WorldWideScience

Sample records for network access provider

  1. The Changing Role of Community Networks in Providing Citizen Access to the Internet.

    Science.gov (United States)

    Keenan, Thomas P.; Trotter, David Mitchell

    1999-01-01

    Examines the changing role of community network associations or freenets in providing Internet access by examining the case of the Calgary Community Network Association (CCNA) in Alberta, Canada. Discusses the withdrawal of states from the telecommunications field, priorities of the Canadian government, and the role of the private sector.…

  2. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  3. Evolution of Network Access Points (NAPs and agreements among Internet Service Providers (ISPs in South America

    Directory of Open Access Journals (Sweden)

    Fernando Beltrán

    2006-05-01

    Full Text Available Este artículo presenta los aspectos principales del desarrollo histórico y de asuntos actuales en el mercado suramericano de acceso a Internet: los acuerdos de interconexión para el intercambio de tráfico local y regional en Suramérica, los incentivos que tienen los proveedores de acceso a Internet para mantener o modificar la naturaleza de los acuerdos y los métodos de recuperación de costos en los puntos de intercambio de tráfico. El artículo también identifica algunas amenazas a la estabilidad de los puntos de intercambio de tráfico y las ilustra con dos casos. / This paper presents the main aspects of the historical development and the current issues at stake in the South American Internet access market: the interconnection schemes for the exchange of local and regional traffic in the South American region, the incentives Internet access providers have for keeping or modifying the nature of the agreements, and the cost recovery methods at the traffic exchange points. Some threats to the stability of the scheme for domestic traffic exchange adopted throughout the region are also identified and subsequently illustrated with country-cases.

  4. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 h2>Backgroundh2> With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access

  5. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  6. Providing access to research data, publications and current research information at Data Archiving and Networked Services - DANS

    NARCIS (Netherlands)

    Dijk, E.M.S.; Doorn, P.K.

    2014-01-01

    Data Archiving and Networked Services (DANS) promotes sustained access to digital research data in the Netherlands. Researchers can deposit their data through the online archiving system EASY. Via the portal NARCIS the research data are shown in context, namely in relation to publications, and other

  7. Metropolitan Access Network

    Directory of Open Access Journals (Sweden)

    Slavko Šarić

    2003-11-01

    Full Text Available The optical fibre is the highest quality transmission mediumfor broadband services, and therefore the new access cablenetwork has to be realized to the greatest extent and as closeas possible to the subscriber by means of the optical fibre cables,in accordance with the possibilities of the telecommunicationoperator. The development of digital technology in commutations,supported by the increasingly powerful systems of processorcontrol, development of optical communications andtransport technologies in the framework of SDH concepts, arereflected on the access telecommunication networks of the urbanareas. Urban areas are the most profitable regions in telecommunications.In planning of urban optical networks the fact should betaken as a guideline that only a well-organised urban networkwill allow high quality of service provision of the leased cablesto the end points of business customers.Business customers have greater requirements for the networkreliability, flexibility and maintainability, for the sake ofundisturbed telecommunication traffic.The optical medium based technology- FITL (fiber in theloop, provides almost limitless upgrading of the system regardingthe transmission bandwidths, as well as adaptation to allthe future customers' requirements.Considering the increase in the price of installing the coppercables, the prices of electronics and optical components arecontinuously falling. The application of the optical medium isincreasing and becoming more cost-effective, and due to higherreliability of the optical transmission systems the maintenancecosts are reduced.

  8. Accessibility in complex networks

    Science.gov (United States)

    Travençolo, B. A. N.; da F. Costa, L.

    2008-12-01

    This Letter describes a method for the quantification of the diversity of non-linear dynamics in complex networks as a consequence of self-avoiding random walks. The methodology is analyzed in the context of theoretical models and illustrated with respect to the characterization of the accessibility in urban streets.

  9. Demonstrate provider accessibility with desktop and online services.

    Science.gov (United States)

    2001-10-01

    It's available on personal computers with a CD or through Internet access. Assess instantly the accessibility of your provider network or the most promising areas to establish a health service with new GIS tools.

  10. A quantum access network.

    Science.gov (United States)

    Fröhlich, Bernd; Dynes, James F; Lucamarini, Marco; Sharpe, Andrew W; Yuan, Zhiliang; Shields, Andrew J

    2013-09-05

    The theoretically proven security of quantum key distribution (QKD) could revolutionize the way in which information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, until now no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we introduce and experimentally demonstrate the concept of a 'quantum access network': based on simple and cost-effective telecommunication technologies, the scheme can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We show that a high-speed single-photon detector positioned at a network node can be shared between up to 64 users for exchanging secret keys with the node, thereby significantly reducing the hardware requirements for each user added to the network. This point-to-multipoint architecture removes one of the main obstacles restricting the widespread application of QKD. It presents a viable method for realizing multi-user QKD networks with efficient use of resources, and brings QKD closer to becoming a widespread technology.

  11. Optical Subsystems for Next Generation Access Networks

    DEFF Research Database (Denmark)

    Lazaro, J.A; Polo, V.; Schrenk, B.

    2011-01-01

    Recent optical technologies are providing higher flexibility to next generation access networks: on the one hand, providing progressive FTTx and specifically FTTH deployment, progressively shortening the copper access network; on the other hand, also opening fixed-mobile convergence solutions in ...

  12. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  13. Bring Your Own Device - Providing Reliable Model of Data Access

    Directory of Open Access Journals (Sweden)

    Stąpór Paweł

    2016-10-01

    Full Text Available The article presents a model of Bring Your Own Device (BYOD as a model network, which provides the user reliable access to network resources. BYOD is a model dynamically developing, which can be applied in many areas. Research network has been launched in order to carry out the test, in which as a service of BYOD model Work Folders service was used. This service allows the user to synchronize files between the device and the server. An access to the network is completed through the wireless communication by the 802.11n standard. Obtained results are shown and analyzed in this article.

  14. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  15. Accessibility of MOOCs: Understanding the Provider Perspective

    Science.gov (United States)

    Iniesto, Francisco; McAndrew, Patrick; Minocha, Shailey; Coughlan, Tim

    2016-01-01

    Massive Online Open Courses (MOOCs) have become an accepted way to make learning opportunities available at large scale and with low cost to the learner. However, only if these are made accessible will they be able to offer flexibility of learning and benefits to all, irrespective of disability. Experience in providing accessible online learning…

  16. Research on optical access network remote management technology

    Science.gov (United States)

    Wang, Wayne; Zou, Chen; Luo, Wenyi

    2008-11-01

    This paper goal is to provide a framework for the remote configuration and management of services for PON (Passive Optical Network) access and fiber access. Also it defines how Auto-Configuration Servers (ACS) in the network can remotely configure, troubleshoot and manage a Passive Optical Network (PON) optical network termination (ONT) with layer 3 capabilities using the CPE WAN management protocol, TR-069.

  17. Network performance and fault analytics for LTE wireless service providers

    CERN Document Server

    Kakadia, Deepak; Gilgur, Alexander

    2017-01-01

     This book is intended to describe how to leverage emerging technologies big data analytics and SDN, to address challenges specific to LTE and IP network performance and fault management data in order to more efficiently manage and operate an LTE wireless networks. The proposed integrated solutions permit the LTE network service provider to operate entire integrated network, from RAN to Core , from UE to application service, as one unified system and correspondingly collect and align disparate key metrics and data, using an integrated and holistic approach to network analysis. The LTE wireless network performance and fault involves the network performance and management of network elements in EUTRAN, EPC and IP transport components, not only as individual components, but also as nuances of inter-working of these components. The key metrics for EUTRAN include radio access network accessibility, retainability, integrity, availability and mobility. The key metrics for EPC include MME accessibility, mobility and...

  18. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  19. Authentication Issues in Multi-Service Residential Access Networks

    OpenAIRE

    Rossebo, Judith; Ronan, John; Walsh, Kristian

    2003-01-01

    Multi-service residential access networks allow residential customers to choose amongst a variety of service offerings, over a range of Core Networks and subject to user requirements such as QoS, mobility, cost and availability. These issues place requirements on authentication for network access, with a need for mutual authentication of the residential gateway (RG) to the local access point (LAP). The EU-IST project TORRENT is building a testbed providing for multi-service residential access...

  20. Internet access and investment incentives for broadband service providers

    OpenAIRE

    Baranes, Edmond; Poudou, Jean-Christophe

    2011-01-01

    This paper studies a model of the Internet broadband market as a platform in order to show how di¤erent pricing schemes from the so-called "net neutrality " can increase economic e¢ ciency by allowing more investment of access providers and enhancing consumers surplus and social welfare. We show that departing from the "net neutrality", where at rates are used, introducing termination fees can increase incentives to invest for the ISP and enhance social surplus. Keywords : Network neutrality,...

  1. Providing Data Access for Interdisciplinary Research

    Science.gov (United States)

    Hooper, R. P.; Couch, A.

    2012-12-01

    Developing an interdisciplinary understanding of human and environmental interactions with water requires access to a variety of data kinds collected by various organizations. The CUAHSI Hydrologic Information System (HIS) is a standards-based, services-oriented architecture designed for time-series data. Such data represents an important type of data in water studies. Through the efforts of HIS, a standard transmission language, WaterML2, has been adopted by the Open Geospatial Consortium and is under consideration by the World Meteorologic Organization as an international standards. Web services have also been developed to retrieve data and metadata. HIS is completed with a metadata catalog, hosted by San Diego Supercomputing Center, which indexes more than 20 million time series provided from over 90 different services. This catalog is supported through a hierarchically organized controlled vocabulary that is open for community input and mediation. Data publishers include federal agencies, universities, state agencies, and non-profit organizations such as watershed associations. Accessing data from such a broad spectrum of sources through a uniform service standard promises to truly transform the way in which hydrologic research is done. CUAHSI HIS is a large-scale prototype at this time, but a proposal is under consideration by the National Science Foundation to operationalize HIS through a data facility, tentatively called the CUAHSI Water Data Center. Establishing HIS is an important step to enable research into human-environment interactions with water, but it is only one step. Other data structures will need to be made accessible and interoperable to support this research. Some data—such as two-dimensional GIS coverages—already have widely used standards for transmission and sharing. The US Federal government has long operated a clearinghouse for federal geographic data that is now being augmented with other services such as ArcGIS OnLine. Other data

  2. Accessibility and delay in random temporal networks

    Science.gov (United States)

    Tajbakhsh, Shahriar Etemadi; Coon, Justin P.; Simmons, David E.

    2017-09-01

    In a wide range of complex networks, the links between the nodes are temporal and may sporadically appear and disappear. This temporality is fundamental to analyzing the formation of paths within such networks. Moreover, the presence of the links between the nodes is a random process induced by nature in many real-world networks. In this paper, we study random temporal networks at a microscopic level and formulate the probability of accessibility from a node i to a node j after a certain number of discrete time units T . While solving the original problem is computationally intractable, we provide an upper and two lower bounds on this probability for a very general case with arbitrary time-varying probabilities of the links' existence. Moreover, for a special case where the links have identical probabilities across the network at each time slot, we obtain the exact probability of accessibility between any two nodes. Finally, we discuss scenarios where the information regarding the presence and absence of links is initially available in the form of time duration (of presence or absence intervals) continuous probability distributions rather than discrete probabilities over time slots. We provide a method for transforming such distributions to discrete probabilities, which enables us to apply the given bounds in this paper to a broader range of problem settings.

  3. Softward-Defined Networking in Heterogeneous Radio Access Networks

    DEFF Research Database (Denmark)

    Yu, Hao

    2014-01-01

    Integrating diff erent wireless access technologies to provide users with data service will definitely result in a heterogeneous radio access network. Moving from one wireless domain to another causes traffic being switched from one interface to another. This results in a reestablishment of TCP c....... This paper provides a possible solution architecture and research direction for vertical handover problem by leveraging the concept of software - defined networking together with existing proposals....... connection due to the change of the assigned IP address. Frequent handovers may force users to perform re - logins or application restarts, which undoubtedly jeopardize the quality of experience. This vertical handover problem will not be trivial as mobility is becomin g a dominant factor in communications...

  4. Approximate Networking for Universal Internet Access

    Directory of Open Access Journals (Sweden)

    Junaid Qadir

    2017-12-01

    Full Text Available Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost-efficient ways of provisioning high-performance, global Internet. In this paper, we argue that instead of an exclusive focus on a utopian goal of universally accessible “ideal networking” (in which we have a high throughput and quality of service as well as low latency and congestion, we should consider providing “approximate networking” through the adoption of context-appropriate trade-offs. In this regard, we propose to leverage the advances in the emerging trend of “approximate computing” that rely on relaxing the bounds of precise/exact computing to provide new opportunities for improving the area, power, and performance efficiency of systems by orders of magnitude by embracing output errors in resilient applications. Furthermore, we propose to extend the dimensions of approximate computing towards various knobs available at network layers. Approximate networking can be used to provision “Global Access to the Internet for All” (GAIA in a pragmatically tiered fashion, in which different users around the world are provided a different context-appropriate (but still contextually functional Internet experience.

  5. Location-aware network operation for cloud radio access network

    KAUST Repository

    Wang, Fanggang

    2017-06-20

    One of the major challenges in effectively operating a cloud radio access network (C-RAN) is the excessive overhead signaling and computation load that scale rapidly with the size of the network. In this paper, the exploitation of location information of the mobile devices is proposed to address this challenge. We consider an approach in which location-assisted channel state information (CSI) acquisition methods are introduced to complement conventional pilot-based CSI acquisition methods and avoid excessive overhead signaling. A low-complexity algorithm is designed to maximize the sum rate. An adaptive algorithm is also proposed to address the uncertainty issue in CSI acquisition. Both theoretical and numerical analyses show that location information provides a new dimension to improve throughput for next-generation massive cooperative networks.

  6. Mission-Aware Medium Access Control in Random Access Networks

    OpenAIRE

    Park, Jaeok; Van Der Schaar, Mihaela

    2009-01-01

    We study mission-critical networking in wireless communication networks, where network users are subject to critical events such as emergencies and crises. If a critical event occurs to a user, the user needs to send necessary information for help as early as possible. However, most existing medium access control (MAC) protocols are not adequate to meet the urgent need for information transmission by users in a critical situation. In this paer, we propose a novel class of MAC protocols that u...

  7. A Method for Upper Bounding on Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Patel, A.; Pedersen, Jens Myrup

    2004-01-01

    This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management.......This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management....

  8. JSTOR: Providing New Access to Old Research

    OpenAIRE

    K.M. Guthrie

    1998-01-01

    Much has transpired in a short period of time. The JSTOR database now includes well over two million pages from 47 core journals in 11 academic disciplines. Additional journal content is being digitized at a rate of approximately 100,000 pages per month. More than 250 libraries in the United States and Canada have become participating institutions, providing support for the creation, maintenance and growth of this database. Outside of North America, we have recently announced the establishmen...

  9. Providing Internet Access to High-Resolution Mars Images

    Science.gov (United States)

    Plesea, Lucian

    2008-01-01

    The OnMars server is a computer program that provides Internet access to high-resolution Mars images, maps, and elevation data, all suitable for use in geographical information system (GIS) software for generating images, maps, and computational models of Mars. The OnMars server is an implementation of the Open Geospatial Consortium (OGC) Web Map Service (WMS) server. Unlike other Mars Internet map servers that provide Martian data using an Earth coordinate system, the OnMars WMS server supports encoding of data in Mars-specific coordinate systems. The OnMars server offers access to most of the available high-resolution Martian image and elevation data, including an 8-meter-per-pixel uncontrolled mosaic of most of the Mars Global Surveyor (MGS) Mars Observer Camera Narrow Angle (MOCNA) image collection, which is not available elsewhere. This server can generate image and map files in the tagged image file format (TIFF), Joint Photographic Experts Group (JPEG), 8- or 16-bit Portable Network Graphics (PNG), or Keyhole Markup Language (KML) format. Image control is provided by use of the OGC Style Layer Descriptor (SLD) protocol. The OnMars server also implements tiled WMS protocol and super-overlay KML for high-performance client application programs.

