ORB Protocol that improve the integration of the applications in heterogeneous environments. The CORBA protocol is emerging as the business application messaging standard for the Internet and deserves attention from Information Technologies (IT organizations. We conclude that CORBA, together with the Internet, constitute a perfect symbiotic relationship to build, maintain and extend client/server applications with critical mission.

  2. Internet Addiction and Antisocial Internet Behavior of Adolescents

    OpenAIRE

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued ...

  3. Rethinking Marketing Curricula in the Internet Age

    Science.gov (United States)

    Bevan-Dye, A. L.; Venter, P. F.

    2008-01-01

    The aim of this research is to identify an inventory of topics pertaining to the Internet-driven marketing principles that have emerged from the Internet's implication to and application in marketing that bear relevance to the study field of mainstream marketing. Empirical research was conducted to measure South African marketing educators' and…

  4. Suicide and Self-Harm Related Internet Use.

    Science.gov (United States)

    Padmanathan, Prianka; Biddle, Lucy; Carroll, Robert; Derges, Jane; Potokar, John; Gunnell, David

    2018-05-31

    The rise in Internet use adds a new dimension to suicide prevention. We investigated suicide/self-harm (S/Sh)-related Internet use among patients presenting to hospital with self-harm. We asked 1,198 adult and 315 child and adolescent patients presenting to hospital following self-harm in a city in South West England about Internet use associated with their hospital presentation. Associations between Internet use and sociodemographic and clinical characteristics were investigated using multivariable logistic regression models. Focus groups with clinicians explored the acceptability and utility of asking about Internet use. The prevalence of S/Sh-related Internet use was 8.4% (95% CI: 6.8-10.1%) among adult hospital presentations and 26.0% (95% CI = 21.3-31.2%) among children's hospital presentations. In both samples, S/Sh-related Internet use was associated with higher levels of suicidal intent. Mostly, clinicians found it acceptable to ask about Internet use during psychosocial assessments and believed this could inform perceptions of risk and decision-making. It is unclear whether the findings in this study are applicable to the general self-harm patient population because only those who had psychosocial assessments were included. S/Sh-related Internet use is likely to become increasingly relevant as the Internet-native generation matures. Furthermore, Internet use may be a proxy marker for intent.

  5. Entanglement percolation on a quantum internet with scale-free and clustering characters

    Energy Technology Data Exchange (ETDEWEB)

    Wu Liang; Zhu Shiqun [School of Physical Science and Technology, Soochow University, Suzhou, Jiangsu 215006 (China)

    2011-11-15

    The applicability of entanglement percolation protocol to real Internet structure is investigated. If the current Internet can be used directly in the quantum regime, the protocol can provide a way to establish long-distance entanglement when the links are pure nonmaximally entangled states. This applicability is primarily due to the combination of scale-free degree distribution and a high level of clustering, both of which are widely observed in many natural and artificial networks including the current Internet. It suggests that the topology of real Internet may play an important role in entanglement establishment.

  6. Entanglement percolation on a quantum internet with scale-free and clustering characters

    International Nuclear Information System (INIS)

    Wu Liang; Zhu Shiqun

    2011-01-01

    The applicability of entanglement percolation protocol to real Internet structure is investigated. If the current Internet can be used directly in the quantum regime, the protocol can provide a way to establish long-distance entanglement when the links are pure nonmaximally entangled states. This applicability is primarily due to the combination of scale-free degree distribution and a high level of clustering, both of which are widely observed in many natural and artificial networks including the current Internet. It suggests that the topology of real Internet may play an important role in entanglement establishment.

  7. Management of cyber physical objects in the future Internet of Things methods, architectures and applications

    CERN Document Server

    Loscri, Valeria; Rovella, Anna; Fortino, Giancarlo

    2016-01-01

    This book focuses on new methods, architectures, and applications for the management of Cyber Physical Objects (CPOs) in the context of the Internet of Things (IoT). It covers a wide range of topics related to CPOs, such as resource management, hardware platforms, communication and control, and control and estimation over networks. It also discusses decentralized, distributed, and cooperative optimization as well as effective discovery, management, and querying of CPOs. Other chapters outline the applications of control, real-time aspects, and software for CPOs and introduce readers to agent-oriented CPOs, communication support for CPOs, real-world deployment of CPOs, and CPOs in Complex Systems. There is a focus on the importance of application of IoT technologies for Smart Cities.

  8. Internet pricing: una breve rassegna critica (Internet Pricing: A Short Critical Survey

    Directory of Open Access Journals (Sweden)

    Claudio Sardoni

    2012-04-01

    Full Text Available In the article, some recent literature on Internet pricing is surveyed. The author looks at the topic by setting it in the more general framework of the analysis of activities that can be regarded as similar to Internet from the technological and economic point of view. In particular, attention is focused on the problem of the divergence between private and social costs when there occurs network congestion and the problem of efficient prices in activities characterized by the existence of peak-loads. The author argues that dealing with such issues in the context of Internet cannot be reduced to a straightforward application of traditional results of welfare economics and the literature on peak-load pricing. In a competitive market with similar features to the market for Internet services, it is well possible that there do not exist incentives that induce firms to adopt price systems such as to prevent and/or eliminate congestion. Further theoretical and analytical developments are then in order.  JEL Codes: L86, L11Keywords: Pricing

  9. Tagging: An Organization Scheme for the Internet

    Directory of Open Access Journals (Sweden)

    Marijke A. Visser

    2010-03-01

    Full Text Available How should the information on the Internet be organized? This question and the possible solutions spark debates among people concerned with how we identify, classify, and retrieve Internet content. This paper discusses the benefits and the controversies of using a tagging system to organize Internet resources. Tagging refers to a classification system where individual Internet users apply labels, or tags, to digital resources. Tagging increased in popularity with the advent of Web 2.0 applications that encourage interaction among users. As more information is available digitally, the challenge to find an organizational system scalable to the Internet will continue to require forward thinking. Trained to ensure access to a range of informational resources, librarians need to be concerned with access to Internet content. Librarians can play a pivotal role by advocating for a system that supports the user at the moment of need. Tagging may just be the necessary system.

  10. 5G internet of things: A survey

    OpenAIRE

    Li, S.; Xu, L.; Zhao, S.

    2018-01-01

    The existing 4G networks have been widely used in the Internet of Things (IoT) and is continuously evolving to match the needs of the future Internet of Things (IoT) applications. The 5G networks are expected to massive expand today's IoT that can boost cellular operationgs, IoT security, and network challenges and driving the Internet future to the edge. The existing IoT solutions are facing a number of challenges such as large number of conneciton of nodes, security, and new standards. This...

  11. Obtaining Application-based and Content-based Internet Traffic Statistics

    DEFF Research Database (Denmark)

    Bujlow, Tomasz; Pedersen, Jens Myrup

    2012-01-01

    the Volunteer-Based System for Research on the Internet, developed at Aalborg University, is capable of providing detailed statistics of Internet usage. Since an increasing amount of HTTP traffic has been observed during the last few years, the system also supports creating statistics of different kinds of HTTP...... traffic, like audio, video, file transfers, etc. All statistics can be obtained for individual users of the system, for groups of users, or for all users altogether. This paper presents results with real data collected from a limited number of real users over six months. We demonstrate that the system can...

  12. ROLE OF MIDDLEWARE FOR INTERNET OF THINGS: A STUDY

    OpenAIRE

    Soma Bandyopadhyay; Munmun Sengupta; Souvik Maiti; Subhajit Dutta

    2011-01-01

    Internet of Things (IoT) has been recognized as a part of future internet and ubiquitous computing. Itcreates a true ubiquitous or smart environment. It demands a complex distributed architecture withnumerous diverse components, including the end devices and application and association with theircontext. This article provides the significance of middleware system for (IoT). The middleware for IoTacts as a bond joining the heterogeneous domains of applications communicating over heterogeneousi...

  13. Internet pornography viewing preference as a risk factor for adolescent Internet addiction: The moderating role of classroom personality factors.

    Science.gov (United States)

    Alexandraki, Kyriaki; Stavropoulos, Vasileios; Burleigh, Tyrone L; King, Daniel L; Griffiths, Mark D

    2018-05-23

    Background and aims Adolescent Internet pornography viewing has been significantly increased in the last decade with research highlighting its association with Internet addiction (IA). However, there is little longitudinal data on this topic, particularly in relation to peer context effects. This study aimed to examine age- and context-related variations in the Internet pornography-IA association. Methods A total of 648 adolescents, from 34 classrooms, were assessed at 16 years and then at 18 years to examine the effect of Internet pornography preference on IA in relation to the classroom context. IA was assessed using the Internet Addiction Test (Young, 1998), Internet pornography preference (over other Internet applications) was assessed with a binary (yes/no) question, and classroom introversion and openness to experience (OTE) with the synonymous subscales within the Five Factor Questionnaire (Asendorpf & Van Aken, 2003). Results Three-level hierarchical linear models were calculated. Findings showed that viewing Internet pornography exacerbates the risk of IA over time, while classroom factors, such as the average level of OTE and introversion, differentially moderate this relationship. Discussion and conclusion The study demonstrated that the contribution of Internet pornography preference (as an IA risk factor) might be increased in more extroverted classrooms and decreased in OTE classrooms.

  14. Internet Advertising. Google AdWords versus Facebook Ads

    OpenAIRE

    Paul PAŞCU

    2014-01-01

    This article describes how to use the applications for Internet advertising, Google AdWords and Facebook Ads. Our attempt is to present the advantages and disadvantages of each of them, the costs and benefits, a useful aspect for companies that plan to start advertising campaigns on the Internet.

  15. Differential psychological impact of internet exposure on Internet addicts.

    Directory of Open Access Journals (Sweden)

    Michela Romano

    Full Text Available The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  16. Differential psychological impact of internet exposure on Internet addicts.

    Science.gov (United States)

    Romano, Michela; Osborne, Lisa A; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  17. Perancangan dan Implementasi Aplikasi Internet Radio Menggunakan Multimedia Database Melalui Penerapan Ontology dan Metadata

    Directory of Open Access Journals (Sweden)

    M. Rudy Erwansyah

    2012-06-01

    Full Text Available The study aims to analyze, design and implement the internet radio application used in managing the audio data on Heartline FM radio station. In this application, the audio data which has been managed can be used in a radio broadcast scheduling. The scheduled radio broadcast is then forwarded to the webcast server to be transmitted through the Internet. This research carries out analysis, design and implementation using Object Oriented Analysis and Design method and Lean Architecture for Agile Software Development. The programcomponent design consists of: (1 software functional system, (2 user interface, (3 problem domain model, which in internet radio application is divided into five subcomponents, namely: audio-indexing-retrieval, scheduling, reporting, user and ontology. In the implementation of internet application of this radio, the audio data management uses multimedia database by applying metadata and ontology, so that the process of indexing and retrieval can be reused quickly on the broadcast. This application can also be used in carrying out the radiobroadcast automatically during specified hours. This internet radio application has been able to meet the needs of radio Heartline.

  18. PENGGUNAAN TEKNOLOGI INTERNET DALAM BISNIS

    Directory of Open Access Journals (Sweden)

    Oviliani Yuliana

    2000-01-01

    Full Text Available The uses of internet in business are for information exchange, product catalog, promotion media, electronic mail, bulletin boards, electronic questioner, and mailing list. Internet can also be used for dialog, discussion, and consultation with customer online, therefore consumer can be proactively and interactively involved in designing, developing, marketing, and selling products. There are 2 methods for marketing products via internet, which are push and pull marketing. The advantages of internet in business strategy are global and interactive communication, information supply; consumer based service; increased cooperation; possibility to open new marketplace, product or services; and integrated the activity on-line. There are 2 applications in electronic commerce, which are business-to-business and business-to-consumer commerce. Electronic commerce payment transaction is arranged by Electronic Funds Transfer system, whereas the data security is governed by Secure Socket Layer, which then be developed to Secure Electronic Transaction. Abstract in Bahasa Indonesia : Internet dalam bisnis digunakan untuk pertukaran informasi, katalog produk, media promosi, surat elektronik, bulletin boards, kuesioner elektronik, dan mailing list. Internet juga bisa digunakan untuk berdialog, berdiskusi, dan konsultasi dengan konsumen secara on-line, sehingga konsumen dapat dilibatkan secara proaktif dan interaktif dalam perancangan, pengembangan, pemasaran, dan penjualan produk. Pemasaran lewat internet ada 2 metode, yaitu push dan pull marketing. Keunggulan strategi bisnis yang dapat diperoleh dari internet adalah komunikasi global dan interaktif; menyediakan informasi dan pelayanan sesuai dengan kebutuhan konsumen; meningkatkan kerja sama; memungkinkan untuk membuka pasar, produk, atau pelayanan baru; serta mengintegrasikan aktivitas secara on-line. Aplikasi Electronic Commerce ada 2, yaitu: Business-to-Consumer dan Business-to-Business Commerce. Pembayaran

  19. Front-End Intelligence for Large-Scale Application-Oriented Internet-of-Things

    KAUST Repository

    Bader, Ahmed; Ghazzai, Hakim; Kadri, Abdullah; Alouini, Mohamed-Slim

    2016-01-01

    The Internet-of-things (IoT) refers to the massive integration of electronic devices, vehicles, buildings, and other objects to collect and exchange data. It is the enabling technology for a plethora of applications touching various aspects of our lives such as healthcare, wearables, surveillance, home automation, smart manufacturing, and intelligent automotive systems. Existing IoT architectures are highly centralized and heavily rely on a back-end core network for all decision-making processes. This may lead to inefficiencies in terms of latency, network traffic management, computational processing, and power consumption. In this paper, we advocate the empowerment of front-end IoT devices to support the back-end network in fulfilling end-user applications requirements mainly by means of improved connectivity and efficient network management. A novel conceptual framework is presented for a new generation of IoT devices that will enable multiple new features for both the IoT administrators as well as end users. Exploiting the recent emergence of software-defined architecture, these smart IoT devices will allow fast, reliable, and intelligent management of diverse IoT-based applications. After highlighting relevant shortcomings of the existing IoT architectures, we outline some key design perspectives to enable front-end intelligence while shedding light on promising future research directions.

  20. Front-End Intelligence for Large-Scale Application-Oriented Internet-of-Things

    KAUST Repository

    Bader, Ahmed

    2016-06-14

    The Internet-of-things (IoT) refers to the massive integration of electronic devices, vehicles, buildings, and other objects to collect and exchange data. It is the enabling technology for a plethora of applications touching various aspects of our lives such as healthcare, wearables, surveillance, home automation, smart manufacturing, and intelligent automotive systems. Existing IoT architectures are highly centralized and heavily rely on a back-end core network for all decision-making processes. This may lead to inefficiencies in terms of latency, network traffic management, computational processing, and power consumption. In this paper, we advocate the empowerment of front-end IoT devices to support the back-end network in fulfilling end-user applications requirements mainly by means of improved connectivity and efficient network management. A novel conceptual framework is presented for a new generation of IoT devices that will enable multiple new features for both the IoT administrators as well as end users. Exploiting the recent emergence of software-defined architecture, these smart IoT devices will allow fast, reliable, and intelligent management of diverse IoT-based applications. After highlighting relevant shortcomings of the existing IoT architectures, we outline some key design perspectives to enable front-end intelligence while shedding light on promising future research directions.

  1. The internet, virtual communities and threats to confidentiality ...

    African Journals Online (AJOL)

    Internet list servers and chat groups gather doctors together in virtual space to exchange views on clinical and professional issues. This paper focuses on the last of these Internet applications, beginning with a description of the 'virtual community' that the list servers and chat groups constitute. It demonstrates how various ...

  2. Internet Advertising. Google AdWords versus Facebook Ads

    Directory of Open Access Journals (Sweden)

    Paul PAŞCU

    2014-05-01

    Full Text Available This article describes how to use the applications for Internet advertising, Google AdWords and Facebook Ads. Our attempt is to present the advantages and disadvantages of each of them, the costs and benefits, a useful aspect for companies that plan to start advertising campaigns on the Internet.

  3. Machine Perception for Identification and Interaction in the Internet of Things

    DEFF Research Database (Denmark)

    Tan, Zheng-Hua

    2010-01-01

    The most significant step from the Internet towards the Internet of Things (IoT) is to embrace a vast amount of objects in the global system. This first presents a nontrivial challenge to identification due to the limited applicability of Internet Protocol (IP) to these objects. They are therefore...

  4. Big Data, Internet of Things and Cloud Convergence--An Architecture for Secure E-Health Applications.

    Science.gov (United States)

    Suciu, George; Suciu, Victor; Martian, Alexandru; Craciunescu, Razvan; Vulpe, Alexandru; Marcu, Ioana; Halunga, Simona; Fratu, Octavian

    2015-11-01

    Big data storage and processing are considered as one of the main applications for cloud computing systems. Furthermore, the development of the Internet of Things (IoT) paradigm has advanced the research on Machine to Machine (M2M) communications and enabled novel tele-monitoring architectures for E-Health applications. However, there is a need for converging current decentralized cloud systems, general software for processing big data and IoT systems. The purpose of this paper is to analyze existing components and methods of securely integrating big data processing with cloud M2M systems based on Remote Telemetry Units (RTUs) and to propose a converged E-Health architecture built on Exalead CloudView, a search based application. Finally, we discuss the main findings of the proposed implementation and future directions.

  5. The Industrial Internet of Things

    OpenAIRE

    Albano, Michele; Silva, José Bruno; Lino Ferreira, Luis

    2017-01-01

    Demo in 22º Seminário da Rede Temática de Comunicações Móveis (RTCM 2017). 18, Jan, 2017, Session III. Lisboa. The application of the Internet of Things to manufacturing is the driving force of the new industrial revolution (Industrie 4.0). In fact, most activities in the manufacturing industry can benefit from the data collected in the context of the industrial process. The Industrial Internet of Things (IIoT), whose pillars are the usage of IP communication between the devices and making...

  6. Automated Story Capture From Internet Weblogs

    National Research Council Canada - National Science Library

    Gordon, Andrew S; Cao, Qun; Swanson, Reid

    2007-01-01

    .... first-person narratives about real-life experiences. Millions of these stories appear in Internet weblogs, offering a potentially valuable resource for future knowledge management and training applications...

  7. Design and Implement AN Interoperable Internet of Things Application Based on AN Extended Ogc Sensorthings Api Standard

    Science.gov (United States)

    Huang, C. Y.; Wu, C. H.

    2016-06-01

    The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring and physical mashup applications can be constructed to improve people's daily life. However, IoT devices created by different manufacturers follow different proprietary protocols and cannot communicate with each other. This heterogeneity issue causes different products to be locked in multiple closed ecosystems that we call IoT silos. In order to address this issue, a common industrial solution is the hub approach, which implements connectors to communicate with IoT devices following different protocols. However, with the growing number of proprietary protocols proposed by device manufacturers, IoT hubs need to support and maintain a lot of customized connectors. Hence, we believe the ultimate solution to address the heterogeneity issue is to follow open and interoperable standard. Among the existing IoT standards, the Open Geospatial Consortium (OGC) SensorThings API standard supports comprehensive conceptual model and query functionalities. The first version of SensorThings API mainly focuses on connecting to IoT devices and sharing sensor observations online, which is the sensing capability. Besides the sensing capability, IoT devices could also be controlled via the Internet, which is the tasking capability. While the tasking capability was not included in the first version of the SensorThings API standard, this research aims on defining the tasking capability profile and integrates with the SensorThings API standard, which we call the extended-SensorThings API in this paper. In general, this research proposes a lightweight JSON-based web service description, the "Tasking Capability Description", allowing device owners and manufacturers to describe different IoT device protocols. Through the extended- SensorThings API, users and applications can follow a coherent protocol to control Io

  8. An Internet enabled impact limiter material database

    Energy Technology Data Exchange (ETDEWEB)

    Wix, S.; Kanipe, F.; McMurtry, W.

    1998-09-01

    This paper presents a detailed explanation of the construction of an interest enabled database, also known as a database driven web site. The data contained in the internet enabled database are impact limiter material and seal properties. The technique used in constructing the internet enabled database presented in this paper are applicable when information that is changing in content needs to be disseminated to a wide audience.

  9. An Internet enabled impact limiter material database

    International Nuclear Information System (INIS)

    Wix, S.; Kanipe, F.; McMurtry, W.

    1998-01-01

    This paper presents a detailed explanation of the construction of an interest enabled database, also known as a database driven web site. The data contained in the internet enabled database are impact limiter material and seal properties. The technique used in constructing the internet enabled database presented in this paper are applicable when information that is changing in content needs to be disseminated to a wide audience

  10. Estimation of Monetary Value of Information on the Internet

    Directory of Open Access Journals (Sweden)

    Mohsen Nazari

    2015-03-01

    Full Text Available This research estimates the monetary value of internet information for each type of information and services by using Hedonic pricing method. The statistic social of this research is high-speed internet users in Tehran. Based on the results, high speed internet users of Tehran consider a positive monetary value for some information types in the internet, in descendent respect, such as film downloading, gaming, News, social network, and music. Also, the results indicates that people with higher education level and people who are subscribed to high speed internet earlier than other people consider more monetary value to use the internet. For generalizing the result of this research, it’s suggested to do this research at other cities of Iran. At last, some applicable suggestions made.

  11. IP Connected Low Power Wireless Personal Area Networks in the Future Internet

    DEFF Research Database (Denmark)

    Jacobsen, Rune Hylsberg; Toftegaard, Thomas Skjødeberg; Kjærgaard, Jens Kristian

    2012-01-01

    The Internet of Things is a key concept of the Future Internet. The Internet of Things potentially interconnects billions of small devices in a large ubiquitous infrastructure based on the Internet Protocol (IP). Typically, these devices will be limited in computational capacity, memory......WPANs). The authors address the key mechanisms from network aspects down to device design aspects and discuss how technologies interplay to make real application deployment practical for the Internet of Things....

  12. Internet of things – promise for the future? An introduction

    CSIR Research Space (South Africa)

    Coetzee, L

    2011-01-01

    Full Text Available The Internet is a living entity, always changing and evolving. New applications and businesses are created continuously. In addition to an evolving Internet, technology is also changing the landscape. Broadband connectivity is becoming cheap...

  13. The Review of Internet Marketing Use in Latvia's Companies

    Science.gov (United States)

    Sloka, Biruta; Kantane, Inara; Walczak, Renata

    2017-01-01

    Development of new technologies and increasing competition require new solutions in business applications in internet marketing and advertising. The paper deals with issues related to advertising activities in internet marketing. There were presented both theoretical findings and empirical analysis of the survey conducted among Latvia's companies.…

  14. Rich internet application system for patient-centric healthcare data management using handheld devices.

    Science.gov (United States)

    Constantinescu, L; Pradana, R; Kim, J; Gong, P; Fulham, Michael; Feng, D

    2009-01-01

    Rich Internet Applications (RIAs) are an emerging software platform that blurs the line between web service and native application, and is a powerful tool for handheld device deployment. By democratizing health data management and widening its availability, this software platform has the potential to revolutionize telemedicine, clinical practice, medical education and information distribution, particularly in rural areas, and to make patient-centric medical computing a reality. In this paper, we propose a telemedicine application that leverages the ability of a mobile RIA platform to transcode, organise and present textual and multimedia data, which are sourced from medical database software. We adopted a web-based approach to communicate, in real-time, with an established hospital information system via a custom RIA. The proposed solution allows communication between handheld devices and a hospital information system for media streaming with support for real-time encryption, on any RIA enabled platform. We demonstrate our prototype's ability to securely and rapidly access, without installation requirements, medical data ranging from simple textual records to multi-slice PET-CT images and maximum intensity (MIP) projections.

  15. Internet congestion control

    CERN Document Server

    Varma, Subir

    2015-01-01

    Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms. The field of congestion control has seen many notable advances in recent years and the purpose of this book, which is targeted towards the advanced and intermediate reader, is to inform about the most important developments in this area. The book should enable the reader to gain a good understanding of the application of congestion control theory to a number of applic

  16. A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications

    OpenAIRE

    Sikder, Amit Kumar; Petracca, Giuseppe; Aksu, Hidayet; Jaeger, Trent; Uluagac, A. Selcuk

    2018-01-01

    The concept of Internet of Things (IoT) has become more popular in the modern era of technology than ever before. From small household devices to large industrial machines, the vision of IoT has made it possible to connect the devices with the physical world around them. This increasing popularity has also made the IoT devices and applications in the center of attention among attackers. Already, several types of malicious activities exist that attempt to compromise the security and privacy of...

  17. Architectural and Mobility Management Designs in Internet-Based Infrastructure Wireless Mesh Networks

    Science.gov (United States)

    Zhao, Weiyi

    2011-01-01

    Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…

  18. Mutton Traceability Method Based on Internet of Things

    Directory of Open Access Journals (Sweden)

    Wu Min-Ning

    2014-01-01

    Full Text Available In order to improve the mutton traceability efficiency for Internet of Things and solve the problem of data transmission, analyzed existing tracking algorithm, proposed the food traceability application model, Petri network model of food traceability and food traceability of time series data of improved K-means algorithm based on the Internet of things. The food traceability application model to convert, integrate and mine the heterogeneous information, implementation of the food safety traceability information management, Petri network model for food traceability in the process of the state transition were analyzed and simulated and provides a theoretical basis to study the behavior described in the food traceability system and structural design. The experiments on simulation data show that the proposed traceability method based on Internet of Things is more effective for mutton traceability data than the traditional K-means methods.

  19. Internet Technologies for Space-based Communications: State of the Art and Challenges

    Science.gov (United States)

    Bhasin, K.; DePaula, R.; Edwards, C.

    2000-01-01

    The Internet is rapidly changing the ways we communicate information around the globe today. The desire to provide Internet-based services to anyone, anywhere, anytime has brought satellite communications to the forefront to become an integral part of the Internet. In spite of the distances involved, satellite links are proving to be capable of providing Internet services based on Internet protocol (TCP/IP) stack. This development has led to the question particularly at NASA; can satellites and other space platforms become an Internet-node in space? This will allow the direct transfer of information directly from space to the users on Earth and even be able to control the spacecraft and its instruments. NASA even wants to extend the near earth space Internet to deep space applications where scientists and the public here on Earth may view space exploration in real time via the Internet. NASA's future solar system exploration will involve intensive in situ investigations of planets, moons, asteroids, and comets. While past missions typically involved a single fly-by or orbiting science spacecraft, future missions will begin to use fleets of small, highly intelligent robotic vehicles to carry out collaborative investigations. The resulting multi-spacecraft topologies will effectively create a wide area network spanning the solar system. However, this will require significant development in Internet technologies for space use. This paper provides the status'of the Internet for near earth applications and the potential extension of the Internet for use in deep space planetary exploration. The paper will discuss the overall challenges of implementing the space Internet and how the space Internet will integrate into the complex terrestrial systems those forms the Internet of today in a hybrid set of networks. Internet. We envision extending to the deep space environment such Internet concepts as a well-designed layered architecture. This effort will require an ability to

  20. Multimedia presentation of radiological image data using the internet

    International Nuclear Information System (INIS)

    Beier, J.; Sell, C.; Hosten, N.; Fleck, E.; Felix, R.

    1997-01-01

    Aim: Recent developments of the Internet (World Wide Web) allow the integration of audio, video, digital film sequences, and three-dimensional data. The applicability of these innovations for medical documentation is demonstrated. Methods: Our existing software for medical image processing and 3D reconstruction was extended to provide images, film sequences, and complex 3D models in an Internet-compatible data format. Results: The multimedia results of the image processing were integrated into Internet documents. Specialized programs are no longer necessary for visualization. The Internet software allows for user-friendly handling and interactive presentation of the 2D and 3D data. Conclusions: The Internet offers public-domain software for display of images, audio/video, and 3D data. Thus, the tools of the Internet represent an ideal basis for local hospital information systems, computer-aided medical education, and teleconferencing. (orig.) [de

  1. Differential Psychological Impact of Internet Exposure on Internet Addicts

    OpenAIRE

    Romano, Michela; Osborne, Lisa A.; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and aut...

  2. What drives individuals to access the internet mostly using a cell phone?

    OpenAIRE

    Yook, Seungyun; Jung, Yumi

    2012-01-01

    Mobile Internet users can access content, applications, and services using their cell phones. Recent PEW Internet research shows that more than half of U.S. cell phone owners have smartphones. Among them, some people have adopted a mobile phone and use it as a major Internet access medium; they may use other devices such as a desktop computer, notebook, netbook, or tablet PC, but those are not included in their Internet access medium repertoire. This paper examines who accesses the Internet m...

  3. Energy management of internet data centers in smart grid

    CERN Document Server

    Jiang, Tao; Cao, Yang

    2015-01-01

    This book reports the latest findings on intelligent energy management of Internet data centers in smart-grid environments. The book gathers novel research ideas in Internet data center energy management, especially scenarios with cyber-related vulnerabilities, power outages and carbon emission constraints. The book will be of interest to university researchers, R&D engineers and graduate students in communication and networking areas who wish to learn the core principles, methods, algorithms, and applications of energy management of Internet data centers in smart grids.

  4. Factors Affecting Internet Banking Success: A Comparative Investigation between Indonesia and South Korea

    OpenAIRE

    Aries Susanto; Hwansoo Lee; Hangjung Zo; Andrew P. Ciganek

    2013-01-01

    Internet banking is a prominent example of Internet-based applications. Previous research has found that satisfaction, trust, commitment, and loyalty are important factors for Internet banking success. Resistance to adopt Internet banking is often attributed to the role of trust, security, and privacy in e-commerce systems. This study proposes a framework to examine behaviors toward Internet banking services in Indonesia and South Korea. A research model was empirically tested with data captu...

  5. Safe and reliable solutions for Internet application in power sector. SAT automation

    International Nuclear Information System (INIS)

    Eichelburg, W. K.

    2004-01-01

    The requirements for communication of various information systems (control systems, EMS, ERP) continually increase. Internet is prevailingly a Universal communication device for interconnection of the distant systems at the present. However, the communication with the outside world is important, the internal system must be protected safely and reliably. The goal of the article is to inform the experienced participants with the verified solutions of the safe and reliable Internet utilization for interconnection of control systems on the superior level, the distant management, the diagnostic and for interconnection of information systems. An added value is represented by the solutions using Internet for image and sound transmission. (author)

  6. HMIoT: A New Healthcare Model Based on Internet of Things

    OpenAIRE

    Suraki, Mohsen Yaghoubi; Suraki, Morteza Yaghoubi; SourakiAzad, Leila

    2015-01-01

    In recent century, with developing of equipment, using of the internet and things connected to the internet is growing. Therefore, the need for informing in the process of expanding the scope of its application is very necessary and important. These days, using intelligent and autonomous devices in our daily lives has become commonplace and the Internet is the most important part of the relationship between these tools and even at close distances also. Things connected to the Internet that ar...

  7. Internet quality management

    International Nuclear Information System (INIS)

    Park, Yeong Taek; Song, Hae Geun

    2000-09-01

    This book guides the useful application of internet quality management. It mentions understanding of modern quality management, which includes basics of quality management, six sigma quality innovation, best system, search way of quality information, consideration for effective information search, establishment of quality information center using bookmark, sites related quality by fields, journal sites related quality, sites related quality award,and web sites of the highest business.

  8. CISCO SYSTEM’S STRATEGIC USE OF THE INTERNET AND BUSINESS APPLICATIONS

    OpenAIRE

    Abdurrahman Celebi; Raju Vijaya

    2011-01-01

    Information systems are the key decision component of a firm’s business strategy. Cisco made use of internet and its information systems to accomplish its following strategies: to create a business ecology market its technology to networking world; to create a virtual organization and outsourcing many operational and customer services and focusing its resources on its own core product innovation strategy; to showcase its own internet use as a marketing tool. Cisco’s strategy enabl...

  9. Study on the application of mobile internet cloud computing platform

    Science.gov (United States)

    Gong, Songchun; Fu, Songyin; Chen, Zheng

    2012-04-01

    The innovative development of computer technology promotes the application of the cloud computing platform, which actually is the substitution and exchange of a sort of resource service models and meets the needs of users on the utilization of different resources after changes and adjustments of multiple aspects. "Cloud computing" owns advantages in many aspects which not merely reduce the difficulties to apply the operating system and also make it easy for users to search, acquire and process the resources. In accordance with this point, the author takes the management of digital libraries as the research focus in this paper, and analyzes the key technologies of the mobile internet cloud computing platform in the operation process. The popularization and promotion of computer technology drive people to create the digital library models, and its core idea is to strengthen the optimal management of the library resource information through computers and construct an inquiry and search platform with high performance, allowing the users to access to the necessary information resources at any time. However, the cloud computing is able to promote the computations within the computers to distribute in a large number of distributed computers, and hence implement the connection service of multiple computers. The digital libraries, as a typical representative of the applications of the cloud computing, can be used to carry out an analysis on the key technologies of the cloud computing.

  10. Effect of internet marketing, increase customer hotels in Kermanshah city

    OpenAIRE

    A. Zarrabi; K. Nazari; P. Akbari

    2014-01-01

    Today, Internet marketing and advertising is an important channel. The tourism and hospitality industry associated with it, has a good position to exploit the potential of the Internet. The study also aimed to consider the application of research methods, descriptive survey - analysis, to examine the impact of Internet marketing on hotel clients in Kermanshah city has increased. Results indicate that, of the three options awareness, provide quick service and attitude can increase customer acq...

  11. Untangling the Relationship between Internet Anxiety and Internet Identification in Students: The Role of Internet Self-Efficacy

    Science.gov (United States)

    Hsiao, Bo; Zhu, Yu-Qian; Chen, Li-Yueh

    2017-01-01

    Introduction: Previous research has identified Internet anxiety and Internet identification as two important factors that predict usage and experience on the Internet. However, little is known about the relationship between them. This research aimed to untangle the relationship between Internet anxiety and Internet identification, and to…

  12. Influence of a Game-Based Application on Secondary School Students' Safe Internet Use

    Science.gov (United States)

    Durak, Gürhan; Cankaya, Serkan; Yünkül, Eyup; Taylan, Ufuk; Erten, Emine; Akpinar, Sükran

    2017-01-01

    The purpose of this study was to investigate the influence of a game called Wild Web Woods (WWW) designed by the European Council for safe Internet use on secondary school students' safe Internet use. In line with this purpose, for the purpose of determining the students' awareness of safe Internet use, a total of 504 students from different…

  13. Sikap dan Intensi Pemanfaatan Internet dalam Kegiatan Bisnis

    OpenAIRE

    Anggita Nurul Adha, Irena; Virianita, Ratri

    2010-01-01

    As developed time, needs of information and communication media become significant. Internet utilization functions for business were transformed from information exchange into an instrument for business strategy application such as marketing, selling and customer service. In general, internet has three functions in business such as communication, promotion and research. Small and middle scale entrepreneur which exposed with the growth of information technology have the options whether...

  14. Commercial Security on the Internet.

    Science.gov (United States)

    Liddy, Carrie

    1996-01-01

    Discusses commercial security on the Internet and explains public key technology as successfully melding the conflicting requirements of openness for practical business applications and isolation and confidentiality for protection of data. Examples of public key value-added products are described, including encryption, digital signature and…

  15. Tierless Programming for the Internet of Things

    Energy Technology Data Exchange (ETDEWEB)

    Decker, Brett [Brown Univ., Providence, RI (United States)

    2015-02-01

    The Internet of Things (IoT) is about Internet-addressability and connectivity for everyday devices. The goal of this project was to create a framework to allow developers to more easily control IoT devices and turn their interactions into meaningful applications. We leveraged a tierless approach for Software Defined Networking (SDN) to build this framework. We expanded Flowlog, a tierless programming language for SDN controllers, to support IoT devices developed by Spark IO to build this framework.

  16. Internet gambling is a predictive factor of Internet addictive behavior.

    Science.gov (United States)

    Critselis, Elena; Janikian, Mari; Paleomilitou, Noni; Oikonomou, Despoina; Kassinopoulos, Marios; Kormas, George; Tsitsika, Artemis

    2013-12-01

    Adolescent Internet gambling is associated with concomitant addictive behaviors. This study aimed to assess the prevalence of Internet gambling practices, its impact upon psychosocial development and to evaluate the association between gambling practices and Internet addictive behavior among Cypriot adolescents. A cross-sectional study was conducted in a convenience sample (n = 805) of adolescents attending selected public schools (9th and 10th grades) in Cyprus. Anonymous self-completed questionnaires were used including the Internet Addiction Test and the Strengths and Difficulties Questionnaire. Among the study population (n = 805), approximately one third (n = 28; 34.9%) reported Internet gambling. Internet gamblers were twice as likely to utilize Internet café portals (adjusted odds ratio for gender and age, AOR: 2.13; 95% confidence interval, 95% CI: 1.56-2.91) for interactive game-playing (AOR: 6.84; 95% CI: 4.23-11.07), chat-rooms (AOR: 2.57; 95% CI: 1.31-4.85), and retrieval of sexual information (AOR: 1.99; 95% CI: 1.42-2.81). Among Internet gamblers 26.0% (n = 73) reported borderline addictive Internet use and 4.3% (n = 12) addictive behavior. Internet gamblers more often had comprehensive psychosocial and emotional maladjustment (AOR: 4.00; 95% CI: 1.97-8.13), including Abnormal Conduct Problems (AOR: 3.26; 95% CI: 2.00-5.32), Emotional Symptoms (AOR: 1.78; 95% CI: 1.02-3.11), and Peer Problems (AOR: 2.44; 95% CI: 1.08-5.48) scores. The multivariate regression analyses indicated that the single independent predictor associated with Internet addictive behavior was Internet gambling (AOR: 5.66; 95% CI: 1.45-22.15). Internet gambling is associated with addictive Internet use, as well as emotional maladjustment and behavioral problems, among Cypriot adolescents. Longitudinal studies are needed to elucidate whether Internet gambling constitutes a risk factor for the development of Internet addictive behavior among adolescents.

  17. Physician communication via Internet-enabled technology: A systematic review.

    Science.gov (United States)

    Barr, Neil G; Randall, Glen E; Archer, Norman P; Musson, David M

    2017-10-01

    The use of Internet-enabled technology (information and communication technology such as smartphone applications) may enrich information exchange among providers and, consequently, improve health care delivery. The purpose of this systematic review was to gain a greater understanding of the role that Internet-enabled technology plays in enhancing communication among physicians. Studies were identified through a search in three electronic platforms: the Association for Computing Machinery Digital Library, ProQuest, and Web of Science. The search identified 5140 articles; of these, 21 met all inclusion criteria. In general, physicians were satisfied with Internet-enabled technology, but consensus was lacking regarding whether Internet-enabled technology improved efficiency or made a difference to clinical decision-making. Internet-enabled technology can play an important role in enhancing communication among physicians, but the extent of that benefit is influenced by (1) the impact of Internet-enabled technology on existing work practices, (2) the availability of adequate resources, and (3) the nature of institutional elements, such as privacy legislation.

  18. French validation of the compulsive internet use scale (CIUS).

    Science.gov (United States)

    Khazaal, Yasser; Chatton, Anne; Horn, Alessandra; Achab, Sophia; Thorens, Gabriel; Zullino, Daniele; Billieux, Joël

    2012-12-01

    The popularity of using the Internet and related applications has grown in European countries in the last two decades. Despite numerous advantages in terms of optimizing communications among individuals and social systems, the use of the Internet may be associated with excessive use and possible Internet addiction. The goals of the current study were to validate a French version of the compulsive Internet use scale (CIUS) and to assess its links with common psychiatric symptoms such as depression (assessed with the Beck depression inventory: BDI), anxiety (assessed with the trait anxiety inventory: STAI) and alcohol misuse (assessed with the alcohol use disorder identification test: AUDIT). The French versions of the CIUS, BDI, STAI and AUDIT were administered to a sample of Internet users. Exploratory and confirmatory analyses, correlation analysis and logistic regression were performed. As previously found with the original version, a one-factor model of the CIUS had good psychometric properties and fit the data well. Excessive use of the Internet was associated with depressive symptoms.

  19. Arabic validation of the Compulsive Internet Use Scale (CIUS

    Directory of Open Access Journals (Sweden)

    Khazaal Yasser

    2011-11-01

    Full Text Available Abstract Background The popularity of using the Internet and related applications has grown in Arabic countries in recent years. Despite numerous advantages in terms of optimizing communications among individuals and social systems, the use of the Internet may in certain cases become problematic and engender negative consequences in daily life. As no instrument in the Arabic language is available, however, to measure excessive Internet use, the goal of the current study was to validate an Arabic version of the Compulsive Internet Use Scale (CIUS. Methods The Arabic version of the CIUS was administered to a sample of 185 Internet users and exploratory and confirmatory analyses performed. Results As found previously for the original version, a one-factor model of the CIUS had good psychometric properties and fit the data well. The total score on the CIUS was positively associated with time spent online. Conclusion The Arabic version of the CIUS seems to be a valid self-report to measure problematic Internet use.

  20. Managing the Internet of Things architectures, theories, and applications

    CERN Document Server

    Hua, Kun

    2016-01-01

    The implementation and deployment of the Internet of Things (IoT) brings with it management challenges around seamless integration, heterogeneity, scalability, mobility, security, and many other issues. This comprehensive book explores these challenges and looks at possible solutions.

  1. Educational Uses Of Internet In The World and Turkey (A Comparative Review)

    OpenAIRE

    USUN, Salih

    2015-01-01

    This paper focuses on the educational uses and major technologies of the Internet in the World and Turkey; Compares eachother; reviews of the literature; examines the uses of the Internet in Primary, Secondary and Higher education in Turkey a developing country; exposes and discusses applications, studies and problems on the educational uses of the Internet in Turkey comparing with the developed countries ; number of suggestions presents on the effective using of the Internet in Turkish educa...

  2. Internet: A place for patent retrieval

    African Journals Online (AJOL)

    GRACE

    2006-05-16

    May 16, 2006 ... Key words: Biotechnology, intellectual property rights, Patents, Internet application. INTRODUCTION. The principle objective of biotechnology is to produce ... Finland. France. Germany. Greek. Georgian. Hong Kong. Hungarian. Irsish. Italian. Japan. Korean. Luxemberg. Lithuania. Malaysian. Moldova.

  3. Internet of Things in agriculture

    NARCIS (Netherlands)

    Verdouw, C.N.; Wolfert, Jacques; Tekinerdogan, B.

    2016-01-01

    This literature review on Internet of Things (IoT) in agriculture and food, provides an overview of existing applications, enabling technologies and main challenges ahead. The results of the review show that this subject received attention by the scientific community from 2010 on and the number of

  4. Guided and unguided Acceptance and Commitment Therapy for social anxiety disorder and/or panic disorder provided via the Internet and a smartphone application: A randomized controlled trial.

    Science.gov (United States)

    Ivanova, Ekaterina; Lindner, Philip; Ly, Kien Hoa; Dahlin, Mats; Vernmark, Kristofer; Andersson, Gerhard; Carlbring, Per

    2016-12-01

    Acceptance and Commitment Therapy (ACT) can be effective in treating anxiety disorders, yet there has been no study on Internet-delivered ACT for social anxiety disorder (SAD) and panic disorder (PD), nor any study investigating whether therapist guidance is superior to unguided self-help when supplemented with a smartphone application. In the current trial, n=152 participants diagnosed with SAD and/or PD were randomized to therapist-guided or unguided treatment, or a waiting-list control group. Both treatment groups used an Internet-delivered ACT-based treatment program and a smartphone application. Outcome measures were self-rated general and social anxiety and panic symptoms. Treatment groups saw reduced general (d=0.39) and social anxiety (d=0.70), but not panic symptoms (d=0.05) compared to the waiting-list group, yet no differences in outcomes were observed between guided and unguided interventions. We conclude that Internet-delivered ACT is appropriate for treating SAD and potentially PD. Smartphone applications may partially compensate for lack of therapist support. Copyright © 2016. Published by Elsevier Ltd.

  5. Internet-kulttuuri nykytaiteessa

    OpenAIRE

    Höyssä, Timo

    2016-01-01

    Internet-kulttuuri nykytaiteessa Tutkimuksessa tarkastellaan internet-taiteen historiaa ja nykyisiä esityskäytäntöjä sekä sitä miten globaali internet-kulttuuri on muokannut nykytaidetta sekä galleriassa että webissä. Tutkimuksessa kysytään miten internetin kehitys on vaikuttanut internet-taiteeseen sekä post-internet-taiteen syntyyn? Mikä on internetin paikka nykytaiteessa sekä populaarikulttuurissa? Internet culture in contemporary art A study on the history of Internet art and it’...

  6. Internet services in e-learning management

    Directory of Open Access Journals (Sweden)

    Вера Николаевна Бутова

    2013-12-01

    Full Text Available The article describes the issues of Internet services practical application in order to check correspondence of written works to their topics in terms of Human Sciences as well as checking of written texts on uniqueness.

  7. The internet as a tool in clinical pharmacology

    Science.gov (United States)

    Castel, Josep-Maria; Figueras, Albert; Vigo, Joan-Miquel

    2006-01-01

    The invention of the internet and the world-wide web was a landmark that has affected many aspects of everyday life, but is so recent and dynamic that many of its potential uses are still being explored. Aside from its purely commercial use as a virtual pharmacy (e-commerce), the internet is useful in at least three aspects related to clinical pharmacology: communication, training and research. In this paper we briefly review several internet applications related to clinical pharmacology and describe, as an example, the logistics of a multicentre research collaboration related to the promotion of rational drug use in the prevention of postpartum haemorrhage. PMID:16722847

  8. Analysis of Camera Arrays Applicable to the Internet of Things.

    Science.gov (United States)

    Yang, Jiachen; Xu, Ru; Lv, Zhihan; Song, Houbing

    2016-03-22

    The Internet of Things is built based on various sensors and networks. Sensors for stereo capture are essential for acquiring information and have been applied in different fields. In this paper, we focus on the camera modeling and analysis, which is very important for stereo display and helps with viewing. We model two kinds of cameras, a parallel and a converged one, and analyze the difference between them in vertical and horizontal parallax. Even though different kinds of camera arrays are used in various applications and analyzed in the research work, there are few discussions on the comparison of them. Therefore, we make a detailed analysis about their performance over different shooting distances. From our analysis, we find that the threshold of shooting distance for converged cameras is 7 m. In addition, we design a camera array in our work that can be used as a parallel camera array, as well as a converged camera array and take some images and videos with it to identify the threshold.

  9. Freemium Internet: Next Generation Business Model to connect next billion

    OpenAIRE

    Esselaar, Steve; Song, Steve; Stork, Christoph

    2017-01-01

    This paper analyses a business model for providing free basic-rate Internet to everyone with a data capable phone, living in mobile coverage areas. The model is called Freemium Internet. The term "freemium" refers to a well-known business model for digital services, where free services or applications provide basic functions and more advanced functions are available by paying a fee. We examine the impact of applying the freemium business model to the provision of mobile Internet access and di...

  10. The Analysis of Research on Internet Marketing

    Directory of Open Access Journals (Sweden)

    Vida Davidavičienė

    2014-09-01

    Full Text Available The targeted development of internet marketing faces the dynamic environment and its alterations that occur both – in business terms and conditions and in the use of e­tools and applicable concepts. The growing importance of internet marketing is indicated by a growth in e­markets, an increasing number of new generation consumers, investments of organizations in e­based decisions, a strong interest of scientists representing different fields as well as by widening the base of knowledge related to the above introduced phenomenon. Despite a continuously increasing amount of scientific literature on Internet marketing, this area of research is still at the initial stage. The article is aimed at analysing the fields of ongoing researches into Internet marketing and at identifying the areas required for deeper examination. The article has applied for the methods such as a comparative analysis and summary of scientific literature, information comparison and techniques for grouping and the graphical visualization of information.

  11. Internet Technology on Spacecraft

    Science.gov (United States)

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Powers, Edward I. (Technical Monitor)

    2000-01-01

    approaches. The cost to implement is much less than current approaches due to the availability of highly reliable and standard Internet tools. Use of standard Internet applications onboard reduces the risk of obsolescence inherent in custom protocols due to extremely wide use across all domains. These basic building blocks provide the framework for building onboard software to support direct user communication with payloads including payload control. Other benefits are payload to payload communication from dissimilar spacecraft, constellations of spacecraft, and reconfigurability on orbit. This work is funded through contract with the National Aeronautics and Space Administration (NASA) Goddard Space Flight Center (GSFC).

  12. Ethical Issues in Internet Research: International Good Practice and Irish Research Ethics Documents

    Science.gov (United States)

    Felzmann, Heike

    2013-01-01

    This chapter discusses the main research ethical concerns that arise in internet research and reviews existing research ethical guidance in the Irish context in relation to its application to internet research. The chapter begins with a brief outline of high profile cases in the early history of the internet that highlighted specific emerging…

  13. Development of internet-based information systems using software components with the emphasis on the application in the military organization

    Directory of Open Access Journals (Sweden)

    Miloš J. Pejanović

    2011-01-01

    Full Text Available The development of personal computers and Internet technology causes continuous changes in methodological approaches and concepts of development of information systems. Most existing information systems, due to their heterogeneity, have a problem of integration of subsystems. In order to overcome this problem, software vendors offer different solutions. In this work we explore different approaches and propose an optimal way, with a special emphasis on its application in the military organization. By applying modern approaches in the development of information systems on the concept of distributed component systems, we come to the set of proposed solutions from different manufacturers. The solutions are related to the mechanisms which should ensure that components written in different languages cooperate with each other in heterogeneous systems that are in different nodes in the computer network. This work describes the concept of component distributed information systems of Internet technology and their capabilities and offers a solution specifying the implementation environment in the military organization. Access to the development of information systems In the development of information systems, an important role is given to the choice of appropriate methods and tools. For large systems such as military organizations, standardized procedures and methodologies for the development of information systems are recommended. There are different methodological approaches in the development of information systems: a systematic integrated approach to development (from design, implementation to implementation and maintenance and development of information systems as technical - technological structures (standard computer and network service. The combination of these two approaches leads to the concept of 'open systems' that allow different standards and IT services to operate on these systems. The UML system description of the process of software

  14. Contingent approach to Internet-based supply network integration

    Science.gov (United States)

    Ho, Jessica; Boughton, Nick; Kehoe, Dennis; Michaelides, Zenon

    2001-10-01

    The Internet is playing an increasingly important role in enhancing the operations of supply networks as many organizations begin to recognize the benefits of Internet- enabled supply arrangements. However, the developments and applications to-date do not extend significantly beyond the dyadic model, whereas the real advantages are to be made with the external and network models to support a coordinated and collaborative based approach. The DOMAIN research group at the University of Liverpool is currently defining new Internet- enabled approaches to enable greater collaboration across supply chains. Different e-business models and tools are focusing on different applications. Using inappropriate e- business models, tools or techniques will bring negative results instead of benefits to all the tiers in the supply network. Thus there are a number of issues to be considered before addressing Internet based supply network integration, in particular an understanding of supply chain management, the emergent business models and evaluating the effects of deploying e-business to the supply network or a particular tier. It is important to utilize a contingent approach to selecting the right e-business model to meet the specific supply chain requirements. This paper addresses the issues and provides a case study on the indirect materials supply networks.

  15. Internet Policy

    Science.gov (United States)

    Lehr, William H.; Pupillo, Lorenzo Maria

    The Internet is now widely regarded as essential infrastructure for our global economy and society. It is in our homes and businesses. We use it to communicate and socialize, for research, and as a platform for E-commerce. In the late 1990s, much was predicted about what the Internet has become at present; but now, we have actual experience living with the Internet as a critical component of our everyday lives. Although the Internet has already had profound effects, there is much we have yet to realize. The present volume represents a third installment in a collaborative effort to highlight the all-encompassing, multidisciplinary implications of the Internet for public policy. The first installment was conceived in 1998, when we initiated plans to organize an international conference among academic, industry, and government officials to discuss the growing policy agenda posed by the Internet. The conference was hosted by the European Commission in Brussels in 1999 and brought together a diverse mix of perspectives on what the pressing policy issues would be confronting the Internet. All of the concerns identified remain with us today, including how to address the Digital Divide, how to modify intellectual property laws to accommodate the new realities of the Internet, what to do about Internet governance and name-space management, and how to evolve broadcast and telecommunications regulatory frameworks for a converged world.

  16. The Effect of Internet-Based Education on Student Success in Teaching of 8th Grade Triangles Subject

    Science.gov (United States)

    Kaya, Deniz; Kesan, Cenk; Izgiol, Dilek

    2013-01-01

    In the study, it was researched the effect of internet-based application on student success. Internet-based application was used at the teaching of triangles subject which is included in 8th grade units of triangles and algebra. The study was carried out over the internet with a computer software program: Vitamin Program. The study was carried out…

  17. A framework for QoS & mobility in the Internet next generation

    NARCIS (Netherlands)

    Rexhepi, Vlora; Karagiannis, Georgios; Heijenk, Geert; Pras, Aiko

    2000-01-01

    It is expected that the Internet next generation architecture will support applications with different quality of service requirements, independently of whether their location is fixed or mobile. However, enabling QoS in Internet is a tough challenge, and it gets even tougher when the mobile

  18. A framework for QoS & mobility in the Internet next generation

    NARCIS (Netherlands)

    Karagiannis, Georgios; Rexhepi, Vlora; Heijenk, Geert

    It is expected that the next generation Internet architecture will support applications with different quality of service requirements, independently of whether their location is fixed or movable. However, enabling QoS in Internet is a tough challenge, and it gets even tougher when the mobile

  19. Search strategies on the Internet: general and specific.

    Science.gov (United States)

    Bottrill, Krys

    2004-06-01

    Some of the most up-to-date information on scientific activity is to be found on the Internet; for example, on the websites of academic and other research institutions and in databases of currently funded research studies provided on the websites of funding bodies. Such information can be valuable in suggesting new approaches and techniques that could be applicable in a Three Rs context. However, the Internet is a chaotic medium, not subject to the meticulous classification and organisation of classical information resources. At the same time, Internet search engines do not match the sophistication of search systems used by database hosts. Also, although some offer relatively advanced features, user awareness of these tends to be low. Furthermore, much of the information on the Internet is not accessible to conventional search engines, giving rise to the concept of the "Invisible Web". General strategies and techniques for Internet searching are presented, together with a comparative survey of selected search engines. The question of how the Invisible Web can be accessed is discussed, as well as how to keep up-to-date with Internet content and improve searching skills.

  20. On Internet Symmetry and its Impact on Society

    Science.gov (United States)

    Wolff, S. S.

    2014-12-01

    The end-to-end principle, enunciated by Clark and Saltzer in 1981 enabled an Internet implementation in which there was a symmetry among the network nodes in the sense that no node was architecturally distinguished. Each interface to the network had a unique and accessible address and could communicate on equal terms with any other interface or collection of interfaces. In this egalitarian implementation there was in consequence no architectural distinction between providers and consumers of content - any network node could play either role. As the Internet spread to university campuses, incoming students found 10 megabit Ethernet in the dorm - while their parents at home were still stuck with 56 kilobit dialup. In the two decades bisected by the millenium, this combination of speed and symmetry on campus and beyond led to a panoply of transformational Internet applications such as Internet video conferencing and billion dollar industries like Google, Yahoo!, and Facebook. This talk places early Internet history in a social context, elaborates on the social and economic outcomes, defines"middlebox friction", discusses its erosive consequences, and suggests a solution to restore symmetry to the Internet-at-large.

  1. Study on data compression algorithm and its implementation in portable electronic device for Internet of Things applications

    Directory of Open Access Journals (Sweden)

    Khairi Nor Asilah

    2017-01-01

    Full Text Available An Internet of Things (IoT device is usually powered by a small battery, which does not last long. As a result, saving energy in IoT devices has become an important issue when it comes to this subject. Since power consumption is the primary cause of radio communication, some researchers have proposed several compression algorithms with the purpose of overcoming this particular problem. Several data compression algorithms from previous reference papers are discussed in this paper. The description of the compression algorithm in the reference papers was collected and summarized in a table form. From the analysis, MAS compression algorithm was selected as a project prototype due to its high potential for meeting the project requirements. Besides that, it also produced better performance regarding energy-saving, better memory usage, and data transmission efficiency. This method is also suitable to be implemented in WSN. MAS compression algorithm will be prototyped and applied in portable electronic devices for Internet of Things applications.

  2. Study on data compression algorithm and its implementation in portable electronic device for Internet of Things applications

    Science.gov (United States)

    Asilah Khairi, Nor; Bahari Jambek, Asral

    2017-11-01

    An Internet of Things (IoT) device is usually powered by a small battery, which does not last long. As a result, saving energy in IoT devices has become an important issue when it comes to this subject. Since power consumption is the primary cause of radio communication, some researchers have proposed several compression algorithms with the purpose of overcoming this particular problem. Several data compression algorithms from previous reference papers are discussed in this paper. The description of the compression algorithm in the reference papers was collected and summarized in a table form. From the analysis, MAS compression algorithm was selected as a project prototype due to its high potential for meeting the project requirements. Besides that, it also produced better performance regarding energy-saving, better memory usage, and data transmission efficiency. This method is also suitable to be implemented in WSN. MAS compression algorithm will be prototyped and applied in portable electronic devices for Internet of Things applications.

  3. Internet user behaviour

    Directory of Open Access Journals (Sweden)

    Radbâță, A.

    2011-01-01

    Full Text Available Internet is a useful tool for everybody in a technologically advanced world. As Internet appears and develops, it creates a totally new network environment. The development of commerce on the Internet based on virtual communities has become one of the most successful business models in the world. After analyzing the concept of internet, the e-commerce market and its marketing mix and the benefits and limitations of the Internet, we have presented a few studies on Internet user behaviour. Furthermore, the paper looks at a representative sample of Romanian internet users. The results reveal that the Romanians are using the Internet especially for information gathering, e-mail, entertainment and social networking.

  4. The sales and marketing practices of English-language internet alcohol vendors.

    Science.gov (United States)

    Williams, Rebecca S; Schmidt, Allison

    2014-03-01

    This study aimed to fill information gaps about the sales and marketing practices of internet alcohol vendors and their implications for addressing youth access and other legal violations. Further, it aimed to expand the limited scientific literature on internet alcohol sales using systematic survey methods to inform future efforts to regulate this industry and prevent sales to minors. The design was a cross-sectional website content analysis survey. [Not applicable]. A total of 105 internet alcohol vendor websites. Six key content analysis topics were explored: products offered, average prices and proportions of vendors using different promotions, policy statements and methods for age verification, payment and delivery. Websites sell and promote a variety of alcohol products, offered as cheaply as $1.93 for a 750-ml bottle. Vendors rely heavily upon age verification methods that are unlikely to prevent sales to minors. Many vendors advertise shipping of products via methods through which it is illegal or against delivery company policies to transport alcohol, and 99% of vendors accept credit cards. Limiting and enforcing delivery and payment options are types of policy interventions that have been used successfully with internet cigarette vendors that may be applicable to internet alcohol vendors as well. Internet alcohol vendor practices are insufficient to prevent sales to minors, and need further regulation and enforcement of existing policies. Their sales practices are similar to those of internet cigarette vendors prior to regulation, and similar regulatory approaches may be effective in reducing internet alcohol sales to minors. © 2013 Society for the Study of Addiction.

  5. Monitoring Dangerous Goods in Container Yard Using the Internet of Things

    OpenAIRE

    Ding, Lianhong; Chen, Yifan; Li, Juntao

    2016-01-01

    The Internet of Things (IoT), a network of objects, has been regarded as the next revolution for the global information industry after the Internet. With IoT, many intelligent applications can be accomplished or improved. This paper presents a framework for dangerous goods management in container yard using IoT technology. The framework consists of three layers: perceptual layer, transport layer, and application layer. It offers an infrastructure for management and data analysis and utilizati...

  6. Internet-Based Communication

    Science.gov (United States)

    Gernsbacher, Morton Ann

    2014-01-01

    Google the question, "How is the Internet changing the way we communicate?," and you will find no shortage of opinions, or fears, about the Internet altering the way we communicate. Although the Internet is not necessarily making communication briefer (neither is the Internet making communication less formal), the Internet is manifesting…

  7. A Self-Assessment Stereo Capture Model Applicable to the Internet of Things

    Science.gov (United States)

    Lin, Yancong; Yang, Jiachen; Lv, Zhihan; Wei, Wei; Song, Houbing

    2015-01-01

    The realization of the Internet of Things greatly depends on the information communication among physical terminal devices and informationalized platforms, such as smart sensors, embedded systems and intelligent networks. Playing an important role in information acquisition, sensors for stereo capture have gained extensive attention in various fields. In this paper, we concentrate on promoting such sensors in an intelligent system with self-assessment capability to deal with the distortion and impairment in long-distance shooting applications. The core design is the establishment of the objective evaluation criteria that can reliably predict shooting quality with different camera configurations. Two types of stereo capture systems—toed-in camera configuration and parallel camera configuration—are taken into consideration respectively. The experimental results show that the proposed evaluation criteria can effectively predict the visual perception of stereo capture quality for long-distance shooting. PMID:26308004

  8. Internet of Robotic Things – Converging Sensing/Actuating, Hyperconnectivity, Artificial Intelligence and IoT Platforms

    OpenAIRE

    Vermesan, Ovidiu; Bröring, Arne; Tragos, Elias Z.; Serrano, Martin; Bacciu, Davide; Chessa, Stefano; Gallicchio, Claudio; Micheli, Alessio; Dragone, Mauro; Saffiotti, Alessandro; Simoens, Pieter; Cavallo, Filippo; Bahr, Roy

    2017-01-01

    The Internet of Things (IoT) concept is evolving rapidly and influencing new developments in various application domains, such as the Internet of Mobile Things (IoMT), Autonomous Internet of Things (A-IoT), Autonomous System of Things (ASoT), Internet of Autonomous Things (IoAT), Internet of Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc. that are progressing/advancing by using IoT technology. The IoT influence represents new development and deployment challenges in diffe...

  9. Internet Abuse and Internet Addiction in the Workplace

    Science.gov (United States)

    Griffiths, Mark

    2010-01-01

    Purpose: This paper seeks to overview the issues, concerns and challenges relating to internet abuse and internet addiction in the workplace. Design/methodology/approach: Using psychological literature, the paper outlines a number of important and inter-related areas including brief overviews of internet abuse, and the most extreme form of…

  10. The Future Potential of Internet of Things

    Directory of Open Access Journals (Sweden)

    Aelita Skaržauskienė

    2012-07-01

    Full Text Available Purpose: To define the Internet of things and to analyze it as a background for the internet of services.Design/methodology/approach: The article discusses potential possibilities and problematic issues concerning the Internet of things (IoT and Internet of services (IoS. The debates concerning IoT and its possible application fields have continued for more than ten years. The technological background is there and the fields of application are broad. However, there is still a lack of understanding about the possible benefits that technology could give to various bodies if applied correctly. This article is based on comparison and analysis of scientific articles, research papers and case studies related to the potential for IoT and its implementation in IoS.Theoretical findings: IoT is a logical evolutionary step for the internet. Despite the technological background, the concept of objects which are aware of their surroundings, allow to manipulate them by defining different rule patterns and ensuring interaction possibilities with other objects or human beings. The necessity for web-based services is increasing along with the technological gadgets which support them. Applying things, which are connected in a network, could revolutionize many industry and service sectors and create new service provision and administration methods based on information technology. However, there are many problematic issues and research challenges related to the IoT. Few of the most significant are related to standardization of technology, legal regulation and ethical aspects concerning the IoT technology.Research limitations/implications: The IoT is a popular trend promoted by the business sector and governmental bodies. There are few comprehensive studies and projects which talk about the benefits that business and society could gain from the IoT. There is a lot less information about the possible risk and problematic aspects, and a lack of agreements between the

  11. Internet and video technology in psychotherapy supervision and training.

    Science.gov (United States)

    Wolf, Abraham W

    2011-06-01

    The seven articles in this special section on the use of Internet and video technology represent the latest growth on one branch of the increasingly prolific and differentiated work in the technology of psychotherapy. In addition to the work presented here on video and the Internet applications to supervision and training, information technology is changing the field of psychotherapy through computer assisted therapies and virtual reality interventions.

  12. Internet of robotic things : converging sensing/actuating, hypoconnectivity, artificial intelligence and IoT Platforms

    OpenAIRE

    Vermesan, Ovidiu; Bröring, Arne; Tragos, Elias; Serrano, Martin; Bacciu, Davide; Chessa, Stefano; Gallicchio, Claudio; Micheli, Alessio; Dragone, Mauro; Saffiotti, Alessandro; Simoens, Pieter; Cavallo, Filippo; Bahr, Roy

    2017-01-01

    The Internet of Things (IoT) concept is evolving rapidly and influencing newdevelopments in various application domains, such as the Internet of MobileThings (IoMT), Autonomous Internet of Things (A-IoT), Autonomous Systemof Things (ASoT), Internet of Autonomous Things (IoAT), Internetof Things Clouds (IoT-C) and the Internet of Robotic Things (IoRT) etc.that are progressing/advancing by using IoT technology. The IoT influencerepresents new development and deployment challenges in different a...

  13. Internet security technologies

    CERN Multimedia

    CERN. Geneva

    2003-01-01

    The three pillars of Internet Security are Infrastructure, Applications and People. In this series of lectures we will examine those three pillars and how vital it is for individuals to understand the vulnerabilities of this technology so they can made informed decisions about risks and how they can reduce those risks for themselves and their colleagues.First we will focus on the infrastructure: network; servers; operating systems and all those things that are mostly invisible. Moving up a level, into the visible realm, we discuss the application and see things like buffer overflows, viruses and how as application developers and users we can protect ourselves. Finally, it's all about people. The strongest security technology in the world is easily defeated if people don't understand their role in the whole system.

  14. Examining Internet Access and Social Media Application Use for Online Nutrition Education in SNAP-Ed Participants in Rural Illinois.