  10. Providing Internet Access to High-Resolution Lunar Images

    Science.gov (United States)

    Plesea, Lucian

    2008-01-01

    The OnMoon server is a computer program that provides Internet access to high-resolution Lunar images, maps, and elevation data, all suitable for use in geographical information system (GIS) software for generating images, maps, and computational models of the Moon. The OnMoon server implements the Open Geospatial Consortium (OGC) Web Map Service (WMS) server protocol and supports Moon-specific extensions. Unlike other Internet map servers that provide Lunar data using an Earth coordinate system, the OnMoon server supports encoding of data in Moon-specific coordinate systems. The OnMoon server offers access to most of the available high-resolution Lunar image and elevation data. This server can generate image and map files in the tagged image file format (TIFF) or the Joint Photographic Experts Group (JPEG), 8- or 16-bit Portable Network Graphics (PNG), or Keyhole Markup Language (KML) format. Image control is provided by use of the OGC Style Layer Descriptor (SLD) protocol. Full-precision spectral arithmetic processing is also available, by use of a custom SLD extension. This server can dynamically add shaded relief based on the Lunar elevation to any image layer. This server also implements tiled WMS protocol and super-overlay KML for high-performance client application programs.

  11. Achieving universal access to next generation networks

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders

    The paper examines investment dimensions of next generation networks in a universal service perspective in a European context. The question is how new network infrastructures for getting access to communication, information and entertainment services in the present and future information society...

  12. Optimizing the next generation optical access networks

    DEFF Research Database (Denmark)

    Amaya Fernández, Ferney Orlando; Soto, Ana Cardenas; Tafur Monroy, Idelfonso

    2009-01-01

    Several issues in the design and optimization of the next generation optical access network (NG-OAN) are presented. The noise, the distortion and the fiber optic nonlinearities are considered to optimize the video distribution link in a passive optical network (PON). A discussion of the effect of...

  13. Personalizing Access to Learning Networks

    DEFF Research Database (Denmark)

    Dolog, Peter; Simon, Bernd; Nejdl, Wolfgang

    2008-01-01

    In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address in this fra......In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address...... in this framework, enabling personalized access to federated learning repositories with a vast number of learning offers. Our infrastructure includes personalization strategies both at the query and the query results level. Query rewriting is based on learning and language preferences; rule-based and ranking...

  14. Scalable Lunar Surface Networks and Adaptive Orbit Access Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Innovative network architecture, protocols, and algorithms are proposed for both lunar surface networks and orbit access networks. Firstly, an overlaying...

  15. Quantum secured gigabit optical access networks

    Science.gov (United States)

    Fröhlich, Bernd; Dynes, James F.; Lucamarini, Marco; Sharpe, Andrew W.; Tam, Simon W.-B.; Yuan, Zhiliang; Shields, Andrew J.

    2015-12-01

    Optical access networks connect multiple endpoints to a common network node via shared fibre infrastructure. They will play a vital role to scale up the number of users in quantum key distribution (QKD) networks. However, the presence of power splitters in the commonly used passive network architecture makes successful transmission of weak quantum signals challenging. This is especially true if QKD and data signals are multiplexed in the passive network. The splitter introduces an imbalance between quantum signal and Raman noise, which can prevent the recovery of the quantum signal completely. Here we introduce a method to overcome this limitation and demonstrate coexistence of multi-user QKD and full power data traffic from a gigabit passive optical network (GPON) for the first time. The dual feeder implementation is compatible with standard GPON architectures and can support up to 128 users, highlighting that quantum protected GPON networks could be commonplace in the future.

  16. Survey on Cloud Radio Access Network

    Directory of Open Access Journals (Sweden)

    Reeta Chhatani

    2016-01-01

    Full Text Available The existing wireless network will face the challenge of data tsunami in the near future. Densification of network will deal huge data traffic but will increase the interferences and network cost. At the same time, the existing wireless network is underutilized due to dynamic traffic. To deal with this adverse scenario, a change in the current network architecture is required. Based on virtualization, Cloud Radio Access Network (CRAN was proposed for wireless network. In CRAN the functionality of base station will be distributed into base band unit (BBU and remote radio heads (RRH which will achieve benefits of centralization. This paper presents a survey on CRAN centring on optimized resource allocation, energy efficiency and throughput maximization under fronthaul capacity. The existing solution and future opportunities in CRAN are also summarized.

  17. The SOOS Data Portal, providing access to Southern Oceans data

    Science.gov (United States)

    Proctor, Roger; Finney, Kim; Blain, Peter; Taylor, Fiona; Newman, Louise; Meredith, Mike; Schofield, Oscar

    2013-04-01

    The Southern Ocean Observing System (SOOS) is an international initiative to enhance, coordinate and expand the strategic observations of the Southern Oceans that are required to address key scientific and societal challenges. A key component of SOOS will be the creation and maintenance of a Southern Ocean Data Portal to provide improved access to historical and ongoing data (Schofield et al., 2012, Eos, Vol. 93, No. 26, pp 241-243). The scale of this effort will require strong leveraging of existing data centres, new cyberinfrastructure development efforts, and defined data collection, quality control, and archiving procedures across the international community. The task of assembling the SOOS data portal is assigned to the SOOS Data Management Sub-Committee. The information infrastructure chosen for the SOOS data portal is based on the Australian Ocean Data Network (AODN, http://portal.aodn.org.au). The AODN infrastructure is built on open-source tools and the use of international standards ensures efficiency of data exchange and interoperability between contributing systems. OGC standard web services protocols are used for serving of data via the internet. These include Web Map Service (WMS) for visualisation, Web Feature Service (WFS) for data download, and Catalogue Service for Web (CSW) for catalogue exchange. The portal offers a number of tools to access and visualize data: - a Search link to the metadata catalogue enables search and discovery by simple text search, by geographic area, temporal extent, keyword, parameter, organisation, or by any combination of these, allowing users to gain access to further information and/or the data for download. Also, searches can be restricted to items which have either data to download, or attached map layers, or both - a Map interface for discovery and display of data, with the ability to change the style and opacity of layers, add additional data layers via OGC Web Map Services, view animated timeseries datastreams

  18. Protocol and networking design issues for local access WDM networks

    NARCIS (Netherlands)

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this

  19. TCP Performance Enhancement for UMTS Access Network

    DEFF Research Database (Denmark)

    Hu, Liang

    2008-01-01

    is between UMTS access network and Internet. The split proxy divides the bandwidth delay product into two parts, resulting in two TCP connections with smaller bandwidth delay products. Simulation results show, the split TCP proxy can significantly improve the TCP performance under high bit rate DCH channel......We aim at optimize the TCP performance over UMTS access network challenged by the large delay bandwidth product that is mainly caused by the latency from the link layer ARQ retransmissions and diversity technique at physical layer. We propose to place a split TCP proxy at GGSN nodes which...

  20. Social Network Privacy via Evolving Access Control

    Science.gov (United States)

    di Crescenzo, Giovanni; Lipton, Richard J.

    We study the problem of limiting privacy loss due to data shared in a social network, where the basic underlying assumptions are that users are interested in sharing data and cannot be assumed to constantly follow appropriate privacy policies. Note that if these two assumptions do not hold, social network privacy is theoretically very easy to achieve; for instance, via some form of access control and confidentiality transformation on the data.

  1. Cloud Radio Access Network architecture. Towards 5G mobile networks

    DEFF Research Database (Denmark)

    Checko, Aleksandra

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges that mobile operators face while trying to support ever-growing end-users’ needs towards 5th generation of mobile networks (5G). The main idea behind C-RAN is to split the base......, and for the analyzed scenario it can assure synchronization on the nanosecond level, fulfilling mobile network requirements. Furthermore, mechanisms to lower delay and jitter have been identified, namely: source scheduling and preemption. An innovative source scheduling scheme which can minimize jitter has been...

  2. Providing Access to Electronic Information Resources in Further Education

    Science.gov (United States)

    Banwell, Linda; Ray, Kathryn; Coulson, Graham; Urquhart, Christine; Lonsdale, Ray; Armstrong, Chris; Thomas, Rhian; Spink, Sin; Yeoman, Alison; Fenton, Roger; Rowley, Jennifer

    2004-01-01

    This article aims to provide a baseline for future studies on the provision and support for the use of digital or electronic information services (EIS) in further education. The analysis presented is based on a multi-level model of access, which encompasses access to and availability of information and communication technology (ICT) resources,…

  3. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  4. Spectrum access games for cognitive radio networks

    CSIR Research Space (South Africa)

    Masonta, MT

    2010-09-01

    Full Text Available received a wide acceptance in next generation and intelligent wireless communication systems. In this paper the authors make use of game theory approach to model and analyze cognitive radio networks in order to allow dynamic spectrum access in broadband...

  5. Proposal of using wireless optical mesh networks and integrated VDSL for broadband access networks

    Science.gov (United States)

    Zhang, Jinlong

    2001-11-01

    The proposal addresses the wireless optical broadband access networks architecture by deploying mesh network structure, which could be the alternatives to FTTx (home or node, etc) architecture. Instead of fiber used as the transmission medium in the distribution plant, here we suggest to use the free space optic links to construct the optical mesh network. The practical connections are depending on the services provided. For Video-on-Demand (VoD) service, the final connection could use twisted pair by integrated VDSL technology. The distributed bandwidth can reach 25-32 Mbps per end user. In this paper we give some comments for designing a broadband access network using optical mesh network structure. It includes the traffic estimation, transmission network design and access node design suggestions.

  6. An evaluation of Access Tier local area network switches.

    Energy Technology Data Exchange (ETDEWEB)

    Eldridge, John M.; Olsberg, Ronald R.

    2004-06-01

    This reports tabulates the Test and Evaluation results of the Access Class Switch tests conducted by members of Department 9336. About 15 switches were reviewed for use in the enterprise network as access tier switches as defined in a three tier architecture. The Access Switch Tier has several functions including: aggregate customer desktop ports, preserve and apply QoS tags, provide switched LAN access, provide VLAN assignment, as well as others. The typical switch size is 48 or less user ports. The evaluation team reviewed network switch evaluation reports from the Tolly Group as well as other sources. We then used these reports as a starting point to identify particular switches for evaluation. In general we reviewed the products of dominant equipment manufacturers. Also, based on architectural design requirements, the majority of the switches tested were of relatively small monolithic unit variety.

  7. Alternatives for Monitoring and Limiting Network Access to Students in Network-Connected Classrooms

    Science.gov (United States)

    Almeroth, Kevin; Zhang, Hangjin

    2013-01-01

    With the advent of laptop computers and network technology, many classrooms are now being equipped with Internet connections, either through wired connections or wireless infrastructure. Internet access provides students an additional source from which to obtain course-related information. However, constant access to the Internet can be a…

  8. Security Evaluation of Wireless Network Access Points

    Directory of Open Access Journals (Sweden)

    Kalniņš Rūdolfs

    2017-05-01

    Full Text Available The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it have been analysed. To ascertain the knowledge about the security of wireless networks of the average user, an online survey has been conducted. To test the security of encryption methods and WPS function, practical attacks against private test wireless networks have been made. The authors conclude that the safest way to set up 802.11 network with a pre-shared key is to use Wi-Fi Protected Access 2 (WPA2 encryption without support for WPS function. Statistics in Riga shows that networks are often configured otherwise and thus vulnerable to attacks. Survey results prove that respondents are not well informed regarding the security of wireless networks.

  9. Sci-Hub provides access to nearly all scholarly literature

    OpenAIRE

    Himmelstein, Daniel S.; Romero, Ariel R.; McLaughlin, Stephen R.; Tzovaras, Bastian Greshake; Greene, Casey S.

    2017-01-01

    The website Sci-Hub provides access to scholarly literature via full text PDF downloads. The site enables users to access articles that would otherwise be paywalled. Since its creation in 2011, Sci-Hub has grown rapidly in popularity. However, until now, the extent of Sci-Hub’s coverage was unclear. As of March 2017, we find that Sci-Hub’s database contains 68.9% of all 81.6 million scholarly articles, which rises to 85.2% for those published in toll access journals. Coverage varies by discip...

  10. Access, fronthaul and backhaul networks for 5G and beyond

    CERN Document Server

    Imran, Muhammad Ali; Shakir, Muhammad Zeeshan

    2017-01-01

    This book provides an overview from both academic and industrial stakeholders of innovative backhaul/fronthaul solutions, covering a wide spectrum of underlying themes ranging from the recent thrust in edge caching for backhaul relaxation to mmWave based fronthauling for radio access networks.

  11. Knowledge in Access in Rural Interconnected Areas Network Phase ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This project provides support for the Knowledge Access in Rural Interconnected Areas Network (KariaNet). Phases I and II ran from 2004 to 2013. The goal of Phase III is to mainstream knowledge management and sharing on local food systems to enable rural and agricultural development professionals to improve project ...

  12. Designing Broadband Access Networks with Triple Redundancy

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Riaz, Muhammad Tahir; Knudsen, Thomas Phillip

    2005-01-01

    provided by some wireless solution. Based on experience with planning Fiber To The Home, the architecture is designed to meet a number of demands, making it practicable and useful in realworld network planning. The proposed wired topology is planar, and suitable for being fitted onto the road network...... without compromising line independency, and it can be implemented stepwise, the first step being based on a simple ring/tree topology. The double ring is used for the distribution network, ensuring 3-connectivity and making it feasible to use for connecting the base stations of the wireless network...

  13. Access to finance from different finance provider types

    NARCIS (Netherlands)

    Wulandari, Eliana; Meuwissen, Miranda P.M.; Karmana, Maman H.; Oude Lansink, Alfons G.J.M.

    2017-01-01

    Analysing farmer knowledge of the requirements of finance providers can provide valuable insights to policy makers about ways to improve farmers’ access to finance. This study compares farmer knowledge of the requirements to obtain finance with the actual requirements set by different finance

  14. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani

    2013-01-01

    This paper advocates for a new Medium Access Control (MAC) strategy for wireless meshed networks by identifying overload scenarios in order to provide additional channel access priority to the relay. The key behind our MAC protocol is that the relay will adjust its back off window size according...... that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over...... classical forwarding when both systems implement the improved MAC. However, our measurement results show an even larger gain for network coding, namely, up to 65 % over forwarding, as it copes better with channel losses under high load scenarios....

  15. Reliability monitoring of broadband access networks

    Directory of Open Access Journals (Sweden)

    Perlicki Krzysztof

    2017-06-01

    Full Text Available One of the critical issues for broadband accesss is how to test the access network infrastructure and quality of optical signal. The installation and powering up of an optical fiber access networks requires measurement techniques for verifying the link has been configured properly and that its constituent components are functioning correctly. Maintenance functions for a broadband optical access network are classified in two main categories: preventive maintenance and post-fault maintenance. The first one consists of: surveillance (to detect degradation in optical fiber components, or any other anomalous condition not preventing the signal transmission,, testing (to measure and locate any detected degradation or anomalous condition and control (fiber identification and fiber transfer to allow the testing of the link.. In turn second one consisits of: surveillance (to detect alarms or trouble reports and activate a procedure for restoration, testing (to locate the fault and/or verify the carrier performances after the restoration and remedy (fiber identification, fiber repair or fiber transfer to restore the link.

  16. Optical technologies in extended-reach access networks

    DEFF Research Database (Denmark)

    Wong, Elaine; Amaya Fernández, Ferney Orlando; Tafur Monroy, Idelfonso

    2009-01-01

    The merging of access and metro networks has been proposed as a solution to lower the unit cost of customer bandwidth. This paper reviews some of the recent advances and challenges in extended-reach optical access networks....

  17. Spectrum access and management for cognitive radio networks

    CERN Document Server

    2017-01-01

    This book presents cutting-edge research contributions that address various aspects of network design, optimization, implementation, and application of cognitive radio technologies. It demonstrates how to make better utilization of the available spectrum, cognitive radios and spectrum access to achieve effective spectrum sharing between licensed and unlicensed users. The book provides academics and researchers essential information on current developments and future trends in cognitive radios for possible integration with the upcoming 5G networks. In addition, it includes a brief introduction to cognitive radio networks for newcomers to the field.

  18. A Survey of Access Control Models in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Htoo Aung Maw

    2014-06-01

    Full Text Available Wireless sensor networks (WSNs have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mechanisms with a large overhead of computation and communication are impractical to use in WSNs; security in sensor networks is, therefore, a challenge. Access control is a critical security service that offers the appropriate access privileges to legitimate users and prevents illegitimate users from unauthorized access. However, access control has not received much attention in the context of WSNs. This paper provides an overview of security threats and attacks, outlines the security requirements and presents a state-of-the-art survey on access control models, including a comparison and evaluation based on their characteristics in WSNs. Potential challenging issues for access control schemes in WSNs are also discussed.

  19. Metadata and Providing Access to e-Books

    Science.gov (United States)

    Vasileiou, Magdalini; Rowley, Jennifer; Hartley, Richard

    2013-01-01

    In the very near future, students are likely to expect their universities to provide seamless access to e-books through online library catalogues and virtual learning environments. A paradigm change in terms of the format of books, and especially textbooks, which could have far-reaching impact, is on the horizon. Based on interviews with a number…

  20. A Fuzzy Preprocessing Module for Optimizing the Access Network Selection in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Faisal Kaleem

    2013-01-01

    Full Text Available A heterogeneous wireless network is characterized by the presence of different wireless access technologies that coexist in an overlay fashion. These wireless access technologies usually differ in terms of their operating parameters. On the other hand, Mobile Stations (MSs in a heterogeneous wireless network are equipped with multiple interfaces to access different types of services from these wireless access technologies. The ultimate goal of these heterogeneous wireless networks is to provide global connectivity with efficient ubiquitous computing to these MSs based on the Always Best Connected (ABC principle. This is where the need for intelligent and efficient Vertical Handoffs (VHOs between wireless technologies in a heterogeneous environment becomes apparent. This paper presents the design and implementation of a fuzzy multicriteria based Vertical Handoff Necessity Estimation (VHONE scheme that determines the proper time for VHO, while considering the continuity and quality of the currently utilized service, and the end-users' satisfaction.

  1. Random access procedures and radio access network (RAN) overload control in standard and advanced long-term evolution (LTE and LTE-A) networks

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Popovski, Petar

    2015-01-01

    In this chapter, we describe and discuss the current LTE random access procedure and the Radio Access Network Load Control solution within LTE/LTE-A. We provide an overview of the several considered load control solutions and give a detailed description of the standardized Extended Access Class B...

  2. High Dimensional Modulation and MIMO Techniques for Access Networks

    DEFF Research Database (Denmark)

    Binti Othman, Maisara

    Exploration of advanced modulation formats and multiplexing techniques for next generation optical access networks are of interest as promising solutions for delivering multiple services to end-users. This thesis addresses this from two different angles: high dimensionality carrierless amplitudep...... wired-wireless access networks....... the capacity per wavelength of the femto-cell network. Bit rate up to 1.59 Gbps with fiber-wireless transmission over 1 m air distance is demonstrated. The results presented in this thesis demonstrate the feasibility of high dimensionality CAP in increasing the number of dimensions and their potentially...... to be utilized for multiple service allocation to different users. MIMO multiplexing techniques with OFDM provides the scalability in increasing spectral efficiency and bit rates for RoF systems. High dimensional CAP and MIMO multiplexing techniques are two promising solutions for supporting wired and hybrid...

  3. Foundry provides the network backbone for supercomputing

    CERN Multimedia

    2003-01-01

    Some of the results from the fourth annual High-Performance Bandwidth Challenge, held in conjunction with SC2003, the international conference on high-performance computing and networking which occurred last week in Phoenix, AZ (1/2 page).

  4. Optical solutions for unbundled access network

    Science.gov (United States)

    Bacîş Vasile, Irina Bristena

    2015-02-01

    The unbundling technique requires finding solutions to guarantee the economic and technical performances imposed by the nature of the services that can be offered. One of the possible solutions is the optic one; choosing this solution is justified for the following reasons: it optimizes the use of the access network, which is the most expensive part of a network (about 50% of the total investment in telecommunications networks) while also being the least used (telephone traffic on the lines has a low cost); it increases the distance between the master station/central and the terminal of the subscriber; the development of the services offered to the subscribers is conditioned by the subscriber network. For broadband services there is a need for support for the introduction of high-speed transport. A proper identification of the factors that must be satisfied and a comprehensive financial evaluation of all resources involved, both the resources that are in the process of being bought as well as extensions are the main conditions that would lead to a correct choice. As there is no single optimal technology for all development scenarios, which can take into account all access systems, a successful implementation is always done by individual/particularized scenarios. The method used today for the selection of an optimal solution is based on statistics and analysis of the various, already implemented, solutions, and on the experience that was already gained; the main evaluation criterion and the most unbiased one is the ratio between the cost of the investment and the quality of service, while serving an as large as possible number of customers.

  5. Resource Allocation for Cloud Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama

    2016-04-01

    Cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio system. In CRANs, joint signal processing is performed at multiple cloud computing centers (clouds) that are connected to several base stations (BSs) via high capacity backhaul links. As a result, large-scale interference management and network power consumption reduction can be effectively achieved. Unlike recent works on CRANs which consider a single cloud processing and treat inter-cloud interference as background noise, the first part of this thesis focuses on the more practical scenario of the downlink of a multi-cloud radio access network where BSs are connected to each cloud through wireline backhaul links. Assume that each cloud serves a set of pre-known single-antenna mobile users (MUs). This part focuses on minimizing the network total power consumption subject to practical constraints. The problems are solved using sophisticated techniques from optimization theory (e.g. Dual Decomposition-based algorithm and the alternating direction method of multipliers (ADMM)-based algorithm). One highlight of this part is that the proposed solutions can be implemented in a distributed fashion by allowing a reasonable information exchange between the coupled clouds. Additionally, feasible solutions of the considered optimization problems can be estimated locally at each iteration. Simulation results show that the proposed distributed algorithms converge to the centralized algorithms in a reasonable number of iterations. To further account of the backhaul congestion due to densification in CRANs, the second part of this thesis considers the downlink of a cache-enabled CRAN where each BS is equipped with a local-cache with limited size used to store the popular files without the need for backhauling. Further, each cache-enabled BS is connected to the cloud via limited capacity backhaul link and can serve a set of pre-known single antenna MUs. This part

  6. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  7. The Effect of Information Access Strategy on Power Consumption and Reliability in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    This paper examines the effect of different information access strategies on power consumption and information reliability, considering the wireless sensor network as the source of information. Basically, the paper explores three different access strategies, namely; reactive, periodic and hybrid...... and computes power consumption and mismatch probability [1] in each of these access strategies. Based on our study, we make some recommendations when and where, which access strategy is suitable depending upon the application's requirements and network behavior. It also provides the model implementation...

  8. A Unified Access Model for Interconnecting Heterogeneous Wireless Networks

    Science.gov (United States)

    2015-05-01

    validation of the proposed network design for unified network access, and it lays the foundation for implementing a Software-Defined Networking ( SDN ...testing real-world applications. Most importantly, our simulation serves as a template for implementing a unified MAC layer network using SDN . SDN ...is a network program with a programmable, centralized control plane.4 SDN protocols can be used to mediate access between nodes of an HN. The method

  9. Preferred access in packet-switching radio networks

    Science.gov (United States)

    Shacham, N.

    Channel-access protocols that provide prioritized access to a common channel in a packet switching network are considered. The elements of such protocols are discussed and a specific protocol that integrates two types of packets is proposed. A probabilistic model of the protocol is presented, and its analysis yields the throughput-delay characteristics of the two classes and the interaction between them. The model is analyzed by a method similar to the one used in priority queues; this method allows consideration of each class separately, thus reducing the computational effort substantially.

  10. Optical-router-based dynamically reconfigurable photonic access network

    NARCIS (Netherlands)

    Roy, R.

    2014-01-01

    The Broadband photonics (BBP) project under the Freeband consortium of projects investigated the design of a dynamically reconfigurable photonic access network. Access networks form a key link in ensuring optimal bandwidth to the end user without which any improvements deeper in the network in the

  11. Analysis and Comparison on Novel Sensor Network Security Access Technology

    Directory of Open Access Journals (Sweden)

    Ping LIU

    2014-01-01

    Full Text Available The article introduces against technical defects of traditional network access control system, detail NAC, NAP, UAC and TNC four kinds of new network security access technology, and this article analyzes and compares them. Security framework for wireless sensor networks SPINS defines the mechanism and algorithm of complete and effective in confidentiality, point-to-point message authentication, integrity, authentication, broadcast authentication.

  12. Models of network access using feedback fluid queues

    NARCIS (Netherlands)

    Mandjes, M.R.H.; Mitra, Debasis; Scheinhardt, Willem R.W.

    At the access to networks, in contrast to the core, distances and feedback delays, as well as link capacities are small, which has network engineering implications that are investigated in this paper. We consider a single point in the access network which multiplexes several bursty users. The users

  13. Models of network access using feedback fluid queues

    NARCIS (Netherlands)

    M.R.H. Mandjes (Michel); D. Mitra; W.R.W. Scheinhardt (Werner)

    2002-01-01

    htmlabstractAt the access to networks, in contrast to the core, distances and feedback delay s, as well as link capacities are small, which has network engineering implications that are investigated in this paper. We consider a single point in the access network which multiplexes several bursty

  14. Provision of metro ethernet services using a reconfigurable photonic access network

    NARCIS (Netherlands)

    Roy, R.; van Etten, Wim

    2007-01-01

    The paper proposes a design for traffic engineering to provide Ethernet services using an extended access network. Ethernet has remained the dominant technology for Local Area and Enterprise Networks, the use of Ethernet in metro networks has seen significant interest of late to provide for end to

  15. Health Provider Networks, Quality and Costs

    NARCIS (Netherlands)

    Boone, J.; Schottmuller, C.

    2015-01-01

    We provide a modeling framework to think about selective contracting in the health care sector. Two health care providers differ in quality and costs. When buying health insurance, consumers observe neither provider quality nor costs. We derive an equilibrium where health insurers signal provider

  16. Health provider networks, quality and costs

    NARCIS (Netherlands)

    Boone, Jan; Schottmuller, C.

    2015-01-01

    We provide a modeling framework to think about selective contracting in the health care sector. Two health care providers differ in quality and costs. When buying health insurance, consumers observe neither provider quality nor costs. We derive an equilibrium where health insurers signal provider

  17. Radio Access Sharing Strategies for Multiple Operators in Cellular Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Iversen, Villy Bæk

    2015-01-01

    deployments (required for coverage enhancement), increased base station utilization, and reduced overall power consumption. Today, network sharing in the radio access part is passive and limited to cell sites. With the introduction of Cloud Radio Access Network and Software Defined Networking adoption......Mobile operators are moving towards sharing network capacity in order to reduce capital and operational expenditures, while meeting the increasing demand for mobile broadband data services. Radio access network sharing is a promising technique that leads to reduced number of physical base station...... to the radio access network, the possibility for sharing baseband processing and radio spectrum becomes an important aspect of network sharing. This paper investigates strategies for active sharing of radio access among multiple operators, and analyses the individual benefits depending on the sharing degree...

  18. Quantitative analysis of access strategies to remoteinformation in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach in......, network delay characterization) and specific requirements on mismatch probability, traffic overhead, and access delay. Finally, the analysis is applied to the use-case of context-sensitive service discovery....

  19. Peer Relations and Access to Capital in the Mathematics Classroom: A Bourdieusian Social Network Analysis

    Science.gov (United States)

    Choudry, Sophina; Williams, Julian; Black, Laura

    2017-01-01

    The aim of this article is to explore the structure of social capital in peer networks and its relation to the unequal access of educational resources within mathematics classrooms. We hypothesise that learners can gain access to mathematics through friendship networks which provide more or less help from peers that might sustain (or curtail)…

  20. An Efficient Channel Access Scheme for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Syed Asad Hussain

    2017-01-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs are getting more popularity due to the potential Intelligent Transport Systems (ITS technology. It provides many efficient network services such as safety warnings (collision warning, entertainment (video and voice, maps based guidance, and emergency information. VANETs most commonly use Road Side Units (RSUs and Vehicle-to-Vehicle (V2V referred to as Vehicle-to-Infrastructure (V2I mode for data accessing. IEEE 802.11p standard which was originally designed for Wireless Local Area Networks (WLANs is modified to address such type of communication. However, IEEE 802.11p uses Distributed Coordination Function (DCF for communication between wireless nodes. Therefore, it does not perform well for high mobility networks such as VANETs. Moreover, in RSU mode timely provision of data/services under high density of vehicles is challenging. In this paper, we propose a RSU-based efficient channel access scheme for VANETs under high traffic and mobility. In the proposed scheme, the contention window is dynamically varied according to the times (deadlines the vehicles are going to leave the RSU range. The vehicles with shorter time deadlines are served first and vice versa. Simulation is performed by using the Network Simulator (NS-3 v. 3.6. The simulation results show that the proposed scheme performs better in terms of throughput, backoff rate, RSU response time, and fairness.

  1. Provider barriers to family planning access in urban Kenya.

    Science.gov (United States)

    Tumlinson, Katherine; Okigbo, Chinelo C; Speizer, Ilene S

    2015-08-01

    A better understanding of the prevalence of service provider-imposed barriers to family planning can inform programs intended to increase contraceptive use. This study, based on data from urban Kenya, describes the frequency of provider self-reported restrictions related to clients' age, parity, marital status, and third-party consent, and considers the impact of facility type and training on restrictive practices. Trained data collectors interviewed 676 service providers at 273 health care facilities in five Kenyan cities. Service providers were asked questions about their background and training and were also asked about age, marital, parity, or consent requirements for providing family planning services. More than half of providers (58%) reported imposing minimum age restrictions on one or more methods. These restrictions were commonly imposed on clients seeking injectables, a popular method in urban Kenya, with large numbers refusing to offer injectables to women younger than 20 years. Forty-one percent of providers reported that they would not offer one or more methods to nulliparous women and more than one in four providers reported that they would not offer the injectable to women without at least one child. Providers at private facilities were significantly more likely to impose barriers, across all method types, and those without in-service training on family planning provision had a significantly higher prevalence of imposing parity, marital, and consent barriers across most methods. Programs need to address provider-imposed barriers that reduce access to contraceptive methods particularly among young, lower parity, and single women. Promising strategies include targeting private facility providers and increasing the prevalence of in-service training. Copyright © 2015 Elsevier Inc. All rights reserved.

  2. Service delivery aspects in a reconfigurable photonic access network

    NARCIS (Netherlands)

    Roy, R.; Manhoudt, Gert; van Etten, Wim

    2008-01-01

    We discuss service delivery aspects in a reconfigurable photonic access network. The network is viewed as a stack of logical PONs in which a DWDM overlay is used over TDM PONs operating in their native format. The use of optical routers in the network allows for a dynamic change in the network

  3. Distributed cloud association in downlink multicloud radio access networks

    KAUST Repository

    Dahrouj, Hayssam

    2015-03-01

    This paper considers a multicloud radio access network (M-CRAN), wherein each cloud serves a cluster of base-stations (BS\\'s) which are connected to the clouds through high capacity digital links. The network comprises several remote users, where each user can be connected to one (and only one) cloud. This paper studies the user-to-cloud-assignment problem by maximizing a network-wide utility subject to practical cloud connectivity constraints. The paper solves the problem by using an auction-based iterative algorithm, which can be implemented in a distributed fashion through a reasonable exchange of information between the clouds. The paper further proposes a centralized heuristic algorithm, with low computational complexity. Simulations results show that the proposed algorithms provide appreciable performance improvements as compared to the conventional cloud-less assignment solutions. © 2015 IEEE.

  4. Network Performance and Quality of Experience of Remote Access Laboratories

    Directory of Open Access Journals (Sweden)

    Alexander A. Kist

    2012-11-01

    Full Text Available Remote Access Laboratories (RAL have become important learning and teaching tools. This paper presents a performance study that targets a specific remote access architecture implemented within a universities operational environment. This particular RAL system provides globally authenticated and arbitrated remote access to virtualized computers as well as computer controlled hardware experiments. This paper presents system performance results that have been obtained utilizing both a set of automated and human subject tests. Principle objectives of the study were: To gain a better understanding of the nature of network traffic caused by experimental activity usage; to obtain an indication of user expectations of activity performance; and to develop a measure to predict Quality of Experience, based on easily measurable Quality of Service parameters. The study emulates network layer variation of access-bandwidth and round-trip-time of typical usage scenarios and contrasts against user perception results that allow classifying expected user performance. It demonstrates that failure rate is excellent measure of usability, and that round-trip-time predominantly affects user experience. Thin-client and remote desktop architectures are popular to separate the location of users and the actual data processing and use similar structures, hence results of this study to be applied in these application areas as well.