    Science.gov (United States)

    Loehmer, Emily; Smith, Sylvia; McCaffrey, Jennifer; Davis, Jeremy

    2018-01-01

    To examine Internet access and interest in receiving nutrition education via social media applications among low-income adults participating in the Supplemental Nutrition Assistance Program Education (SNAP-Ed). A cross-sectional survey was distributed during 25 SNAP-Ed classes throughout the 16 southernmost counties of Illinois. From 188 responses, the majority of participants had Internet access (76%). Among participants aged 18-32 years (n = 51), 92% owned a smartphone with Internet access and 57% indicated that they would use online nutrition education, with most interest in e-mail (41%), Facebook (40%), and text messaging (35%). There was little interest in using blogs, Vine, Twitter, Tumblr, and Pinterest. Overall, 49% of middle-aged adults aged 33-64 years and 87% of seniors aged ≥65 years reported they would not use online nutrition education. Results indicated similar Internet accessibility in southern Illinois among low-income populations compared with national rural rates. Interest in using online nutrition education varied among SNAP-Ed participants according to age. Young adults appeared to be the most captive audience regarding online nutrition education. Results may be useful to agencies implementing SNAP-Ed to supplement current curriculum with online nutrition education for audiences aged ≤32 years. Copyright © 2017 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  15. Evaluation of reinitialization-free nonvolatile computer systems for energy-harvesting Internet of things applications

    Science.gov (United States)

    Onizawa, Naoya; Tamakoshi, Akira; Hanyu, Takahiro

    2017-08-01

    In this paper, reinitialization-free nonvolatile computer systems are designed and evaluated for energy-harvesting Internet of things (IoT) applications. In energy-harvesting applications, as power supplies generated from renewable power sources cause frequent power failures, data processed need to be backed up when power failures occur. Unless data are safely backed up before power supplies diminish, reinitialization processes are required when power supplies are recovered, which results in low energy efficiencies and slow operations. Using nonvolatile devices in processors and memories can realize a faster backup than a conventional volatile computer system, leading to a higher energy efficiency. To evaluate the energy efficiency upon frequent power failures, typical computer systems including processors and memories are designed using 90 nm CMOS or CMOS/magnetic tunnel junction (MTJ) technologies. Nonvolatile ARM Cortex-M0 processors with 4 kB MRAMs are evaluated using a typical computing benchmark program, Dhrystone, which shows a few order-of-magnitude reductions in energy in comparison with a volatile processor with SRAM.

  16. Tracking the Internet into the 21st Century

    CERN Multimedia

    CERN. Geneva

    2009-01-01

    Abstract: The Internet was designed in 1973, began operation in 1983, became widely known to the general public in 1993 and now has become a global infrastructure for all forms of communication. The network is relatively unaware of the applications that use it and also relatively insensitive to the technologies that transport its Internet "packets" around the world. Where did the Internet come from? What is its condition today? How will it be used tomorrow? What might we expect it to look like in the next decade? What technical and international policy challenges does the Internet pose? Could it be made to operate across our solar system to support manned and robotic exploration? Answers to these questions and more will be provided in this presentation. Short Biography: Vinton G. Cerf is vice president and chief Internet evangelist for Google. Cerf served as a senior vice president of MCI from 1994-2005, as VP of the Corporation for National Research Initiatives from 1986-1994, as VP MCI from 1982-1986, and ...

  17. Social Internet of Vehicles for Smart Cities

    Directory of Open Access Journals (Sweden)

    Leandros A. Maglaras

    2016-02-01

    Full Text Available Digital devices are becoming increasingly ubiquitous and interconnected. Their evolution to intelligent parts of a digital ecosystem creates novel applications with so far unresolved security issues. A particular example is a vehicle. As vehicles evolve from simple means of transportation to smart entities with new sensing and communication capabilities, they become active members of a smart city. The Internet of Vehicles (IoV consists of vehicles that communicate with each other and with public networks through V2V (vehicle-to-vehicle, V2I (vehicle-to-infrastructure and V2P (vehicle-to-pedestrian interactions, which enables both the collection and the real-time sharing of critical information about the condition on the road network. The Social Internet of Things (SIoT introduces social relationships among objects, creating a social network where the participants are not humans, but intelligent objects. In this article, we explore the concept of the Social Internet of Vehicles (SIoV, a network that enables social interactions both among vehicles and among drivers. We discuss technologies and components of the SIoV, possible applications and issues of security, privacy and trust that are likely to arise.

  18. Problematic Internet use in a sample of Colombian university students

    Directory of Open Access Journals (Sweden)

    Diana Ximena Puerta-Cortés

    2013-06-01

    Full Text Available Internet is a tool that facilitates the development of academic and social activities, business and entertainment. However, particular bevavior may arise in relation with its overuse. This research aims to identify sociodemographic characteristics and type of Internet use in a sample of Colombian university students and relate it to the possible use problematic. The sample consisted of 595 students from the University of Ibagué of 16-34 years of age who completed all three sections of the questionnaire: (1 socio-demographic data, (2 Internet usage information and (3 an adapted version of the Internet Addiction Test - IAT- (Young, 1998a. The results showed two groups, one with controlled use of the internet (88% and one with problematic use (12 %, only one case showed addictive use. Problematic Internet use was related to the number of hours  pent on social networks, chat, sites with adult content and movies. The use of these Internet applications generated interference in daily activities.

  19. Analisis Perkembangan Internet Broadband di Daerah Perbatasan Sulawesi Utara

    Directory of Open Access Journals (Sweden)

    Riva'atul Adaniah Wahab

    2016-12-01

    infrastructure is still insufficient, the availability of high-quality internet broadband services with low rates are still difficult to realize. From the aspect of demand, stigma or the community perception that the internet is not important makes the people don't have internet access. The barriers is predominantly lack of knowledge in internet usage. This factor also causes community internet broadband literacy at level 0. As solutions, the preparation and establishment of policies and regulations such as the QoS service, interconnection, infrastructure sharing can provide high-quality internet broadband internet at a cheaper price. Besides the distribution of valuable mobile device (smartphone should also be encouraged by the application of local content level for the production of the device. No less important is the increase of community lietracy in internet broadband through socialization or training, both formal and informal.

  20. Internet Research: Implications for The Future of Health Care

    Science.gov (United States)

    Shortliffe, Ted

    1999-01-01

    The phenomenal growth in Internet usage, largely due to the success of the World Wide Web, has stressed the international networking infrastructure in ways that were never contemplated when the early ARPAnet emerged from research laboratories in the 1970s. Some of the challenges are logistical and legal, and have to do with management of domain names, intellectual-property agreements, and international business activities. Others are technical, resulting both because we are envisioning applications that the current Internet cannot support, and because the existing infrastructure cannot scale to a world in which a huge portion of the world's population is online and individual homes and businesses may have IP addresses for tens of electronic devices, such as appliances, heating systems, or security alarms. In this presentation, I will discuss some of the US research and testbed activities that are currently underway in an effort to respond to the technical challenges. These include the Internet-2 testbed created by a consortium of academic institutions, and the federal government's Next Generation Internet research initiative. I will explain the difference between these two programs and identify some of the technical requirements other than a simple increase in bandwidth that have been identified for the evolving Internet. This will lead to a discussion of the limitations of the current Internet that have constrained its use in health care and that accordingly help to define the networking research agenda that is of greatest importance to the biomedical community. Policy and regulatory issues that arise because of health care's use of the Internet will also be discussed, as will those technical requirements that may be unique to biomedical applications. One goal of the discussion will be to motivate an international discussion of the ways in which the medical informatics community should be engaged in both basic and applied research in the area of networking and the

  1. Freedom of Speech, Sexual Harassment, and Internet Filters in Academic Libraries.

    Science.gov (United States)

    Janssen, Avi

    2000-01-01

    Discusses the appropriateness and legality of Internet filters in any type of library and suggests that there is a much less tenable legal justification for Internet filters in academic libraries. Topics include freedom of speech; pornography versus obscenity; sexual harassment; applicable court cases; and acceptable use policies. (LRW)

  2. KAJIAN EMPIRIS INTERNET FINANCIAL REPORTING DAN PRAKTEK PENGUNGKAPAN

    Directory of Open Access Journals (Sweden)

    Reskino ,

    2017-02-01

    Full Text Available Purpose – Internet is a medium with applications that are used to streamline the communication process including the communication of financial statements to the parties concerned. This study examined the factors that affect the company's financial reporting on the internet property sector, real estate and building construction. These factors include firm size, leverage, profitability and liquidity of the financial reporting through the internet (IFR. Design/methodology/approach – Secondarydata were sourced from 53 samples of the company which listed in the Indonesia Stock Exchange in 2013. The study was conducted on Research data analysis using logistic regression analysis with dummy variables and t test (partial with significance level of 5%. Findings –The analysis found that only the size of companies that have effect on the financial reporting through the internet (internet financial reporting. However leverage, profitability, and liquidity do not explain the company choice to use IFR. Originalitas – This is one of the studies to examine the factors that influence the disclosure of financial statements on the Internet at property sector, real estate and building construction. The artikel provides a valuable contribution to researchers and practitioners to extends the understanding of IFR at property sector, real estate and building construction  Keywords: Internet Financial Reporting, Firm Size, Leverage, Profitability, Liquidity, Voluntary Disclosure

  3. Internet marketing

    OpenAIRE

    Zelený, Martin

    2009-01-01

    In the bachelor thesis are introduced theoretical concepts of the Internet and marketing, accented the need of marketing mix along with its specifics of the internet environment. Next is interpreted which tools can be used for marketing of firms and which marketing instruments are to be deployed. Final chapter illustrates socio-demographics of Czech internet users along with media market allocation from the perspective of all media as well as in the segment of the Internet.

  4. Internet Technology for Future Space Missions

    Science.gov (United States)

    Hennessy, Joseph F. (Technical Monitor); Rash, James; Casasanta, Ralph; Hogie, Keith

    2002-01-01

    Ongoing work at National Aeronautics and Space Administration Goddard Space Flight Center (NASA/GSFC), seeks to apply standard Internet applications and protocols to meet the technology challenge of future satellite missions. Internet protocols and technologies are under study as a future means to provide seamless dynamic communication among heterogeneous instruments, spacecraft, ground stations, constellations of spacecraft, and science investigators. The primary objective is to design and demonstrate in the laboratory the automated end-to-end transport of files in a simulated dynamic space environment using off-the-shelf, low-cost, commodity-level standard applications and protocols. The demonstrated functions and capabilities will become increasingly significant in the years to come as both earth and space science missions fly more sensors and the present labor-intensive, mission-specific techniques for processing and routing data become prohibitively. This paper describes how an IP-based communication architecture can support all existing operations concepts and how it will enable some new and complex communication and science concepts. The authors identify specific end-to-end data flows from the instruments to the control centers and scientists, and then describe how each data flow can be supported using standard Internet protocols and applications. The scenarios include normal data downlink and command uplink as well as recovery scenarios for both onboard and ground failures. The scenarios are based on an Earth orbiting spacecraft with downlink data rates from 300 Kbps to 4 Mbps. Included examples are based on designs currently being investigated for potential use by the Global Precipitation Measurement (GPM) mission.

  5. Fundamental rate-loss trade-off for the quantum internet.

    Science.gov (United States)

    Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong

    2016-11-25

    The quantum internet holds promise for achieving quantum communication-such as quantum teleportation and quantum key distribution (QKD)-freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka-Guha-Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result-putting a practical but general limitation on the quantum internet-enables us to grasp the potential of the future quantum internet.

  6. Multivariable Sensors for Ubiquitous Monitoring of Gases in the Era of Internet of Things and Industrial Internet.

    Science.gov (United States)

    Potyrailo, Radislav A

    2016-10-12

    Modern gas monitoring scenarios for medical diagnostics, environmental surveillance, industrial safety, and other applications demand new sensing capabilities. This Review provides analysis of development of new generation of gas sensors based on the multivariable response principles. Design criteria of these individual sensors involve a sensing material with multiresponse mechanisms to different gases and a multivariable transducer with independent outputs to recognize these different gas responses. These new sensors quantify individual components in mixtures, reject interferences, and offer more stable response over sensor arrays. Such performance is attractive when selectivity advantages of classic gas chromatography, ion mobility, and mass spectrometry instruments are canceled by requirements for no consumables, low power, low cost, and unobtrusive form factors for Internet of Things, Industrial Internet, and other applications. This Review is concluded with a perspective for future needs in fundamental and applied aspects of gas sensing and with the 2025 roadmap for ubiquitous gas monitoring.

  7. Improving Service Management in the Internet of Things

    Science.gov (United States)

    Sammarco, Chiara; Iera, Antonio

    2012-01-01

    In the Internet of Things (IoT) research arena, many efforts are devoted to adapt the existing IP standards to emerging IoT nodes. This is the direction followed by three Internet Engineering Task Force (IETF) Working Groups, which paved the way for research on IP-based constrained networks. Through a simplification of the whole TCP/IP stack, resource constrained nodes become direct interlocutors of application level entities in every point of the network. In this paper we analyze some side effects of this solution, when in the presence of large amounts of data to transmit. In particular, we conduct a performance analysis of the Constrained Application Protocol (CoAP), a widely accepted web transfer protocol for the Internet of Things, and propose a service management enhancement that improves the exploitation of the network and node resources. This is specifically thought for constrained nodes in the abovementioned conditions and proves to be able to significantly improve the node energetic performance when in the presence of large resource representations (hence, large data transmissions).

  8. Information on radionuclides on the Internet. http://www.tue.nl/sbd/nvsnucleair.htm

    International Nuclear Information System (INIS)

    Franken, Y.

    1997-01-01

    A selection from Internet information sources on the subjects of radiation protection, dosimetry and medical radiation applications are discussed. The article is also available through the Internet (see title) including links to the discussed sites

  9. Internet accounting

    NARCIS (Netherlands)

    Pras, Aiko; van Beijnum, Bernhard J.F.; Sprenkels, Ron; Parhonyi, R.

    2001-01-01

    This article provides an introduction to Internet accounting and discusses the status of related work within the IETF and IRTF, as well as certain research projects. Internet accounting is different from accounting in POTS. To understand Internet accounting, it is important to answer questions like

  10. Gender Difference in Internet Use and Internet Problems among Quebec High School Students.

    Science.gov (United States)

    Dufour, Magali; Brunelle, Natacha; Tremblay, Joel; Leclerc, Danielle; Cousineau, Marie-Marthe; Khazaal, Yasser; Légaré, Andrée-Anne; Rousseau, Michel; Berbiche, Djamal

    2016-10-01

    There are presently no data available concerning Internet addiction (IA) problems among adolescents in Canada and the province of Quebec. The goal of this study is thus to document and compare the influence of gender on Internet use and addiction. The study data were collected from a larger research project on gambling among adolescents. Activities conducted online (applications used and time spent) as well as answers to the Internet Addiction Test (IAT) were collected from 3938 adolescents from grades 9 to 11. The two most often employed cut-off points for the IAT in the literature were documented: (40-69 and 70+) and (50+). Boys spent significantly more time on the Internet than did girls. A greater proportion of the girls made intense use of social networks, whereas a greater proportion of the boys made intense use of massively multiplayer online role-playing games, online games, and adult sites. The proportion of adolescents with a potential IA problem varied according to the cut-off employed. When the cut-off was set at 70+, 1.3% of the adolescents were considered to have an IA, while 41.7% were seen to be at risk. At a 50+ cut-off, 18% of the adolescents were considered to have a problem. There was no significant difference between the genders concerning the proportion of adolescents considered to be at risk or presenting IA problems. Finally, analysis of the percentile ranks would seem to show that a cut-off of 50+ better describes the category of young people at risk. The results of this study make it possible to document Internet use and IA in a large number of Quebec adolescents. © The Author(s) 2016.

  11. Recent Progress in Data Engineering and Internet Technology Volume 1

    CERN Document Server

    Gaol, Ford Lumban

    2013-01-01

    The latest inventions in internet technology influence most of business and daily activities. Internet security, internet data management, web search, data grids, cloud computing, and web-based applications play vital roles, especially in business and industry, as more transactions go online and mobile. Issues related to ubiquitous computing are becoming critical.   Internet technology and data engineering should reinforce efficiency and effectiveness of business processes. These technologies should help people make better and more accurate decisions by presenting necessary information and possible consequences for the decisions. Intelligent information systems should help us better understand and manage information with ubiquitous data repository and cloud computing.   This book is a compilation of some recent research findings in Internet Technology and Data Engineering. This book provides state-of-the-art accounts in computational algorithms/tools, database management and database technologies,  intelli...

  12. Recent Progress in Data Engineering and Internet Technology Volume 2

    CERN Document Server

    Gaol, Ford Lumban

    2012-01-01

    The latest inventions in internet technology influence most of business and daily activities. Internet security, internet data management, web search, data grids, cloud computing, and web-based applications play vital roles, especially in business and industry, as more transactions go online and mobile. Issues related to ubiquitous computing are becoming critical.   Internet technology and data engineering should reinforce efficiency and effectiveness of business processes. These technologies should help people make better and more accurate decisions by presenting necessary information and possible consequences for the decisions. Intelligent information systems should help us better understand and manage information with ubiquitous data repository and cloud computing.   This book is a compilation of some recent research findings in Internet Technology and Data Engineering. This book provides state-of-the-art accounts in computational algorithms/tools, database management and database technologies,  intelli...

  13. Future Internet: towards context information brokering

    NARCIS (Netherlands)

    Deventer, O.M. van; Tilanus, P.A.J.; Schenk, M.R.; Cramer, E.R.; Adriaanse, J.

    2009-01-01

    Future Internet is about combinations of communication, content and context services. Whereas the former two have achieved already a reasonable state of maturity, context information services are still at their infancy: at most stand-alone applications with limited on-line-or-off-line presence

  14. Internet firewalls: questions and answers

    Science.gov (United States)

    Ker, Keith

    1996-03-01

    As organizations consider connecting to the Internet, the issue of internetwork security becomes more important. There are many tools and components that can be used to secure a network, one of which is a firewall. Modern firewalls offer highly flexible private network security by controlling and monitoring all communications passing into or out of the private network. Specifically designed for security, firewalls become the private network's single point of attack from Internet intruders. Application gateways (or proxies) that have been written to be secure against even the most persistent attacks ensure that only authorized users and services access the private network. One-time passwords prevent intruders from `sniffing' and replaying the usernames and passwords of authorized users to gain access to the private network. Comprehensive logging permits constant and uniform system monitoring. `Address spoofing' attacks are prevented. The private network may use registered or unregistered IP addresses behind the firewall. Firewall-to-firewall encryption establishes a `virtual private network' across the Internet, preventing intruders from eavesdropping on private communications, eliminating the need for costly dedicated lines.

  15. Enhancing prospective chemistry teachers cognitive structures in the topics of bonding and hybridization by internet-assisted chemistry applications

    OpenAIRE

    Özge Özyalçın Oskay, Sinem Dinçol

    2011-01-01

    The purpose of this study is to determine the effects of internet-assisted chemistry applications on prospective chemistry teachers’ cognitive structures in the topics of bonding and hybridization. The sample of the study consisted of 36 prospective chemistry teachers attending Hacettepe University, Faculty of Education, the Department of Chemistry Education in 2010-2011 academic year and taking Basic Chemistry I lesson. In the study, students were separated into experimental and control gr...

  16. Developing an Internet Oriented Platform for Earthquake Engineering Application and Web-based Virtual Reality Simulation System for Seismic hazards: Towards Disaster Mitigation in Metropolises

    Directory of Open Access Journals (Sweden)

    Ali Alaghehbandian

    2003-04-01

    Full Text Available This paper reviews the state of the art on risk communication to the public, with an emphasis on simulation of seismic hazards using VRML. Rapid growth computer technologies, especially the Internet provide human beings new measures to deal with engineering and social problems which were hard to solve in traditional ways. This paper presents a prototype of an application platform based on the Internet using VR (Virtual Reality for civil engineering considering building an information system of risk communication for seismic hazards and at the moment in the case of bridge structure.

  17. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  18. [Internet and cell phone addiction: passing fad or disorder?].

    Science.gov (United States)

    Sanchez-Carbonell, Xavier; Beranuy, Marta; Castellana, Montserrat; Chamarro, Ander; Oberst, Ursula

    2008-01-01

    The Information and Communication Technologies (ICT) generate new styles of meeting people or connecting with friends or strangers. In this context, the internet and the mobile phone deserve special attention. This article deals with the maladaptive use of these technologies. By reviewing the literature published between 1991 and 2005 and indexed in the databases of PsycINFO, Medline, Psicodoc, IME, and ISOC, we aim to determine whether maladaptive use of these technologies can be considered a mental disorder, and if so, of which type. We describe the psychological phenomena of maladaptive use of the internet and mobile phones, we review research on prevalence and possible risk groups, and finally we discuss some of the criticisms made with regard to the existence and classification of this disorder. It is concluded that excessive use of the internet can lead to a mental disorder of the addictive type, which can particularly affect individuals with special emotional needs, as well as adolescents and young adults. Among specific applications of the internet, a major risk is found for the use of communicative and synchronic applications, such as chats and online role games, since they permit hyperpersonal communication, playing with different identities, and projections and dissociation without consequences in real life. Furthermore, the internet can play an important role in the development and maintenance of other addictions, such as pathological gambling and sex addiction. In contrast to the case of the internet, maladaptive use of mobile phones may be considered abuse, but not addiction, since their use does not lead to the rapid emotional changes or the playing with identities that can take place in chats and online role games.

  19. Research on Intelligent Agriculture Greenhouses Based on Internet of Things Technology

    OpenAIRE

    Shang Ying; Fu An-Ying

    2017-01-01

    Internet of things is a hot topic in the field of research, get a lot of attention, On behalf of the future development trend of the network, Internet of Things has a wide range of applications, because of the efficient and reliable information transmission in modern agriculture. In the greenhouse, the conditions of the Greenhouse determine the quality of crops, high yield and many other aspects. Research on Intelligent Agriculture Greenhouses based on Internet of Things, mainly Research on h...

  20. The Internet of Things: Perspectives on Security from RFID and WSN

    OpenAIRE

    Shah, Ayush; Pal, Ambar; Acharya, H. B.

    2016-01-01

    A massive current research effort focuses on combining pre-existing 'Intranets' of Things into one Internet of Things. However, this unification is not a panacea; it will expose new attack surfaces and vectors, just as it enables new applications. We therefore urgently need a model of security in the Internet of Things. In this regard, we note that IoT descends directly from pre-existing research (in embedded Internet and pervasive intelligence), so there exist several bodies of related work:...

  1. Positioning internet of things application, and associated human behavioural changes in a developing context

    CSIR Research Space (South Africa)

    Coetzee, L

    2012-05-01

    Full Text Available Internet of Things (IoT) is an evolutionary development with the potential to greatly influence and impact society, economy and environment. Through IoT, all devices become Internet connected. These connected devices are controlled by largescale...

  2. Perceptions of Internet Usefulness amongst Non-Traditional ...

    African Journals Online (AJOL)

    ... Ghanaian NTEs with the highest internationalisation (80% - 99%) reckoned the ... Wholly owned local exporting firms believed the most that, the Internet was key ... knowledge about the technology and the use of its applications can be more ...

  3. Internet agorą wyborczą XXI wieku

    Directory of Open Access Journals (Sweden)

    Jarosław Kinal

    2012-01-01

    Full Text Available The transfer of the activity of electoral candidates to the Internet was one significant change in the way of the creating of the image of the candidates in the local elections in 2010. Politicians have begun to notice the possibilities offered by the network before. In this paper, an analysis was provided of the two recent electoral campaigns in Poland. In the introduction, a few figures were related to the campaign of Barack Obama and the marketing potential hidden in applications was outlined, generally referred to as Web 2.0. In the initial chapter, paradigms were presented needed to establish the planning stage in the electoral campaign in the Internet. Deformations of communication were also presented in relation to the traditional H. Lasswell’s communication model. An analysis was provided of selected political marketing tools used in the Internet. The analysis indicates a poor use of the Internet in the electoral campaign for the candidates in Subcarpathia even though there are one candidate in this region who created virtual avatars to build her political image.

  4. Internet

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet. The latest communication revolution surrounds Internet. Some stats*:. 210 billion emails sent daily; 15 billion phone calls everyday; ~40 billion WWW links served everyday. * Source : The Radicati group.

  5. Virtualization of Event Sources in Wireless Sensor Networks for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Néstor Lucas Martínez

    2014-12-01

    Full Text Available Wireless Sensor Networks (WSNs are generally used to collect information from the environment. The gathered data are delivered mainly to sinks or gateways that become the endpoints where applications can retrieve and process such data. However, applications would also expect from a WSN an event-driven operational model, so that they can be notified whenever occur some specific environmental changes instead of continuously analyzing the data provided periodically. In either operational model, WSNs represent a collection of interconnected objects, as outlined by the Internet of Things. Additionally, in order to fulfill the Internet of Things principles, Wireless Sensor Networks must have a virtual representation that allows indirect access to their resources, a model that should also include the virtualization of event sources in a WSN. Thus, in this paper a model for a virtual representation of event sources in a WSN is proposed. They are modeled as internet resources that are accessible by any internet application, following an Internet of Things approach. The model has been tested in a real implementation where a WSN has been deployed in an open neighborhood environment. Different event sources have been identified in the proposed scenario, and they have been represented following the proposed model.

  6. Virtualization of Event Sources in Wireless Sensor Networks for the Internet of Things

    Science.gov (United States)

    Martínez, Néstor Lucas; Martínez, José-Fernán; Díaz, Vicente Hernández

    2014-01-01

    Wireless Sensor Networks (WSNs) are generally used to collect information from the environment. The gathered data are delivered mainly to sinks or gateways that become the endpoints where applications can retrieve and process such data. However, applications would also expect from a WSN an event-driven operational model, so that they can be notified whenever occur some specific environmental changes instead of continuously analyzing the data provided periodically. In either operational model, WSNs represent a collection of interconnected objects, as outlined by the Internet of Things. Additionally, in order to fulfill the Internet of Things principles, Wireless Sensor Networks must have a virtual representation that allows indirect access to their resources, a model that should also include the virtualization of event sources in a WSN. Thus, in this paper a model for a virtual representation of event sources in a WSN is proposed. They are modeled as internet resources that are accessible by any internet application, following an Internet of Things approach. The model has been tested in a real implementation where a WSN has been deployed in an open neighborhood environment. Different event sources have been identified in the proposed scenario, and they have been represented following the proposed model. PMID:25470489

  7. Virtualization of event sources in wireless sensor networks for the internet of things.

    Science.gov (United States)

    Lucas Martínez, Néstor; Martínez, José-Fernán; Hernández Díaz, Vicente

    2014-12-01

    Wireless Sensor Networks (WSNs) are generally used to collect information from the environment. The gathered data are delivered mainly to sinks or gateways that become the endpoints where applications can retrieve and process such data. However, applications would also expect from a WSN an event-driven operational model, so that they can be notified whenever occur some specific environmental changes instead of continuously analyzing the data provided periodically. In either operational model, WSNs represent a collection of interconnected objects, as outlined by the Internet of Things. Additionally, in order to fulfill the Internet of Things principles, Wireless Sensor Networks must have a virtual representation that allows indirect access to their resources, a model that should also include the virtualization of event sources in a WSN. Thus, in this paper a model for a virtual representation of event sources in a WSN is proposed. They are modeled as internet resources that are accessible by any internet application, following an Internet of Things approach. The model has been tested in a real implementation where a WSN has been deployed in an open neighborhood environment. Different event sources have been identified in the proposed scenario, and they have been represented following the proposed model.

  8. Design theory, modelling and the application for the Internet of Things service

    Science.gov (United States)

    Shang, Xiaopu; Zhang, Runtong; Zhu, Xiaomin; Zhou, Quan

    2016-03-01

    The Internet of Things (IoT) makes it possible for us to sense the physical world and locate objects in it using the enabling technologies associated with IoT. Compared with traditional information systems, IoT enabling technologies can help acquire real-time data necessary for managing enterprise business process. An IoT system should have an ability beyond integrating enabling technologies and traditional information systems that are only used to access environmental data. This paper begins with a literature review of IoT-related issues and a discussion of the difference between traditional information service and IoT service. Three principles for IoT service design from the perceptive of service classification, coordination and compatibility are proposed. The paper also proposes a utility model for resource allocation in order to improve IoT service performance, and an application involving a cold chain visibility platform is given to illustrate our research.

  9. Drivers and barriers to the Internet of Things

    OpenAIRE

    Page, T

    2015-01-01

    The aim of this research is to investigate the development and implications for applications and future directions of the Internet of Things (IoT). The current understanding of the Internet of Things is explored and discussed to understand, what is currently understood because IoT has been often considered a vague and relatively little understood concept. A range of users were asked to describe their understanding of the IoT and how they use IoT devices. A significant finding showed that alth...

  10. Responsible Internet Use.

    Science.gov (United States)

    Truett, Carol; And Others

    1997-01-01

    Provides advice for making school Internet-use guidelines. Outlines responsible proactive use of the Internet for educators and librarians, discusses strengths and weaknesses of Internet blocking software and rating systems, and describes acceptable-use policies (AUP). Lists resources for creating your own AUP, Internet filtering software, and…

  11. Thermal engineering studies with Excel, Mathcad and Internet

    CERN Document Server

    2016-01-01

    This book provides the fundamentals of the application of mathematical methods, modern computational tools (Excel, Mathcad, SMath, etc.), and the Internet to solve the typical problems of heat and mass transfer, thermodynamics, fluid dynamics, energy conservation and energy efficiency. Chapters cover the technology for creating and using databases on various properties of working fluids, coolants and thermal materials. All calculation methods are provided with links to online computational pages where data can be inserted and recalculated. It discusses tasks involving the generation of electricity at thermal, nuclear, gas turbine and combined-cycle power plants, as well as processes of co- and trigeneration, conditioning facilities and heat pumps. This text engages students and researchers by using modern calculation tools and the Internet for thermal engineering applications. .

  12. An Internet of Things Generic Reference Architecture

    DEFF Research Database (Denmark)

    Bhalerao, Dipashree M.; Riaz, Tahir; Madsen, Ole Brun

    2013-01-01

    Internet of things Network is a future application of Internet. This network has three major basic blocks as business process or Application, core network or internetwork and peripheral network as Things or objects. The assembly has the basic intention of connecting all physical and virtual things......, and keeping track of all these things for monitoring and controlling some information. IoT architecture is studied from software architecture, overall system architecture and network architecture point of view. Paper puts forward the requirements of software architecture along with, its component...... and deployment diagram, process and interface diagram at abstract level. Paper proposes the abstract generic IoT reference and concrete abstract generic IoT reference architectures. Network architecture is also put up as a state of the art. Paper shortly gives overviews of protocols used for IoT. Some...

  13. [Interrelations Between Adolescent Problematic Internet Use and Parental Internet Mediation].

    Science.gov (United States)

    Kammerl, Rudolf; Wartberg, Lutz

    2018-02-01

    Interrelations Between Adolescent Problematic Internet Use and Parental Internet Mediation Everyday life of adolescents and their parents is increasingly characterized by digital media usage (also referred to as "process of mediatization"). In the current study, associations between problematic Internet use of the adolescents (as a possible consequence of the process of mediatization) and parental media education were explored. For this purpose, throughout Germany 1,095 family dyads (an adolescent and a related parent) were investigated with a standardized questionnaire measuring different aspects of parental media education and adolescent problematic Internet use. We conducted two multiple linear regression analyses (dimensional approach) with adolescent problematic Internet use based on self-ratings (model 1, corrected R 2 = 0.18) and parental assessment (model 2, corrected R 2 = 0.24) as response variables. Consistently for self- and parental ratings, adolescent problematic Internet use was statistically significant related to male gender (of the adolescent), a more frequent inconsistent media education (adolescents' and parents' perspective) and a stronger monitoring (parents' perspective). Additionally, we observed associations between the parental rating of adolescent problematic Internet use and a less frequent active and restrictive Internet Mediation (parents' perspective). The findings of the present study show the importance of parental media education for problematic Internet use in adolescence and especially, the role of inconsistent media education should be investigated again in further studies.

  14. Watching pornographic pictures on the Internet: role of sexual arousal ratings and psychological-psychiatric symptoms for using Internet sex sites excessively.

    Science.gov (United States)

    Brand, Matthias; Laier, Christian; Pawlikowski, Mirko; Schächtle, Ulrich; Schöler, Tobias; Altstötter-Gleich, Christine

    2011-06-01

    Excessive or addictive Internet use can be linked to different online activities, such as Internet gaming or cybersex. The usage of Internet pornography sites is one important facet of online sexual activity. The aim of the present work was to examine potential predictors of a tendency toward cybersex addiction in terms of subjective complaints in everyday life due to online sexual activities. We focused on the subjective evaluation of Internet pornographic material with respect to sexual arousal and emotional valence, as well as on psychological symptoms as potential predictors. We examined 89 heterosexual, male participants with an experimental task assessing subjective sexual arousal and emotional valence of Internet pornographic pictures. The Internet Addiction Test (IAT) and a modified version of the IAT for online sexual activities (IATsex), as well as several further questionnaires measuring psychological symptoms and facets of personality were also administered to the participants. Results indicate that self-reported problems in daily life linked to online sexual activities were predicted by subjective sexual arousal ratings of the pornographic material, global severity of psychological symptoms, and the number of sex applications used when being on Internet sex sites in daily life, while the time spent on Internet sex sites (minutes per day) did not significantly contribute to explanation of variance in IATsex score. Personality facets were not significantly correlated with the IATsex score. The study demonstrates the important role of subjective arousal and psychological symptoms as potential correlates of development or maintenance of excessive online sexual activity.