  5. Broadband Access Network Planning Optimization Considering Real Copper Cable Lengths

    Science.gov (United States)

    Peternel, Blaž Kos, Andrej

    Broadband access network planning strategies with techno-economic calculations are important topics, when optimal broadband network deployments are considered. This paper analyzes optimal deployment combination of digital subscriber line technologies (xDSL) and fiber to the home technologies (FTTx), following different user bandwidth demand scenarios. For this reason, optimal placement of remote digital subscriber line multiplexer (RDSLAM) is examined. Furthermore, the article also discusses the economy of investments, depending on certain investment threshold and the reach of different xDSL technologies. Finally, the difference between broadband network deployment in a characteristic urban and rural area in Republic of Slovenia, in terms of required optical cable dig length per household is shown. A tree structure network model of a traditional copper access network is introduced. A dynamic programming logic, with recursion as a basis of a tree structure examination and evaluation of optimal network elements placement is used. The tree structure network model considers several real network parameters (e. g.: copper cable lengths, user coordinates, node coordinates). The main input for the optimization is a local loop distance between each user and a candidate node for RDSLAM placement. Modelling of copper access networks with a tree structure makes new extensions in planning optimization of broadband access networks. Optimization of network elements placement has direct influence on efficiency and profitability of broadband access telecommunication networks.

  6. A Method for Automated Planning of FTTH Access Network Infrastructures

    DEFF Research Database (Denmark)

    Riaz, Muhammad Tahir; Pedersen, Jens Myrup; Madsen, Ole Brun

    2005-01-01

    In this paper a method for automated planning of Fiber to the Home (FTTH) access networks is proposed. We introduced a systematic approach for planning access network infrastructure. The GIS data and a set of algorithms were employed to make the planning process more automatic. The method explains...

  7. Access network evolution: optical fibre to the subscribers and impact on the metropolitan and home networks

    Science.gov (United States)

    Chanclou, P.; Belfqih, Z.; Charbonnier, B.; Duong, T.; Frank, F.; Genay, N.; Huchard, M.; Guignard, P.; Guillo, L.; Landousies, B.; Pizzinat, A.; Ramanitra, H.; Saliou, F.; Durel, S.; Urvoas, P.; Ouzzif, M.; Le Masson, J.

    2008-11-01

    This article describes broadband optical access network evolution including high speed interfaces for fixed and mobile services. The impact of network access evolution on network architecture and transmission equipment localization on the metropolitan network is also mentioned. Some technical challenges are also discussed, namely concerning the optical extended budget, as well as the impact of access evolution on the metropolitan network. The access bit rate evolution has also an impact on the home network by the necessity of offering connectivity to customers at 1 Gbit/s, for example, over plastic optical fibre. To cite this article: P. Chanclou et al., C. R. Physique 9 (2008).

  8. Accessing Wireless Sensor Networks Via Dynamically Reconfigurable Interaction Models

    Directory of Open Access Journals (Sweden)

    Maria Cecília Gomes

    2012-12-01

    Full Text Available The Wireless Sensor Networks (WSNs technology is already perceived as fundamental for science across many domains, since it provides a low cost solution for environment monitoring. WSNs representation via the service concept and its inclusion in Web environments, e.g. through Web services, supports particularly their open/standard access and integration. Although such Web enabled WSNs simplify data access, network parameterization and aggregation, the existing interaction models and run-time adaptation mechanisms available to clients are still scarce. Nevertheless, applications increasingly demand richer and more flexible accesses besides the traditional client/server. For instance, applications may require a streaming model in order to avoid sequential data requests, or the asynchronous notification of subscribed data through the publish/subscriber. Moreover, the possibility to automatically switch between such models at runtime allows applications to define flexible context-based data acquisition. To this extent, this paper discusses the relevance of the session and pattern abstractions on the design of a middleware prototype providing richer and dynamically reconfigurable interaction models to Web enabled WSNs.

  9. Effects of network node consolidation in optical access and aggregation networks on costs and power consumption

    Science.gov (United States)

    Lange, Christoph; Hülsermann, Ralf; Kosiankowski, Dirk; Geilhardt, Frank; Gladisch, Andreas

    2010-01-01

    The increasing demand for higher bit rates in access networks requires fiber deployment closer to the subscriber resulting in fiber-to-the-home (FTTH) access networks. Besides higher access bit rates optical access network infrastructure and related technologies enable the network operator to establish larger service areas resulting in a simplified network structure with a lower number of network nodes. By changing the network structure network operators want to benefit from a changed network cost structure by decreasing in short and mid term the upfront investments for network equipment due to concentration effects as well as by reducing the energy costs due to a higher energy efficiency of large network sites housing a high amount of network equipment. In long term also savings in operational expenditures (OpEx) due to the closing of central office (CO) sites are expected. In this paper different architectures for optical access networks basing on state-of-the-art technology are analyzed with respect to network installation costs and power consumption in the context of access node consolidation. Network planning and dimensioning results are calculated for a realistic network scenario of Germany. All node consolidation scenarios are compared against a gigabit capable passive optical network (GPON) based FTTH access network operated from the conventional CO sites. The results show that a moderate reduction of the number of access nodes may be beneficial since in that case the capital expenditures (CapEx) do not rise extraordinarily and savings in OpEx related to the access nodes are expected. The total power consumption does not change significantly with decreasing number of access nodes but clustering effects enable a more energyefficient network operation and optimized power purchase order quantities leading to benefits in energy costs.

  10. Formal Specification and Validation of Secure Connection Establishment in a Generic Access Network Scenario

    DEFF Research Database (Denmark)

    Fleischer, Paul; Kristensen, Lars Michael

    2008-01-01

    The Generic Access Network (GAN) architecture is defined by the 3rd Generation Partnership Project (3GPP), and allows telephone services, such as SMS and voice-calls, to be accessed via generic IP networks. The main usage of this is to allow mobile phones to use WiFi in addition to the usual GSM...... network. The GAN specification relies on the Internet Protocol Security layer (IPSec) and the Internet Key Exchange protocol (IKEv2) to provide encryption across IP networks, and thus avoid compromising the security of the telephone networks. The detailed usage of these two Internet protocols (IPSec...

  11. Symmetric reconfigurable capacity assignment in a bidirectional DWDM access network.

    Science.gov (United States)

    Ortega, Beatriz; Mora, José; Puerto, Gustavo; Capmany, José

    2007-12-10

    This paper presents a novel architecture for DWDM bidirectional access networks providing symmetric dynamic capacity allocation for both downlink and uplink signals. A foldback arrayed waveguide grating incorporating an optical switch enables the experimental demonstration of flexible assignment of multiservice capacity. Different analog and digital services, such as CATV, 10 GHz-tone, 155Mb/s PRBS and UMTS signals have been transmitted in order to successfully test the system performance under different scenarios of total capacity distribution from the Central Station to different Base Stations with two reconfigurable extra channels for each down and upstream direction.

  12. Allocating resources between network nodes for providing a network node function

    NARCIS (Netherlands)

    Strijkers, R.J.; Meulenhoff, P.J.

    2014-01-01

    The invention provides a method wherein a first network node advertises available resources that a second network node may use to offload network node functions transparently to the first network node. Examples of the first network node are a client device (e.g. PC, notebook, tablet, smart phone), a

  13. Software Defined Networking for Next Generation Converged Metro-Access Networks

    Science.gov (United States)

    Ruffini, M.; Slyne, F.; Bluemm, C.; Kitsuwan, N.; McGettrick, S.

    2015-12-01

    While the concept of Software Defined Networking (SDN) has seen a rapid deployment within the data center community, its adoption in telecommunications network has progressed slowly, although the concept has been swiftly adopted by all major telecoms vendors. This paper presents a control plane architecture for SDN-driven converged metro-access networks, developed through the DISCUS European FP7 project. The SDN-based controller architecture was developed in a testbed implementation targeting two main scenarios: fast feeder fiber protection over dual-homed Passive Optical Networks (PONs) and dynamic service provisioning over a multi-wavelength PON. Implementation details and results of the experiment carried out over the second scenario are reported in the paper, showing the potential of SDN in providing assured on-demand services to end-users.

  14. The impact of wireless device access on content delivery networks

    OpenAIRE

    Denney, Justin; Race, Nicholas

    2003-01-01

    Content delivery network architectures are initiatives designed to support the effective delivery of continuous and discrete media to end-users. Mobile devices are now capable of exploiting services such as content delivery, but with the protocols governing the content delivery networks designed for wired networked topologies; an assessment of the impact of mobile devices on the network has never been undertaken. Wireless devices access causes significant issues in the ability of the media tr...

  15. Access Network Selection Based on Fuzzy Logic and Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Mohammed Alkhawlani

    2008-01-01

    Full Text Available In the next generation of heterogeneous wireless networks (HWNs, a large number of different radio access technologies (RATs will be integrated into a common network. In this type of networks, selecting the most optimal and promising access network (AN is an important consideration for overall networks stability, resource utilization, user satisfaction, and quality of service (QoS provisioning. This paper proposes a general scheme to solve the access network selection (ANS problem in the HWN. The proposed scheme has been used to present and design a general multicriteria software assistant (SA that can consider the user, operator, and/or the QoS view points. Combined fuzzy logic (FL and genetic algorithms (GAs have been used to give the proposed scheme the required scalability, flexibility, and simplicity. The simulation results show that the proposed scheme and SA have better and more robust performance over the random-based selection.

  16. Redirecting a client device from a first gateway to a second gateway for accessing a network node function

    NARCIS (Netherlands)

    Strijkers, R.J.; Norp, A.H.J.

    2014-01-01

    The present invention enables a network operator to select a gateway that provides desirable operational parameters to access a network node function in a network node requested by a client. A network service provider detects what service a client device is requesting or using and selects a gateway

  17. Logical optical line terminal technologies towards flexible and highly reliable metro- and access-integrated networks

    Science.gov (United States)

    Okamoto, Satoru; Sato, Takehiro; Yamanaka, Naoaki

    2017-01-01

    In this paper, flexible and highly reliable metro and access integrated networks with network virtualization and software defined networking technologies will be presented. Logical optical line terminal (L-OLT) technologies and active optical distribution networks (ODNs) are the key to introduce flexibility and high reliability into the metro and access integrated networks. In the Elastic Lambda Aggregation Network (EλAN) project which was started in 2012, a concept of the programmable optical line terminal (P-OLT) has been proposed. A role of the P-OLT is providing multiple network services that have different protocols and quality of service requirements by single OLT box. Accommodated services will be Internet access, mobile front-haul/back-haul, data-center access, and leased line. L-OLTs are configured within the P-OLT box to support the functions required for each network service. Multiple P-OLTs and programmable optical network units (P-ONUs) are connected by the active ODN. Optical access paths which have flexible capacity are set on the ODN to provide network services from L-OLT to logical ONUs (L-ONUs). The L-OLT to L-ONU path on the active ODN provides a logical connection. Therefore, introducing virtualization technologies becomes possible. One example is moving an L-OLT from one P-OLT to another P-OLT like a virtual machine. This movement is called L-OLT migration. The L-OLT migration provides flexible and reliable network functions such as energy saving by aggregating L-OLTs to a limited number of P-OLTs, and network wide optical access path restoration. Other L-OLT virtualization technologies and experimental results will be also discussed in the paper.

  18. Rural women and violence situation: access and accessibility limits to the healthcare network.

    Science.gov (United States)

    Costa, Marta Cocco da; Silva, Ethel Bastos da; Soares, Joannie Dos Santos Fachinelli; Borth, Luana Cristina; Honnef, Fernanda

    2017-07-13

    To analyze the access and accessibility to the healthcare network of women dwelling in rural contexts undergoing violence situation, as seen from the professionals' speeches. A qualitative, exploratory, descriptive study with professionals from the healthcare network services about coping with violence in four municipalities in the northern region of Rio Grande do Sul. The information derived from interviews, which have been analyzed by thematic modality. (Lack of) information of women, distance, restricted access to transportation, dependence on the partner and (lack of) attention by professionals to welcome women undergoing violence situation and (non)-articulation of the network are factors that limit the access and, as a consequence, they result in the lack of confrontation of this problem. To bring closer the services which integrate the confrontation network of violence against women and to qualify professionals to welcome these situations are factors that can facilitate the access and adhesion of rural women to the services.

  19. What Type of Knowledge Provides Valid Housing Standards Addressing Accessibility?

    DEFF Research Database (Denmark)

    Helle, Tina; Brandt, Åse; Iwarsson, Susanne

    Objective The overarching aim was to contribute to the advancement of the validity of the housing standards addressing accessibility. The specific aim was to explore the use of an activity-based approach to examine the validity of a set of housing standards. State of the art Housing standards...... with functional limitations and dependence on mobility devices to have access to housing design features as a means to be able to interact with the environment to perform a range of everyday activities in the dwelling. However, in a comprehensive literature review in search of scientific publications...... with a potential to inform housing standards addressing accessibility that accommodate adult people with physical functional limitations using/not using mobility devices (Helle et al., 2011), it was found that the existing knowledge: • Derived from the field of anthropometry and ergonomics • Focused on isolated...

  20. Amplified CWDM-based Next Generation Broadband Access Networks

    Science.gov (United States)

    Peiris, Sasanthi Chamarika

    The explosive growth of both fixed and mobile data-centric traffic along with the inevitable trend towards all-IP/Ethernet transport protocols and packet switched networks will ultimately lead to an all-packet-based converged fixed-mobile optical transport network from the core all the way out to the access network. To address the increasing capacity and speed requirements in the access networks, Wavelength-Division Multiplexed (WDM) and/or Coarse WDM (CWDM)-based Passive Optical Networks (PONs) are expected to emerge as the next-generation optical access infrastructures. However, due to several techno-economic hurdles, CWDM-PONs are still considered an expensive solution and have not yet made any significant inroads into the current access area. One of the key technology hurdles is the scalability of the CWDM-based PONs. Passive component optical insertion losses limit the reach of the network or the number of served optical network units (ONUs). In the recent years, optical amplified CWDM approaches have emerged and new designs of optical amplifiers have been proposed and demonstrated. The critical design parameter for these amplifiers is the very wide optical amplification bandwidth (e.g., 340 nm combined for both directions). The objective of this PhD dissertation work is first to engineer ring and tree-ring based PON architectures that can achieve longer unamplified PON reach and/or provide service to a greater number of ONUs and customers. Secondly is to develop new novel optical amplifier schemes to further address the scalability limitation of the CWDM-based PONs. Specifically, this work proposes and develops novel ultra wide-band hybrid Raman-Optical parametric amplifier (HROPA) schemes that operate over nearly the entire specified CWDM band to provide 340 nm bidirectional optical gain bandwidth over the amplified PON's downstream and upstream CWDM wavelength bands (about 170 nm in each direction). The performance of the proposed HROPA schemes is assessed

  1. Measuring sustainable accessibility potential using the mobility infrastructure's network configuration

    NARCIS (Netherlands)

    Gil, J.; Read, S.

    2012-01-01

    This paper is an exploration into the analysis of public transport networks using space syntax approaches combined with concepts of sustainable accessibility. Present urban development policy aims to achieve sustainable mobility patterns, shifting mobility to soft transportation modes such as

  2. On the Design of Energy Efficient Optical Networks with Software Defined Networking Control Across Core and Access Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Yan, Ying; Dittmann, Lars

    2013-01-01

    This paper presents a Software Defined Networking (SDN) control plane based on an overlay GMPLS control model. The SDN control platform manages optical core networks (WDM/DWDM networks) and the associated access networks (GPON networks), which makes it possible to gather global information...

  3. Modeling of Bandwidth Aggregation over Heterogeneous Wireless Access Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Dittmann, Lars

    2012-01-01

    Motivated by the multihomming capability of the mobile devices and the fact that the heterogeneous wireless access networks overlap in coverage, mobile operators are looking for solutions that will benefit by simultaneous use of the available multiple access interfaces. Multipath or multilink...... applications. The analysis is performed on a multipath model developed with OPNET Modeler, which is an advanced research tool that supports modeling and integration of various kinds of built-in networks....

  4. Network accessibility & the evoluation of urban employment.

    Science.gov (United States)

    2011-06-01

    This research examines the impact of accessibility on the growth of employment centers in the : Los Angeles Region between 1980 and 2000. There is extensive empirical documentation of : polycentricity the presence of multiple concentrations of em...

  5. Security Issues in Networks with Internet Access

    National Research Council Canada - National Science Library

    Landwehr, Carl E; Goldschlag, David M

    1997-01-01

    .... The principles are illustrated by describing the security issues a hypothetical company faces as the networks that support its operations evolve from strictly private, through a mix of Internet...

  6. Approximate Networking for Universal Internet Access

    National Research Council Canada - National Science Library

    Junaid Qadir; Arjuna Sathiaseelan; Umar Bin Farooq; Muhammad Usama; Muhammad Ali Imran; Muhammad Shafique

    2017-01-01

    Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost...

  7. System Architecture and Key Technologies for 5G Heterogeneous Cloud Radio Access Networks

    OpenAIRE

    Peng, Mugen; Li, Yong; Zhao, Zhongyuan; Wang, Chonggang

    2014-01-01

    Compared with the fourth generation (4G) cellular systems, the fifth generation wireless communication systems (5G) are anticipated to provide spectral and energy efficiency growth by a factor of at least 10, and the area throughput growth by a factor of at least 25. To achieve these goals, a heterogeneous cloud radio access network (H-CRAN) is presented in this article as the advanced wireless access network paradigm, where cloud computing is used to fulfill the centralized large-scale coope...

  8. Provider Patient-Sharing Networks and Multiple-Provider Prescribing of Benzodiazepines.

    Science.gov (United States)

    Ong, Mei-Sing; Olson, Karen L; Cami, Aurel; Liu, Chunfu; Tian, Fang; Selvam, Nandini; Mandl, Kenneth D

    2016-02-01

    Prescription benzodiazepine overdose continues to cause significant morbidity and mortality in the US. Multiple-provider prescribing, due to either fragmented care or "doctor-shopping," contributes to the problem. To elucidate the effect of provider professional relationships on multiple-provider prescribing of benzodiazepines, using social network analytics. A retrospective analysis of commercial healthcare claims spanning the years 2008 through 2011. Provider patient-sharing networks were modelled using social network analytics. Care team cohesion was measured using care density, defined as the ratio between the total number of patients shared by provider pairs within a patient's care team and the total number of provider pairs in the care team. Relationships within provider pairs were further quantified using a range of network metrics, including the number and proportion of patients or collaborators shared. The relationship between patient-sharing network metrics and the likelihood of multiple prescribing of benzodiazepines. Patients between the ages of 18 and 64 years who received two or more benzodiazepine prescriptions from multiple providers, with overlapping coverage of more than 14 days. A total of 5659 patients and 1448 provider pairs were included in our study. Among these, 1028 patients (18.2 %) received multiple prescriptions of benzodiazepines, involving 445 provider pairs (30.7 %). Patients whose providers rarely shared patients had a higher risk of being prescribed overlapping benzodiazepines; the median care density was 8.1 for patients who were prescribed overlapping benzodiazepines and 10.1 for those who were not (p benzodiazepines. Our findings demonstrate the importance of care team cohesion in addressing multiple-provider prescribing of controlled substances. Furthermore, we illustrate the potential of the provider network as a surveillance tool to detect and prevent adverse events that could arise due to fragmentation of care.

  9. Analytical Modeling of Medium Access Control Protocols in Wireless Networks

    Science.gov (United States)

    2006-03-01

    Imperatives and chal- lenges. Ad Hoc Networks, 1(1):13–64, July 2003. [28] I. Chlamtac and A. Faragó. Making transmission schedules immune to topology changes...P. Karn. MACA - a new channel access method for packet radio. In ARRL/CRRL Amateur Radio 9th Computer Networking Conference, pages 134–140, 1990

  10. Robust and Flexible Wavelength Division Multiplexed Optical Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    Future wavelength division multiplexed (WDM) access networks should be as flexible as possible. One flexibility is port wavelength-agnosticism at the optical network unit (ONU) interface, achieved via tunable laser. At the same time such systems needs to be robust against crosstalk impairments...

  11. A cost model for broadband access networks: FTTx versus WiMAX

    Science.gov (United States)

    Pereira, João Paulo Ribeiro

    2007-09-01

    Local communities and governments are taking various steps to fight the so-called "digital divide" between well served urban communities and undeserved areas. In order to make broadband access available to these under served areas, several technical solutions are available with the capacity to provide high speed Internet access, video, telephony services, etc. This paper presents a cost-model and a tool for the evaluation of broadband access technologies (xDSL, HFC, FTTx, WiMAX, PLC and satellite), and compares two technologies: FTTx and WiMAX. Our tool compares these different access technologies in different scenarios, and examining the capital expense and deployment of building access networks with the same requisite performance using each technology. The cost model is limited to the access part of the network. The results obtained by our evaluation tool give the possibility to compare several BB access technologies, and support the decision about which is the better technological solution for a given scenario

  12. Greening radio access networks using distributed base station architectures

    DEFF Research Database (Denmark)

    Kardaras, Georgios; Soler, José; Dittmann, Lars

    2010-01-01

    . However besides this, increasing energy efficiency represents a key factor for reducing operating expenses and deploying cost effective mobile networks. This paper presents how distributed base station architectures can contribute in greening radio access networks. More specifically, the advantages...... energy saving. Different subsystems have to be coordinated real-time and intelligent network nodes supporting complicated functionalities are necessary. Distributed base station architectures are ideal for this purpose mainly because of their high degree of configurability and self...

  13. Multiple access protocol for supporting multimedia services in wireless ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo

    1999-01-01

    The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications....... In this paper, we propose a multiple access protocol using centralized and distributed channel access control techniques to provide QoS guarantees for multimedia services by taking advantage of the characteristics of different kinds of ATM traffics. Multimedia traffic, including constant bit rate (CBR...

  14. Design mobile satellite system architecture as an integral part of the cellular access digital network

    Science.gov (United States)

    Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.

    1988-01-01

    The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.

  15. Reliability Demands in FTTH Access Networks

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Knudsen, Thomas Phillip; Madsen, Ole Brun

    2004-01-01

    In this paper reliability and bandwidth demands of existing, new and expected classes of applications running over Fiber To The Home (FTTH) networks to private users and small enterprises are analyzed and discussed. Certain applications such as home security and telemedicine are likely to require...

  16. Reliability Demands in FTTH Access Networks

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Knudsen, Thomas Phillip; Madsen, Ole Brun

    2005-01-01

    In this paper reliability and bandwidth demands of existing, new and expected classes of applications running over Fiber To The Home (FTTH) networks to private users and small enterprises are analysed and discussed. Certain applications such as home security and telemedicine are likely to require...

  17. Feasibility of using existing open access networks to support the harmonization of open access

    OpenAIRE

    Linde, Peter; Wessels, Bridgette; Smallwood, Rod; Price, Lada; Noorman, Merel; Wyatt, Sally; Sondervan, Jeroen

    2015-01-01

    In this report we identify and assess different options for bringing together and mobilizing relevant stakeholders in the open access arena. This builds on previous work done in the RECODE project about the open access stakeholder ecosystem, the barriers and the enablers for open access to research data as well as on the RECODE overarching policy recommendations set out in the RECODE work package 5. We have identified a sample of existing networks and organizations to determine whether they a...

  18. Optimizing Cooperative Cognitive Radio Networks with Opportunistic Access

    KAUST Repository

    Zafar, Ammar

    2012-09-16

    Optimal resource allocation for cooperative cognitive radio networks with opportunistic access to the licensed spectrum is studied. Resource allocation is based on minimizing the symbol error rate at the receiver. Both the cases of all-participate relaying and selective relaying are considered. The objective function is derived and the constraints are detailed for both scenarios. It is then shown that the objective functions and the constraints are nonlinear and nonconvex functions of the parameters of interest, that is, source and relay powers, symbol time, and sensing time. Therefore, it is difficult to obtain closed-form solutions for the optimal resource allocation. The optimization problem is then solved using numerical techniques. Numerical results show that the all-participate system provides better performance than its selection counterpart, at the cost of greater resources. © 2012 Ammar Zafar et al.

  19. 48 CFR 552.238-70 - Identification of Electronic Office Equipment Providing Accessibility for the Handicapped.

    Science.gov (United States)

    2010-10-01

    ... Electronic Office Equipment Providing Accessibility for the Handicapped. 552.238-70 Section 552.238-70... Equipment Providing Accessibility for the Handicapped. As prescribed in 538.273(a)(1), insert the following clause: Identification of Electronic Office Equipment Providing Accessibility for the Handicapped (SEP...

  20. Increasing Access to Health Care Providers with Nurse Practitioner Competencies

    Science.gov (United States)

    Grace, Del Marjorie

    2014-01-01

    Emergency department visits increased from 102.8 million to 136.1 million in 2009, resulting in crowding and increased wait times, affecting U.S. hospitals' ability to provide safe, timely patient care resulting in dangerous delays and serious health problems shown by research. The purpose of this project was to determine if competencies developed…

  1. How social network heterogeneity facilitates lexical access and lexical prediction.

    Science.gov (United States)

    Lev-Ari, Shiri; Shao, Zeshu

    2017-04-01

    People learn language from their social environment. As individuals differ in their social networks, they might be exposed to input with different lexical distributions, and these might influence their linguistic representations and lexical choices. In this article we test the relation between linguistic performance and 3 social network properties that should influence input variability, namely, network size, network heterogeneity, and network density. In particular, we examine how these social network properties influence lexical prediction, lexical access, and lexical use. To do so, in Study 1, participants predicted how people of different ages would name pictures, and in Study 2 participants named the pictures themselves. In both studies, we examined how participants' social network properties related to their performance. In Study 3, we ran simulations on norms we collected to see how age variability in one's network influences the distribution of different names in the input. In all studies, network age heterogeneity influenced performance leading to better prediction, faster response times for difficult-to-name items, and less entropy in input distribution. These results suggest that individual differences in social network properties can influence linguistic behavior. Specifically, they show that having a more heterogeneous network is associated with better performance. These results also show that the same factors influence lexical prediction and lexical production, suggesting the two might be related.

  2. Auction pricing of network access for North American railways

    DEFF Research Database (Denmark)

    Harrod, Steven

    2013-01-01

    The question of pricing train paths for "open access" railway networks in North America is discussed. An auction process is suggested as necessary to maintain transparency in the contracting process. Multiple random samples of auction pricing for a single track railway line demonstrate that the i......The question of pricing train paths for "open access" railway networks in North America is discussed. An auction process is suggested as necessary to maintain transparency in the contracting process. Multiple random samples of auction pricing for a single track railway line demonstrate...

  3. ALPHA: Proposal of Mapping QoS Parameters between UPnP Home Network and GMPLS Access

    DEFF Research Database (Denmark)

    Brewka, Lukasz Jerzy; Sköldström, Pontus; Gavler, Anders

    2011-01-01

    This paper is treating the interdomain QoS signaling between the home and access domains with a focus on applying it for providing QoS between a UPnP-QoS based home network and GMPLS based access network. The work presented here is defining a possible approach for an interface between UPn...

  4. Steep optical filtering for next generation optical access networks

    Science.gov (United States)

    Korček, Dušan; Müllerová, Jarmila

    2012-01-01

    Future development of optical access technologies expects increasing traffic and bandwidth. The first candidates to improve Gigabit-capable passive optical networks (GPON) are 10-Gigabit-PON (XG-PON) and wavelength-division multiplexing PON (WDM PON). Another possibility for increasing penetration of current PON branch is to extend number of channels provided on one optical fiber for one PON technology. Coexistence of GPON, XG-PON and WDM-PON in the same infrastructure is a most discussed issue concerning passive optical networks nowadays. Therefore, extensive studies are necessary to design proper and low-cost candidates. International Telecommunication Union (ITU) allocates specific wavelength bands for the present status quo and the future development of access technologies. However, within coexistence, it is necessary to protect signals from various PON technologies from interference. A potential barrier to deploying XG-GPONs and WDM PONs with current GPONs is the usage of broadband light sources and sophisticated optical methods of slicing the light source emission into specific wavelength channels. Protective measures comprise the exact allocation of upstream and downstream signal bands for each technology; the so-called guard bands within the wavelength allocation scheme to protect signals; and optionally the usage of wavelength blocking filters. In this contribution, bandpass thin-film filters are numerically presented for hybrid time division/wavelength division multiplexing TDM/WDM (TWDM) and for simple operation. They have been designed to be tunable and as steep as possible to reject the wavelength bands outside those allocated to TWDM-PON. The TWDM-PON filters are proposed to guarantee steep transmission curves in the vicinity of cut-on/cut-off wavelengths of the specific allocated wavelength bands and facilitate migration from legacy GPON and XG-PON to TWDM-PON. Their deployment protects the allocated wavelength bands from the undesirable interference.

  5. Outward Accessibility in Urban Street Networks: Characterization and Improvements

    OpenAIRE

    Travençolo, Bruno Augusto Nassif; Costa, Luciano da Fontoura

    2008-01-01

    The dynamics of transportation through towns and cities is strongly affected by the topology of the connections and routes. The current work describes an approach combining complex networks and self-avoiding random walk dynamics in order to quantify in objective and accurate manner, along a range of spatial scales, the accessibility of places in towns and cities. The transition probabilities are estimated for several lengths of the walks and used to calculate the outward accessibility of each...

  6. Scheduling Data Access in Smart Grid Networks Utilizing Context Information

    DEFF Research Database (Denmark)

    Findrik, Mislav; Grønbæk, Jesper; Olsen, Rasmus Løvenstein

    2014-01-01

    managing this fast flexibility requires two-way data exchange between a controller and sensors/meters via communication networks. In this paper we investigated scheduling of data collection utilizing meta-data from sensors that are describing dynamics of information. We show the applicability...... of this approach for a constraint communication networks of the smart grid and compared three general data access mechanisms, namely, push, pull and event-based....

  7. GPON: the next big thing in optical access networks

    Science.gov (United States)

    Marmur, Oren; Shraga, Eyal

    2004-04-01

    This paper contains a comprehensive review of the various Passive Optical Network (PON) technologies in the marketplace today, namely APON, EPON and GPON, and draws an in-depth comparison between them. Following a review of the history of the various PON flavors, as well as the service requirements set forth by service providers, the emerging Gigabit PON (GPON) technology is examined in detail. System performance between the various protocols is compared using efficiency and scalability factors, and conclusions are drawn as to the overall throughput efficiency of and cost influence on the solution. GPON carries a two-fold promise of both higher bit rates and higher efficiency when carrying multiple services over the PON. It offers a scalable framing structure from 622Mb/s to 2.5Gb/s, as well as support for asymmetric bit rates, exceptionally high bandwidth utilization for any type of service and a variant of standard ITU-T Generic Framing Protocol (GFP) encapsulation of any type of service (both TDM and packet) onto a synchronous transport protocol. It is shown that in the worst-case scenario, based upon the most conservative assumptions regarding traffic distribution, GPON is substantially more efficient, with an overall efficiency of 93% compared to 71% with APON and 49% with EPON. Using a more detailed analysis based upon a traffic model provided by the service providers within the full service access networks (FSAN) consortium, it is shown in quantitative terms that GPON offers exceptionally higher bandwidth for the entire range of applications when compared to both APON and, especially, EPON, resulting in substantially lower cost per bit and a much faster payback period.

  8. Modified network simulation model with token method of bus access

    Directory of Open Access Journals (Sweden)

    L.V. Stribulevich

    2013-08-01

    Full Text Available Purpose. To study the characteristics of the local network with the marker method of access to the bus its modified simulation model was developed. Methodology. Defining characteristics of the network is carried out on the developed simulation model, which is based on the state diagram-layer network station with the mechanism of processing priorities, both in steady state and in the performance of control procedures: the initiation of a logical ring, the entrance and exit of the station network with a logical ring. Findings. A simulation model, on the basis of which can be obtained the dependencies of the application the maximum waiting time in the queue for different classes of access, and the reaction time usable bandwidth on the data rate, the number of network stations, the generation rate applications, the number of frames transmitted per token holding time, frame length was developed. Originality. The technique of network simulation reflecting its work in the steady condition and during the control procedures, the mechanism of priority ranking and handling was proposed. Practical value. Defining network characteristics in the real-time systems on railway transport based on the developed simulation model.

  9. Requirements and Algorithms for Cooperation of Heterogeneous Radio Access Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena D.; Tragos, Elias; Mino, Emilio

    2009-01-01

    This paper defines the requirements for cooperation of heterogeneous radio access networks (RANs) and proposes a novel radio resource management (RRM) framework for support of mobility and quality of service (QoS) in a heterogeneous communication environment comprising IMT-Advanced and legacy...

  10. Random Access with Physical-layer Network Coding

    NARCIS (Netherlands)

    Goseling, J.; Gastpar, M.C.; Weber, J.H.

    2013-01-01

    Leveraging recent progress in compute-and-forward we propose an approach to random access that is based on physical-layer network coding: When packets collide, it is possible to recover a linear combination of the packets at the receiver. Over many rounds of transmission, the receiver can thus

  11. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever...

  12. Ubiquitous access control and policy management in personal networks

    DEFF Research Database (Denmark)

    Kyriazanos, Dimitris M.; Stassinopoulos, George I.; Prasad, Neeli R.