  15. Convergence of Secure Vehicular Ad-Hoc Network and Cloud in Internet of Things

    DEFF Research Database (Denmark)

    Kulkarni, Nandkumar P.; Prasad, Neeli R.; Lin, Tao

    2016-01-01

    that VANET could be the basis of many new applications in the field of Internet of Things (IoT). The applications of VANET are not limited to be the driver for safety, traffic management, entertainment, commerce, etc. In the future, VANETs are expected to transport the enormous amount of information. Some......-as-a-Service (STaaS), Platform-as-a-Service (PaaS), etc. over the internet via Cloud vendors....

  16. Health domains for sale: the need for global health Internet governance.

    Science.gov (United States)

    Mackey, Tim Ken; Liang, Bryan A; Kohler, Jillian C; Attaran, Amir

    2014-03-05

    A debate on Internet governance for health, or "eHealth governance", is emerging with the impending award of a new dot-health (.health) generic top-level domain name (gTLD) along with a host of other health-related domains. This development is critical as it will shape the future of the health Internet, allowing largely unrestricted use of .health second-level domain names by future registrants, raising concerns about the potential for privacy, use and marketing of health-related information, credibility of online health content, and potential for Internet fraud and abuse. Yet, prospective .health gTLD applicants do not provide adequate safeguards for use of .health or related domains and have few or no ties to the global health community. If approved, one of these for-profit corporate applicants would effectively control the future of the .health address on the Internet with arguably no active oversight from important international public health stakeholders. This would represent a lost opportunity for the public health, medical, and broader health community in establishing a trusted, transparent and reliable source for health on the Internet. Countries, medical associations, civil society, and consumer advocates have objected to these applications on grounds that they do not meet the public interest. We argue that there is an immediate need for action to postpone awarding of the .health gTLD and other health-related gTLDs to address these concerns and ensure the appropriate development of sound eHealth governance rules, principles, and use. This would support the crucial need of ensuring access to quality and evidence-based sources of health information online, as well as establishing a safe and reliable space on the Internet for health. We believe, if properly governed, .health and other domains could represent such a promise in the future.

  17. Security in the internet; Sicherheitsaspekte im Internet

    Energy Technology Data Exchange (ETDEWEB)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P. [Witten-Herdecke Univ., Witten (Germany). Inst. fuer Diagnostische und Interventionelle Radiologie

    2000-04-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [German] Ziele der Studie und Analyse: Es sollten die Fragen beantwortet werden, ob es moeglich ist, das Internet als sicheres Uebermittlungsmedium fuer Telemedizin zu nutzen und welche Sicherheitsrisiken bestehen. Dazu wurden die gaengigen Sicherheitsmethoden analysiert. Telemedizin im Internet ist mit Sicherheitsrisiken behaftet, die durch die Oeffnung eines Intranets mit der Moeglichkeit zur unberechtigten Manipulation von aussen bedingt sind. Schlussfolgerung: Diese Sicherheitsrisiken koennen durch eine Firewall weitgehend unterbunden werden. Chipkarten wie die Health professional card ermoeglichen eine hohe Sicherheit bei digitaler Signatur und sicherer Authentifikation der Sender und Empfaenger von Daten im Internet. Auch Standards wie Pretty good privacy sind inzwischen fuer sichere e-mails einfach einzusetzen. Wichtige Voraussetzung fuer die Reduktion von Sicherheitsrisiken ist unter Beruecksichtigung der gesetzlichen Vorgaben die exakte Planung aller Aktivitaeten im Internet, bei denen medizinische Patientendaten versandt werden sollen, in einem Team aus Aerzten und Informatikern. (orig.)

  18. From Access to Collaboration: Four African Pathologists Profile Their Use of the Internet and Social Media.

    Science.gov (United States)

    Royall, Julia; Isyagi, Micongwe Moses; Iliyasu, Yawale; Lukande, Robert; Vuhahula, Edda

    2018-03-01

    The shared practice of pathology via the Internet holds great potential for pathologists in sub-Saharan Africa (SSA) and their global partners. Application of the Internet is constrained by issues of bandwidth, cost, and power. The penetration of mobile telephony and the arrival of smartphones have changed the use of Internet and social media in Africa and therefore the work of the 4 African pathologists featured in this article. As pathology in SSA struggles for visibility and usefulness, the Internet and its electronic applications provide a critical infrastructure as well as a podium for pathologists across the continent. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. Feasibility of e-Health Interventions on Smoking Cessation among Vietnamese Active Internet Users

    Directory of Open Access Journals (Sweden)

    Bach Xuan Tran

    2018-01-01

    Full Text Available Introduction: Although e-health interventions are widely implemented as a supportive measure to smoking cessation, there is a lack of evidence in the feasibility of its application among Vietnamese youths, which is considered to be one of the most frequent internet using populations. This study assessed the quitting attempts among smokers and their preference and willingness to pay for smartphone-based cessation supporting applications in a sample of active internet users approached. Methods: A total of 1082 participants were recruited for the online-based survey from August to October 2015 in Vietnam. Information on sociodemographic characteristics, health information seeking behaviors on the internet, smoking status, quitting attempts and willingness to pay for smartphone-based cessation supporting applications were collected. Multivariate logistic regression was used to determine the associated factors with current smoking and willingness to pay for the smoking cessation application. Results: About 11% of participants were current smokers while 73.4% had attempted to quit smoking. Only 26.8% of the individuals indicated that they were willing to utilize a smartphone application to assist them in quitting. Participants who were male, had partners/spouse and lived at other places were more likely to smoke cigarette. Meanwhile, people who spent 50–70% of their online time to read health information were less likely to smoke. Results also show that living with family and never sharing health information on the internet were negatively associated with a participant’s willingness to pay for the smartphone application. Meanwhile, people who highly trusted health information were more likely to be willing to pay for the application. Conclusions: This prevalence of smoking and associated factors can provide potential indicators for creating several public health interventions in the new environment with the increasing development of information

  20. Using the Internet in the management of asthma.

    Science.gov (United States)

    Patel, A M

    2001-01-01

    The ultimate goals of managing asthma are to eliminate death, prevent or promptly treat exacerbations, and maximize the quality of life and health status of patients. Current strategies include appropriate education, trigger control, and timely access to effective pharmacotherapy and follow-up. Internet-based technologies have emerged as potentially powerful tools to enable meaningful communication and proactive partnership in care for various medical conditions. The main types of Internet-based applications for asthma management include remote monitoring and feedback between health professionals and their patients; online education and marketing for either patients or professionals; networking and collaborative research; and administrative oversight through policy making, planning, and decision support. With increased understanding of integrated disease management and the technostructural as well as psychodynamic issues related to Internet use, further refinement and evolution of the Internet and related technologies may drastically improve the way we monitor, educate, treat, and establish policies for this global problem while attending to individual or local community needs. This review presents a conceptual overview of the current challenges and use of the Internet for improving asthma management through timely and tailored education and appropriate access to health care expertise.

  1. INTERNET ADVERTISING: A PRIMER

    OpenAIRE

    Matthew N. O. Sadiku*, Shumon Alam, Sarhan M. Musa

    2017-01-01

    Internet advertising (IA) is using the Internet to market products and services to a large audience. In the current era of Internet commerce, companies have chosen to use Internet advertising and the trend is irreversible. The goal of Internet advertising is to drive customers to your website. Understanding some key concepts of Internet advertising is crucial to creating a strategy that will suit one’s business. This paper provides a brief introduction to Internet or online advertising.

  2. Hierarchical Broadcasting in the Future Mobile Internet

    NARCIS (Netherlands)

    Hesselman, C.E.W.; Eertink, E.H.; Fernandez, Milagros; Crnkovic, Ivica; Fohler, Gerhard; Griwodz, Carsten; Plagemann, Thomas; Gruenbacher, Paul

    2002-01-01

    We describe an architecture for the hierarchical distribution of multimedia broadcasts in the future mobile Internet. The architecture supports network as well as application-layer mobility solutions, and uses stream control functions that are influenced by available network resources, user-defined

  3. Ubiquitous Wireless Sensor Networks and future “Internet of Things""

    OpenAIRE

    Vermesan, Ovidiu

    2009-01-01

    Overview of heterogeneous networks of embedded devices that can range from RFID, to smart identifiable systems with sensing and actuating capabilitie. Presentation of wireless sensor networks protocols and Internet of Things future technology. Bridging the real, virtual and digital worlds by using wireless connectivity. Application examples in automotive, aeronautics, healthcare, building, oil and gas industries. Ubiquitous Wireless Sensor Networks and future “Internet ...

  4. Approximate Networking for Universal Internet Access

    Directory of Open Access Journals (Sweden)

    Junaid Qadir

    2017-12-01

    Full Text Available Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost-efficient ways of provisioning high-performance, global Internet. In this paper, we argue that instead of an exclusive focus on a utopian goal of universally accessible “ideal networking” (in which we have a high throughput and quality of service as well as low latency and congestion, we should consider providing “approximate networking” through the adoption of context-appropriate trade-offs. In this regard, we propose to leverage the advances in the emerging trend of “approximate computing” that rely on relaxing the bounds of precise/exact computing to provide new opportunities for improving the area, power, and performance efficiency of systems by orders of magnitude by embracing output errors in resilient applications. Furthermore, we propose to extend the dimensions of approximate computing towards various knobs available at network layers. Approximate networking can be used to provision “Global Access to the Internet for All” (GAIA in a pragmatically tiered fashion, in which different users around the world are provided a different context-appropriate (but still contextually functional Internet experience.

  5. Intelligent Device Discovery in the Internet of Things - Enabling the Robot Society

    OpenAIRE

    Sunthonlap, James; Nguyen, Phuoc; Ye, Zilong

    2017-01-01

    The Internet of Things (IoT) is continuously growing to connect billions of smart devices anywhere and anytime in an Internet-like structure, which enables a variety of applications, services and interactions between human and objects. In the future, the smart devices are supposed to be able to autonomously discover a target device with desired features and generate a set of entirely new services and applications that are not supervised or even imagined by human beings. The pervasiveness of s...

  6. Internet Commerce Managing Financial on the Internet

    Directory of Open Access Journals (Sweden)

    Chandra Wibowo Widhianto

    2001-03-01

    Full Text Available Article explain how to business through internet which are web business clarification, strategy effect, how to make profit, and business electronic changes consist of criptografy, EDI, signature, digital notarisation, file, payment, and how to get succes in internet business.

  7. Internet of Things Security: Layered classification of attacks and possible Countermeasures

    Directory of Open Access Journals (Sweden)

    Otmane El Mouaatamid

    2016-12-01

    Full Text Available Nowadays, the internet of things (IoT presents a strong focus of research with various initiatives working on the application, and usage of Internet standards in the IoT. But the big challenge of the internet of things is security. In this paper a layered classification and a goal based comparison of attacks in the IoT are presented so that a better understanding of IoT attacks can be achieved and subsequently more efficient and effective techniques and procedures to combat these attacks may be developed

  8. The impact of internet gambling on gambling problems: a comparison of moderate-risk and problem Internet and non-Internet gamblers.

    Science.gov (United States)

    Gainsbury, Sally M; Russell, Alex; Hing, Nerilee; Wood, Robert; Blaszczynski, Alex

    2013-12-01

    Numerous studies have reported higher rates of gambling problems among Internet compared with non-Internet gamblers. However, little research has examined those at risk of developing gambling problems or overall gambling involvement. This study aimed to examine differences between problem and moderate-risk gamblers among Internet and non-Internet gamblers to determine the mechanisms for how Internet gambling may contribute to gambling problems. Australian gamblers (N = 6,682) completed an online survey that included measures of gambling participation, problem gambling severity, and help seeking. Compared with non-Internet gamblers, Internet gamblers were younger, engaged in a greater number of gambling activities, and were more likely to bet on sports. These differences were significantly greater for problem than moderate-risk gamblers. Non-Internet gamblers were more likely to gamble on electronic gaming machines, and a significantly higher proportion of problem gamblers participated in this gambling activity. Non-Internet gamblers were more likely to report health and psychological impacts of problem gambling and having sought help for gambling problems. Internet gamblers who experience gambling-related harms appear to represent a somewhat different group from non-Internet problem and moderate-risk gamblers. This has implications for the development of treatment and prevention programs, which are often based on research that does not cater for differences between subgroups of gamblers. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  9. Internet Economics IV

    Science.gov (United States)

    2004-08-01

    edts.): Internet Economics IV Technical Report No. 2004-04, August 2004 Information Systems Laboratory IIS, Departement of Computer Science University of...level agreements (SLA), Information technology (IT), Internet address, Internet service provider 16. PRICE CODE 17. SECURITY CLASSIFICATION 18... technology and its economic impacts in the Internet world today. The second talk addresses the area of AAA protocol, summarizing authentication

  10. A new Information publishing system Based on Internet of things

    Science.gov (United States)

    Zhu, Li; Ma, Guoguang

    2018-03-01

    A new information publishing system based on Internet of things is proposed, which is composed of four level hierarchical structure, including the screen identification layer, the network transport layer, the service management layer and the publishing application layer. In the architecture, the screen identification layer has realized the internet of screens in which geographically dispersed independent screens are connected to the internet by the customized set-top boxes. The service management layer uses MQTT protocol to implement a lightweight broker-based publish/subscribe messaging mechanism in constrained environments such as internet of things to solve the bandwidth bottleneck. Meanwhile the cloud-based storage technique is used to storage and manage the promptly increasing multimedia publishing information. The paper has designed and realized a prototype SzIoScreen, and give some related test results.

  11. Insights into Motivating Internet Users towards Internet Banking

    OpenAIRE

    J. Ramola Premalatha

    2016-01-01

    Internet banking has evolved from helping customers meet their basic banking needs to meeting their sophisticated needs. In recent years, the number of internet banking users has been increasing exponentially. As customers get more and more educated, getting insight about internet banking has become a primary area of concern for all leading banks in India. Hence, the study is made to analyse the perception of customers specifically who are computer literate, in a semi-urban area about interne...

  12. Identity Management Framework for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.

    -configuring capability and is termed as Internet of Things (IoT). The vision of IoT is to connect every object with computing, communication and sensing ability to the Internet. IoT contains varied range of devices from RFID tags, sensor nodes to the even shoes. Thus, IoT enable nomadic collaboration and communication...... between users and devices, between devices themselves and devices to services. Due to rapid technological advancements in the wireless communications, information coming from uncountable applications and services converged on user devices, communication infrastructure and the Internet are integral part...... that are public can be part of the personal space of multiple users at the same time. Secure interaction in and with IoT, secure data management and exchange, authentication, distributed access control and IdM of the devices are the main challenges. The work carried out in the scope of this thesis addresses...

  13. Structural analysis of behavioral networks from the Internet

    International Nuclear Information System (INIS)

    Meiss, M R; Menczer, F; Vespignani, A

    2008-01-01

    In spite of the Internet's phenomenal growth and social impact, many aspects of the collective communication behavior of its users are largely unknown. Understanding the structure and dynamics of the behavioral networks that connect users with each other and with services across the Internet is key to modeling the network and designing future applications. We present a characterization of the properties of the behavioral networks generated by several million users of the Abilene (Internet2) network. Structural features of these networks offer new insights into scaling properties of network activity and ways of distinguishing particular patterns of traffic. For example, we find that the structure of the behavioral network associated with Web activity is characterized by such extreme heterogeneity as to challenge any simple attempt to model Web server traffic

  14. Structural analysis of behavioral networks from the Internet

    Energy Technology Data Exchange (ETDEWEB)

    Meiss, M R; Menczer, F [Department of Computer Science, Indiana University, Bloomington, IN 47405 (United States); Vespignani, A [Department of Informatics, Indiana University, Bloomington, IN 47408 (United States)], E-mail: mmeiss@indiana.edu

    2008-06-06

    In spite of the Internet's phenomenal growth and social impact, many aspects of the collective communication behavior of its users are largely unknown. Understanding the structure and dynamics of the behavioral networks that connect users with each other and with services across the Internet is key to modeling the network and designing future applications. We present a characterization of the properties of the behavioral networks generated by several million users of the Abilene (Internet2) network. Structural features of these networks offer new insights into scaling properties of network activity and ways of distinguishing particular patterns of traffic. For example, we find that the structure of the behavioral network associated with Web activity is characterized by such extreme heterogeneity as to challenge any simple attempt to model Web server traffic.

  15. Edge computing technologies for Internet of Things: a primer

    Directory of Open Access Journals (Sweden)

    Yuan Ai

    2018-04-01

    Full Text Available With the rapid development of mobile internet and Internet of Things applications, the conventional centralized cloud computing is encountering severe challenges, such as high latency, low Spectral Efficiency (SE, and non-adaptive machine type of communication. Motivated to solve these challenges, a new technology is driving a trend that shifts the function of centralized cloud computing to edge devices of networks. Several edge computing technologies originating from different backgrounds to decrease latency, improve SE, and support the massive machine type of communication have been emerging. This paper comprehensively presents a tutorial on three typical edge computing technologies, namely mobile edge computing, cloudlets, and fog computing. In particular, the standardization efforts, principles, architectures, and applications of these three technologies are summarized and compared. From the viewpoint of radio access network, the differences between mobile edge computing and fog computing are highlighted, and the characteristics of fog computing-based radio access network are discussed. Finally, open issues and future research directions are identified as well. Keywords: Internet of Things (IoT, Mobile edge computing, Cloudlets, Fog computing

  16. The MovieClassroom: An Internet Based Application for Students and Instructors to Create Captioned Animations.

    Science.gov (United States)

    Urbano, L.

    2005-12-01

    We have developed and tested an internet based application that facilitates the creation of animations for use in lectures and permits movie production by students in laboratory classes. Animation have been found to be extremely useful educational aids in the geosciences, particularly relating to topics requiring comprehension of geospatial relationships. With this program, instructors are able to assemble and caption animations using an online video clip catalogue and present these movies through a standard internet browser. Captioning increases student comprehension by increasing the multimodality of information delivery. For student use, we developed an exercise for introductory, undergraduate, laboratory class sections that was informed by learning pedagogy, particularly as related to game-based learning. Students were asked to assemble video clips and captions into a coherent movie to explain geospatial concepts, with questions such as "Explain why we have seasons?" The affinity of students to digital technology, particularly computer games and digital media, makes this type of exercise particularly captivating to the typical undergraduate. The opportunity to select and arrange video clips (and add background music) into a unique production offers students a greater degree of ownership of the learning process and allows unique non-linear pathways for accomplishing learning objectives. Use in a laboratory section permitted rapid feedback from the instructor. The application was created using open-sourced software and the database populated with video clips and music contributed by faculty and students under a non-commercial-use license. This tool has the potential to permit the wider dissemination of scientific research results given the increasing use animations for scientific visualization, because it eases the creation of multiple presentations targeted to various audiences and allows user participation in the creation of multimedia.

  17. Networking Foundations for Collaborative Computing at Internet Scope

    National Research Council Canada - National Science Library

    Dommel, H-Peter; Garcia-Luna-Aceves, J. J

    2006-01-01

    ... and at various levels of granularity. This aspect stands in contrast to legacy client-server applications such as Internet radio broadcast or video-on-demand, and to asynchronous, document-centric collaboration tools like email, instant...

  18. An application of the TODIM method to the evaluation of Broadband Internet plans

    Directory of Open Access Journals (Sweden)

    Luís Alberto Duncan Rangel

    2011-08-01

    Full Text Available This article presents a case study of the evaluation of the various types of access to the Broadband Internet available to a small company, located in Volta Redonda, in the state of Rio de Janeiro. This small company needs to implement Broadband Internet in its establishment and sought an evaluation of the companies which work providing this type of service. With the aim of carrying out a technical evaluation of the provision of the Broadband Internet service and, considering the diverse points of view and needs of this small company, a Multicriteria Decision Aiding Method, the TODIM method, was used. By means of this research, the power of this Operational Research tool was verified in the search for the solution to the problem of ranking the services offered in the city, according to the criteria chosen by this small company.

  19. JIP: Java image processing on the Internet

    Science.gov (United States)

    Wang, Dongyan; Lin, Bo; Zhang, Jun

    1998-12-01

    In this paper, we present JIP - Java Image Processing on the Internet, a new Internet based application for remote education and software presentation. JIP offers an integrate learning environment on the Internet where remote users not only can share static HTML documents and lectures notes, but also can run and reuse dynamic distributed software components, without having the source code or any extra work of software compilation, installation and configuration. By implementing a platform-independent distributed computational model, local computational resources are consumed instead of the resources on a central server. As an extended Java applet, JIP allows users to selected local image files on their computers or specify any image on the Internet using an URL as input. Multimedia lectures such as streaming video/audio and digital images are integrated into JIP and intelligently associated with specific image processing functions. Watching demonstrations an practicing the functions with user-selected input data dramatically encourages leaning interest, while promoting the understanding of image processing theory. The JIP framework can be easily applied to other subjects in education or software presentation, such as digital signal processing, business, mathematics, physics, or other areas such as employee training and charged software consumption.

  20. Internet printing

    Science.gov (United States)

    Rahgozar, M. Armon; Hastings, Tom; McCue, Daniel L.

    1997-04-01

    The Internet is rapidly changing the traditional means of creation, distribution and retrieval of information. Today, information publishers leverage the capabilities provided by Internet technologies to rapidly communicate information to a much wider audience in unique customized ways. As a result, the volume of published content has been astronomically increasing. This, in addition to the ease of distribution afforded by the Internet has resulted in more and more documents being printed. This paper introduces several axes along which Internet printing may be examined and addresses some of the technological challenges that lay ahead. Some of these axes include: (1) submission--the use of the Internet protocols for selecting printers and submitting documents for print, (2) administration--the management and monitoring of printing engines and other print resources via Web pages, and (3) formats--printing document formats whose spectrum now includes HTML documents with simple text, layout-enhanced documents with Style Sheets, documents that contain audio, graphics and other active objects as well as the existing desktop and PDL formats. The format axis of the Internet Printing becomes even more exciting when one considers that the Web documents are inherently compound and the traversal into the various pieces may uncover various formats. The paper also examines some imaging specific issues that are paramount to Internet Printing. These include formats and structures for representing raster documents and images, compression, fonts rendering and color spaces.

  1. Is there a relationship between Internet dependence and eating disorders? A comparison study of Internet dependents and non-Internet dependents.

    Science.gov (United States)

    Tao, Z L; Liu, Y

    2009-01-01

    Several studies have examined the underlying psychopathology in overuse of the Internet, including depression, social anxiety, and substance dependence. A relationship between these psychological disorders appears to exist. No links have been established between Internet dependence and eating disorders. Fifty-four Internet dependents were compared with a control group concerning symptomatic aspects of eating disorders and psychological characteristics related to eating disorders. They all belonged to 1199 respondents of Chinese secondary school and college students between the ages of 12 and 25 years old. A Mann-Whitney U-test was used to determine the difference between Internet dependent groups and non-Internet dependent groups concerning Eating Attitudes Test and Eating Disorder Inventory scores. Females and male Internet dependents rated themselves with significantly higher symptomatic aspects of eating disorders than control groups. Female and male Internet dependents showed significantly higher psychological characteristics related to eating disorders than control groups. A relationship between Internet dependence and eating disorders appears to exist.

  2. Development of Field Information Monitoring System Based on the Internet of Things

    Science.gov (United States)

    Cai, Ken; Liang, Xiaoying; Wang, Keqiang

    With the rapid development and wide application of electronics, communication and embedded system technologies, the global agriculture is changing from traditional agriculture that is to improve the production relying on the increase of labor, agricultural inputs to the new stage of modern agriculture with low yields, high efficiency, real-time and accuracy. On the other hand the research and development of the Internet of Things, which is an information network to connect objects, with the full capacity to perceive objects, and having the capabilities of reliable transmission and intelligence processing for information, allows us to obtain real-time information of anything. The application of the Internet of Things in field information online monitoring is an effective solution for present wired sensor monitoring system, which has much more disadvantages, such as high cost, the problems of laying lines and so on. In this paper, a novel field information monitoring system based on the Internet of Things is proposed. It can satisfy the requirements of multi-point measurement, mobility, convenience in the field information monitoring process. The whole structure of system is given and the key designs of system design are described in the hardware and software aspect. The studies have expanded current field information measurement methods and strengthen the application of the Internet of Things.

  3. Interaction and Humans in Internet of Things

    DEFF Research Database (Denmark)

    Turunen, Markku; Sonntag, Daniel; Engelbrecht, Klaus-Peter

    2015-01-01

    Internet of Things is mainly about connected devices embedded in our everyday environment. Typically, ‘interaction’ in the context of IoT means interfaces which allow people to either monitor or configure IoT devices. Some examples include mobile applications and embedded touchscreens for control...

  4. Combining internet technology and mobile phones for emergency response management

    International Nuclear Information System (INIS)

    Palsson, S.E.

    2002-12-01

    The report is intended for persons involved in radiological emergency response management. An introduction is given to the technical basis of the mobile Internet and ongoing development summarised. Examples are given describing how mobile Internet technology has been used to improve monitoring media coverage of incidents and events, and a test is described where web based information was selectively processed and made available to WAP enabled mobile phones. The report concludes with recommendations stressing the need for following mobile Internet developments and taking them into account when designing web applications for radiological response management. Doing so can make web based material accessible to mobile devices at minimal additional cost. (au)

  5. Internet of Things challenges and opportunities

    CERN Document Server

    2014-01-01

    Advancement in sensor technology, smart instrumentation, wireless sensor networks, miniaturization, RFID and information processing is helping towards the realization of Internet of Things (IoT). IoTs are finding applications in various area applications including environmental monitoring, intelligent buildings, smart grids and so on. This book provides design challenges of IoT, theory, various protocols, implementation issues and a few case study. The book will be very useful for postgraduate students and researchers to know from basics to implementation of IoT.

  6. [Internet addiction].

    Science.gov (United States)

    Korkeila, Jyrki

    2012-01-01

    Internet addiction is defined as uncontrolled and harmful use of Internet, which manifests in three forms: gaming, various sexual activities and excessive use of emails, chats or SMS messaging. Several studies have found that abuse of alcohol and other substances, depression and other health problems are associated with Internet addiction. In boys and men depression may be more a consequence of the addiction than a cause for it. ADHD seems to be a significant background factor for developing the condition. Because it is almost impossible to lead a life without Internet and computers nowadays, it is unrealistic to aim towards full abstinence. Treatment has generally followed the guidelines adapted for pathological gambling.

  7. Internet use and suicidal behaviors: internet as a threat or opportunity?

    Science.gov (United States)

    Robert, Anna; Suelves, Josep Maria; Armayones, Manuel; Ashley, Sivakamy

    2015-04-01

    Suicidal behavior is a common and severe health problem around the world. Internet use has been related to an increase in suicidal behaviors, but few studies have focused on the potential benefits of Internet use for preventing self-harm and suicide. We reviewed the existing literature on the relationship between suicide and Internet use. The accessibility of suicide-related information on the Internet seems to have an impact on the incidence of suicide behaviors. However, the Internet is useful for linking people who feel lonely or isolated, and it provides access to suicide prevention information and resources. The Internet can influence vulnerable people to attempt suicide, but it can also be used to prevent self-harm and suicide. We propose some efforts that can be made in this preventive line.

  8. Problematic internet users' skin conductance and anxiety increase after exposure to the internet.

    Science.gov (United States)

    Romano, Michela; Roaro, Alessandra; Re, Federica; Osborne, Lisa A; Truzoli, Roberto; Reed, Phil

    2017-12-01

    To examine the impact of cessation of an internet session on skin conductance responses and anxiety of higher and lower problem internet users, in order to explore possible physiological withdrawal effects. Participants were measured in terms of their skin conductance before (15min), during (15min), and after (15min) an internet session, and completed self-report measures of state anxiety and problematic internet use. Higher, but not lower, problem users showed increased skin conductance after internet use was stopped, relative to before their internet session. Higher problem users' GSR scores increased, as the time from internet cessation became longer. Higher problem users also showed increased levels of anxiety, following their internet session, which correlated with their skin conductance scores. These results suggest that, following termination of an internet session, withdrawal-like effects are seen, both psychologically and physiologically. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Potential and Limitations of the Internet Use in Learning Process

    Directory of Open Access Journals (Sweden)

    D. Pavlovic

    2017-12-01

    Full Text Available The main research objective of this paper is to point out potentials and limitations of the Internet in the process of learning in higher education, through review and analysis of literature. The results of this theoretical study emphasize positive aspects of the Internet use in the learning process of university students that arise from the Internet features such as high technical capabilities, power, speed, universality and accessibility, as well as high sensitivity of young people to the means of new media. The positive effects of the applica-tion of the Internet were pointed out in research studies that analysed the pro-cess of innovation in higher education, the changes in the culture of learning, or certain aspects of personality development of university students. In contrast, some studies pointed out the limitations that may occur when using the Internet in the learning process related primarily to the credibility of the infor-mation, light and entertaining content dominance, and dependence on technology. Accordingly, it is recommended to adopt the measures on a larger scale that will affect the greater use of the Internet in the process of acquiring knowledge, especially in the field of higher education.

  10. Modeling traditional literacy, internet skills and internet usage: an empirical study

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; van Dijk, Johannes A.G.M.

    2016-01-01

    This paper focuses on the relationships among traditional literacy (reading, writing and understanding text), medium-related Internet skills (consisting of operational and formal skills), content-related Internet skills (consisting of information and strategic skills) and Internet usage types

  11. Characteristics of internet use as a means of perceived stress reduction in health care students

    Directory of Open Access Journals (Sweden)

    Hinić Darko

    2016-01-01

    Full Text Available Previous studies suggest that people use media for instrumental needs, entertainment/leisure or for social gratification. The aim of this study is to identify specific characteristics of Internet use in health care students who use the Internet as a means of perceived stress reduction. The sample included 231 students (m=34%; f=66%, aged (M=22.44; SD=2.09, who were subsequently categorised into two groups according to whether they consciously use the Internet to alleviate the consequences of stressful experiences. The individuals reporting the Internet as a means of perceived stress reduction spend considerably more time online than other Internet users. They also use contents related to entertainment, culture and sex more frequently, as well as social applications and networks. In comparison to others, these participants meet new people and potential partners more often via the Internet, spend more time on their friends' profiles, while using different entertainment applications, most commonly games. The Internet may play a significant role in reducing negative reactions to stressful events; therefore, we may regard cyberspace as a fertile ground for educational, preventive and counselling services. The main limitation to the current study is the sample (only health care students. Future studies should include assessment of perceived stress levels and their relation to study variables.

  12. Analisis Pemanfaatan Internet Di Pemerintah Kota Denpasar

    Directory of Open Access Journals (Sweden)

    made andyka

    2016-11-01

    Full Text Available The usage of the Internet can be described by the traffic characteristics, user behavior, and bandwidth. This research collected Internet traffic data at the government office of Denpasar city in October 2015, for study case of Dinas Perijinan. The result shows the average 90 % volume of TCP protocol and 10 % of others, such as UDP, GRE, and ICMP. There are average 95 % of application port’s volumes were used by IANA’s port, and 5 % by unsigned port, which means it may become a potential to be used as malware and file sharing application. The biggest domain’s volumes were accessed to Youtube and Facebook websites, and also to other malware domain. Based on the observation of user's behaviour, there are 3 of 12 sample users did not understand how to access good link from malware. From the analysis, a limitation access on youtube is one of recommendation actions besides closing malware port and user training.

  13. The Internet information infrastructure: Terrorist tool or architecture for information defense?

    Energy Technology Data Exchange (ETDEWEB)

    Kadner, S.; Turpen, E. [Aquila Technologies Group, Albuquerque, NM (United States); Rees, B. [Los Alamos National Lab., NM (United States)

    1998-12-01

    The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizing possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.

  14. [A review on the advancement of internet-based public health surveillance program].

    Science.gov (United States)

    Zhao, Y Q; Ma, W J

    2017-02-10

    Internet data is introduced into public health arena under the features of fast updating and tremendous volume. Mining and analyzing internet data, researchers can model the internet-based surveillance system to assess the distribution of health-related events. There are two main types of internet-based surveillance systems, i.e. active and passive, which are distinguished by the sources of information. Through passive surveillance system, information is collected from search engine and social media while the active system gathers information through provision of the volunteers. Except for serving as a real-time and convenient complementary approach to traditional disease, food safety and adverse drug reaction surveillance program, Internet-based surveillance system can also play a role in health-related behavior surveillance and policy evaluation. Although several techniques have been applied to filter information, the accuracy of internet-based surveillance system is still bothered by the false positive information. In this article, we have summarized the development and application of internet-based surveillance system in public health to provide reference for a better surveillance program in China.