    2006-01-01

    In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures-having in this case...

  13. Network Asymmetries and Access Pricing in Cellular Telecommunications

    NARCIS (Netherlands)

    V. Kocsis

    2005-01-01

    textabstractNetwork shares and retail prices are not symmetric in the telecommunications market with multiple bottlenecks which give rise to new questions of access fee regulation. In this paper we consider a model with two types of asymmetry arising from different entry timing, i.e. a larger

  14. Adaptive spectrum decision framework for heterogeneous dynamic spectrum access networks

    CSIR Research Space (South Africa)

    Masonta, M

    2015-09-01

    Full Text Available Spectrum decision is the ability of a cognitive radio (CR) system to select the best available spectrum band to satisfy dynamic spectrum access network (DSAN) users¿ quality of service (QoS) requirements without causing harmful interference...

  15. Awareness of LGBT aging issues among aging services network providers.

    Science.gov (United States)

    Hughes, Anne K; Harold, Rena D; Boyer, Janet M

    2011-10-01

    Very little research exists examining the interactions between community-based aging service providers and lesbian, gay, bisexual, and transgender (LGBT) older adults. It is unclear whether mainstream aging services acknowledge the needs of this community. We asked direct care providers and administrators in the Michigan aging services network to describe their work with LGBT older adults. We found there are very few services specific to the needs of older LGBT adults and very little outreach to this community. At the agency level, resistance to providing services was found.

  16. Deployment of a Testbed in a Brazilian Research Network using IPv6 and Optical Access Technologies

    Science.gov (United States)

    Martins, Luciano; Ferramola Pozzuto, João; Olimpio Tognolli, João; Chaves, Niudomar Siqueira De A.; Reggiani, Atilio Eduardo; Hortêncio, Claudio Antonio

    2012-04-01

    This article presents the implementation of a testbed and the experimental results obtained with it on the Brazilian Experimental Network of the government-sponsored "GIGA Project." The use of IPv6 integrated to current and emerging optical architectures and technologies, such as dense wavelength division multiplexing and 10-gigabit Ethernet on the core and gigabit capable passive optical network and optical distribution network on access, were tested. These protocols, architectures, and optical technologies are promising and part of a brand new worldwide technological scenario that has being fairly adopted in the networks of enterprises and providers of the world.

  17. The IRIS Data Management Center: Providing Efficient Access to GSN data

    Science.gov (United States)

    Ahern, T. K.; Benson, R. B.

    2004-05-01

    The IRIS Data Management Center (DMC) in Seattle, Washington is the host of the largest seismological database of its kind in the world. The Global Seismic Network (GSN) lies at the center of the DMC holdings. The DMC relies heavily upon a petabyte mass storage system for waveform storage and Oracle for its relational data base infrastructure. During the past several years, emphasis has been placed upon the development and implementation of robust and effective technologies that allow access to the information at the IRIS DMC in a variety of ways. This talk will highlight the general structure of the IRIS DMC and the method we use to manage the gigabytes of information in Oracle as well more than 100 terabytes of time series data we have in our mass storage systems. An overview will be given of the methods through which users can access the information in our relational database systems as well as the mass storage systems in order to conduct their research using GSN and other data. A discussion of three distinctly different approaches will be presented. These include an email-based method, a web-based method as well as a multi-tier distributed computing environment we call the Data Handling Interface (DHI). The DHI is based upon Common Object Request Broker Architecture (CORBA) and provides direct connections between client applications, normally provided by IRIS, and data center servers established at several data centers within the United States. The DHI presently supports the distribution of information about seismic events, information about the seismic stations that record the time series and finally the time series (seismograms) themselves. The system is capable of transmitting seismic waveform data in real time. Waveform data and all associated metadata are available through this interface allowing direct access to information at the DMC within client applications running on a users workstation.

  18. Access pricing for transmission networks: Hypotheses and empirical evidence

    Energy Technology Data Exchange (ETDEWEB)

    Martoccia, Maria [Decision Technology Centre, London (United Kingdom)

    1999-08-01

    The sectors characterised by the use of transmission or transport networks as inputs of production (electricity, gas, telecommunications) have long been considered as natural monopolies. Thanks to the technological innovations which have modified the economics of production (as in electricity generation) or that have driven the development of high value added services (as in telecommunications), the boundaries of the old natural monopolies have been eroded by the presence of operators potentially able to compete in national and international markets. The objective is to delineate, by analysing the more significant theoretical contributions and some of the restructuring experiences of the sector in question, the possible regulatory solutions which, in the perspective of a `European market` for electricity, makes the management and the expansion of the transmission networks adequate for the `open access` of national electricity sectors. The analysis of some mature experiences, such as in Chile, Argentina, the UK and Norway, in the second section, will offer a useful support to this evaluation. The regulatory solution here adopted will be analysed, in particular, with reference to the two main problems outlined above: on the one hand, the problem of providing through prices the necessary information about the opportunities of using the transmission assets; and on the other hand, the problem of defining an efficient incentive mechanism for the behaviour of the monopolist (the owner of the transmission assets). Finally, by considering the limits found in the solutions explored in these models, we will try, in the third section, to delineate the evolution that the regulation of the analysed sectors could follow, in an attempt to make the optimal solution defined in the first section consistent with the imperfections of the real scenarios. (EHS)

  19. MAC Protocols for Optimal Information Retrieval Pattern in Sensor Networks with Mobile Access

    Directory of Open Access Journals (Sweden)

    Dong Min

    2005-01-01

    Full Text Available In signal field reconstruction applications of sensor network, the locations where the measurements are retrieved from affect the reconstruction performance. In this paper, we consider the design of medium access control (MAC protocols in sensor networks with mobile access for the desirable information retrieval pattern to minimize the reconstruction distortion. Taking both performance and implementation complexity into consideration, besides the optimal centralized scheduler, we propose three decentralized MAC protocols, namely, decentralized scheduling through carrier sensing, Aloha scheduling, and adaptive Aloha scheduling. Design parameters for the proposed protocols are optimized. Finally, performance comparison among these protocols is provided via simulations.

  20. Analysis of physical layer performance of hybrid optical-wireless access network

    Science.gov (United States)

    Shaddad, R. Q.; Mohammad, A. B.; Al-hetar, A. M.

    2011-09-01

    The hybrid optical-wireless access network (HOWAN) is a favorable architecture for next generation access network. It is an optimal combination of an optical backhaul and a wireless front-end for an efficient access network. In this paper, the HOWAN architecture is designed based on a wavelengths division multiplexing/time division multiplexing passive optical network (WDM/TDM PON) at the optical backhaul and a wireless fidelity (WiFi) technology at the wireless front-end. The HOWAN is proposed that can provide blanket coverage of broadband and flexible connection for end-users. Most of the existing works, based on performance evaluation are concerned on network layer aspects. This paper reports physical layer performance in terms of the bit error rate (BER), eye diagram, and signal-to-noise ratio (SNR) of the communication system. It accommodates 8 wavelength channels with 32 optical network unit/wireless access points (ONU/APs). It is demonstrated that downstream and upstream of 2 Gb/s can be achieved by optical backhaul for each wavelength channel along optical fiber length of 20 km and a data rate of 54 Mb/s per ONU/AP along a 50 m outdoor wireless link.

  1. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  2. A spontaneous ad hoc network to share www access

    OpenAIRE

    Lloret Jaime; Garcia Miguel; Peñalver Lourdes; Lacuesta Raquel

    2010-01-01

    In this paper, we propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction, to grant a quick, easy, and secure access to the users to surf the Web. The paper shows the description of our proposal, the procedure of the nodes involved in the system, the security algorithms implemented, and the designed messages. We have taken into account the security and its performance. Although some people have defined and described the main features of spontaneous ad-hoc network...

  3. Providing the Public with Online Access to Large Bibliographic Data Bases.

    Science.gov (United States)

    Firschein, Oscar; Summit, Roger K.

    DIALOG, an interactive, computer-based information retrieval language, consists of a series of computer programs designed to make use of direct access memory devices in order to provide the user with a rapid means of identifying records within a specific memory bank. Using the system, a library user can be provided access to sixteen distinct and…

  4. CONSTRICTOR: constraint modification provides insight into design of biochemical networks.

    Directory of Open Access Journals (Sweden)

    Keesha E Erickson

    Full Text Available Advances in computational methods that allow for exploration of the combinatorial mutation space are needed to realize the potential of synthetic biology based strain engineering efforts. Here, we present Constrictor, a computational framework that uses flux balance analysis (FBA to analyze inhibitory effects of genetic mutations on the performance of biochemical networks. Constrictor identifies engineering interventions by classifying the reactions in the metabolic model depending on the extent to which their flux must be decreased to achieve the overproduction target. The optimal inhibition of various reaction pathways is determined by restricting the flux through targeted reactions below the steady state levels of a baseline strain. Constrictor generates unique in silico strains, each representing an "expression state", or a combination of gene expression levels required to achieve the overproduction target. The Constrictor framework is demonstrated by studying overproduction of ethylene in Escherichia coli network models iAF1260 and iJO1366 through the addition of the heterologous ethylene-forming enzyme from Pseudomonas syringae. Targeting individual reactions as well as combinations of reactions reveals in silico mutants that are predicted to have as high as 25% greater theoretical ethylene yields than the baseline strain during simulated exponential growth. Altering the degree of restriction reveals a large distribution of ethylene yields, while analysis of the expression states that return lower yields provides insight into system bottlenecks. Finally, we demonstrate the ability of Constrictor to scan networks and provide targets for a range of possible products. Constrictor is an adaptable technique that can be used to generate and analyze disparate populations of in silico mutants, select gene expression levels and provide non-intuitive strategies for metabolic engineering.

  5. Adaptive Information Access on Multiple Applications Support Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2014-01-01

    is used for safety and security monitoring purposes. In this paper, we evaluate different access strategies to remote dynamic information and compare between achieving information reliability (mismatch probability) and the associated power consumption. Lastly, based on the models, we propose an adaptive......Accessing information remotely to dynamically changing information elements cannot be avoided and has become a required functionality for various network services. Most applications require up-to-date information which is reliable and accurate. The information reliability in terms of using correct...... information is challenged by dynamic nature of information elements. These challenges are more prominent in case of wireless sensor network (WSN) applications, as the information that the sensor node collects are mostly dynamic in nature (say, temperature). Therefore, it is likely that there can be a mismatch...

  6. A Network Access Control Framework for 6LoWPAN Networks

    Science.gov (United States)

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  7. FttC-Based Fronthaul for 5G Dense/Ultra-Dense Access Network: Performance and Costs in Realistic Scenarios

    Directory of Open Access Journals (Sweden)

    Franco Mazzenga

    2017-10-01

    Full Text Available One distinctive feature of the next 5G systems is the presence of a dense/ultra-dense wireless access network with a large number of access points (or nodes at short distances from each other. Dense/ultra-dense access networks allow for providing very high transmission capacity to terminals. However, the deployment of dense/ultra-dense networks is slowed down by the cost of the fiber-based infrastructure required to connect radio nodes to the central processing units and then to the core network. In this paper, we investigate the possibility for existing FttC access networks to provide fronthaul capabilities for dense/ultra-dense 5G wireless networks. The analysis is realistic in that it is carried out considering an actual access network scenario, i.e., the Italian FttC deployment. It is assumed that access nodes are connected to the Cabinets and to the corresponding distributors by a number of copper pairs. Different types of cities grouped in terms of population have been considered. Results focus on fronthaul transport capacity provided by the FttC network and have been expressed in terms of the available fronthaul bit rate per node and of the achievable coverage.

  8. Efficient traffic grooming with dynamic ONU grouping for multiple-OLT-based access network

    Science.gov (United States)

    Zhang, Shizong; Gu, Rentao; Ji, Yuefeng; Wang, Hongxiang

    2015-12-01

    Fast bandwidth growth urges large-scale high-density access scenarios, where the multiple Passive Optical Networking (PON) system clustered deployment can be adopted as an appropriate solution to fulfill the huge bandwidth demands, especially for a future 5G mobile network. However, the lack of interaction between different optical line terminals (OLTs) results in part of the bandwidth resources waste. To increase the bandwidth efficiency, as well as reduce bandwidth pressure at the edge of a network, we propose a centralized flexible PON architecture based on Time- and Wavelength-Division Multiplexing PON (TWDM PON). It can provide flexible affiliation for optical network units (ONUs) and different OLTs to support access network traffic localization. Specifically, a dynamic ONU grouping algorithm (DGA) is provided to obtain the minimal OLT outbound traffic. Simulation results show that DGA obtains an average 25.23% traffic gain increment under different OLT numbers within a small ONU number situation, and the traffic gain will increase dramatically with the increment of the ONU number. As the DGA can be deployed easily as an application running above the centralized control plane, the proposed architecture can be helpful to improve the network efficiency for future traffic-intensive access scenarios.

  9. A hybrid medium access control for convergence of broadband wireless and wireline ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    2000-01-01

    In this paper, we propose a hybrid medium access control protocol for supporting broadband integrated services in the wireless ATM networks. The integrated services include CBR, VBR and ABR traffic varying from low bit-rate to very high bit-rate. The proposed protocol is an excellent compromise...... of contention, reservation and polling access techniques based on the dynamic TDMA system. Extensive simulation results using realistic data traffic sources, show that the proposed medium access scheme may provide QoS guarantees to different ATM traffic including the realistic MPEG video traces with low cell...

  10. Monday 9 January 2006: RESTRICTED ACCESS to the Technical Network

    CERN Multimedia

    CNIC Users Exchange and IT/CS

    2005-01-01

    As of Monday 9 January 2006, Ethernet access from the general CERN network to the Technical Network (TN) will be restricted in order to improve security on the TN. As a result, all Ethernet communication between the General Purpose Network (GPN) and the TN will be filtered. Only communication lines to the general IT services such as DNS, TP, NICE, DFS, AFS, Antivirus, Linux installation servers, License servers, OracleDB, TSM backup servers and dedicated AB and TS servers on the GPN will remain open. Please make sure that all your devices are registered properly in the network database (LANDB): http://network.cern.ch/. You are encouraged to make proper use of the 'Tag' and 'Description' fields in order to identify your system later on. If your system depends on special services on the GPN or is split between the GPN and the TN, e.g. consists of devices (PCs, PLCs, VME crates, webcams, etc.) connected to both the TN and the GPN, please contact the Technical-Network.Administrator@cern.ch . They will include...

  11. Use of a geographic information system to assess accessibility to health facilities providing emergency obstetric and newborn care in Bangladesh.

    Science.gov (United States)

    Chowdhury, Mahbub E; Biswas, Taposh K; Rahman, Monjur; Pasha, Kamal; Hossain, Mollah A

    2017-08-01

    To use a geographic information system (GIS) to determine accessibility to health facilities for emergency obstetric and newborn care (EmONC) and compare coverage with that stipulated by UN guidelines (5 EmONC facilities per 500 000 individuals, ≥1 comprehensive). A cross-sectional study was undertaken of all public facilities providing EmONC in 24 districts of Bangladesh from March to October 2012. Accessibility to each facility was assessed by applying GIS to estimate the proportion of catchment population (comprehensive 500 000; basic 100 000) able to reach the nearest facility within 2 hours and 1 hour of travel time, respectively, by existing road networks. The minimum number of public facilities providing comprehensive and basic EmONC services (1 and 5 per 500 000 individuals, respectively) was reached in 16 and 3 districts, respectively. However, after applying GIS, in no district did 100% of the catchment population have access to these services. A minimum of 75% and 50% of the population had accessibility to comprehensive services in 11 and 5 districts, respectively. For basic services, accessibility was much lower. Assessing only the number of EmONC facilities does not ensure universal coverage; accessibility should be assessed when planning health systems. © 2017 International Federation of Gynecology and Obstetrics.

  12. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks.

    Science.gov (United States)

    Lin, Yun; Wang, Chao; Wang, Jiaxing; Dou, Zheng

    2016-10-12

    Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel.