  15. Undesigning the Internet : An exploratory study of reducing everyday Internet connectivity

    OpenAIRE

    Widdicks, Kelly Victoria; Ringenson, Tina; Pargman, Daniel; Kuppusamy, Vishnupriya; Lago, Patricia

    2018-01-01

    Internet connectivity is seamlessly integrated into many of our everyday habits and activities. Despite this, previous research has highlighted that our rather excessive Internet use is not sustainable or even always socially beneficial. In this paper, we carried out an exploratory study on how Internet disconnection affects our everyday lives and whether such disconnection is even possible in today’s society. Through daily surveys, we captured what Internet use means for ten participants and...

  16. Can we make Schools and Universities smarter with the Internet of Things?

    Directory of Open Access Journals (Sweden)

    Gabriela Kiryakova

    2017-02-01

    Full Text Available Schools and universities stand up to the challenge the Internet of Things, which has the potential to significantly change teaching and learning. The learning and administrative processes and the relationships between all participants in education may benefit from the Internet of Things since the linked physical devices ensure connectivity of people and ensure their activity. The implementation of the Internet of Things in education, unlike other spheres, has a very important and difficult task. The Internet of Thing has to guarantee the creation of an environment that supports the acquisition of knowledge in a new, natural and effective way, consistent with the new realities and learners’ expectations. The questions of how and in what direction the Internet of Things will lead to changes in educational activities and processes have many answers and need discussions and debates. The objective of the current work is to answer these questions by presenting the concept the Internet of Things and consider its possible applications in education.

  17. Internet piracy

    OpenAIRE

    Fiala, Jiří

    2012-01-01

    The main objective of this thesis is to describe the Internet piracy phenomenon and to define responsibility of individuals for copyright violations on the Internet from the view of valid Czech legislation. In order to prevent Internet piracy, countries are pushed to swiftly react on continuous development of new technologies used by pirates - these efforts of individual countries are described in several chapters of this thesis that are exploring the most significant court rulings. These rul...

  18. A study on Turkish adolescent's Internet use: possible predictors of Internet addiction.

    Science.gov (United States)

    Ak, Serife; Koruklu, Nermin; Yılmaz, Yusuf

    2013-03-01

    The purpose of this study is to investigate the internet use of Turkish adolescents, with a (particular) focus on the risk of Internet addiction. A web-based questionnaire was completed by a total of 4,311 adolescents attending public high schools in grades 9-12, in a small-sized city in western Turkey. Ages ranged from 15 to 19 years, 54 percent were female and 46 percent male. The questionnaire included items on sociodemographic information, Internet usage, and a Turkish version of the Young's Internet Addiction Test. The data were analyzed in SPPS 15.0 program using the t test, the Mann-Whitney U test, correlation and hierarchic regression analysis. The findings show that, regardless of gender, Facebook ranked highest in the classification of students' purpose of Internet use; it was also found that females mainly used the Internet for communication, whereas males were more interested in playing online games and reading newspapers and magazines. The results of hierarchic regression analysis indicated that the significant predictors of the internet addiction were the presence of Internet access at home, gender, and family income levels.

  19. A Practical Application Combining Wireless Sensor Networks and Internet of Things: Safety Management System for Tower Crane Groups

    Directory of Open Access Journals (Sweden)

    Dexing Zhong

    2014-07-01

    Full Text Available The so-called Internet of Things (IoT has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC, is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE installed in the driver’s operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP through General Packet Radio Service (GPRS. Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things.

  20. A Practical Application Combining Wireless Sensor Networks and Internet of Things: Safety Management System for Tower Crane Groups

    Science.gov (United States)

    Zhong, Dexing; Lv, Hongqiang; Han, Jiuqiang; Wei, Quanrui

    2014-01-01

    The so-called Internet of Things (IoT) has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC), is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE) installed in the driver's operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT) at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP) through General Packet Radio Service (GPRS). Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC) or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things. PMID:25196106

  1. A practical application combining wireless sensor networks and Internet of Things: Safety Management System for Tower Crane Groups.

    Science.gov (United States)

    Zhong, Dexing; Lv, Hongqiang; Han, Jiuqiang; Wei, Quanrui

    2014-07-30

    The so-called Internet of Things (IoT) has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC), is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE) installed in the driver's operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT) at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP) through General Packet Radio Service (GPRS). Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC) or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things.

  2. LANGUAGE AWARENESS IN AN INTERNET CHAT ROOM

    Directory of Open Access Journals (Sweden)

    Leszek Szymański

    2013-10-01

    Full Text Available When communicating on the Internet, the participants, so to say, mingle two traditional modes of communication: writing and speech. The phenomenon appears to be most noticeable in chat room interactions. This suggestion is based on the fact that users try to behave as though they are engaged in a spoken act of communication, though the actual medium of communication employs written language forms. Therefore, Internet users need to know what conventions to employ and how to perform such actions in order to express the desired meanings, all with the aim of driving the interaction as close as possible to speech. Such implementations of certain language-related customs require a specific kind of language awareness from the users. This concept, plus the applied conventions, constitute the essence of this article. The discussion begins with an introduction to the research problem, in this case the intentional utilization by Internet chat participants of the graphic mode of communication in order to express their desired meanings. Second, the reader becomes acquainted with the terminology used in the paper, which includes: language awareness, (Internet chat, and (language corpus. Moreover, the source of the studied language material—a corpus of Internet chats—is presented. The said description additionally includes the informants’ characteristics, as well as the topicality of their conversations. The further sections of the paper discus the application of selected non-normative spelling conventions and word-formation processes, with the support of examples taken from the corpus. Based on the discussion, an attempt is made to indicate which features comprise certain values to the participants of Internet chats.

  3. Period of internet usage: An indicator of the buying behaviour of internet users?

    Directory of Open Access Journals (Sweden)

    PJ du Plessis

    2004-07-01

    Full Text Available This article focuses on the experience of the Internet user with regard to purchasing goods and services. A self-administered survey, hosted on a dedicated website, was used as a data collection method and 1005 responses were received. It was found that the period of Internet usage significantly influenced the decision to purchase via the Internet. Another finding was that the period of Internet usage significantly influenced whether those shopping on the Internet searched for, or considered searching for, product and service information online prior to purchasing from non-Internet-based sellers.

  4. Implementation of the Internet of Things on Public Security

    Science.gov (United States)

    Lu, Kesheng; Li, Xichun

    The development of the Internet of Things will occur within a new ecosystem that will be driven by a number of key players. The public security as one of the key players is going to make real-time communications will be possible not only by humans but also by things at anytime and from anywhere. This research will present the advent of the Internet of Things to create a plethora of innovative applications and services, which will enhance quality of life and reduce inequalities.

  5. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Science.gov (United States)

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  6. An internet of things example: classrooms access control over near field communication.

    Science.gov (United States)

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  7. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Directory of Open Access Journals (Sweden)

    Daniel Palma

    2014-04-01

    Full Text Available The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  8. The Third Annual NASA Science Internet User Working Group Conference

    Science.gov (United States)

    Lev, Brian S. (Editor); Gary, J. Patrick (Editor)

    1993-01-01

    The NASA Science Internet (NSI) User Support Office (USO) sponsored the Third Annual NSI User Working Group (NSIUWG) Conference March 30 through April 3, 1992, in Greenbelt, MD. Approximately 130 NSI users attended to learn more about the NSI, hear from projects which use NSI, and receive updates about new networking technologies and services. This report contains material relevant to the conference; copies of the agenda, meeting summaries, presentations, and descriptions of exhibitors. Plenary sessions featured a variety of speakers, including NSI project management, scientists, and NSI user project managers whose projects and applications effectively use NSI, and notable citizens of the larger Internet community. The conference also included exhibits of advanced networking applications; tutorials on internetworking, computer security, and networking technologies; and user subgroup meetings on the future direction of the conference, networking, and user services and applications.

  9. Internet Bad Neighborhoods

    NARCIS (Netherlands)

    Moreira Moura, Giovane

    2013-01-01

    A significant part of current Internet attacks originates from hosts that are distributed all over the Internet. However, there is evidence that most of these hosts are, in fact, concentrated in certain parts of the Internet. This behavior resembles the crime distribution in the real world: it

  10. Internet Freedom in Asia: Case of Internet Censorship in China

    Directory of Open Access Journals (Sweden)

    ZAINUDDIN MUDA Z. MONGGILO

    2016-02-01

    Full Text Available Internet can develop the communication and information freedom on society but unfortunately in some nations, especially in Asia, it cannot be fully accessed because of government censorship. This report explains the relationship between the practice of Internet censorship imposed by the Chinese government and the freedom of its citizens (in the internet surfing experience as the realization of human rights in the freedom of expression and opinion (seek, receive-use, and communicate information which is traced through the relevant literature study. China is a unique case since the internet censorship regulation contributes to its status as the country with the least internet freedom yet at the same time it is credited as having the most internet users globally. In addition, China known as the communist country that began opening up to globalization and information of technology, but the government’s control over it is still so tight and binding, not only in the press, or the traditional media, but also in new media with the internet censorship. The control over this information may have a clear objective to maintain a climate of information in the community, but on the other hand, such control is tantamount to restricting the right of citizens to make, use, and distribute information, and more fatal as a violation of human rights.

  11. Internet Economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1998-01-01

    Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing.......Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing....

  12. Healthcare teams over the Internet: towards a certificate-based approach.

    Science.gov (United States)

    Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I

    2002-01-01

    Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modem healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has therefore become a major concern for healthcare applications over the Internet. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security policy is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.

  13. Current trends in using Internet and mobile technology to support the treatment of substance use disorders.

    Science.gov (United States)

    Cucciare, Michael A; Weingardt, Kenneth R; Greene, Carolyn J; Hoffman, Julia

    2012-09-01

    By allowing for the efficient delivery of instructional content and the secure collection of self-report data regarding substance use and related problems, the Internet has tremendous potential to improve the effectiveness and accessibility of Substance Use Disorder (SUD) treatment and recovery-oriented services. This article discusses some of the ways in which Internet and mobile technology can facilitate, complement and support the process of traditional clinician-delivered treatment for individuals with SUDs. Internet applications are being used to support a range of activities including (a) the assessment and feedback process that constitutes a key feature of brief motivational interventions; and (b) the concurrent monitoring of patients who are receiving treatment for SUDs, to support continuing care, and the ongoing recovery of SUD patients who have completed face-to-face treatment. Internet technology is also being used to (c) support efficient delivery of clinical training in evidence-based practices for treating individuals who may have SUDs. This emerging body of literature suggests that SUD treatment providers and program administrators can enhance the quality of clinician-delivered treatment by incorporating internet applications into existing processes of care and recovery oriented services. Internet applications provide an unparalleled opportunity to engage patients in the treatment process, incorporate real-time data into treatment planning, prevent relapse, and promote evidence-based treatment approaches.

  14. Internet-based wide area measurement applications in deregulated power systems

    Science.gov (United States)

    Khatib, Abdel-Rahman Amin

    Since the deregulation of power systems was started in 1989 in the UK, many countries have been motivated to undergo deregulation. The United State started deregulation in the energy sector in California back in 1996. Since that time many other states have also started the deregulation procedures in different utilities. Most of the deregulation market in the United States now is in the wholesale market area, however, the retail market is still undergoing changes. Deregulation has many impacts on power system network operation and control. The number of power transactions among the utilities has increased and many Independent Power Producers (IPPs) now have a rich market for competition especially in the green power market. The Federal Energy Regulatory Commission (FERC) called upon utilities to develop the Regional Transmission Organization (RTO). The RTO is a step toward the national transmission grid. RTO is an independent entity that will operate the transmission system in a large region. The main goal of forming RTOs is to increase the operation efficiency of the power network under the impact of the deregulated market. The objective of this work is to study Internet based Wide Area Information Sharing (WAIS) applications in the deregulated power system. The study is the first step toward building a national transmission grid picture using information sharing among utilities. Two main topics are covered as applications for the WAIS in the deregulated power system, state estimation and Total Transfer Capability (TTC) calculations. As a first step for building this national transmission grid picture, WAIS and the level of information sharing of the state estimation calculations have been discussed. WAIS impacts to the TTC calculations are also covered. A new technique to update the TTC using on line measurements based on WAIS created by sharing state estimation is presented.

  15. PREDICTING THE INTENTION TO USE INTERNET – A COMPARATIVE STUDY

    Directory of Open Access Journals (Sweden)

    Slaven Brumec

    2006-06-01

    Full Text Available This article focuses on an application of the Triandis Model in researching Internet usage and the intention to use Internet. Unlike other TAM-based studies undertaken to date, the Triandis Model offers a sociological account of interaction between the various factors, particularly attitude, intention, and behavior. The technique of Structural Equation Modeling was used to assess the impact those factors have on intention to use the Internet in accordance with the relationships posited by the Triandis Model. The survey was administered to Croatian undergraduate students at and employed individuals. The survey results are compared to the results of a similar survey that was carried out by two universities in Hong Kong.

  16. Bla-bla-bla: video chat service on the Internet - a market feasibility study

    OpenAIRE

    Lindgreen, Adam; Antioco, Michael; Wetzels, Martin

    2004-01-01

    The Internet is changing the way that companies carry out their business and, in fact, constitutes an entirely new application domain, which makes product innovation possible. Moreover, it is a new medium for reaching consumers, which is a central preoccupation to organisations in the current business market. Here interest lies in video chatting on the Internet. This is a type of service that adds video support to chatting using a Web cam and is gradually attracting more Internet users. The p...

  17. Measuring the internet

    NARCIS (Netherlands)

    Zhou, X.

    2006-01-01

    The Internet is a collection of networks that use the TCP/IP suite of protocols. It has a huge impact on human activity. There are currently hundreds of millions of computers connected to the Internet, generating several petabytes traffic a day. Internet is still growing rapidly. However, the

  18. Internet from Above.

    Science.gov (United States)

    Sullivan, Laura

    1998-01-01

    Explains how fast and reliable Internet access can be obtained by using satellite communications based on experiences at a high school in Mississippi. Discusses Internet communications; how it was implemented in the media center; local area networks; the need for Ethernet-based connection to the Internet; and price. (LRW)

  19. Towards a quantum internet

    Science.gov (United States)

    Dür, Wolfgang; Lamprecht, Raphael; Heusler, Stefan

    2017-07-01

    A long-range quantum communication network is among the most promising applications of emerging quantum technologies. We discuss the potential of such a quantum internet for the secure transmission of classical and quantum information, as well as theoretical and experimental approaches and recent advances to realize them. We illustrate the involved concepts such as error correction, teleportation or quantum repeaters and consider an approach to this topic based on catchy visualizations as a context-based, modern treatment of quantum theory at high school.

  20. Australian internet policy

    Directory of Open Access Journals (Sweden)

    Angela Daly

    2017-03-01

    Full Text Available This special issue focussing on internet policy in Australia provides a snapshot of developments on various topics (access, privacy, censorship as a means of understanding better the state of play in Australia, and also how this compares to internet policy in other parts of the world, especially Europe and North America. Given changing geopolitics, the influence of internet policy in the rest of the Asia Pacific through vehicles such as the Regional Comprehensive Economic Partnership (RCEP may become increasingly important in Australia in the coming years. This leaves Australia, and its internet policy, at a crossroads, which may reflect broader dynamics in internet policy internationally, and makes this an interesting time in which to explore what is happening in this particular country.

  1. Truck Drivers' Use of the Internet: A Mobile Health Lifeline.

    Science.gov (United States)

    Heaton, Karen; Combs, Bryan; Griffin, Russell

    2017-06-01

    Because of their social isolation, irregular and unpredictable schedules, limited access to health care, and long periods of travel, long-haul truckers may benefit from the use of mobile health applications on Internet-capable devices. The purpose of this study was to determine Internet access and usage among a sample of long-haul truck drivers. In this cross-sectional study, truck drivers completed a pencil and paper survey with questions on demographics, work and health histories, and Internet access and usage for both personal and job reasons. A total of 106 truck drivers were recruited from trucking industry trade shows, by word of mouth, and directly from trucking companies. Overall, the truck drivers' use of the Internet was limited. Their usage for personal and job-related reasons differed. Social connectivity and access to health and wellness information were important during personal usage time. Job-related Internet use was highly practical, and applied to seeking information for directions and maps, fuel stops and pricing, and communicating with employers or transmitting documents. Age and experience were associated with Internet use. Younger, less-experienced drivers used the Internet more than older, experienced drivers. Targeted mobile health messaging may be a useful tool to inform truck drivers of health conditions and plans, and may provide links to primary care providers needing to monitor or notify drivers of diagnostic results or treatment plans.

  2. Internet Self-Efficacy Preferences of Internet Based Environments and Achievement of Prospective Teachers

    Science.gov (United States)

    Ozyalcin Oskay, Ozge

    2011-01-01

    The aims of this study are to determine prospective chemistry teachers' internet self-efficacy and preferences of constructivist internet-assisted environments and to examine the relationship between their internet self-efficacy and their preferences for constructivist internet-assisted environments, the relationship between their achievement in…

  3. Trends in Internet Marketing

    OpenAIRE

    Panchanathan, Nitin

    2005-01-01

    Internet marketing involves the usage of the Internet to market and sell goods or services. In this thesis we wished to seek answers for the following questions with the help of web, email surveys taking into consideration consumer perspective, company perspective and 3rd party internet marketing agency perspective. Our survey sample was based on a small set of companies, consumers and internet marketing agencies. The survey results helped us in predicting the trends in internet marketing. We...

  4. Examining the Application of the DC-IA-A Diagnostic Criteria for Internet Addiction Disorder in At-Risk College Students.

    Science.gov (United States)

    Hsu, Wen-Yu; Chang, Shan-Mei; Chiu, Nan-Ying; Lin, Sunny S J; Tseng, Yin-Hsing

    2015-01-01

    Internet addiction disorder is a relatively new condition, and the criteria for its diagnosis have been developed only over the last several years. The criteria for Internet addiction remain controversial. We strive to further elucidate the clinical validity of the diagnostic criteria for Internet addiction. To test items of the diagnostic criteria for Internet addiction among adolescents, we conducted a clinical interview study of college students based on longitudinal data on their risky use of the Internet. Forty-one high-risk cases were selected from a 3-year 5-time point longitudinal survey of 716 college freshmen. We examined disputes relevant to symptoms and impairment in the DC-IA-A (Diagnostic Criteria for Internet Addiction among Taiwanese Adolescents). Of the 41 cases, 21 were diagnosed with Internet addiction via a psychiatric interview. In the Internet addiction disorder group, 23.8% of cases had a diagnosis of depression, whereas only 15.0% of the cases in the non-Internet addiction group had a diagnosis of depression. Two major criteria (A8 and A3) had low incidences in these high-risk college students and thus did not help provide a differential diagnosis between the groups. We suggest that A8, 'excessive effort spent on activities necessary to obtain access to the Internet', should be omitted, and that A3, 'tolerance: a marked increase in the duration of Internet use needed to achieve satisfaction', should be modified. A1 and A9 should be discussed regarding their role in the diagnosis of Internet addiction disorder. Additional well-designed studies examining the diagnostic criteria and the relationship between factors are needed. © 2015 S. Karger AG, Basel.

  5. Internet economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1997-01-01

    A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect.......A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect....

  6. Internet use at workplaces and its effects on working style in indian context: An exploration.

    Science.gov (United States)

    Shrivastava, Apoorva; Sharma, Manoj K; Marimuthu, P

    2016-01-01

    Internet use has revolutionized the pattern of working style at the workplace. It led to an increased use for nonprofessional activities at the workplace. It has been shown to affect productivity at the workplace. There is a dearth of literature from the Indian context in this area. This study was conducted to explore the pattern of Internet use at the workplace and its dysfunctions. The present study was a cross-sectional prospective study. The objective of the study was to assess the pattern of technology use at the workplace. Two hundred and fifty employees having experience of Internet use for more than a year of various Government/Private sector organizations in Bengaluru were assessed using background data sheet. Users who were unwilling to participate were excluded from the study. 29.6% of the participants used mobile phone exclusively. 58.8% of the participants used mobile along with other devices such as desktop, laptop, and tablet at home as well as at work. 64% of the participants reported change in their productivity due to nonwork-related Internet use at the workplace. 42% of the participants acknowledgemed postponement of their work due to Internet activities. 3-5% reported preference for Internet to work, meals, personal hygiene, sleep, and interaction with family members. WhatsApp was the most used application followed by Facebook and Gmail. Gaming applications and messenger applications such as hike and hangouts were used less frequently. Overall, delay in going to sleep was 1.6 hours and early morning awakening was 1.5 hours due to Internet use. The present study has implications for evolving psychoeducational modules for the promotion of healthy use of technology.

  7. Astronomy from the chair - the application of the Internet in promoting of Astronomy

    Science.gov (United States)

    Tomic, Zoran

    2014-05-01

    Internet and modern communication technologies are an indispensable part of modern life. The use of the Internet makes it possible to enhance the education and expand opportunities for acquiring new knowledge. One example is Astronomy, where today thanks to the Internet, we can control telescopes that are distant from us and listen to lectures from Universities in other countries. "Astronomy from the chair" is the name for a concept where amateur astronomers can deal with astronomy from their homes using the Internet. The concept can be divided into four sections depending on the content being offered: Robotic Observatory, Virtual Observatory, Online astronomy broadcasting and Online courses. Robotic observatory is defined as an astronomical instrument and detection system that enables efficient observation without the need of a person's physical intervention. Virtual Observatory is defined as a collection of databases and software tools that use the Internet as a platform for scientific research. Online astronomy broadcasting is part of concept "Astronomy from the chair" which gives users the opportunity to get directly involved in astronomical observation organized by an amateur astronomer from somewhere in the world. Online courses are groups of sites and organizations that provide the opportunity to amateur astronomers to attend lectures, save and watch video materials from lectures, do homework, communicate with other seminar participants and in that way become familiar with the various areas of Astronomy. This paper discusses a new concept that describes how the Internet can be applied in modern education. In this paper will be described projects that allows a large number of astronomy lovers to do their own research without the need to own a large and expensive set of astronomical equipment (Virtual Telescope from Italy, Observatory "Night Hawk" from Serbia and project "Astronomy from an armchair" at Faculty of Sciences and Mathematics in Nis), to help

  8. Internet technology for clinical application in a digital radiology department

    International Nuclear Information System (INIS)

    Bergh, B.; Pietsch, M.; Vogl, T.J.

    2000-01-01

    Problem: To provide an overview and to assess the clinical feasibility of internet technology-based systems for hospital-wide image and report distribution as well as for video conferencing. Methods: The paper describes the theoretical concept behind, the various technical approaches and the experience gained from different systems. Results: Image and report distribution: Advantages include the universal availability of images and reports inside and outside hospitals; ease of use; security features; image and report integration; cost savings by reducing support and training efforts and by optimising available hardware. The main critical issues are performance and workflow integration with RIS and PACS. Video conferencing: Main advantages are the standardised, software-based approach and the low investments for hard- and software. Depending on the desired usage the communication performance can be seen as inappropriate. Conclusion: Today, internet technology-based systems appear to satisfy the main clinical needs in radiology. The mentioned drawbacks could be eliminated by means of modified software implementation and focused standardisation efforts. Considering the numerous advantages of these systems a further distribution can be expected for the future. (orig.) [de

  9. Conviviality of internet social networks: An exploratory study of internet campaigns in Iran

    OpenAIRE

    Ameripour, Aghil; Nicholson, Brian; Newman, Michael

    2010-01-01

    In this study, we focus on the relationship between Internet social networks and societal change by examining case studies of the impact of Internet-based campaigns in Iran. Ivan Illich's theory of Conviviality of Tools enables an analysis of the conviviality of the Internet. Subsequently, this conceptual lens is used to examine empirical data from two Internet-based campaigns. The paper contributes theoretical and practical implications regarding conviviality of Internet social networks and ...

  10. The Internet and tourism

    OpenAIRE

    Verner, Zbyněk

    2012-01-01

    This work concentrates on Internet and its influence on tourism. It describes history of Internet, tourism and interactions among them. Next this work deals with the newest trends of Internet and their influence on tourism. Last but not least, it analyzes the influence of Internet on demand in tourism in Czech Republic.

  11. World tour through the internet

    International Nuclear Information System (INIS)

    Jang, Ji Hwan; Kang, Ho Seong; Kim, Jong Hun

    1994-03-01

    This book deals with basic knowledge and familiarity with internet use, which is composed of seven chapters ; the world of internet, the basic knowledge for internet use such as telnet, mail, talk, basic command on Unix and command for communication, to access to the internet, if you get on the internet for the first time, useful service of internet such as archie service, gopher service, who is service, Use net, IRC and Netiquette on IRC, interesting internet trip like Billboard charts, TV-Rating, Solar Report, Agricultural Info, CARL, Nat'l Education BBS, internet service in Sydney university FEDIX, CAIR, NOAA, SDDAS, Stock, MUD and international Go server. The last chapter is computer networks connected to the internet ; computer services, BITNET, and FidoNet.

  12. World tour through the internet

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Ji Hwan; Kang, Ho Seong; Kim, Jong Hun

    1994-03-15

    This book deals with basic knowledge and familiarity with internet use, which is composed of seven chapters ; the world of internet, the basic knowledge for internet use such as telnet, mail, talk, basic command on Unix and command for communication, to access to the internet, if you get on the internet for the first time, useful service of internet such as archie service, gopher service, who is service, Use net, IRC and Netiquette on IRC, interesting internet trip like Billboard charts, TV-Rating, Solar Report, Agricultural Info, CARL, Nat'l Education BBS, internet service in Sydney university FEDIX, CAIR, NOAA, SDDAS, Stock, MUD and international Go server. The last chapter is computer networks connected to the internet ; computer services, BITNET, and FidoNet.

  13. The use of the internet: consumption patterns of adolescents in romania

    Directory of Open Access Journals (Sweden)

    SIMONA ŞTEFĂNESCU

    2008-02-01

    Full Text Available Starting from the theoretical premise according to which Internet users are an active force in the "generative process of technology" and from the results of a larger investigation conducted using both quantitative and qualitative methods, this work deals with the patterns of Internet consumption and use by Romanian adolescents. The study presents data related to the frequency and duration of Internet use by adolescents, data related to the most used Internet applications, as well as data related to the significance of Internet for young people and the self perception of the influence of this new means of communication. The conclusions of the work refer to the impact of Internet on communication - it is "facilitated" by the Internet, as far as adolescents are concerned and, in any case, it is "transformed", "changed" by this new means of communication - on entertainment - Internet is a space that offers various entertainment opportunities which are impossible to offer by other means of communication, such as on-line gaming and downloading - as well as on information - the Internet offers, without any restriction, i.e. allowing for the freedom of choice, information from all fields and related to all preoccupations, including information related to school, universities and professions which can be chosen in life. The work is also a debate on the fact that Internet is almost exclusively characterized in positive terms by adolescents, despite the warning signals given and emphasized by some with respect to the "danger" represented by the Internet. As a conclusion, the work shows that according to the investigated data, young people use the Internet frequently and to a large extent, that it is an integral part of their life and its use is a routine "ritual" without which, for many adolescents, life can't even be conceived.

  14. From Sensor to Observation Web with Environmental Enablers in the Future Internet

    Science.gov (United States)

    Havlik, Denis; Schade, Sven; Sabeur, Zoheir A.; Mazzetti, Paolo; Watson, Kym; Berre, Arne J.; Mon, Jose Lorenzo

    2011-01-01

    This paper outlines the grand challenges in global sustainability research and the objectives of the FP7 Future Internet PPP program within the Digital Agenda for Europe. Large user communities are generating significant amounts of valuable environmental observations at local and regional scales using the devices and services of the Future Internet. These communities’ environmental observations represent a wealth of information which is currently hardly used or used only in isolation and therefore in need of integration with other information sources. Indeed, this very integration will lead to a paradigm shift from a mere Sensor Web to an Observation Web with semantically enriched content emanating from sensors, environmental simulations and citizens. The paper also describes the research challenges to realize the Observation Web and the associated environmental enablers for the Future Internet. Such an environmental enabler could for instance be an electronic sensing device, a web-service application, or even a social networking group affording or facilitating the capability of the Future Internet applications to consume, produce, and use environmental observations in cross-domain applications. The term “envirofied” Future Internet is coined to describe this overall target that forms a cornerstone of work in the Environmental Usage Area within the Future Internet PPP program. Relevant trends described in the paper are the usage of ubiquitous sensors (anywhere), the provision and generation of information by citizens, and the convergence of real and virtual realities to convey understanding of environmental observations. The paper addresses the technical challenges in the Environmental Usage Area and the need for designing multi-style service oriented architecture. Key topics are the mapping of requirements to capabilities, providing scalability and robustness with implementing context aware information retrieval. Another essential research topic is handling

  15. From Sensor to Observation Web with environmental enablers in the Future Internet.

    Science.gov (United States)

    Havlik, Denis; Schade, Sven; Sabeur, Zoheir A; Mazzetti, Paolo; Watson, Kym; Berre, Arne J; Mon, Jose Lorenzo

    2011-01-01

    This paper outlines the grand challenges in global sustainability research and the objectives of the FP7 Future Internet PPP program within the Digital Agenda for Europe. Large user communities are generating significant amounts of valuable environmental observations at local and regional scales using the devices and services of the Future Internet. These communities' environmental observations represent a wealth of information which is currently hardly used or used only in isolation and therefore in need of integration with other information sources. Indeed, this very integration will lead to a paradigm shift from a mere Sensor Web to an Observation Web with semantically enriched content emanating from sensors, environmental simulations and citizens. The paper also describes the research challenges to realize the Observation Web and the associated environmental enablers for the Future Internet. Such an environmental enabler could for instance be an electronic sensing device, a web-service application, or even a social networking group affording or facilitating the capability of the Future Internet applications to consume, produce, and use environmental observations in cross-domain applications. The term "envirofied" Future Internet is coined to describe this overall target that forms a cornerstone of work in the Environmental Usage Area within the Future Internet PPP program. Relevant trends described in the paper are the usage of ubiquitous sensors (anywhere), the provision and generation of information by citizens, and the convergence of real and virtual realities to convey understanding of environmental observations. The paper addresses the technical challenges in the Environmental Usage Area and the need for designing multi-style service oriented architecture. Key topics are the mapping of requirements to capabilities, providing scalability and robustness with implementing context aware information retrieval. Another essential research topic is handling data

  16. From Sensor to Observation Web with Environmental Enablers in the Future Internet

    Directory of Open Access Journals (Sweden)

    Jose Lorenzo Mon

    2011-03-01

    Full Text Available This paper outlines the grand challenges in global sustainability research and the objectives of the FP7 Future Internet PPP program within the Digital Agenda for Europe. Large user communities are generating significant amounts of valuable environmental observations at local and regional scales using the devices and services of the Future Internet. These communities’ environmental observations represent a wealth of information which is currently hardly used or used only in isolation and therefore in need of integration with other information sources. Indeed, this very integration will lead to a paradigm shift from a mere Sensor Web to an Observation Web with semantically enriched content emanating from sensors, environmental simulations and citizens. The paper also describes the research challenges to realize the Observation Web and the associated environmental enablers for the Future Internet. Such an environmental enabler could for instance be an electronic sensing device, a web-service application, or even a social networking group affording or facilitating the capability of the Future Internet applications to consume, produce, and use environmental observations in cross-domain applications. The term “envirofied” Future Internet is coined to describe this overall target that forms a cornerstone of work in the Environmental Usage Area within the Future Internet PPP program. Relevant trends described in the paper are the usage of ubiquitous sensors (anywhere, the provision and generation of information by citizens, and the convergence of real and virtual realities to convey understanding of environmental observations. The paper addresses the technical challenges in the Environmental Usage Area and the need for designing multi-style service oriented architecture. Key topics are the mapping of requirements to capabilities, providing scalability and robustness with implementing context aware information retrieval. Another essential research

  17. Gender differences in Internet identification and Internet anxiety ...

    African Journals Online (AJOL)

    This exploratory study investigated gender differences in Internet identification and Internet anxiety. A sample of 231 students (138 females and 93 males) from four different schools participated in the study. A structured interview schedule was used to collect data. Factor analysis was carried out to test for construct validity.

  18. Internet Inquiry

    DEFF Research Database (Denmark)

    This collection of dialogues is the only textbook of its kind. Internet Inquiry: Conversations About Method takes students into the minds of top internet researchers as they discuss how they have worked through critical challenges as they research online social environments. Editors Annette N....... Markham and Nancy K. Baym illustrate that good research choices are not random but are deliberate, studied, and internally consistent. Rather than providing single "how to" answers, this book presents distinctive and divergent viewpoints on how to think about and conduct qualitative internet studies....

  19. Research on the Operation Mode of Intelligent-town Energy Internet Based on Source-Load Interaction

    Science.gov (United States)

    Li, Hao; Li, Wen; Miao, Bo; Li, Bin; Liu, Chang; Lv, Zhipeng

    2018-01-01

    On the background of the rise of intelligence and the increasing deepening of “Internet +”application, the energy internet has become the focus of the energy research field. This paper, based on the fundamental understanding on the energy internet of the intelligent town, discusses the mode of energy supply in the source-load interactive region, and gives an in-depth study on the output characteristics of the energy supply side and the load characteristics of the demand side, so as to derive the law of energy-load interaction of the intelligent-town energy internet.