  13. Joint Hybrid Backhaul and Access Links Design in Cloud-Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb

    2015-09-06

    The cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio systems. In this paper, we consider the downlink of a CRAN formed of one central processor (the cloud) and several base station (BS), where each BS is connected to the cloud via either a wireless or capacity-limited wireline backhaul link. The paper addresses the joint design of the hybrid backhaul links (i.e., designing the wireline and wireless backhaul connections from the cloud to the BSs) and the access links (i.e., determining the sparse beamforming solution from the BSs to the users). The paper formulates the hybrid backhaul and access link design problem by minimizing the total network power consumption. The paper solves the problem using a two-stage heuristic algorithm. At one stage, the sparse beamforming solution is found using a weighted mixed 11/12 norm minimization approach; the correlation matrix of the quantization noise of the wireline backhaul links is computed using the classical rate-distortion theory. At the second stage, the transmit powers of the wireless backhaul links are found by solving a power minimization problem subject to quality-of-service constraints, based on the principle of conservation of rate by utilizing the rates found in the first stage. Simulation results suggest that the performance of the proposed algorithm approaches the global optimum solution, especially at high signal-to-interference-plus-noise ratio (SINR).

  14. FttC-Based Fronthaul for 5G Dense/Ultra-Dense Access Network: Performance and Costs in Realistic Scenarios

    OpenAIRE

    Franco Mazzenga; Romeo Giuliano; Francesco Vatalaro

    2017-01-01

    One distinctive feature of the next 5G systems is the presence of a dense/ultra-dense wireless access network with a large number of access points (or nodes) at short distances from each other. Dense/ultra-dense access networks allow for providing very high transmission capacity to terminals. However, the deployment of dense/ultra-dense networks is slowed down by the cost of the fiber-based infrastructure required to connect radio nodes to the central processing units and then to the core net...

  15. Networked Print Production: Does JDF Provide a Perfect Workflow?

    Directory of Open Access Journals (Sweden)

    Bernd Zipper

    2004-12-01

    Full Text Available The "networked printing works" is a well-worn slogan used by many providers in the graphics industry and for the past number of years printing-works manufacturers have been working on the goal of achieving the "networked printing works". A turning point from the concept to real implementation can now be expected at drupa 2004: JDF (Job Definition Format and thus "networked production" will form the center of interest here. The first approaches towards a complete, networked workflow between prepress, print and postpress in production are already available - the products and solutions will now be presented publicly at drupa 2004. So, drupa 2004 will undoubtedly be the "JDF-drupa" - the drupa where machines learn to communicate with each other digitally - the drupa, where the dream of general system and job communication in the printing industry can be first realized. CIP3, which has since been renamed CIP4, is an international consortium of leading manufacturers from the printing and media industry who have taken on the task of integrating processes for prepress, print and postpress. The association, to which nearly all manufacturers in the graphics industry belong, has succeeded with CIP3 in developing a first international standard for the transmission of control data in the print workflow.Further development of the CIP4 standard now includes a more extensive "system language" called JDF, which will guarantee workflow communication beyond manufacturer boundaries. However, not only data for actual print production will be communicated with JDF (Job Definition Format: planning and calculation data for MIS (Management Information systems and calculation systems will also be prepared. The German printing specialist Hans-Georg Wenke defines JDF as follows: "JDF takes over data from MIS for machines, aggregates and their control desks, data exchange within office applications, and finally ensures that data can be incorporated in the technical workflow

  16. Providing Social Enterprises with Better Access to Public Procurement : The Development of Supportive Legal Frameworks

    NARCIS (Netherlands)

    Argyrou, A.

    2017-01-01

    This article discusses the issue of social enterprises gaining access to public procurement processes and contracts at the EU and national level. It primarily examines the opportunities for social enterprises to access public procurement contracts provided for in the Public Procurement Directive

  17. A Fine-Grained Data Access Control System in Wireless Sensor Network

    National Research Council Canada - National Science Library

    Boniface K. Alese; Sylvester O. Olatunji; Oluwatoyin C. Agbonifo; Aderonke F. Thompson

    2015-01-01

    .... Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks...

  18. Supporting Dynamic Spectrum Access in Heterogeneous LTE+ Networks

    Energy Technology Data Exchange (ETDEWEB)

    Luiz A. DaSilva; Ryan E. Irwin; Mike Benonis

    2012-08-01

    As early as 2014, mobile network operators’ spectral capac- ity is expected to be overwhelmed by the demand brought on by new devices and applications. With Long Term Evo- lution Advanced (LTE+) networks likely as the future one world 4G standard, network operators may need to deploy a Dynamic Spectrum Access (DSA) overlay in Heterogeneous Networks (HetNets) to extend coverage, increase spectrum efficiency, and increase the capacity of these networks. In this paper, we propose three new management frameworks for DSA in an LTE+ HetNet: Spectrum Accountability Client, Cell Spectrum Management, and Domain Spectrum Man- agement. For these spectrum management frameworks, we define protocol interfaces and operational signaling scenar- ios to support cooperative sensing, spectrum lease manage- ment, and alarm scenarios for rule adjustment. We also quan- tify, through integer programs, the benefits of using DSA in an LTE+ HetNet, that can opportunistically reuse vacant TV and GSM spectrum. Using integer programs, we consider a topology using Geographic Information System data from the Blacksburg, VA metro area to assess the realistic benefits of DSA in an LTE+ HetNet.

  19. Performance of SON for RSRP-based LTE/WLAN access network selection

    NARCIS (Netherlands)

    Kovács, I.Z.; Laselva, D.; Michaelsen, P.H.; Wang, Y.; Djapic, R.; Spaey, K.

    2014-01-01

    Carrier-grade Wireless Local Area Network (WLAN) is becoming an important complementary system to cellular networks for Mobile Network Operators (MNOs). Network controlled access network selection between cellular and WLAN is an essential functionality to optimize network performance and user

  20. Extending AAA operational model for profile-based access control in ethernet-based Neutral Access Networks

    NARCIS (Netherlands)

    Matias, J.; Jacob, E.; Demchenko, Y.; de Laat, C.; Gommans, L.; Macías López, E.M.; Bogliolo, A.; Perry, M.; Ran, M

    2010-01-01

    Neutral Access Networks (NAN) have appeared as a new model to overcome some restrictions and lack of flexibility that are present currently in broadband access networks. NAN brings new business opportunities by opening this market to new stakeholders. Although the NAN model is accepted, there are

  1. Enabling multimode wireless access networks using remote radio heads

    DEFF Research Database (Denmark)

    Kardaras, Georgios; Soler, José; Dittmann, Lars

    2012-01-01

    The deployment of 4G networks is spreading rapidly providing mobile broadband services to the public. 4G technologies are designed to overlay existing 3G networks enabling reusability of several network components. In this way, the coexistence of 3G/4G standards is facilitated. This paper describes...... and management plane. Switching between wireless standards becomes easily feasible through firmware upgrading. Finally, real-time configuration of radio functionalities, such as transmit power, receiver gain, carrier frequency, channel bandwidth and others result in a modular software defined radio platform....... © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering....

  2. QoS Provisioning Techniques for Future Fiber-Wireless (FiWi Access Networks

    Directory of Open Access Journals (Sweden)

    Martin Maier

    2010-04-01

    Full Text Available A plethora of enabling optical and wireless access-metro network technologies have been emerging that can be used to build future-proof bimodal fiber-wireless (FiWi networks. Hybrid FiWi networks aim at providing wired and wireless quad-play services over the same infrastructure simultaneously and hold great promise to mitigate the digital divide and change the way we live and work by replacing commuting with teleworking. After overviewing enabling optical and wireless network technologies and their QoS provisioning techniques, we elaborate on enabling radio-over-fiber (RoF and radio-and-fiber (R&F technologies. We describe and investigate new QoS provisioning techniques for future FiWi networks, ranging from traffic class mapping, scheduling, and resource management to advanced aggregation techniques, congestion control, and layer-2 path selection algorithms.

  3. Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks.

    Science.gov (United States)

    Anwar, Asim; Seet, Boon-Chong; Ding, Zhiguo

    2018-02-08

    Ubiquitous wireless sensor networks (UWSNs) have become a critical technology for enabling smart cities and other ubiquitous monitoring applications. Their deployment, however, can be seriously hampered by the spectrum available to the sheer number of sensors for communication. To support the communication needs of UWSNs without requiring more spectrum resources, the power-domain non-orthogonal multiple access (NOMA) technique originally proposed for 5th Generation (5G) cellular networks is investigated for UWSNs for the first time in this paper. However, unlike 5G networks that operate in the licensed spectrum, UWSNs mostly operate in unlicensed spectrum where sensors also experience cross-technology interferences from other devices sharing the same spectrum. In this paper, we model the interferences from various sources at the sensors using stochastic geometry framework. To evaluate the performance, we derive a theorem and present new closed form expression for the outage probability of the sensors in a downlink scenario under interference limited environment. In addition, diversity analysis for the ordered NOMA users is performed. Based on the derived outage probability, we evaluate the average link throughput and energy consumption efficiency of NOMA against conventional orthogonal multiple access (OMA) technique in UWSNs. Further, the required computational complexity for the NOMA users is presented.

  4. Performance Evaluation of 5G Millimeter-Wave Cellular Access Networks Using a Capacity-Based Network Deployment Tool

    Directory of Open Access Journals (Sweden)

    Michel Matalatala

    2017-01-01

    Full Text Available The next fifth generation (5G of wireless communication networks comes with a set of new features to satisfy the demand of data-intensive applications: millimeter-wave frequencies, massive antenna arrays, beamforming, dense cells, and so forth. In this paper, we investigate the use of beamforming techniques through various architectures and evaluate the performance of 5G wireless access networks, using a capacity-based network deployment tool. This tool is proposed and applied to a realistic area in Ghent, Belgium, to simulate realistic 5G networks that respond to the instantaneous bit rate required by the active users. The results show that, with beamforming, 5G networks require almost 15% more base stations and 4 times less power to provide more capacity to the users and the same coverage performances, in comparison with the 4G reference network. Moreover, they are 3 times more energy efficient than the 4G network and the hybrid beamforming architecture appears to be a suitable architecture for beamforming to be considered when designing a 5G cellular network.

  5. The climate4impact platform: Providing, tailoring and facilitating climate model data access

    Science.gov (United States)

    Pagé, Christian; Pagani, Andrea; Plieger, Maarten; Som de Cerff, Wim; Mihajlovski, Andrej; de Vreede, Ernst; Spinuso, Alessandro; Hutjes, Ronald; de Jong, Fokke; Bärring, Lars; Vega, Manuel; Cofiño, Antonio; d'Anca, Alessandro; Fiore, Sandro; Kolax, Michael

    2017-04-01

    One of the main objectives of climate4impact is to provide standardized web services and tools that are reusable in other portals. These services include web processing services, web coverage services and web mapping services (WPS, WCS and WMS). Tailored portals can be targeted to specific communities and/or countries/regions while making use of those services. Easier access to climate data is very important for the climate change impact communities. To fulfill this objective, the climate4impact (http://climate4impact.eu/) web portal and services has been developed, targeting climate change impact modellers, impact and adaptation consultants, as well as other experts using climate change data. It provides to users harmonized access to climate model data through tailored services. It features static and dynamic documentation, Use Cases and best practice examples, an advanced search interface, an integrated authentication and authorization system with the Earth System Grid Federation (ESGF), a visualization interface with ADAGUC web mapping tools. In the latest version, statistical downscaling services, provided by the Santander Meteorology Group Downscaling Portal, were integrated. An innovative interface to integrate statistical downscaling services will be released in the upcoming version. The latter will be a big step in bridging the gap between climate scientists and the climate change impact communities. The climate4impact portal builds on the infrastructure of an international distributed database that has been set to disseminate the results from the global climate model results of the Coupled Model Intercomparison project Phase 5 (CMIP5). This database, the ESGF, is an international collaboration that develops, deploys and maintains software infrastructure for the management, dissemination, and analysis of climate model data. The European FP7 project IS-ENES, Infrastructure for the European Network for Earth System modelling, supports the European

  6. Network Physics anounces first product to provide business-level management of the most complex and dynamic networks

    CERN Multimedia

    2003-01-01

    Network Physics, provider of business-level, traffic flow-based network management solutions, today announced the introduction of the Network Physics NP/BizFlow-1000. With the NP/BizFlow-1000, Fortune 1000 companies with complex and dynamic networks can analyze the flows that link business groups, critical applications, and network software and hardware (1 page).

  7. A Spontaneous Ad Hoc Network to Share WWW Access

    Directory of Open Access Journals (Sweden)

    Raquel Lacuesta

    2010-01-01

    Full Text Available In this paper, we propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction, to grant a quick, easy, and secure access to the users to surf the Web. The paper shows the description of our proposal, the procedure of the nodes involved in the system, the security algorithms implemented, and the designed messages. We have taken into account the security and its performance. Although some people have defined and described the main features of spontaneous ad-hoc networks, nobody has published any design and simulation until today. Spontaneous networking will enable a more natural form of wireless computing when people physically meet in the real world. We also validate the success of our proposal through several simulations and comparisons with a regular architecture, taking into account the optimization of the resources of the devices. Finally, we compare our proposal with other caching techniques published in the related literature. The proposal has been developed with the main objective of improving the communication and integration between different study centers of low-resource communities. That is, it lets communicate spontaneous networks, which are working collaboratively and which have been created on different physical places.

  8. Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    Science.gov (United States)

    Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  9. Partial Interference and Its Performance Impact on Wireless Multiple Access Networks

    Directory of Open Access Journals (Sweden)

    Lau WingCheong

    2010-01-01

    Full Text Available To determine the capacity of wireless multiple access networks, the interference among the wireless links must be accurately modeled. In this paper, we formalize the notion of the partial interference phenomenon observed in many recent wireless measurement studies and establish analytical models with tractable solutions for various types of wireless multiple access networks. In particular, we characterize the stability region of IEEE 802.11 networks under partial interference with two potentially unsaturated links numerically. We also provide a closed-form solution for the stability region of slotted ALOHA networks under partial interference with two potentially unsaturated links and obtain a partial characterization of the boundary of the stability region for the general M-link case. Finally, we derive a closed-form approximated solution for the stability region for general M-link slotted ALOHA system under partial interference effects. Based on our results, we demonstrate that it is important to model the partial interference effects while analyzing wireless multiple access networks. This is because such considerations can result in not only significant quantitative differences in the predicted system capacity but also fundamental qualitative changes in the shape of the stability region of the systems.

  10. Utilization of nondentist providers and attitudes toward new provider models: findings from the National Dental Practice-Based Research Network.

    Science.gov (United States)

    Blue, Christine M; Funkhouser, D Ellen; Riggs, Sheila; Rindal, D Brad; Worley, Donald; Pihlstrom, Daniel J; Benjamin, Paul; Gilbert, Gregg H

    2013-01-01

    The purpose of this study was to quantify, within the National Dental Practice-Based Research Network, current utilization of dental hygienists and assistants with expanded functions and quantify network dentists' attitudes toward a new nondentist provider model - the dental therapist. National Dental Practice-Based Research Network practitioner-investigators participated in a single, cross-sectional administration of a questionnaire. Current nondentist providers are not being utilized by network practitioner-investigators to the fullest extent allowed by law. Minnesota practitioners, practitioners in large group practices, and those with prior experience with expanded-function nondentist providers delegate at a higher rate and had more-positive perceptions of the new dental therapist model. Expanding scopes of practice for dental hygienists and assistants has not translated to the maximal delegation allowed by law among network practices. This finding may provide insight into dentists' acceptance of newer nondentist provider models. © 2013 American Association of Public Health Dentistry.

  11. Evaluation of the role of access providers. Discussion of Dutch Pirate Bay case law and introducing principles on directness, effectiveness, costs, relevance, and time

    NARCIS (Netherlands)

    Lodder, A.R.; van der Meulen, N.S.

    2013-01-01

    Internet service providers (ISPs) play a pivotal role in contemporary society because they provide access to the Internet. The primary task of ISPs – to blindly transfer information across the network – has recently come under pressure, as has their status as neutral third parties. Both the public

  12. Association of mandated language access programming and quality of care provided by mental health agencies.

    Science.gov (United States)

    McClellan, Sean R; Snowden, Lonnie

    2015-01-01

    This study examined the association between language access programming and quality of psychiatric care received by persons with limited English proficiency (LEP). In 1999, the California Department of Mental Health required county Medicaid agencies to implement a "threshold language access policy" to meet the state's Title VI obligations. This policy required Medi-Cal agencies to provide language access programming, including access to interpreters and translated written material, to speakers of languages other than English if the language was spoken by at least 3,000, or 5%, of the county's Medicaid population. Using a longitudinal study design with a nonequivalent control group, this study examined the quality of care provided to Spanish speakers with LEP and a severe mental illness before and after implementation of mandatory language access programming. Quality was measured by receipt of at least two follow-up medication visits within 90 days or three visits within 180 days of an initial medication visit over a period of 38 quarter-years. On average, only 40% of Spanish-speaking clients received at least three medication follow-up visits within 180 days. In multivariate analyses, language access programming was not associated with receipt of at least two medication follow-up visits within 90 days or at least three visits within 180 days. This study found no evidence that language access programming led to increased rates of follow-up medication visits for clients with LEP.