  20. Optimal Network QoS over the Internet of Vehicles for E-Health Applications

    Directory of Open Access Journals (Sweden)

    Di Lin

    2016-01-01

    Full Text Available Wireless technologies are pervasive to support ubiquitous healthcare applications. However, a critical issue of using wireless communications under a healthcare scenario is the electromagnetic interference (EMI caused by RF transmission, and a high level of EMI may lead to a critical malfunction of medical sensors. In consideration of EMI on medical sensors, we study the optimization of quality of service (QoS within the whole Internet of vehicles for E-health and propose a novel model to optimize the QoS by allocating the transmit power of each user. Our results show that the optimal power control policy depends on the objective of optimization problems: a greedy policy is optimal to maximize the summation of QoS of each user, whereas a fair policy is optimal to maximize the product of QoS of each user. Algorithms are taken to derive the optimal policies, and numerical results of optimizing QoS are presented for both objectives and QoS constraints.

  1. Seeking sex partners through the internet and mobile phone applications among men who have sex with men in Taiwan.

    Science.gov (United States)

    Ko, Nai-Ying; Tseng, Po-Chia; Huang, Yu-Chao; Chen, Yen-Chin; Hsu, Su-Ting

    2016-07-01

    It has become popular for men who have sex with men (MSM) to use mobile-phone geosocial networking applications (mobile apps) to find sex partners. A cross-sectional online survey was conducted in Taiwan to compare the sexual and substance-use behaviors of MSM seeking sex partners through the internet and mobile apps. Of the 1060 participants, 65.8% used the internet via computer and 37.7% used a mobile app to find sexual partners, while 30.3% used recreational drugs or alcohol in the previous 6 months. MSM who exclusively used mobile apps to seek sex partners were significantly more likely than MSM seeking sex via computer to be older, to have used recreational drugs or alcohol, and to have sex with HIV-positive partners. Additionally, using mobile apps to seek sex partners was significantly associated with having sex with online partners through either mobile apps or computer-based internet use (adjusted odds ratio (AOR), 7.12 [3.87-13.11]), self-reporting as HIV-positive (AOR, 2.24 [1.12-4.12]), using recreational drugs (AOR, 1.67 [1.21-2.32]), having disclosed HIV status to sexual partners (AOR, 1.44 [1.03-2.02]), and having sex with HIV-positive partners (AOR, 1.81 [1.06-3.10]). In conclusion, the mobile apps may serve as a feasible platform for HIV-positive MSM to find other HIV-positive partners.

  2. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  3. Chromhome: a rich internet application for accessing comparative chromosome homology maps.

    Science.gov (United States)

    Nagarajan, Sridevi; Rens, Willem; Stalker, James; Cox, Tony; Ferguson-Smith, Malcolm A

    2008-03-26

    Comparative genomics has become a significant research area in recent years, following the availability of a number of sequenced genomes. The comparison of genomes is of great importance in the analysis of functionally important genome regions. It can also be used to understand the phylogenetic relationships of species and the mechanisms leading to rearrangement of karyotypes during evolution. Many species have been studied at the cytogenetic level by cross species chromosome painting. With the large amount of such information, it has become vital to computerize the data and make them accessible worldwide. Chromhome http://www.chromhome.org is a comprehensive web application that is designed to provide cytogenetic comparisons among species and to fulfil this need. The Chromhome application architecture is multi-tiered with an interactive client layer, business logic and database layers. Enterprise java platform with open source framework OpenLaszlo is used to implement the Rich Internet Chromhome Application. Cross species comparative mapping raw data are collected and the processed information is stored into MySQL Chromhome database. Chromhome Release 1.0 contains 109 homology maps from 51 species. The data cover species from 14 orders and 30 families. The homology map displays all the chromosomes of the compared species as one image, making comparisons among species easier. Inferred data also provides maps of homologous regions that could serve as a guideline for researchers involved in phylogenetic or evolution based studies. Chromhome provides a useful resource for comparative genomics, holding graphical homology maps of a wide range of species. It brings together cytogenetic data of many genomes under one roof. Inferred painting can often determine the chromosomal homologous regions between two species, if each has been compared with a common third species. Inferred painting greatly reduces the need to map entire genomes and helps focus only on relevant

  4. Chromhome: A rich internet application for accessing comparative chromosome homology maps

    Directory of Open Access Journals (Sweden)

    Cox Tony

    2008-03-01

    Full Text Available Abstract Background Comparative genomics has become a significant research area in recent years, following the availability of a number of sequenced genomes. The comparison of genomes is of great importance in the analysis of functionally important genome regions. It can also be used to understand the phylogenetic relationships of species and the mechanisms leading to rearrangement of karyotypes during evolution. Many species have been studied at the cytogenetic level by cross species chromosome painting. With the large amount of such information, it has become vital to computerize the data and make them accessible worldwide. Chromhome http://www.chromhome.org is a comprehensive web application that is designed to provide cytogenetic comparisons among species and to fulfil this need. Results The Chromhome application architecture is multi-tiered with an interactive client layer, business logic and database layers. Enterprise java platform with open source framework OpenLaszlo is used to implement the Rich Internet Chromhome Application. Cross species comparative mapping raw data are collected and the processed information is stored into MySQL Chromhome database. Chromhome Release 1.0 contains 109 homology maps from 51 species. The data cover species from 14 orders and 30 families. The homology map displays all the chromosomes of the compared species as one image, making comparisons among species easier. Inferred data also provides maps of homologous regions that could serve as a guideline for researchers involved in phylogenetic or evolution based studies. Conclusion Chromhome provides a useful resource for comparative genomics, holding graphical homology maps of a wide range of species. It brings together cytogenetic data of many genomes under one roof. Inferred painting can often determine the chromosomal homologous regions between two species, if each has been compared with a common third species. Inferred painting greatly reduces the need to

  5. Uso dos recursos de Internet na Enfermagem: uma revisão Uso de los recursos de la Internet en la Enfermería: una revisión Use of Internet resources in Nursing: a review

    Directory of Open Access Journals (Sweden)

    Selina Guillen Freitas dos Santos

    2006-04-01

    concluyido que la enfermería utiliza satisfactoriamente los recursos del sistema Internet y esto ha contribuido para el proprio desarrollo de la profesión.Resources of Internet system are widely popularized in most of all human activities in the society. This paper aims to identify and to describe major modalities of Internet utilization in nursing areas of Education, Care, and Research. This is a bibliographic review which data source was MEDLINE database, using pertinent descriptors for the focused areas. From referred publications, it was selected 63 articles. Major utilization in Education area is the development of applications to promote distance education; in Patient Education area is the development of applications to make health information available; in Care area are the applications to make care protocols available to promote evidence-based practice, and in Research area is online data collection. It was concluded that nursing is using Internet resources in a satisfactory way, and it has contributed for the profession evolution.

  6. La ética en internet

    OpenAIRE

    Issa Luna Pla

    2015-01-01

    En América Latina el INTERNET es un medio con muchas limitaciones. Solo el 10 ó 15 por ciento de la población total, residente en Argentina, México y Brasil tiene acceso. Trata sobre el Comercio en Internet, la regulación y la ética, las nuevas formas de aplicar reglas, el Internet como espacio público, las comunidades de Internet, los parámetros de ética y responsabilidad social en Internet, los menores y la libertad de expresión, los contenidos informativos en Internet, el Internet corporat...

  7. Audience, Elegance, and Learning via the Internet.

    Science.gov (United States)

    Lafer, Stephen

    1997-01-01

    Discusses the need for educational environments that allow for authentic learning. Shows how the Internet enables practice in which students are able to manipulate concepts for the sake of getting things done and receiving feedback regarding how well the application of an understanding worked. Provides examples of three learning activities on the…

  8. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire (IRSN), 92 - Fontenay-aux-Roses (France)

    2009-07-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection, and environment shared by sites in France, Europe, big agencies and non-ionizing radiations. (N.C.)

  9. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire, IRSN, 92 - Fontenay aux Roses (France)

    2009-10-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear medicine and ionizing radiation, nuclear activity, radiation protection for populations, radioactive waste management in France and Europe. (N.C.)

  10. Modeling the Internet.

    Energy Technology Data Exchange (ETDEWEB)

    Kelic, Andjelka; Mitchell, Michael David; Shirah, Donald N.

    2017-12-01

    The National Infrastructure Simulations and Analysis Center (NISAC) has developed a nationwide model of the Internet to study the potential impact of the loss of physical facilities on the network and on other infrastructures that depend on the Internet for services. The model looks at the Internet from the perspective of Internet Service Providers (ISPs) and their connectivity and can be used to determine how the network connectivity could be modified to assist in mitigating an event. In addition the model could be used to explore how portions of the network could be made more resilient to disruptive events.

  11. Internet versus mail

    DEFF Research Database (Denmark)

    Olsen, Søren Bøye

    In a choice experiment setup, this paper suggests that internet surveys can be a viable alternative to traditional mail surveys when gathering feedback from a sample of respondents. In a study concerning preferences for avoiding encroachment of nature areas in future motorway planning in Denmark......, two samples of respondents are surveyed – one by internet and one by mail. Results suggest that additional self-selection mechanisms in the internet survey mode lead to the internet sample being less representative of the survey population than is the case for the mail sample. Similar response rates...... are obtained in the two samples, but the internet sample is apparently less prone to protest bidding. A thorough parametric analysis cannot reject that stated preferences elicited by use of the two different modes of sampling are identical. This suggests that the fear of a potential survey mode effect...

  12. La ética en internet

    Directory of Open Access Journals (Sweden)

    Issa Luna Pla

    2015-01-01

    Full Text Available En América Latina el INTERNET es un medio con muchas limitaciones. Solo el 10 ó 15 por ciento de la población total, residente en Argentina, México y Brasil tiene acceso. Trata sobre el Comercio en Internet, la regulación y la ética, las nuevas formas de aplicar reglas, el Internet como espacio público, las comunidades de Internet, los parámetros de ética y responsabilidad social en Internet, los menores y la libertad de expresión, los contenidos informativos en Internet, el Internet corporativo, Autorregulación en Internet, tecnología para rastrear contenidos y la situación de América Latina.

  13. Creating Values out of Internet of Things: An Industrial Perspective

    Directory of Open Access Journals (Sweden)

    Partha Pratim Ray

    2016-01-01

    Full Text Available Internet of Things based cloud is envisaged to extract values other than the specified purpose for which it is to be utilized. It is hereby apprehended that different genre of values, rather business values, could efficiently be assimilated from the Internet of Things cloud platforms. It is also investigated to identify numerous domains of applications that are currently being associated with the similar cloud platforms. A case study on various types of value generation methods has been performed. A novel Internet of Things cloud stack is proposed to disseminate and aggregate the business values. Few research challenges are observed that shall need appropriate indulgence to generate more business values out of Internet of Things based cloud. This paper also seeks few research and industry related problems that need to be resolved. It further recommends several key parameters to the enterprise and government policymakers that should immediately be dealt with for long-term success.

  14. Internet Censorship

    Science.gov (United States)

    Jyotsna; Kapil; Aayush

    2012-09-01

    Censorship on Internet has always wet its hands in the water of controversies, It is said to go in with synonym of "FILTERING THE NET" i.e. Either done to protect minors or for nationís privacy, some take it as snatching their freedom over internet and some take it as an appropriate step to protect minor, It has its supporters as well as opponents.Google has reported a whooping number of requests from Governments of U.K, China, Poland, Spain, and Canada to remove videos and search links that led to harassment, sensitive issues or suspicious people. This paper deals with the cons of censorship on internet and to make people aware of the fact that Internet is not a single body owned by an org. but an open sky of information shared equally by all. Research done has found out many unseen aspects of different people's view point.

  15. Internet marketing global features

    Directory of Open Access Journals (Sweden)

    Rakita Branko

    2005-01-01

    Full Text Available Business environment incessantly bringing a yard of a new challenges to market entities. One of the greatest challenges that companies faced during the last couple of decades was development of information systems as well as a large scale usage of world's greatest computer network - Internet - no matter how big they were or what their activities included. There are many papers about Internet, its development, social and economic significance. However, there is no paper or article written by a local author that systematically and thoroughly treats marketing importance of Internet. This paper presents potentials and business importance of internet marketing in new millennium. It considers internet as a communication, trade and distribution channel. In addition, the paper highlights research potentials of Internet.

  16. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Societe Francaise de Radioprotection, 75 - Paris (France)

    2008-04-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  17. The Future Potential of Internet of Things

    Directory of Open Access Journals (Sweden)

    Aelita Skaržauskienė

    2013-01-01

    Full Text Available Purpose: To define the Internet of things and to analyze it as a background for the internet of services. Design/methodology/approach: The article discusses potential possibilities and problematic issues concerning the Internet of things (IoT and Internet of services (IoS. The debates concerning IoT and its possible application fields have continued for more than ten years. The technological background is there and the fields of application are broad. However, there is still a lack of understanding about the possible benefits that technology could give to various bodies if applied correctly. This article is based on comparison and analysis of scientific articles, research papers and case studies related to the potential for IoT and its implementation in IoS. Theoretical findings: IoT is a logical evolutionary step for the internet. Despite the technological background, the concept of objects which are aware of their surroundings, allow to manipulate them by defining different rule patterns and ensuring interaction possibilities with other objects or human beings. The necessity for web-based services is increasing along with the technological gadgets which support them. Applying things, which are connected in a network, could revolutionize many industry and service sectors and create new service provision and administration methods based on information technology. However, there are many problematic issues and research challenges related to the IoT. Few of the most significant are related to standardization of technology, legal regulation and ethical aspects concerning the IoT technology. Research limitations/implications: The IoT is a popular trend promoted by the business sector and governmental bodies. There are few comprehensive studies and projects which talk about the benefits that business and society could gain from the IoT. There is a lot less information about the possible risk and problematic aspects, and a lack of agreements between

  18. End-to-End Mechanisms for Rate-Adaptive Multicast Streaming over the Internet

    OpenAIRE

    Rimac, Ivica

    2005-01-01

    Continuous media applications over packet-switched networks are becoming more and more popular. Radio stations, for example, already use streaming technology to disseminate their content to users on the Internet, and video streaming services are expected to experience similar popularity. In contrast to traditional television and radio broadcast systems, however, prevalent Internet streaming solutions are based on unicast communication and raise scalability and efficiency issues. Multicast com...

  19. Internet Freedom in Asia: Case of Internet Censorship in China

    OpenAIRE

    MONGGILO, ZAINUDDIN MUDA

    2016-01-01

    Internet can develop the communication and information freedom on society but unfortunately in some nations, especially in Asia, it cannot be fully accessed because of government censorship. This report explains the relationship between the practice of Internet censorship imposed by the Chinese government and the freedom of its citizens (in the internet surfing experience) as the realization of human rights in the freedom of expression and opinion (seek, receive-use, and communicate informati...

  20. Application of Docker Swarm cluster for testing programs, developed for system of devices within paradigm of Internet of things

    Science.gov (United States)

    Shichkina, Y. A.; Kupriyanov, M. S.; Moldachev, S. O.

    2018-05-01

    Today, a description of various Internet devices very often appears on the Internet. For the efficient operation of the Industrial Internet of things, it is necessary to provide a modern level of data processing starting from getting them from devices ending with returning them to devices in a processed form. Current solutions of the Internet of Things are mainly focused on the development of centralized decisions, projecting the Internet of Things on the set of cloud-based platforms that are open, but limit the ability of participants of the Internet of Things to adapt these systems to their own problems. Therefore, it is often necessary to create specialized software for specific areas of the Internet of Things. This article describes the solution of the problem of virtualization of the system of devices based on the Docker system. This solution allows developers to test any software on any number of devices forming a mesh.

  1. Internet addiction, problematic internet use, nonproblematic internet use among Chinese adolescents: Individual, parental, peer, and sociodemographic correlates.

    Science.gov (United States)

    Zhou, Nan; Cao, Hongjian; Li, Xiaomin; Zhang, Jintao; Yao, Yuanwei; Geng, Xiaomin; Lin, Xiuyun; Hou, Shumeng; Liu, Fenge; Chen, Xiaoli; Fang, Xiaoyi

    2018-05-01

    Internet addiction has been typically conceptualized as either a continuous construct or a dichotomous construct. Limited research has differentiated adolescents with problematic Internet use (PIU) from the Internet addiction group (IA) and/or nonproblematic Internet use group (NPIU) and examined the potential correlates. To fill this gap, based on data obtained from 956 Chinese adolescents (11-19 years, 47% male), this study examined if adolescents with PIU is a distinctive group from the IA and NPIU. This study also examined factors from different ecological levels that may differentiate among the three groups, including individual, parental, peer, and sociodemographic factors. Results indicated that IA, PIU, and NPIU differed significantly on scores of Young's Diagnostic Questionnaire (YDQ). Critical factors emerging from different ecological levels could differentiate between PIU and NPIU and between IA and NPIU. Such findings suggest that PIU may represent a distinct, intermediate group of Internet users. The potential theoretical and practical implications of identifying PIU were also discussed. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  2. Internet effects

    NARCIS (Netherlands)

    Valkenburg, P.M.; Peter, J.; Levesque, R.J.R.

    2011-01-01

    Adolescents’ extensive use of Internet communication and the uncertainty about its consequences call for an integrative perspective that helps to understand both the appeal of Internet communication and its risks and opportunities. The aim of this essay is to theorize, and if possible, substantiate

  3. Risk Factors of Internet Addiction among Internet Users: An Online Questionnaire Survey.

    Directory of Open Access Journals (Sweden)

    Chia-Yi Wu

    Full Text Available Internet addiction (IA has become a major public health issue worldwide and is closely linked to psychiatric disorders and suicide. The present study aimed to investigate the prevalence of IA and its associated psychosocial and psychopathological determinants among internet users across different age groups.The study was a cross-sectional survey initiated by the Taiwan Suicide Prevention Center. The participants were recruited from the general public who responded to the online questionnaire. They completed a series of self-reported measures, including Chen Internet Addiction Scale-revised (CIAS-R, Five-item Brief Symptom Rating Scale (BSRS-5, Maudsley Personality Inventory (MPI, and questions about suicide and internet use habits.We enrolled 1100 respondents with a preponderance of female subjects (85.8%. Based on an optimal cutoff for CIAS-R (67/68, the prevalence rate of IA was 10.6%. People with higher scores of CIAS-R were characterized as: male, single, students, high neuroticism, life impairment due to internet use, time for internet use, online gaming, presence of psychiatric morbidity, recent suicide ideation and past suicide attempts. Multiple regression on IA showed that age, gender, neuroticism, life impairment, internet use time, and BSRS-5 score accounted for 31% of variance for CIAS-R score. Further, logistic regression showed that neuroticism, life impairment and internet use time were three main predictors for IA. Compared to those without IA, the internet addicts had higher rates of psychiatric morbidity (65.0%, suicide ideation in a week (47.0%, lifetime suicide attempts (23.1%, and suicide attempt in a year (5.1%.Neurotic personality traits, psychopathology, time for internet use and its subsequent life impairment were important predictors for IA. Individuals with IA may have higher rates of psychiatric morbidity and suicide risks. The findings provide important information for further investigation and prevention of IA.

  4. Internet use at workplaces and its effects on working style in indian context: An exploration

    Science.gov (United States)

    Shrivastava, Apoorva; Sharma, Manoj K.; Marimuthu, P.

    2016-01-01

    Background: Internet use has revolutionized the pattern of working style at the workplace. It led to an increased use for nonprofessional activities at the workplace. It has been shown to affect productivity at the workplace. There is a dearth of literature from the Indian context in this area. Aim: This study was conducted to explore the pattern of Internet use at the workplace and its dysfunctions. Setting and Design: The present study was a cross-sectional prospective study. Materials and Methods: The objective of the study was to assess the pattern of technology use at the workplace. Two hundred and fifty employees having experience of Internet use for more than a year of various Government/Private sector organizations in Bengaluru were assessed using background data sheet. Users who were unwilling to participate were excluded from the study. Results: 29.6% of the participants used mobile phone exclusively. 58.8% of the participants used mobile along with other devices such as desktop, laptop, and tablet at home as well as at work. 64% of the participants reported change in their productivity due to nonwork-related Internet use at the workplace. 42% of the participants acknowledgemed postponement of their work due to Internet activities. 3–5% reported preference for Internet to work, meals, personal hygiene, sleep, and interaction with family members. WhatsApp was the most used application followed by Facebook and Gmail. Gaming applications and messenger applications such as hike and hangouts were used less frequently. Overall, delay in going to sleep was 1.6 hours and early morning awakening was 1.5 hours due to Internet use. Conclusions: The present study has implications for evolving psychoeducational modules for the promotion of healthy use of technology. PMID:28194082

  5. TPROXY dan FILTERING SEBAGAI METODE OPTIMASI PEMAKAIAN BANDWIDTH INTERNET

    Directory of Open Access Journals (Sweden)

    Sutiyo Sutiyo

    2015-04-01

    Full Text Available Until now the use of the internet disuatu agencies viewed from the initial planning, use and care, even long-term planning is still not optimal. The main factor lies in the existing human resources, especially in IT personnel and policy makers who do not understand or do not even know at all how your use of the Internet well, optimal, efficient, particularly associated with the consumption of Internet bandwidth. Internet bandwidth capacity greatly affect the speed of web access or other Internet applications. So we need a plan and maintance necessary to obtain good Internet bandwidth consumption efficiency and guaranteed QoS, such as by utilizing Tproxy and filtering methods. TProxy is a development of which has been patched Squid, a proxy to be able to pass traffic without NAT (Network Access Translation. Fitering a firewall system which is used for filtering data packets that do not want filtered dikendaki or akhirmya able to minimize traffic on bandwidth usage. Tproxy and filtering runs on the Linux platform. Linux distributions are often used to Tproxy is a variant Debian, Centos and then to use Mikrotik Filtering. At the end of each request or query from the client or the response of the proxy server does not have meaningful constraints, the bandwidth between the client and the proxy server does not happen limitation, bandwidth capable of running close to capacity including 10 Mbps Ethernet, 100 Mbps, and even a GPS (full speed.

  6. Pemanfaatan Augmented Reality Dalam Memvisualisasikan Produk Perumahan Melalui Internet

    Directory of Open Access Journals (Sweden)

    Bonny A Suryawinata

    2010-12-01

    Full Text Available To attract house buyers, many ways is done by the developers to promote their products, such as by using multiple marketing medias namely television, radio, internet, newspapers or distribute flyers during the exhibition. It is not uncommon that the said use of multiple media elements still make prospective buyers feel confused, because they can not imagine the shape of the house, since all they see is a flat two dimensional (2D object. To obtain detailed product information house of course they have to visit the exhibition or housing sales office that would spend the time and cost. This is why the authors proposed an application that can display 3D images over the Internet by using Augmented Reality technology, so that prospective home buyers can access these applications anytime and anywhere. 

  7. Analisis Korelasi Statistik Antara Populasi Jumlah Penduduk Dan Pengguna Internet Negara-negara Di Dunia

    OpenAIRE

    puspitaningdyah, ratnasari

    2012-01-01

    The advancement of information and communication technology (ICT) that are so rapidly especially Internet now has a lot tochange the world that can be known and felt by the whole world rapidly in a matter of seconds. The purpose of this study to determinewhether there is a relationship and the influence between populations with a total population of Internet users in 20 countries of theworld's highest Internet users in 2008. The method of analysis used is through the application of non-parame...

  8. Internet Addiction in Adolescents

    Directory of Open Access Journals (Sweden)

    Rębisz Sławomir

    2016-08-01

    Full Text Available The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the twentieth century, usually appears in the literature in the context of young people who have been found to be most vulnerable. The phenomenon is known as Adolescent Internet Addiction. Compulsive use of the Internet is a complex phenomenon, its effects being visible in almost all aspects of a young person’s social life. It is manifested in a variety of pathological behaviors and emotional states grouped into several major psycho-physical and social effects that may appear simultaneously, e.g. anger, depression, loneliness or anxiety associated with the lack of access to the network, the weakening of social ties, withdrawal from real life, lack of educational achievement, chronic fatigue or deteriorating health. The authors of this study aim to assess the level of Internet addiction among adolescents in Poland and indicate its main behavioral manifestations, in the students surveyed, which influence their pathological use of the Internet. Our study involved a total of 505 students from three high schools located in Rzeszow (N = 505 and was carried out by questionnaires, including, among others, The Problematic Use of the Internet (PUI which is the Polish adaptation of Kimberly Young’s Internet Addiction Test (IAT (Cronbach’s α = 0.89. Statistical analysis of responses from the PUI test allowed us to determine (1 the level of Internet addiction among these adolescents, whereas the univariate (ANOVA analysis enabled us (2 to verify the hypothesis of the existence of differences in the level of Internet addiction among the investigated groups as far as gender, place of residence or grade are concerned

  9. INTERNET AND SENIORS

    Directory of Open Access Journals (Sweden)

    Rain, Tomáš

    2010-12-01

    Full Text Available The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize ways of using internet for helping seniors to better life. The authors describe terms e-senior. The authors suggest methodological approach to exercising user’s skills.

  10. The Internet Engineering Task Force and The Future of Internet

    OpenAIRE

    Baccelli , Emmanuel; Clausen , Thomas Heide; Jacquet , Philippe

    2009-01-01

    International audience; If one wants to identify where ideas and initiatives regarding the Internet are being confronted, the Internet Engineering Task Force (IETF) is unavoidable. Created in 1986 by US government agencies (DoD, Department of Energy, NASA, NSF) to supervise the design and deployment of Internet protocols, it was initially open only for US government funded researchers. Early 1987 saw a dozen of industry representatives invited, and in a matter of months, the IETF was opened t...

  11. Everyone’s Internet

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    After more than 20 years,the Internet in China has become a big success.The country has the world’s largest Internet population that topped 420 million at the end of June.In the first six months of this year,China’s Internet market reached 74.3 billion yuan($10.9 billion),the equivalent of 2009’s total.Local businesses have risen to

  12. Fault-recovery and Coherence in Internet of Things Choreographies

    OpenAIRE

    Cherrier , Sylvain; Ghamri-Doudane , Yacine; Lohier , Stéphane; Roussel , Gilles

    2014-01-01

    International audience; Facilitating the creation of Internet of Things (IoT) applications is a major concern to increase its development. D-LITe, our previous work, is a framework for that purpose. In D-LITe, Objects are considered as part of a whole application. They offer a REST web service that describes Object capabilities, receives the logic to be executed, and interacts with other stakeholders. Then, the complete application is seen as a choreography dynamically deployed on various obj...

  13. [Internet addiction].

    Science.gov (United States)

    Nakayama, Hideki; Higuchi, Susumu

    2015-09-01

    Internet technologies have made a rapid progress, bringing convenience to daily life. On the other hand, internet use disorder and internet addiction (IA) have become reportedly serious health and social problems. In 2013, internet gaming disorder criteria have been proposed in the section of Conditions for Further Study of DSM-5. Existing epidemiological studies by questionnaire methods have reported that the prevalence of IA ranges between 2.8% and 9.9% among youths in Japan. Attention deficit hyperactivity disorder (ADHD), sleeping disorders, depression, obsessive compulsive disorder, and phobic anxiety disorder are extremely common comorbid mental disorders with IA. Some psychotherapies (e.g., cognitive behavioral therapy, motivational interviewing) and medical treatments (e.g., antidepressant drugs, methylphenidate) for comorbid mental disorders as well as rehabilitation (e.g., treatment camp) are effective for IA remission. However, some serious cases of IA may be difficult to treat, and prevention is very important. In future, the prevention, rehabilitations and treatments for IA will be more required in Japan.

  14. The development of an internet-based knowledge exchange platform for pediatric critical care clinicians worldwide*.

    Science.gov (United States)

    Wolbrink, Traci A; Kissoon, Niranjan; Burns, Jeffrey P

    2014-03-01

    Advances in Internet technology now enable unprecedented global collaboration and collective knowledge exchange. Up to this time, there have been limited efforts to use these technologies to actively promote knowledge exchange across the global pediatric critical care community. To develop an open-access, peer-reviewed, not-for-profit Internet-based learning application, OPENPediatrics, a collaborative effort with the World Federation of Pediatric Intensive and Critical Care Societies, was designed to promote postgraduate educational knowledge exchange for physicians, nurses, and others caring for critically ill children worldwide. Description of program development. International multicenter tertiary pediatric critical care units across six continents. Multidisciplinary pediatric critical care providers. A software application, providing information on demand, curricular pathways, and videoconferencing, downloaded to a local computer. In 2010, a survey assessing postgraduate educational needs was distributed through World Federation of Pediatric Intensive and Critical Care Societies to constituent societies. Four hundred and twenty-nine critical care providers from 49 countries responded to the single e-mail survey request. Respondents included 68% physicians and 28% nurses who care for critically ill children. Fifty-two percent of respondents reported accessing the Internet at least weekly to obtain professional educational information. The five highest requests were for educational content on respiratory care [mechanical ventilation] (48% [38%]), sepsis (28%), neurology (25%), cardiology (14%), extracorporeal membrane oxygenation (10%), and ethics (8%). Based on these findings, and in collaboration with researchers in adult learning and online courseware, an application was developed and is currently being used by 770 registered users in 60 countries. We describe here the development and implementation of an Internet-based application which is among the first

  15. A routing protocol based on energy and link quality for Internet of Things applications.

    Science.gov (United States)

    Machado, Kássio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A F; Neto, Augusto; Souza, José Neuman de

    2013-02-04

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  16. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    Directory of Open Access Journals (Sweden)

    Antonio A. F. Loureiro

    2013-02-01

    Full Text Available The Internet of Things (IoT is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.

  17. A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications

    Science.gov (United States)

    Machado, Kassio; Rosário, Denis; Cerqueira, Eduardo; Loureiro, Antonio A. F.; Neto, Augusto; de Souza, José Neuman

    2013-01-01

    The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare,environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols. PMID:23385410

  18. Assessing internet addiction using the parsimonious internet addiction components model—A preliminary study.

    OpenAIRE

    Kuss, D.J.; Shorter, G.W.; Rooij, A.J. van; Griffiths, M.D.; Schoenmakers, T.M.

    2014-01-01

    Internet usage has grown exponentially over the last decade. Research indicates that excessive Internet use can lead to symptoms associated with addiction. To date, assessment of potential Internet addiction has varied regarding populations studied and instruments used, making reliable prevalence estimations difficult. To overcome the present problems a preliminary study was conducted testing a parsimonious Internet addiction components model based on Griffiths’ addiction components (Journal ...

  19. Internet-Related Disorders: Development of the Short Compulsive Internet Use Scale.

    Science.gov (United States)

    Besser, Bettina; Rumpf, Hans-Jürgen; Bischof, Anja; Meerkerk, Gert-Jan; Higuchi, Susumu; Bischof, Gallus

    2017-11-01

    The addiction treatment system only reaches a small number of individuals suffering from Internet-related disorders. Therefore, it is important to improve case detection for preventive measures and brief interventions. Existing screening instruments are often time-consuming and rarely validated using clinical criteria. The aim of this study is to develop an optimized short screening for problematic Internet use and Internet addiction (IA). A regression analysis was conducted in random subsamples of a merged sample (N = 3,040; N = 1,209) to examine the item performance of the Compulsive Internet Use Scale (CIUS). Based on the results, a short version of the CIUS was developed and compared with the original CIUS. A fully structured diagnostic interview, covering the Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition (DSM-5) criteria for the Internet gaming disorder with a broader focus on all Internet activities, was conducted. A five-item version of the short screening performed best across the samples. Comparing the area under the curve (AUC) of the receiver operating characteristic between the Short CIUS and the original test revealed no significant difference (AUC = 0.968; 0.977). A cutoff point of 7 turned out to perform best for case detection and yielded a sensitivity of 0.95 and a specificity of 0.87, Cronbach's alpha was 0.77. The analysis showed that the performance of the Short CIUS is just as good in detecting problematical Internet use and IA as the performance of the original CIUS. The Short CIUS provides an economical and valid instrument for the assessment of problematic Internet use and IA.

  20. MULTIFUNCTION OF INTERNET IN TRANSLATION

    Directory of Open Access Journals (Sweden)

    Bayu Budiharjo

    2017-04-01

    Full Text Available Technology affects almost all areas, including translation. Many products of technology have made translational works easier, one of which is internet. Despite the wide use of internet, the potentials it has are sometimes unnoticed. While web-based dictionaries or thesaurus often serve as translators’ assistants and online Machine Translation issues become topics of many researches, other uses of internet related to translation may not be known by many. Internet can help disseminate newborn ideas, theories and findings worldwide to enhance translation theories. Besides, the contact between internet and translation generates new areas to examine. Internet also provides helping hand in the area of translation research. Researcher or anyone conducting research in the field of translation can find a range of research gaps as well as reference. Those who need group discussions to collect required data from informants, or researchers of the same interest coming from all over the world can meet and conduct Focus Group Discussion (FGD on virtual world. Furthermore, internet offers various forms of assistance for translation practitioners. The commonly used internet assistance consists of dictionaries, thesaurus and Machine Translations available on the internet. Other forms of aid provided by internet take form of parallel texts, images, and videos, which can be very helpful. Internet provides many things which can be utilized for the purpose of translation. Internet keeps on providing more as it develops from time to time in line with the development of technology. Internet awaits utilization of theorists, researchers, practitioners and those having concern on translation.

  1. Internet Infidelity: Exploration of Attitudes towards Partners Internet Behaviors

    Directory of Open Access Journals (Sweden)

    Mohammad R. Abdi

    2012-09-01

    Full Text Available Background: Today, the Internet has become a part of our everyday life and online communications have made it easy for people to develop interpersonal relationships. However, certain problems and difficulties have arisen from this issue. One of these problems, which have been prevalent among couples and families, is extramarital internet relationships or internet infidelity. The present research has been done to study people's attitudes towards this phenomenon. Materials and Methods: A 43-item Internet Infidelity Questionnaire (IIQ was presented on a website designed for this purpose. 481 Iranian users who were members of Farsi language forums and chat rooms were selected through available community sampling and enrolled in the study. To analyze research data, descriptive statistics and the t-test were used.Results: The results showed that either women or men considered online sexual activities of their partners as traitorous compared with friendly and emotional activities in cyberspace. In addition, women in comparison with men had a more negative attitude towards their partners’ internet activity (especially online sexual activities.Conclusion: This study expanded our understanding of the traditional concept of infidelity that had merely limited it to face-to-face sexual and emotional behavior. The results also showed that women had more negative attitudes towards such activities compared to men.

  2. Screening for Internet dependence: do the proposed diagnostic criteria differentiate normal from dependent Internet use?

    Science.gov (United States)

    Dowling, Nicki A; Quirk, Kelly L

    2009-02-01

    There is continued discussion of including Internet dependence as a diagnosis in future editions of the Diagnostic and Statistical Manual of Mental Disorders. The primary aim of the study was to evaluate the utility of the proposed diagnostic criteria for Internet dependence as measured by Young's Diagnostic Questionnaire (YDQ). Although the YDQ does not provide any measure of severity, there is emerging recognition that some Internet users may display less severe or at risk Internet dependence. The degree to which the cutoff of 5 out of 8 criteria is appropriate to differentiate nondependent from dependent Internet use was evaluated by comparing the Internet usage and psychological dysfunction of 424 university students endorsing 3 and 4 diagnostic criteria (at-risk Internet dependence) to those endorsing less than 3 criteria (nondependent) and those endorsing 5 or more criteria (Internet dependence). The findings suggest that the proposed diagnostic criteria do not adequately discriminate individuals scoring 3 or 4 from those currently classified as Internet dependent. The implications of the findings for the assessment, diagnosis, and treatment of Internet dependence are discussed.

  3. The Internet Process Addiction Test: Screening for Addictions to Processes Facilitated by the Internet.

    Science.gov (United States)

    Northrup, Jason C; Lapierre, Coady; Kirk, Jeffrey; Rae, Cosette

    2015-07-28

    The Internet Process Addiction Test (IPAT) was created to screen for potential addictive behaviors that could be facilitated by the internet. The IPAT was created with the mindset that the term "Internet addiction" is structurally problematic, as the Internet is simply the medium that one uses to access various addictive processes. The role of the internet in facilitating addictions, however, cannot be minimized. A new screening tool that effectively directed researchers and clinicians to the specific processes facilitated by the internet would therefore be useful. This study shows that the Internet Process Addiction Test (IPAT) demonstrates good validity and reliability. Four addictive processes were effectively screened for with the IPAT: Online video game playing, online social networking, online sexual activity, and web surfing. Implications for further research and limitations of the study are discussed.

  4. The Internet and Ethiopia's IP Law, Internet Governance and Legal ...

    African Journals Online (AJOL)

    KM_Yilma & HH_Abraha

    3 Ian Lloyd (2014), Information Technology Law, 7th Edition, Oxford ..... private sector, in the global Internet governance forums has indeed been quite .... Ethiopian government is completely absent from the global internet governance.

  5. Development of Energy Management System Based on Internet of Things Technique

    OpenAIRE

    Wen-Jye Shyr; Chia-Ming Lin and Hung-Yun Feng

    2017-01-01

    The purpose of this study was to develop an energy management system for university campuses based on the Internet of Things (IoT) technique. The proposed IoT technique based on WebAccess is used via network browser Internet Explore and applies TCP/IP protocol. The case study of IoT for lighting energy usage management system was proposed. Structure of proposed IoT technique included perception layer, equipment layer, control layer, application layer and network layer.

  6. Security and Privacy Analyses of Internet of Things Toys

    OpenAIRE

    Chu, Gordon; Apthorpe, Noah; Feamster, Nick

    2018-01-01

    This paper investigates the security and privacy of Internet-connected children's smart toys through case studies of three commercially-available products. We conduct network and application vulnerability analyses of each toy using static and dynamic analysis techniques, including application binary decompilation and network monitoring. We discover several publicly undisclosed vulnerabilities that violate the Children's Online Privacy Protection Rule (COPPA) as well as the toys' individual pr...

  7. Internet addiction and problematic Internet use: A systematic review of clinical research.

    Science.gov (United States)

    Kuss, Daria J; Lopez-Fernandez, Olatz

    2016-03-22

    To provide a comprehensive overview of clinical studies on the clinical picture of Internet-use related addictions from a holistic perspective. A literature search was conducted using the database Web of Science. Over the last 15 years, the number of Internet users has increased by 1000%, and at the same time, research on addictive Internet use has proliferated. Internet addiction has not yet been understood very well, and research on its etiology and natural history is still in its infancy. In 2013, the American Psychiatric Association included Internet Gaming Disorder in the appendix of the updated version of the Diagnostic and Statistical Manual for Mental Disorders (DSM-5) as condition that requires further research prior to official inclusion in the main manual, with important repercussions for research and treatment. To date, reviews have focused on clinical and treatment studies of Internet addiction and Internet Gaming Disorder. This arguably limits the analysis to a specific diagnosis of a potential disorder that has not yet been officially recognised in the Western world, rather than a comprehensive and inclusive investigation of Internet-use related addictions (including problematic Internet use) more generally. The systematic literature review identified a total of 46 relevant studies. The included studies used clinical samples, and focused on characteristics of treatment seekers and online addiction treatment. Four main types of clinical research studies were identified, namely research involving (1) treatment seeker characteristics; (2) psychopharmacotherapy; (3) psychological therapy; and (4) combined treatment. A consensus regarding diagnostic criteria and measures is needed to improve reliability across studies and to develop effective and efficient treatment approaches for treatment seekers.

  8. Internet addiction and problematic Internet use: A systematic review of clinical research

    Science.gov (United States)

    Kuss, Daria J; Lopez-Fernandez, Olatz

    2016-01-01

    AIM: To provide a comprehensive overview of clinical studies on the clinical picture of Internet-use related addictions from a holistic perspective. A literature search was conducted using the database Web of Science. METHODS: Over the last 15 years, the number of Internet users has increased by 1000%, and at the same time, research on addictive Internet use has proliferated. Internet addiction has not yet been understood very well, and research on its etiology and natural history is still in its infancy. In 2013, the American Psychiatric Association included Internet Gaming Disorder in the appendix of the updated version of the Diagnostic and Statistical Manual for Mental Disorders (DSM-5) as condition that requires further research prior to official inclusion in the main manual, with important repercussions for research and treatment. To date, reviews have focused on clinical and treatment studies of Internet addiction and Internet Gaming Disorder. This arguably limits the analysis to a specific diagnosis of a potential disorder that has not yet been officially recognised in the Western world, rather than a comprehensive and inclusive investigation of Internet-use related addictions (including problematic Internet use) more generally. RESULTS: The systematic literature review identified a total of 46 relevant studies. The included studies used clinical samples, and focused on characteristics of treatment seekers and online addiction treatment. Four main types of clinical research studies were identified, namely research involving (1) treatment seeker characteristics; (2) psychopharmacotherapy; (3) psychological therapy; and (4) combined treatment. CONCLUSION: A consensus regarding diagnostic criteria and measures is needed to improve reliability across studies and to develop effective and efficient treatment approaches for treatment seekers. PMID:27014605

  9. SEGMENTASI LAYANAN INTERNET BANKING

    Directory of Open Access Journals (Sweden)

    Ellen Theresia Sihotang

    2017-04-01

    Full Text Available The purpose of this study is to analyze internet banking�s users based on their experiences. It can be used to set marketing program of internet banking that appropriate with customers needs, in order to anticipate tight competition. This research methods starts with focus group discussion and clustering analysis to classify 312 respondents of internet banking users based on demographic, benefit and behavioral segmentation. The sampling method uses purposive sampling and snowball sampling. K-Means Clustering method�s produces four optimal clusters. The benefit orientation of the first cluster in on time saving. Second cluster, concern on the ease of getting and operating internet banking so this cluster does not need auxiliary features such as video guide to use internet banking. The third cluster�s orientation is on the modern lifestyle and the ease of getting and operating internet banking service with detailed daily mutation transaction The fourth cluster, concerns on the detailed daily mutation transaction but they are not sure with the security of personal data via internet banking. �

  10. Towards Marxian Internet Studies

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2012-05-01

    Full Text Available This article gives an overview of example approaches of Critical Internet Studies and points out key concepts of this field. Critical Cyberculture Studies and Critical Political Economy/Critical Theory of the Internet are identified as two approaches in Critical Internet Studies. The paper also discusses the role of 11 Marxian concepts for Critical Internet Studies. Marxian concepts that have been reflected in Critical Internet Studies include: dialectics, capitalism, commodification, surplus value/exploitation/alienation/class, globalization, ideology, class struggle, commons, public sphere, communism, and aesthetics. The paper points out the importance of explicitly acknowledging the importance of Karl Marx’s thinking in Critical Internet Studies. Marx’s concepts are today frequently used implicitly, without acknowledging and engaging with their roots. A critique of the approach of “Critical” Cyberculture Studies is advanced. This approach is compared to the approaches of Critical Theory and Critical Political Economy of the Internet. The difference between these two approaches reflects the debate about class exploitation and non-class domination between Cultural Studies and Critical Political Economy in Media and Communication Studies.

  11. Internet Geo-Location

    Science.gov (United States)

    2017-12-01

    INTERNET GEO-LOCATION DUKE UNIVERSITY DECEMBER 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED STINFO COPY AIR...REPORT TYPE FINAL TECHNICAL REPORT 3. DATES COVERED (From - To) MAY 2014 – MAY 2017 4. TITLE AND SUBTITLE INTERNET GEO-LOCATION 5a. CONTRACT...of SpeedTest servers that are used by end users to measure the speed of their Internet connection. The servers log the IP address and the location

  12. Saving the internet.

    Science.gov (United States)

    Zittrain, Jonathan

    2007-06-01

    The Internet goose has laid countless golden eggs, along with a growing number of rotten ones. But it's the rotten ones that now tempt commercial, governmental, and consumer interests to threaten the Internet's uniquely creative power. The expediently selected, almost accidentally generative properties of the Internet - its technical openness, ease of access and mastery, and adaptability - have combined, especially when coupled with those of the PC, to produce an unsurpassed environment for innovative experiment. Those same properties, however, also make the Internet hospitable to various forms of wickedness: hacking, porn, spam, fraud, theft, predation, and attacks on the network itself. As these undesirable phenomena proliferate, business, government, and many users find common cause for locking down Internet and PC architecture in the interests of security and order. PC and Internet security vulnerabilities are a legitimate menace. However, the most likely reactions - if they are not forestalled - will be at least as unfortunate as the security problems themselves. Consider the growing profusion of "tethered appliances" - devices whose functions cannot readily be altered by their owners (think TiVo). Such appliances take Internet innovations and wrap them up in a neat, easy-to-use package, which is good - but only if the Internet and PC can remain sufficiently in the center of the digital ecosystem to produce the next round of innovations and to generate competition. People buy these devices for their convenience or functionality and may appreciate the fact that they are safer to use (they limit the damage users can do through ignorance or carelessness). But the risk is that users, by migrating to such appliances, will unwittingly trade away the future benefits of generativity - a loss that will go unappreciated even as innovation tapers off.

  13. Breast cancer information on the internet: analysis of accessibility and accuracy.

    LENUS (Irish Health Repository)

    Quinn, E M

    2012-02-18

    Studies show internet sourced information often has poor accuracy. However, it is rapidly becoming a major source of patient information. Our aim was to assess accuracy of breast cancer-related information on the internet. The top five breast cancer-related search terms were identified using the commercial program "Wordtracker". These terms were searched using the search-engine "Google" and the top 100 webpages per topic analysed for applicability and accuracy of information. Overall 500 webpages were analysed. 42% were inapplicable to the question asked. Applicable accuracy rates were variable amongst the five terms: "breast cancer symptoms" 84%, "breast cancer care" 87%, "breast cancer stage" 88%, "breast cancer survival" 91% and "breast cancer signs" 78%. Educational websites were more likely to be accurate(p < 0.001) and interest group administered websites less likely to be accurate(p = 0.018) than other websites. Finding accurate breast cancer information on the internet is difficult due to large numbers of inapplicable unregulated websites preferentially returned via search engines.

  14. The Association between Internet User Characteristics and Dimensions of Internet Addiction among Greek Adolescents

    Science.gov (United States)

    Andreou, Eleni; Svoli, Hionia

    2013-01-01

    This study examined how internet users' psychological characteristics, amount of internet use and demographic factors contribute to particular dimensions of internet addiction. The sample consisted of 384 adolescents, ranging in age from 15 to 18 years. Participants were asked to complete the Internet Addiction Test (IAT), measures of Locus of…

  15. [Internet addiction].

    Science.gov (United States)

    Dannon, Pinhas Nadim; Iancu, Iulian

    2007-07-01

    The Internet provides inexpensive, interesting and comfortable recreation, but sometimes users get hooked. Thus, the computer-internet addiction concept has been proposed as an explanation for uncontrollable and damaging use. Symptoms of addiction could be compared to other addictive behaviors such as pathological gambling, kleptomania, trichotillomania, sex addiction and pyromania. Although criteria to diagnose this addiction have been proposed, methods of assessing excessive computer-internet use are limited. Early diagnosis could help the patient that suffers from this addiction before developing additional psychiatric diagnoses. A review of the proposed etiologies in the literature is summarized, together with recommendations for physicians and mental health officials.

  16. Application of an internet web-site of medical images in tele-radiology

    International Nuclear Information System (INIS)

    Wang Weizhong; Wang Hua; Xie Jingxia; Wang Songzhang; Li Xiangdong; Qian Min; Cao Huixia

    2000-01-01

    Objective: To build and Internet web-site of medical images for tele-education and tele-consultation. Methods: Collecting medical images of cases that fulfilled diagnostic standards for teaching and were pathologically proved. The images were digitized using digital camera and scanner. Frontpage 98, Homesite 2.5 and text editors were used for programming. Results: The web site encompasses many useful cases and was update every week. With smart and friendly interface, easy used navigation, the site runs reliably in TCP/IP environment. The site's URL is http://imager.163.net. At present, the site has received about 100 visits per week. Conclusion: The well-designed and programmed internet web site of medical images would be easily acceptable and is going to play an important role in tele-education and tele-consultation

  17. The Internet Process Addiction Test: Screening for Addictions to Processes Facilitated by the Internet

    Directory of Open Access Journals (Sweden)

    Jason C. Northrup

    2015-07-01

    Full Text Available The Internet Process Addiction Test (IPAT was created to screen for potential addictive behaviors that could be facilitated by the internet. The IPAT was created with the mindset that the term “Internet addiction” is structurally problematic, as the Internet is simply the medium that one uses to access various addictive processes. The role of the internet in facilitating addictions, however, cannot be minimized. A new screening tool that effectively directed researchers and clinicians to the specific processes facilitated by the internet would therefore be useful. This study shows that the Internet Process Addiction Test (IPAT demonstrates good validity and reliability. Four addictive processes were effectively screened for with the IPAT: Online video game playing, online social networking, online sexual activity, and web surfing. Implications for further research and limitations of the study are discussed.

  18. Widespread use of internet, applications, and social media in the professional life of urology residents.

    Science.gov (United States)

    Salem, Johannes; Borgmann, Hendrik; Baunacke, Martin; Boehm, Katharina; Hanske, Julian; Macneily, Andrew; Meyer, Christian; Nestler, Tim; Schmid, Marianne; Huber, Johannes

    2017-09-01

    Digital media have revolutionized communication and information dissemination in healthcare. We aimed to quantify and evaluate professional digital media use among urology residents. We designed a 17-item survey to assess usage and perceived usefulness of digital media, as well as communication type and device type and distributed it via email to 143 Canadian and 721 German urology residents. In total, 58 (41% response rate) residents from Canada and 170 (24% response rate) from Germany reported professional usage rates of 100% on the internet, 89% on apps, and 46% on social media (SoMe). For professional use, residents spent a median of 30 minutes per day on the internet, 10 minutes on apps, and 15 minutes on SoMe. 100% rated the internet, 89% apps, and 31% SoMe as useful for clinical practice. Most (94%) used digital media for communication with colleagues and 23% for communication with patients. Digital media use was allocated to desktop computers (55%) and mobile devices (45%). Canadian residents had higher usage rates of apps (96% vs. 86%; p=0.042) and SoMe (65% vs. 39%; p=0.002) and longer daily usage times for the internet, apps, and SoMe than German residents (pmedia are an integral part of the daily professional practice of urology residents, reflected by high usage rates and perceived usefulness of the internet and apps, and the growing importance of SoMe. Urologists should strive to progressively exhaust the vast potential of digital media for academic and clinical practice.

  19. Widespread use of internet, applications, and social media in the professional life of urology residents

    Science.gov (United States)

    Salem, Johannes; Borgmann, Hendrik; Baunacke, Martin; Boehm, Katharina; Hanske, Julian; MacNeily, Andrew; Meyer, Christian; Nestler, Tim; Schmid, Marianne; Huber, Johannes

    2017-01-01

    Introduction Digital media have revolutionized communication and information dissemination in healthcare. We aimed to quantify and evaluate professional digital media use among urology residents. Methods We designed a 17-item survey to assess usage and perceived usefulness of digital media, as well as communication type and device type and distributed it via email to 143 Canadian and 721 German urology residents. Results In total, 58 (41% response rate) residents from Canada and 170 (24% response rate) from Germany reported professional usage rates of 100% on the internet, 89% on apps, and 46% on social media (SoMe). For professional use, residents spent a median of 30 minutes per day on the internet, 10 minutes on apps, and 15 minutes on SoMe. 100% rated the internet, 89% apps, and 31% SoMe as useful for clinical practice. Most (94%) used digital media for communication with colleagues and 23% for communication with patients. Digital media use was allocated to desktop computers (55%) and mobile devices (45%). Canadian residents had higher usage rates of apps (96% vs. 86%; p=0.042) and SoMe (65% vs. 39%; p=0.002) and longer daily usage times for the internet, apps, and SoMe than German residents (pmedia are an integral part of the daily professional practice of urology residents, reflected by high usage rates and perceived usefulness of the internet and apps, and the growing importance of SoMe. Urologists should strive to progressively exhaust the vast potential of digital media for academic and clinical practice. PMID:29382458

  20. Neural correlate of Internet use in patients undergoing psychological treatment for Internet addiction.

    Science.gov (United States)

    Lai, Carlo; Altavilla, Daniela; Mazza, Marianna; Scappaticci, Silvia; Tambelli, Renata; Aceto, Paola; Luciani, Massimiliano; Corvino, Stefano; Martinelli, David; Alimonti, Flaminia; Tonioni, Federico

    2017-06-01

    The new version of Diagnostic and Statistical Manual of Mental Disorders (DSM-5th) proposed the Internet Gaming Disorder for the diagnosis of Internet addiction (IA) considering the neurobiological evidence of the craving. The aim was to test the neural correlate in response to the Internet cue in patients with IA. Sixteen males with IA diagnosis (clinical group) and 14 healthy male (control group) were recruited for an experimental visual task composed of Internet images and emotional images. During the visual presentation of Internet cue, electroencefalographic data were recorded using Net Station 4.5.1 with a 256-channels HydroCel Geodesic Sensor Net. Event-related potential (ERP) components and low-resolution electromagnetic tomography (sLoreta) were analysed. sLoreta analyses showed that patients from the clinical group presented a higher primary somatosensorial cortex and lower paralimbic, temporal and orbito-frontal activation in response to both Internet and emotional images compared to those of the control group. These results suggest that clinically recognized pathological use of Internet could be linked to dissociative symptoms.

  1. Commercialisation of Internet

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik

    An anthology dealing with the commercialisation of Internet and the development of new services.......An anthology dealing with the commercialisation of Internet and the development of new services....

  2. A comparative study of uses of the Internet among college students with and without Internet addiction.

    Science.gov (United States)

    Kesici, Sahin; Sahin, Ismail

    2009-12-01

    The current study examined uses of the Internet among college students classified as addicted to the Internet or not. Data were gathered from 384 college students. Students classified as Internet Addicted used the Internet more for social functions, leisure functions, and virtual emotional functions, when compared to students considered as Internet Nonaddicted. Effect sizes were large, indicating important group differences in uses of the Internet.

  3. The Association between Internet Parenting Styles and Children's Use of the Internet at Home

    Science.gov (United States)

    Ihmeideh, Fathi Mahmoud; Shawareb, Aseel Akram

    2014-01-01

    Parenting styles are known to have a powerful influence on child development, and as such they can significantly influence children's Internet use. The purpose of this study is to examine the Internet parenting style of Jordanian parents and their perspectives on their children's Internet use. Children's Internet use was evaluated in terms of four…

  4. Research on the business QoS and trustworthy and controllable strategies mechanism for energy internet

    Science.gov (United States)

    Zhang, Geng; Lu, Meiling; Zhang, Dahua; Zhou, Liang; Li, Likang

    2017-01-01

    Energy internet is a kind of power sharing network, which can realize the bidirectional flow of energy information on the basis of the existing power grid. It puts forward higher requirements for reliability and controllability of information communication, and all kinds of business QoS of the backbone network. So the research of business QoS and trustworthy and controllable strategies mechanism have an important significance for the development of energy internet. This paper mainly studies how to use the software defined network (SDN) to achieve business QoS, and provide QoS support for all kinds of business of the energy internet. Combined with the current development situation of the energy internet in our country, this paper researches the trustworthy and controllable strategies mechanism for energy internet, and proposes the transition scheme of the IPv6 credible network architecture based on SDN. This coordinates the contradiction between the growing demand for energy internet applications and the limitations of the energy internet technology itself.

  5. Review on open source operating systems for internet of things

    Science.gov (United States)

    Wang, Zhengmin; Li, Wei; Dong, Huiliang

    2017-08-01

    Internet of Things (IoT) is an environment in which everywhere and every device became smart in a smart world. Internet of Things is growing vastly; it is an integrated system of uniquely identifiable communicating devices which exchange information in a connected network to provide extensive services. IoT devices have very limited memory, computational power, and power supply. Traditional operating systems (OS) have no way to meet the needs of IoT systems. In this paper, we thus analyze the challenges of IoT OS and survey applicable open source OSs.

  6. Development and Validation of an Interactive Internet Platform for Older People: The Healthy Ageing Through Internet Counselling in the Elderly Study.

    Science.gov (United States)

    Jongstra, Susan; Beishuizen, Cathrien; Andrieu, Sandrine; Barbera, Mariagnese; van Dorp, Matthijs; van de Groep, Bram; Guillemont, Juliette; Mangialasche, Francesca; van Middelaar, Tessa; Moll van Charante, Eric; Soininen, Hilkka; Kivipelto, Miia; Richard, Edo

    2017-02-01

    A myriad of Web-based applications on self-management have been developed, but few focus on older people. In the face of global aging, older people form an important target population for cardiovascular prevention. This article describes the full development of an interactive Internet platform for older people, which was designed for the Healthy Ageing Through Internet Counselling in the Elderly (HATICE) study. We provide recommendations to design senior-friendly Web-based applications for a new approach to multicomponent cardiovascular prevention. The development of the platform followed five phases: (1) conceptual framework; (2) platform concept and functional design; (3) platform building (software and content); (4) testing and pilot study; and (5) final product. We performed a meta-analysis, reviewed guidelines for cardiovascular diseases, and consulted end users, experts, and software developers to create the platform concept and content. The software was built in iterative cycles. In the pilot study, 41 people aged ≥65 years used the platform for 8 weeks. Participants used the interactive features of the platform and appreciated the coach support. During all phases adjustments were made to incorporate all improvements from the previous phases. The final platform is a personal, secured, and interactive platform supported by a coach. When carefully designed, an interactive Internet platform is acceptable and feasible for use by older people with basic computer skills. To improve acceptability by older people, we recommend involving the end users in the process of development, to personalize the platform and to combine the application with human support. The interactive HATICE platform will be tested for efficacy in a multinational randomized controlled trial (ISRCTN48151589).

  7. Assessing internet addiction using the parsimonious internet addiction components model—A preliminary study.

    NARCIS (Netherlands)

    Kuss, D.J.; Shorter, G.W.; Rooij, A.J. van; Griffiths, M.D.; Schoenmakers, T.M.

    2014-01-01

    Internet usage has grown exponentially over the last decade. Research indicates that excessive Internet use can lead to symptoms associated with addiction. To date, assessment of potential Internet addiction has varied regarding populations studied and instruments used, making reliable prevalence

  8. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2010-01-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  9. [Security specifications for electronic medical records on the Internet].

    Science.gov (United States)

    Mocanu, Mihai; Mocanu, Carmen

    2007-01-01

    The extension for the Web applications of the Electronic Medical Record seems both interesting and promising. Correlated with the expansion of Internet in our country, it allows the interconnection of physicians of different specialties and their collaboration for better treatment of patients. In this respect, the ophthalmologic medical applications consider the increased possibilities for monitoring chronic ocular diseases and for the identification of some elements for early diagnosis and risk factors supervision. We emphasize in this survey some possible solutions to the problems of interconnecting medical information systems to the Internet: the achievement of interoperability within medical organizations through the use of open standards, the automated input and processing for ocular imaging, the use of data reduction techniques in order to increase the speed of image retrieval in large databases, and, last but not least, the resolution of security and confidentiality problems in medical databases.

  10. Cognitive behavior therapy with Internet addicts: treatment outcomes and implications.

    Science.gov (United States)

    Young, Kimberly S

    2007-10-01

    Research over the last decade has identified Internet addiction as a new and often unrecognized clinical disorder that impact a user's ability to control online use to the extent that it can cause relational, occupational, and social problems. While much of the literature explores the psychological and social factors underlying Internet addiction, little if any empirical evidence exists that examines specific treatment outcomes to deal with this new client population. Researchers have suggested using cognitive behavioral therapy (CBT) as the treatment of choice for Internet addiction, and addiction recovery in general has utilized CBT as part of treatment planning. To investigate the efficacy of using CBT with Internet addicts, this study investigated 114 clients who suffered from Internet addiction and received CBT at the Center for Online Addiction. This study employed a survey research design, and outcome variables such as client motivation, online time management, improved social relationships, improved sexual functioning, engagement in offline activities, and ability to abstain from problematic applications were evaluated on the 3rd, 8th, and 12th sessions and over a 6-month follow-up. Results suggested that Caucasian, middle-aged males with at least a 4-year degree were most likely to suffer from some form of Internet addiction. Preliminary analyses indicated that most clients were able to manage their presenting complaints by the eighth session, and symptom management was sustained upon a 6-month follow-up. As the field of Internet addiction continues to grow, such outcome data will be useful in treatment planning with evidenced-based protocols unique to this emergent client population.

  11. Health-related use of the Internet in Germany 2007

    Directory of Open Access Journals (Sweden)

    Lausen, Berthold

    2008-09-01

    Full Text Available The European eHealth Trends project analyses the attitudes towards and usage of eHealth applications of European citizens in the time frame 2005–2007. In April/May 2007 the second series of representative stratified surveys with computer-based telephone interviews (CATI (in Germany based on the German ADM Master Sample were performed by a poll agency in seven European countries. Here we report the major results for the German population, were 1000 participants with an age between 15 and 80 years were interviewed. For the general use of the Internet for health purposes as well as the established eHealth Internet use (at least once a month we report a significant increase (from 44.4% to 56.6% and from 22.5% to 32.0%. Further, the percentage of Germans who consider the Internet as an important medium for health purposes increased from 33.7% to 36.8%. In Bavaria, the percentage of established eHealth Internet users was lowest among the German states. The results of our eHealth Trends survey in Germany show a considerable increase of eHealth use within the last 18 months. German physicians need to be prepared for an increasing number of empowered patients, who have searched for information on their health problems in the Internet, but will also demand more enhanced services.

  12. Synthesizing Knowledge on Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Liu, Fei; Tan, Chee-Wee; Lim, Eric T. K.

    2016-01-01

    Research on Internet of Things (IoT) has been booming for past couple of years due to technological advances and its potential for application. Nonetheless, the rapid growth of IoT articles as well as the heterogeneous nature of IoT pose challenges in synthesizing prior research on the phenomenon...

  13. Distribute Off-Time Office Internet bandwidth Using Topology Mesh For Sorrounding Neighbour

    Science.gov (United States)

    Zendrato, Niskarto; Sihombing, Oloan; Laia, Yonata; Sabarita Barus, Ertina

    2018-04-01

    The Internet as one of the very rapidly growing information technology can provide data and information with wide world, complete, and up to date. Users can download and upload data such as the application file, multimedia and text through the Internet network. But for the Internet availability is still less equal access because of the lack of availability of adequate infrastructure, therefore the author make the utilization of bandwidth that can be establish Internet balancing although still on a small scale. By this research the authors use bandwidth from PT. Deltauli Home Teknikarya that where bandwidth necessity on when time off-time unused office, where the office always pay full for Internet connection even though at the time of the off-time. It’s many of the available bandwidth, so that the author is trying to take advantage of the bandwidth at the time of the off-time the office to be used by the community using radio connection link and use the radius server as user management and server to send sms and user and password to the users who want to enjoy free internet connection.

  14. Characteristics of Internet Addiction/Pathological Internet Use in U.S. University Students: A Qualitative-Method Investigation

    Science.gov (United States)

    Li, Wen; O’Brien, Jennifer E.; Snyder, Susan M.; Howard, Matthew O.

    2015-01-01

    Studies have identified high rates and severe consequences of Internet Addiction/Pathological Internet Use (IA/PIU) in university students. However, most research concerning IA/PIU in U.S. university students has been conducted within a quantitative research paradigm, and frequently fails to contextualize the problem of IA/PIU. To address this gap, we conducted an exploratory qualitative study using the focus group approach and examined 27 U.S. university students who self-identified as intensive Internet users, spent more than 25 hours/week on the Internet for non-school or non-work-related activities and who reported Internet-associated health and/or psychosocial problems. Students completed two IA/PIU measures (Young’s Diagnostic Questionnaire and the Compulsive Internet Use Scale) and participated in focus groups exploring the natural history of their Internet use; preferred online activities; emotional, interpersonal, and situational triggers for intensive Internet use; and health and/or psychosocial consequences of their Internet overuse. Students’ self-reports of Internet overuse problems were consistent with results of standardized measures. Students first accessed the Internet at an average age of 9 (SD = 2.7), and first had a problem with Internet overuse at an average age of 16 (SD = 4.3). Sadness and depression, boredom, and stress were common triggers of intensive Internet use. Social media use was nearly universal and pervasive in participants’ lives. Sleep deprivation, academic under-achievement, failure to exercise and to engage in face-to-face social activities, negative affective states, and decreased ability to concentrate were frequently reported consequences of intensive Internet use/Internet overuse. IA/PIU may be an underappreciated problem among U.S. university students and warrants additional research. PMID:25647224

  15. Characteristics of internet addiction/pathological internet use in U.S. university students: a qualitative-method investigation.

    Directory of Open Access Journals (Sweden)

    Wen Li

    Full Text Available Studies have identified high rates and severe consequences of Internet Addiction/Pathological Internet Use (IA/PIU in university students. However, most research concerning IA/PIU in U.S. university students has been conducted within a quantitative research paradigm, and frequently fails to contextualize the problem of IA/PIU. To address this gap, we conducted an exploratory qualitative study using the focus group approach and examined 27 U.S. university students who self-identified as intensive Internet users, spent more than 25 hours/week on the Internet for non-school or non-work-related activities and who reported Internet-associated health and/or psychosocial problems. Students completed two IA/PIU measures (Young's Diagnostic Questionnaire and the Compulsive Internet Use Scale and participated in focus groups exploring the natural history of their Internet use; preferred online activities; emotional, interpersonal, and situational triggers for intensive Internet use; and health and/or psychosocial consequences of their Internet overuse. Students' self-reports of Internet overuse problems were consistent with results of standardized measures. Students first accessed the Internet at an average age of 9 (SD = 2.7, and first had a problem with Internet overuse at an average age of 16 (SD = 4.3. Sadness and depression, boredom, and stress were common triggers of intensive Internet use. Social media use was nearly universal and pervasive in participants' lives. Sleep deprivation, academic under-achievement, failure to exercise and to engage in face-to-face social activities, negative affective states, and decreased ability to concentrate were frequently reported consequences of intensive Internet use/Internet overuse. IA/PIU may be an underappreciated problem among U.S. university students and warrants additional research.

  16. Characteristics of internet addiction/pathological internet use in U.S. university students: a qualitative-method investigation.

    Science.gov (United States)

    Li, Wen; O'Brien, Jennifer E; Snyder, Susan M; Howard, Matthew O

    2015-01-01

    Studies have identified high rates and severe consequences of Internet Addiction/Pathological Internet Use (IA/PIU) in university students. However, most research concerning IA/PIU in U.S. university students has been conducted within a quantitative research paradigm, and frequently fails to contextualize the problem of IA/PIU. To address this gap, we conducted an exploratory qualitative study using the focus group approach and examined 27 U.S. university students who self-identified as intensive Internet users, spent more than 25 hours/week on the Internet for non-school or non-work-related activities and who reported Internet-associated health and/or psychosocial problems. Students completed two IA/PIU measures (Young's Diagnostic Questionnaire and the Compulsive Internet Use Scale) and participated in focus groups exploring the natural history of their Internet use; preferred online activities; emotional, interpersonal, and situational triggers for intensive Internet use; and health and/or psychosocial consequences of their Internet overuse. Students' self-reports of Internet overuse problems were consistent with results of standardized measures. Students first accessed the Internet at an average age of 9 (SD = 2.7), and first had a problem with Internet overuse at an average age of 16 (SD = 4.3). Sadness and depression, boredom, and stress were common triggers of intensive Internet use. Social media use was nearly universal and pervasive in participants' lives. Sleep deprivation, academic under-achievement, failure to exercise and to engage in face-to-face social activities, negative affective states, and decreased ability to concentrate were frequently reported consequences of intensive Internet use/Internet overuse. IA/PIU may be an underappreciated problem among U.S. university students and warrants additional research.

  17. The Impact of Pathological Levels of Internet-Related Anxiety on Internet Usage

    Science.gov (United States)

    Brosnan, Mark; Joiner, Richard; Gavin, Jeff; Crook, Charles; Maras, Pam; Guiller, Jane; Scott, Adrian J.

    2012-01-01

    This article compares the use of the Internet during the first year of university education of students who have pathological levels of Internet anxiety with those who do not. Two hundred and sixteen first year psychology students (females 184, males 32) were surveyed for their levels of Internet-related anxiety, from which 12 (5.6%) were…

  18. Building an authorization model for external means of protection of APCS based on the Internet of things

    Science.gov (United States)

    Zaharov, A. A.; Nissenbaum, O. V.; Ponomaryov, K. Y.; Nesgovorov, E. S.

    2018-01-01

    In this paper we study application of Internet of Thing concept and devices to secure automated process control systems. We review different approaches in IoT (Internet of Things) architecture and design and propose them for several applications in security of automated process control systems. We consider an Attribute-based encryption in context of access control mechanism implementation and promote a secret key distribution scheme between attribute authorities and end devices.

  19. INTERNET AND SENIORS

    OpenAIRE

    Rain, Tomáš; Ivana Švarcová

    2010-01-01

    The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize...

  20. Advertising on the Internet.

    Science.gov (United States)

    Jugenheimer, Donald W.

    1996-01-01

    States that although many advertisers have intentions of utilizing the Internet for advertising, which can provide specific audience targeting and buyer/seller interactivity, few have been successful. Explains advantages and disadvantages of using the Internet for advertising purposes. Cites special problems with Internet advertising and successes…

  1. From ‘Gads’ to ‘Apps’: the key challenges of post-web internet era

    Directory of Open Access Journals (Sweden)

    Alan César Belo Angeluci

    2013-12-01

    Full Text Available This paper aims to discuss the main changes that device’s applications have faced along the past decades in order to show how internet connection has deeply influenced the way people communicate and interact with this media. From the Internet of Things (IoT perspective, the Hannibal serie and its second screen app case is briefly presented for supporting the key challenges of this post-web internet era: (1 protection of sensitive and private user data in a ubiquitous environment, (2 interoperability, (3 communication and (4 proper language.

  2. INTERNET5: Shaping an Internet for women's empowerment | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-12-08

    Dec 8, 2017 ... Poor women, girls, and other marginalized communities in the developing ... INTERNET5 — an Internet that helps achieve SDG 5 on gender equality — aims to support ... To ensure that the benefits of broadband are more evenly ... The project seeks to provide an effective and low-cost educational model ...

  3. Combining wireless sensor networks and semantic middleware for an Internet of Things-based sportsman/woman monitoring application.

    Science.gov (United States)

    Rodríguez-Molina, Jesús; Martínez, José-Fernán; Castillejo, Pedro; López, Lourdes

    2013-01-31

    Wireless Sensor Networks (WSNs) are spearheading the efforts taken to build and deploy systems aiming to accomplish the ultimate objectives of the Internet of Things. Due to the sensors WSNs nodes are provided with, and to their ubiquity and pervasive capabilities, these networks become extremely suitable for many applications that so-called conventional cabled or wireless networks are unable to handle. One of these still underdeveloped applications is monitoring physical parameters on a person. This is an especially interesting application regarding their age or activity, for any detected hazardous parameter can be notified not only to the monitored person as a warning, but also to any third party that may be helpful under critical circumstances, such as relatives or healthcare centers. We propose a system built to monitor a sportsman/woman during a workout session or performing a sport-related indoor activity. Sensors have been deployed by means of several nodes acting as the nodes of a WSN, along with a semantic middleware development used for hardware complexity abstraction purposes. The data extracted from the environment, combined with the information obtained from the user, will compose the basis of the services that can be obtained.

  4. Combining Wireless Sensor Networks and Semantic Middleware for an Internet of Things-Based Sportsman/Woman Monitoring Application

    Science.gov (United States)

    Rodríguez-Molina, Jesús; Martínez, José-Fernán; Castillejo, Pedro; López, Lourdes

    2013-01-01

    Wireless Sensor Networks (WSNs) are spearheading the efforts taken to build and deploy systems aiming to accomplish the ultimate objectives of the Internet of Things. Due to the sensors WSNs nodes are provided with, and to their ubiquity and pervasive capabilities, these networks become extremely suitable for many applications that so-called conventional cabled or wireless networks are unable to handle. One of these still underdeveloped applications is monitoring physical parameters on a person. This is an especially interesting application regarding their age or activity, for any detected hazardous parameter can be notified not only to the monitored person as a warning, but also to any third party that may be helpful under critical circumstances, such as relatives or healthcare centers. We propose a system built to monitor a sportsman/woman during a workout session or performing a sport-related indoor activity. Sensors have been deployed by means of several nodes acting as the nodes of a WSN, along with a semantic middleware development used for hardware complexity abstraction purposes. The data extracted from the environment, combined with the information obtained from the user, will compose the basis of the services that can be obtained. PMID:23385405

  5. Combining Wireless Sensor Networks and Semantic Middleware for an Internet of Things-Based Sportsman/Woman Monitoring Application

    Directory of Open Access Journals (Sweden)

    Lourdes López

    2013-01-01

    Full Text Available Wireless Sensor Networks (WSNs are spearheading the efforts taken to build and deploy systems aiming to accomplish the ultimate objectives of the Internet of Things. Due to the sensors WSNs nodes are provided with, and to their ubiquity and pervasive capabilities, these networks become extremely suitable for many applications that so-called conventional cabled or wireless networks are unable to handle. One of these still underdeveloped applications is monitoring physical parameters on a person. This is an especially interesting application regarding their age or activity, for any detected hazardous parameter can be notified not only to the monitored person as a warning, but also to any third party that may be helpful under critical circumstances, such as relatives or healthcare centers. We propose a system built to monitor a sportsman/woman during a workout session or performing a sport-related indoor activity. Sensors have been deployed by means of several nodes acting as the nodes of a WSN, along with a semantic middleware development used for hardware complexity abstraction purposes. The data extracted from the environment, combined with the information obtained from the user, will compose the basis of the services that can be obtained.

  6. Internet skills, sources of support, and benefiting from internet use

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; Courtois, Cédric; van Dijk, Johannes A.G.M.

    2014-01-01

    This study added communication Internet skills to an existing skill framework of operational, formal, information, and strategic skills. The study investigated how people deal with inadequate skill levels by identifying support sources. Furthermore, we investigated which of the Internet skills

  7. Self-Disclosure and Internet Addiction

    Science.gov (United States)

    Arslan, Nihan; Kiper, Aydin

    2018-01-01

    The aim of study is to investigate the relationship between self-disclosure and internet addiction. Self-Disclosure Scale and Internet Addiction Scale were applied to students. Results indicated a negative correlation between self-disclosure and internet addiction. Self-disclosure was negative predicted by internet addiction in the structural…

  8. The Internet drag race

    CERN Document Server

    Fitchard, Kevin

    2004-01-01

    The Internet2 consortium members from California Institute of Technology and CERN developed effective fiber optic network, sending data upto 11,000 kilometers between Caltech's LA laboratories and CERN's campus in Geneva at a rate of 6.25 Gb/s. The 68,431 terabit- meters per second data transfer was accomplished using the IPv4 protocols that power the public Internet. Network run by Internet2, called Abilene maintains the highest capacities in the world, connecting dozens of GigaPOP's with OC-192c 10 Gb/s Ip backbone. The member institutions of Internet2 keep Abilene 10% to 15% full, but the researchers also use the network as a base for the latest Internet technologies and experiments, which include development of IPv6. (Edited abstract).

  9. Internet Usage Habits and Internet Usage in Educational Studies of Vocational School Students

    OpenAIRE

    Zehra Deniz Yakıncı; Perihan Gürbüz; Gülsüm Yetiş

    2018-01-01

    Internet is the easiest way to access information. It provides positive contributions to individual and surroundings, in learning and information era. At this point the answers of the questions: ‘How do young people use internet and how much do they use internet for their education?’ come into prominence. In order to find the answers; a questionnaire prepared by resarchers and Young Internet Addiction Test- Short Form (YIAT-SF) was used on ‘Health Services Vocational High School’ students, in...

  10. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [IRSN, 92 - Fontenay-aux-Roses (France)

    2010-04-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection in nuclear medicine, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  11. Technological advancements and Internet sexuality: does private access to the Internet influence online sexual behavior?

    Science.gov (United States)

    Daneback, Kristian; Månsson, Sven-Axel; Ross, Michael W

    2012-08-01

    The aim of this study was to investigate whether demographic characteristics and sexual behavior online and offline were associated with private, respectively, nonprivate access to the Internet in a Web sample of people who use the Internet for sexual purposes. A total of 1,913 respondents completed an online questionnaire about Internet sexuality, and 1,614 reported using the Internet for sexual purposes. The majority of these respondents reported having access to an Internet-connected computer no one else had access to (62 percent women and 70 percent men). The results showed that it is possible to differentiate between those who have access to an Internet-connected computer no one else has access to and those who have shared access to an Internet-connected computer. Not only did they differ in demographic characteristics, but also in the sexual activities they engaged in on the Internet. Different patterns were found for women and men. For example, men who had private access to Internet-connected computers were more likely than those who had shared access to seek information about sexual issues. Thus, having access to Internet computers no one else has access to may promote sexual knowledge and health for men. The results of this study along with the technological development implies that in future research, attention should be paid to where and how people access the Internet in relation to online behavior in general and online sexual behavior in particular.

  12. Construction of a Teaching Package on Promoting Prosocial Internet Use and Preventing Antisocial Internet Use

    Directory of Open Access Journals (Sweden)

    Hing Keung Ma

    2011-01-01

    Full Text Available In the construction of the teaching package on the Internet use, two major moral characters, respect and responsibility, form the core theoretical basis. The respect character consists of respect for others and self-respect while the responsibility character contains social, civil, and global responsibility. There are a total of nine units on the Internet use in the junior secondary curriculum. There are two units in Secondary One curriculum: the first unit deals with cheating behavior and privacy issues concerning the Internet, and the second one discusses the effect of excessive use of the Internet on life and study. In Secondary Two curriculum, we discuss the following social phenomena on the Internet with students: online shopping, pornographic materials on internet, and infringement of a copyright. Finally, we have designed four units on the Internet use in Secondary Three curriculum which focuses more on the relationship between the Internet use and our health. We try to answer the question on how we can use the Internet healthily and also the possibility on how it may hurt us. Similar to the second unit in Secondary One curriculum, we have designed three more units on discussing the effects of excessive use of the Internet with students. We would like to alert students that ineffective use of the Internet will hurt us mentally and physically. For illustrative purposes, two units in the Secondary One and Two curriculums are outlined in this paper.

  13. Construction of a Teaching Package on Promoting Prosocial Internet Use and Preventing Antisocial Internet Use

    Science.gov (United States)

    Ma, Hing Keung; Chu, Miranda K. Y.; Chan, Winnie W. Y.

    2011-01-01

    In the construction of the teaching package on the Internet use, two major moral characters, respect and responsibility, form the core theoretical basis. The respect character consists of respect for others and self-respect while the responsibility character contains social, civil, and global responsibility. There are a total of nine units on the Internet use in the junior secondary curriculum. There are two units in Secondary One curriculum: the first unit deals with cheating behavior and privacy issues concerning the Internet, and the second one discusses the effect of excessive use of the Internet on life and study. In Secondary Two curriculum, we discuss the following social phenomena on the Internet with students: online shopping, pornographic materials on internet, and infringement of a copyright. Finally, we have designed four units on the Internet use in Secondary Three curriculum which focuses more on the relationship between the Internet use and our health. We try to answer the question on how we can use the Internet healthily and also the possibility on how it may hurt us. Similar to the second unit in Secondary One curriculum, we have designed three more units on discussing the effects of excessive use of the Internet with students. We would like to alert students that ineffective use of the Internet will hurt us mentally and physically. For illustrative purposes, two units in the Secondary One and Two curriculums are outlined in this paper. PMID:22125462

  14. Internet Astrometry

    Science.gov (United States)

    Caballero, Rafael; Argyle, R. W.

    Amateur astronomers can carry out scientific research in many different ways. Some activities require expensive telescopes, cameras, and often access to dark skies. But those who live in highly polluted areas, or do not have access to very specialized equipment, still have many possibilities; amongst which is using the online resources available from the internet. In this chapter we explore Aladin, Simbad, and VizieR, three resources created and maintained by the Centre de Données astronomiques de Strasbourg (CDS). Although these applications are intended for professional astronomers, they are also freely available for amateurs. They allow us to find and measure old neglected difficult pairs, discover new double stars, and in general have a better understanding of those tiny pairs of points of light that we love to observe, photograph and measure.

  15. Internet Of Things-Changing The Game

    Directory of Open Access Journals (Sweden)

    Deendayal Choudhary

    2015-08-01

    Full Text Available Abstract Internet of things is emerging to be a promising trend towards an era of connectivity. IoT is powered by the internet boom and all the different devices connected to it that share data and communicate with each other. The applications of IoT range from smart clothes to smart cities to healthcare and security and so on. This paper deals with the scope of gaming as an application of IoT. Gamers today demand complete freedom in gaming experience and are always asking for more. To provide this the technology must be invisible yet omnipresent-thats the essence of IoT. Alternate reality gaming is the genre of gaming that has close resemblance to the essence of IoT. ARGs are driven by storyline and typically supported through some type of online game portal that manages the game. Websites social media tools media broadcasts phone calls text messages and sometimes person-to-person interactions are all potential elements that move the storyline along. In ARGs a story drives the game play and players are performing activities that mirror their real life. It also explores the scope of IoT games beyond just gaming and into the business world.

  16. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  17. Assessing Internet addiction using the parsimonious Internet addiction components model - a preliminary study [forthcoming

    OpenAIRE

    Kuss, DJ; Shorter, GW; Van Rooij, AJ; Griffiths, MD; Schoenmakers, T

    2014-01-01

    Internet usage has grown exponentially over the last decade. Research indicates that excessive Internet use can lead to symptoms associated with addiction. To date, assessment of potential Internet addiction has varied regarding populations studied and instruments used, making reliable prevalence estimations difficult. To overcome the present problems a preliminary study was conducted testing a parsimonious Internet addiction components model based on Griffiths’ addiction components (2005), i...

  18. A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP

    Directory of Open Access Journals (Sweden)

    Seung-Man Chun

    2017-01-01

    Full Text Available Under unreliable constrained wireless networks for Internet of Things (IoT environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6 and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF Constrained Application Protocol (CoAP retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation.

  19. Internet Teleoperation of a Robot with Streaming Buffer System under Varying Time Delays

    Science.gov (United States)

    Park, Jahng-Hyon; Shin, Wanjae

    It is known that existence of irregular transmission time delay is a major bottleneck for application of advanced robot control schemes to internet telerobotic systems. In the internet teleoperation system, the irregular transmission time delay causes a critical problem, which includes instability and inaccuracy. This paper suggests a practical internet teleoperation system with streaming buffer system, which consists of a buffer, a buffer manager, and a control timer. The proposed system converts the irregular transmission time delay to a constant. So, the system effectively transmits the control input to a remote site to operate a robot stably and accurately. This feature enables short control input intervals. That means the entire system has a large control bandwidth. The validity of the proposed method is demonstrated by experiments of teleoperation from USC (University of Southern California in U. S.A.) to HYU (Hanyang Univ. in Korea) through the Internet. The proposed method is also demonstrated by experiments of teleoperation through the wireless internet.

  20. A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP.

    Science.gov (United States)

    Chun, Seung-Man; Park, Jong-Tae

    2017-01-12

    Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation.

  1. Narcissism and Internet pornography use.

    Science.gov (United States)

    Kasper, Thomas Edward; Short, Mary Beth; Milam, Alex Clinton

    2015-01-01

    This study examined the relation between Internet pornography use and narcissism. Participants (N=257) completed an online survey that included questions on Internet pornography use and 3 narcissism measures (i.e., Narcissistic Personality Inventory, Pathological Narcissistic Inventory, and the Index of Sexual Narcissism). The hours spent viewing Internet pornography was positively correlated to participants' narcissism level. In addition, those who have ever used Internet pornography endorsed higher levels of all 3 measures of narcissism than did those who have never used Internet pornography.

  2. Internet addiction in young people.

    Science.gov (United States)

    Ong, Say How; Tan, Yi Ren

    2014-07-01

    In our technology-savvy population, mental health professionals are seeing an increasing trend of excessive Internet use or Internet addiction. Researchers in China, Taiwan and Korea have done extensive research in the field of Internet addiction. Screening instruments are available to identify the presence of Internet addiction and its extent. Internet addiction is frequently associated with mental illnesses such as anxiety, depression, conduct disorder and attention deficit hyperactivity disorder (ADHD). Treatment modalities include individual and group therapies, cognitive behavioural therapy (CBT), family therapy and psychotropic medications. A significant proportion of Singapore adolescents engaging in excessive Internet use are also diagnosed to have concomitant Internet addiction. Despite the presence of a variety of treatment options, future research in this area is needed to address its growing trend and to minimise its negative psychological and social impact on the individuals and their families.

  3. Internet dalam Konteks Perpustakaan

    Directory of Open Access Journals (Sweden)

    Roni Rodhin

    2017-02-01

    Full Text Available The presence of internet would bring a variaty of effects in all areas of human life. The impac of bias could be both a positive and negative. On the other side for libraries it would bring a disparate impact, engaged  in the service and information. In the contect of libraries, the internet is very helpfull to disseminate information that is available in it. It means internet becomes a partner in the dissemination of information. Therefore, the existence of internet is very important for the library.

  4. Impact of the Internet.

    Science.gov (United States)

    Balajthy, Ernest

    1997-01-01

    Discusses the impact and the potential of the Internet on education. Suggests that educators and parents need to deal with the lack of quality assurance of the Internet. Addresses readability and appropriateness for children. Notes that successful use of the Internet by children requires that teachers provide instruction in multiple sources and…

  5. The internet for radiologists

    International Nuclear Information System (INIS)

    Caramella, D.; Pavone, P.

    1999-01-01

    This book provides information on all aspects of the Internet of interest to radiologists. It also provides non-experts with all the information necessary to profit from the Internet and to explore the different possibilities offered by the www. Its use should be recommended to all radiologists who use the Internet. (orig.)

  6. Internet Addiction and Psychopathology

    Science.gov (United States)

    Koc, Mustafa

    2011-01-01

    This study examined the relationships between university students' internet addiction and psychopathology in Turkey. The study was based on data drawn from a national survey of university students in Turkey. 174 university students completed the SCL-90-R scale and Addicted Internet Users Inventory. Results show that students who use internet six…

  7. [Differences in access to Internet and Internet-based information seeking according to the type of psychiatric disorder].

    Science.gov (United States)

    Brunault, P; Bray, A; Rerolle, C; Cognet, S; Gaillard, P; El-Hage, W

    2017-04-01

    Internet has become a major tool for patients to search for health-related information and to communicate on health. We currently lack data on how patients with psychiatric disorders access and use Internet to search for information on their mental health. This study aimed to assess, in patients followed for a psychiatric disorder (schizophrenia, bipolar disorder, mood and anxiety disorder, substance-related and addictive disorders and eating disorders), prevalence of Internet access and use, and patient expectations and needs regarding the use of Internet to search for mental-health information depending on the psychiatric disorder. We conducted this cross-sectional study between May 2013 and July 2013 in 648 patients receiving psychiatric care in 8 hospitals from the Region Centre, France. We used multivariate logistic regression adjusted for age, gender, socio-educational level and professional status to compare use, expectations and needs regarding Internet-based information about the patient's psychiatric disorder (65-items self-administered questionnaires) as a function of the psychiatric disorders. We identified patients clusters with multiple correspondence analysis and ascending hierarchical classification. Although 65.6% of our population accessed Internet at home, prevalence for Internet access varied depending on the type of psychiatric disorder and was much more related to limited access to a computer and low income than to a lack of interest in the Internet. Most of the patients who used Internet were interested in having access to reliable Internet-based information on their health (76.8%), and most used Internet to search for Internet based health-information about their psychiatric disorder (58.8%). We found important differences in terms of expectations and needs depending on the patient's psychiatric disorder (e.g., higher interest in Internet-based information among patients with bipolar disorder, substance-related and addictive disorders

  8. PUMA Internet Task Logging Using the IDAC-1

    Directory of Open Access Journals (Sweden)

    K. N. Tarchanidis

    2014-08-01

    Full Text Available This project uses an IDAC-1 board to sample the joint angle position of the PUMA 76 1 robot and log the results on a computer. The robot is at the task location and the logging computer is located in a different one. The task the robot is performing is based on a Pseudo Stereo Vision System (PSVS. Internet is the transport media. The protocol used in this project is UDP/IP. The actual angle is taken straight from the PUMA controller. High-resolution potentiometers are connected on each robot joint and are buffered and sampled as potential difference on an A/D converter integrated on the IDAC-1. The logging computer through the Internet acting as client asks for the angle set, the IDAC-1 responds as server with the 10-bit resolution sampling of the joint position. The whole task is logged in a file on the logging computer. This application can give the ability to the Internet user to monitor and log the robot tasks anywhere in the Word Wide Web (www.

  9. Internet Use among Retired Teachers

    Science.gov (United States)

    Demiray, Emine; Candemir, Özden

    2017-01-01

    Internet access tools and devices are developing with the prevalence of the Internet, which is considered revolutionary in information and communications technology. Beside the widespread use of the Internet among young people, statistics show that the number of older people that use the Internet is also on the rise. The purpose of the study is to…

  10. Health-related Internet use by patients with somatic diseases : Frequency of use and characteristics of users

    NARCIS (Netherlands)

    van Uden-Kraan, Cornelia F.; Drossaert, Constance H C; Taal, Erik; Smit, Wim; Moens, Hein J Bernelot; Siesling, Sabine; Seydel, Erwin R.; van de Laar, Mart A F J

    2009-01-01

    The aim of this study was to explore the percentage of Dutch patients using the Internet to search for information about their illness. In addition, we studied patients' usage of health-related Internet applications, such as online patient support groups. The final objective of this study was to

  11. Health-related Internet use by patients with somatic diseases: Frequency of use and characteristics of users

    NARCIS (Netherlands)

    Kraan, C.F.; Drossaert, Constance H.C.; Taal, Erik; Smit, Wim M.; Bernelot Moens, Hein J.; Siesling, Sabine; Seydel, E.R.; van de Laar, Mart A F J

    2009-01-01

    The aim of this study was to explore the percentage of Dutch patients using the Internet to search for information about their illness. In addition, we studied patients' usage of health-related Internet applications, such as online patient support groups. The final objective of this study was to

  12. The Effect of Flow Frequency on Internet Addiction to Different Internet Usage Activities

    Science.gov (United States)

    Yang, Hui-Ling; Wu, Wei-Pang

    2017-01-01

    This study investigated the online flow frequency among college students in regard to different internet activities, and analyzed the effect of flow frequency on internet addiction. This study surveyed 525 undergraduate internet users in Taiwan by using convenience sampling to question participants. In this paper, analysis of variance (ANOVA) was…

  13. Risk personality traits of Internet addiction: a longitudinal study of Internet-addicted Chinese university students.

    Science.gov (United States)

    Dong, Guangheng; Wang, Jiangyang; Yang, Xuelong; Zhou, Hui

    2013-12-01

    As the world's fastest growing "addiction", Internet addiction is still controversial. The present study aimed to examine the potential personality predictors of Internet addicts. Eight hundred and sixty-eight students were tested using the Eysenck Personality Questionnaire after they had just entered university. Two years later, 49 were found to be addicted to the Internet as defined by high Internet addiction test scores. Comparisons of means and logistic regression analysis were used to explore their relationship. Students addicted to the Internet showed higher Neuroticism/Stability scores, higher Psychoticism/Socialization scores, and lower Lie scores than their normal peers before their addiction. Regression results showed that Internet addiction was accounted by three independent variables: Neuroticism/Stability, Psychoticism/Socialization, and Lie. These results suggest that the risk personality traits of Internet addiction include neuroticism, psychoticism, and immaturity. Copyright © 2012 Wiley Publishing Asia Pty Ltd.

  14. Internet Addiction in Adolescents

    Science.gov (United States)

    Rebisz, Slawomir; Sikora, Ilona

    2016-01-01

    The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the…

  15. [Internet addiction--a case report].

    Science.gov (United States)

    Pejović-Milovancević, Milica; Popović-Deusić, Smiljka; Draganić-Gajić, Saveta; Lecić-Tosevski, Dusica

    2009-01-01

    Some addictions cannot be connected with substance abuse (pathological gambling, video games playing, binge eating, compulsive physical activity, emotional relationship addiction, TV addiction). Since 1995, Internet addiction has been accepted as a clinical entity with profound negative effect on social, familial, educational and economical personal functioning. The diagnosis of Internet addiction could be established if the person spends more than 38 hours per week on the Internet exempting online professional needs. Basic symptoms are the increased number of hours spent in front of the computer along with the Internet use, development of abstinent syndrome if the Internet access is prohibited, sleep inversion, neglect of basic social requirements and personal hygiene, many somatic symptoms developed due to prolonged sitting or monitor watching, dissocial behaviour. In this paper, data about the Internet addiction are presented and a case report of an adolescent with developed Internet addiction.

  16. Internet addiction: A case report

    Directory of Open Access Journals (Sweden)

    Pejović-Milovančević Milica

    2009-01-01

    Full Text Available Some addictions cannot be connected with substance abuse (pathological gambling, video games playing, binge eating, compulsive physical activity, emotional relationship addiction, TV addiction. Since 1995, Internet addiction has been accepted as a clinical entity with profound negative effect on social, familial, educational and economical personal functioning. The diagnosis of Internet addiction could be established if the person spends more than 38 hours per week on the Internet exempting online professional needs. Basic symptoms are the increased number of hours spent in front of the computer along with the Internet use, development of abstinent syndrome if the Internet access is prohibited, sleep inversion, neglect of basic social requirements and personal hygiene, many somatic symptoms developed due to prolonged sitting or monitor watching, dissocial behavior. In this paper, data about the Internet addiction are presented and a case report of an adolescent with developed Internet addiction.

  17. Internet use and attitudes towards illicit internet use behavior in a sample of Russian college students.

    Science.gov (United States)

    Palesh, Oxana; Saltzman, Kasey; Koopman, Cheryl

    2004-10-01

    This study assessed Internet use and attitudes toward illicit use of the Internet in a sample of Russian college students. A sample comprised of 198 students was recruited from a university in Moscow. Each participant completed a survey assessing demographic characteristics, Internet use, and attitudes towards engaging in illicit behaviors over the Internet. About half of the students reported that they used the Internet at least several times a year, with 8% reporting daily use of the Internet. Among Internet users, most reported having Internet access either at home or at a friends' home, and 16 % reported having Internet access from work, school, or a computer center. Among Internet users, the main purpose was for school-related activities (60%), followed by e-mail (55%), entertainment (50%), chatting (24%), and searching for pornography (6%). Although most students thought it was inappropriate to read someone else's e-mail, use someone else's password or credit card information without their permission, or break into someone's computer, many students did endorse those illicit behaviors. Over a fifth of the students reported that they knew hackers. Forty three percent of students agreed that people make too much fuss about watching videos, movies or downloading music on the Internet without paying. Males were more likely than females to report using the Internet for entertainment purposes (p = 0.006) and were more likely to agree that it was okay to break into someone's computer (p = 0.04). The results of this study suggest that these Russian college students predominately use the Internet to help with their schoolwork, to communicate with others, and for entertainment. These results also suggest that interventions may be useful to change attitudes endorsing illicit uses of the Internet.

  18. The Internet's effect on personality traits: An important casualty of the "Internet addiction" paradigm.

    Science.gov (United States)

    Aboujaoude, Elias

    2017-03-01

    Background and aims The "Internet addiction" paradigm has been criticized for several shortcomings, including inattention to specific online behaviors, not distinguishing the Internet from other media, insufficient focus on comorbidities, and definitions that do not take into account the constant access now possible. The paradigm's biggest casualty, however, may be that it has diverted attention away from subtle personality changes that seem to occur online, including in users who cannot be considered "addicted" under any definition. Methods A narrative assessment of the literature was conducted, focusing on the Internet's effects on personality traits as revealed in studies of Internet users. Results Impulsivity, narcissism, and aggression are some of the personality traits that seem to be nurtured by the Internet, with possible negative offline consequences. Discussion Ignoring the Internet's subtle effects on personality as we embrace an addiction model that implies severe pathology makes the majority of Internet users feel deceptively immune to the psychological effects of new technologies. It also limits our understanding of the big cultural shifts that are happening as a result. Conclusion The Internet's potentially negative effect on personality, and by extension on society at large, is a fundamental part of online psychology, one well worthy of further investigation.

  19. Internet gaming addiction, problematic use of the internet, and sleep problems: a systematic review.

    Science.gov (United States)

    Lam, Lawrence T

    2014-04-01

    The effect of problematic use of the Internet on mental health, particularly depression among young people, has been established but without a probable model for the underlying mechanism. In this study, a model is presented to describe possible pathways for the linkage between Internet gaming addiction and depression possibly mediated by sleep problems. A systematic review was conducted to gather epidemiological evidence to support or refute the link between addictive Internet gaming, problematic Internet use, and sleep problems including insomnia and poor sleep quality. Seven studies were identified through a systematic literature search, of these three related to addictive Internet gaming and four on problematic Internet uses and sleep problems. Information was extracted and analysed systematically from each of the studies and tabulated as a summary. Results of the review suggest that additive gaming, particularly massively multiplayer online role-playing games MMORPG, might be associated with poorer quality of sleep. Results further indicated that problematic Internet use was associated with sleep problems including subjective insomnia and poor sleep quality.

  20. Internet Usage Habits and Internet Usage in Educational Studies of Vocational School Students

    Directory of Open Access Journals (Sweden)

    Zehra Deniz Yakıncı

    2018-04-01

    Full Text Available Internet is the easiest way to access information. It provides positive contributions to individual and surroundings, in learning and information era. At this point the answers of the questions: ‘How do young people use internet and how much do they use internet for their education?’ come into prominence. In order to find the answers; a questionnaire prepared by resarchers and Young Internet Addiction Test- Short Form (YIAT-SF was used on ‘Health Services Vocational High School’ students, in this study. 3.4 % of students were found to have internet addiction and the average internet usage was found to be 5 hours daily. When students were asked to enumerate the internet sites they use, the result was: social media, news sites, movie and series sites, educational and informational content sites, play sites, e-mail, shopping sites, and sexual content sites in order of usage preferance. While social media was preferred by 79.4% in the first place, educational content sites were determined to be preferred by 5.7% in the first place among others. The second most frequently used sites by students were movies and series (22.8%. Educational / informational content (20.2 % sites were the fifth preferred sites in the preference order.