  13. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks.

    Science.gov (United States)

    Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Zhang, Xuekun

    2015-12-03

    Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT), Machine-to-Machine (M2M) communications, Vehicular-to-Vehicular (V2V) communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  14. Design, Implementation and Optimization of Innovative Internet Access Networks, based on Fog Computing and Software Defined Networking

    OpenAIRE

    Iotti, Nicola

    2017-01-01

    1. DESIGN In this dissertation we introduce a new approach to Internet access networks in public spaces, such as Wi-Fi network commonly known as Hotspot, based on Fog Computing (or Edge Computing), Software Defined Networking (SDN) and the deployment of Virtual Machines (VM) and Linux containers, on the edge of the network. In this vision we deploy specialized network elements, called Fog Nodes, on the edge of the network, able to virtualize the physical infrastructure and expose APIs to e...

  15. Enhancing Sensing and Channel Access in Cognitive Radio Networks

    KAUST Repository

    Hamza, Doha R.

    2014-06-18

    Cognitive radio technology is a promising technology to solve the wireless spectrum scarcity problem by intelligently allowing secondary, or unlicensed, users access to the primary, licensed, users\\' frequency bands. Cognitive technology involves two main tasks: 1) sensing the wireless medium to assess the presence of the primary users and 2) designing secondary spectrum access techniques that maximize the secondary users\\' benefits while maintaining the primary users\\' privileged status. On the spectrum sensing side, we make two contributions. First, we maximize a utility function representing the secondary throughput while constraining the collision probability with the primary below a certain value. We optimize therein the channel sensing time, the sensing decision threshold, the channel probing time, together with the channel sensing order for wideband primary channels. Second, we design a cooperative spectrum sensing technique termed sensing with equal gain combining whereby cognitive radios simultaneously transmit their sensing results to the fusion center over multipath fading reporting channels. The proposed scheme is shown to outperform orthogonal reporting systems in terms of achievable secondary throughput and to be robust against phase and synchronization errors. On the spectrum access side, we make four contributions. First, we design a secondary scheduling scheme with the goal of minimizing the secondary queueing delay under constraints on the average secondary transmit power and the maximum tolerable primary outage probability. Second, we design another secondary scheduling scheme based on the spectrum sensing results and the primary automatic repeat request feedback. The optimal medium access probabilities are obtained via maximizing the secondary throughput subject to constraints that guarantee quality of service parameters for the primary. Third, we propose a three-message superposition coding scheme to maximize the secondary throughput without

  16. Design of a of a survivable multi-wavelength photonic access network

    NARCIS (Netherlands)

    Roy, R.; van Etten, Wim

    2007-01-01

    This paper investigates the design of protection schemes in an extended access network. The network is modeled as a stack of quasi independent logical passive optical networks(PONs), each operating the IEEE Ethernet passive optical networks (EPON) protocol. The dynamics of the network operation when

  17. SON for LTE-WLAN access network selection : design and performance

    NARCIS (Netherlands)

    Willemen, P.; Laselva, D.; Wang, Y.; Kovács, I.; Djapic, R.; Moerman, I.

    2016-01-01

    Mobile network operators (MNOs) are deploying carrier-grade Wireless Local Area Network (WLAN) as an important complementary system to cellular networks. Access network selection (ANS) between cellular and WLAN is an essential component to improve network performance and user quality-of-service

  18. Academic Social Networks and Open Access: French Researchers at the Crossroads

    Directory of Open Access Journals (Sweden)

    Christine Okret-Manville

    2016-01-01

    Full Text Available Researchers benefit from an increasing array of tools to enhance direct communication and the dissemination of their research findings. These include Open Access repositories, Open Access journals, or hybrid publishing. For some years, researchers have been using new ways to communicate and share their work by using academic social networks.In an attempt to foster the development of Open Access in France, the French consortium COUPERIN (Unified Consortium of Higher Education and Research Organizations for Access to Numerical Publications proposed that academic social networks could be used to convince researchers of becoming more involved in Open Access. To test this hypothesis, a nationwide survey was launched in 2014 to explore whether and how these academic social networks are used to share content, but also how they compare to other Open Access classic tools. Within a month (20 May to 20 June, 1,898 researchers answered this 28-question survey. It was fully completed by 1,698 of them. This provides COUPERIN with considerable data for analysis. The respondents roughly reflect the composition of the French academic community in terms of gender and research fields, with a slight overrepresentation of young researchers/ PhD candidates.This survey does not, however, cover the in-depth opinions of researchers on Open Access and academic social networks. It therefore only presents general tendencies. Nonetheless, the survey gives many indications as to how researchers apply Open Access. In addition, it shows how they feel about the usefulness of these networks compared to repositories when efficiently disseminating their work. This survey also takes the differences between disciplines into account and characterizes behaviour and opinions according to the different disciplinary communities and their research practices.Finally, this survey allows us to define the main characteristics of a tool which could meet French researchers’ needs for

  19. PANATIKI: a network access control implementation based on PANA for IoT devices.

    Science.gov (United States)

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  20. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    Directory of Open Access Journals (Sweden)

    Antonio F. Gomez Skarmeta

    2013-11-01

    Full Text Available Internet of Things (IoT networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA has been standardized by the Internet engineering task force (IETF to carry the Extensible Authentication Protocol (EAP, which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1 to demonstrate the feasibility of EAP/PANA in IoT devices; (2 to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS, called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  1. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  2. Multirate IP traffic transmission in flexible access networks based on optical FFH-CDMA

    DEFF Research Database (Denmark)

    Raddo, Thiago R.; Sanches, Anderson L.; Tafur Monroy, Idelfonso

    2016-01-01

    In this paper, we propose a new IP transmission architecture over optical fast frequency hopping code-division multiple-access (OFFH-CDMA) network capable of supporting multirate transmissions for applications in flexible optical access networks. The proposed network architecture is independent...

  3. 47 CFR 51.311 - Nondiscriminatory access to unbundled network elements.

    Science.gov (United States)

    2010-10-01

    ... elements. 51.311 Section 51.311 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON... § 51.311 Nondiscriminatory access to unbundled network elements. (a) The quality of an unbundled network element, as well as the quality of the access to the unbundled network element, that an incumbent...

  4. Spatial Access to Primary Care Providers in Appalachia: Evaluating Current Methodology.

    Science.gov (United States)

    Donohoe, Joseph; Marshall, Vince; Tan, Xi; Camacho, Fabian T; Anderson, Roger T; Balkrishnan, Rajesh

    2016-07-01

    The goal of this research was to examine spatial access to primary care physicians in Appalachia using both traditional access measures and the 2-step floating catchment area (2SFCA) method. Spatial access to care was compared between urban and rural regions of Appalachia. The study region included Appalachia counties of Pennsylvania, Ohio, Kentucky, and North Carolina. Primary care physicians during 2008 and total census block group populations were geocoded into GIS software. Ratios of county physicians to population, driving time to nearest primary care physician, and various 2SFCA approaches were compared. Urban areas of the study region had shorter travel times to their closest primary care physician. Provider to population ratios produced results that varied widely from one county to another because of strict geographic boundaries. The 2SFCA method produced varied results depending on the distance decay weight and variable catchment size techniques chose. 2SFCA scores showed greater access to care in urban areas of Pennsylvania, Ohio, and North Carolina. The different parameters of the 2SFCA method-distance decay weights and variable catchment sizes-have a large impact on the resulting spatial access to primary care scores. The findings of this study suggest that using a relative 2SFCA approach, the spatial access ratio method, when detailed patient travel data are unavailable. The 2SFCA method shows promise for measuring access to care in Appalachia, but more research on patient travel preferences is needed to inform implementation. © The Author(s) 2016.

  5. Optical network unit placement in Fiber-Wireless (FiWi) access network by Moth-Flame optimization algorithm

    Science.gov (United States)

    Singh, Puja; Prakash, Shashi

    2017-07-01

    Hybrid wireless-optical broadband access network (WOBAN) or Fiber-Wireless (FiWi) is the integration of wireless access network and optical network. This hybrid multi-domain network adopts the advantages of wireless and optical domains and serves the demand of technology savvy users. FiWi exhibits the properties of cost effectiveness, robustness, flexibility, high capacity, reliability and is self organized. Optical Network Unit (ONU) placement problem in FiWi contributes in simplifying the network design and enhances the performance in terms of cost efficiency and increased throughput. Several individual-based algorithms, such as Simulated Annealing (SA), Tabu Search, etc. have been suggested for ONU placement, but these algorithms suffer from premature convergence (trapping in a local optima). The present research work undertakes the deployment of FiWi and proposes a novel nature-inspired heuristic paradigm called Moth-Flame optimization (MFO) algorithm for multiple optical network units' placement. MFO is a population based algorithm. Population-based algorithms are better in handling local optima avoidance. The simulation results are compared with the existing Greedy and Simulated Annealing algorithms to optimize the position of ONUs. To the best of our knowledge, MFO algorithm has been used for the first time in this domain, moreover it has been able to provide very promising and competitive results. The performance of MFO algorithm has been analyzed by varying the 'b' parameter. MFO algorithm results in faster convergence than the existing strategies of Greedy and SA and returns a lower value of overall cost function. The results exhibit the dependence of the objective function on the distribution of wireless users also.

  6. Assessment of micro-regional internal accessibility based on road network

    Science.gov (United States)

    Nie, Ting; Li, Manchun; Jiang, Zhixin; Huang, Kang

    2007-06-01

    Accessibility is an important indicator of regional land-use, social justice and quality of life. It means the convenience from one place to another in a specified kind of transportation system. Wide-region based, most of the present domestic accessibility research took the high-grade highway such as highway and railway as entirely open road, without considering the service that high-grade highway provides based on intersection and railway station. This study extended to put forward arithmetic to deal with this problem in a micro-regional study area. Taking New District, Wuxi City, Jiangsu Province as a study case, this study researched the assessment of micro-regional internal accessibility based on road network including closed road. This study provides a tool to regional economical and social decision, and introduces a new view for studying relationship between people and land-use in micro-district.

  7. New advanced technologies to provide decentralised and secure access to medical records: case studies in oncology.

    Science.gov (United States)

    Quantin, Catherine; Coatrieux, Gouenou; Allaert, François André; Fassa, Maniane; Bourquard, Karima; Boire, Jean-Yves; de Vlieger, Paul; Maigne, Lydia; Breton, Vincent

    2009-08-07

    The main problem for health professionals and patients in accessing information is that this information is very often distributed over many medical records and locations. This problem is particularly acute in cancerology because patients may be treated for many years and undergo a variety of examinations. Recent advances in technology make it feasible to gain access to medical records anywhere and anytime, allowing the physician or the patient to gather information from an "ephemeral electronic patient record". However, this easy access to data is accompanied by the requirement for improved security (confidentiality, traceability, integrity, ...) and this issue needs to be addressed. In this paper we propose and discuss a decentralised approach based on recent advances in information sharing and protection: Grid technologies and watermarking methodologies. The potential impact of these technologies for oncology is illustrated by the examples of two experimental cases: a cancer surveillance network and a radiotherapy treatment plan. It is expected that the proposed approach will constitute the basis of a future secure "google-like" access to medical records.

  8. A Service-Oriented Approach for Dynamic Chaining of Virtual Network Functions over Multi-Provider Software-Defined Networks

    Directory of Open Access Journals (Sweden)

    Barbara Martini

    2016-06-01

    Full Text Available Emerging technologies such as Software-Defined Networks (SDN and Network Function Virtualization (NFV promise to address cost reduction and flexibility in network operation while enabling innovative network service delivery models. However, operational network service delivery solutions still need to be developed that actually exploit these technologies, especially at the multi-provider level. Indeed, the implementation of network functions as software running over a virtualized infrastructure and provisioned on a service basis let one envisage an ecosystem of network services that are dynamically and flexibly assembled by orchestrating Virtual Network Functions even across different provider domains, thereby coping with changeable user and service requirements and context conditions. In this paper we propose an approach that adopts Service-Oriented Architecture (SOA technology-agnostic architectural guidelines in the design of a solution for orchestrating and dynamically chaining Virtual Network Functions. We discuss how SOA, NFV, and SDN may complement each other in realizing dynamic network function chaining through service composition specification, service selection, service delivery, and placement tasks. Then, we describe the architecture of a SOA-inspired NFV orchestrator, which leverages SDN-based network control capabilities to address an effective delivery of elastic chains of Virtual Network Functions. Preliminary results of prototype implementation and testing activities are also presented. The benefits for Network Service Providers are also described that derive from the adaptive network service provisioning in a multi-provider environment through the orchestration of computing and networking services to provide end users with an enhanced service experience.

  9. Experimental validation of a distributed algorithm for dynamic spectrum access in local area networks

    DEFF Research Database (Denmark)

    Tonelli, Oscar; Berardinelli, Gilberto; Tavares, Fernando Menezes Leitão

    2013-01-01

    activities with the Autonomous Component Carrier Selection (ACCS) algorithm, a distributed solution for interference management among small neighboring cells. A preliminary evaluation of the algorithm performance is provided considering its live execution on a software defined radio network testbed......Next generation wireless networks aim at a significant improvement of the spectral efficiency in order to meet the dramatic increase in data service demand. In local area scenarios user-deployed base stations are expected to take place, thus making the centralized planning of frequency resources...... among the cells, a non-viable solution. Cognitive Radio (CR) and Dynamic Spectrum Access (DSA) are the research paradigms which are expected to provide the network nodes the capabilities for an autonomous and efficient selection of the spectrum resources. In this paper we present the first experimental...

  10. Resource allocation in heterogeneous cloud radio access networks: advances and challenges

    KAUST Repository

    Dahrouj, Hayssam

    2015-06-01

    Base station densification is increasingly used by network operators to provide better throughput and coverage performance to mobile subscribers in dense data traffic areas. Such densification is progressively diffusing the move from traditional macrocell base stations toward heterogeneous networks with diverse cell sizes (e.g., microcell, picocell, femotcell) and diverse radio access technologies (e.g., GSM, CDMA), and LTE). The coexistence of the different network entities brings an additional set of challenges, particularly in terms of the provisioning of high-speed communications and the management of wireless interference. Resource sharing between different entities, largely incompatible in conventional systems due to the lack of interconnections, becomes a necessity. By connecting all the base stations from different tiers to a central processor (referred to as the cloud) through wire/wireline backhaul links, the heterogeneous cloud radio access network, H-CRAN, provides an open, simple, controllable, and flexible paradigm for resource allocation. This article discusses challenges and recent developments in H-CRAN design. It proposes promising resource allocation schemes in H-CRAN: coordinated scheduling, hybrid backhauling, and multicloud association. Simulations results show how the proposed strategies provide appreciable performance improvement compared to methods from recent literature. © 2015 IEEE.

  11. Women's access and provider practices for the case management of malaria during pregnancy: a systematic review and meta-analysis.

    Directory of Open Access Journals (Sweden)

    Jenny Hill

    2014-08-01

    Full Text Available BACKGROUND: WHO recommends prompt diagnosis and quinine plus clindamycin for treatment of uncomplicated malaria in the first trimester and artemisinin-based combination therapies in subsequent trimesters. We undertook a systematic review of women's access to and healthcare provider adherence to WHO case management policy for malaria in pregnant women. METHODS AND FINDINGS: We searched the Malaria in Pregnancy Library, the Global Health Database, and the International Network for the Rational Use of Drugs Bibliography from 1 January 2006 to 3 April 2014, without language restriction. Data were appraised for quality and content. Frequencies of women's and healthcare providers' practices were explored using narrative synthesis and random effect meta-analysis. Barriers to women's access and providers' adherence to policy were explored by content analysis using NVivo. Determinants of women's access and providers' case management practices were extracted and compared across studies. We did not perform a meta-ethnography. Thirty-seven studies were included, conducted in Africa (30, Asia (4, Yemen (1, and Brazil (2. One- to three-quarters of women reported malaria episodes during pregnancy, of whom treatment was sought by >85%. Barriers to access among women included poor knowledge of drug safety, prohibitive costs, and self-treatment practices, used by 5%-40% of women. Determinants of women's treatment-seeking behaviour were education and previous experience of miscarriage and antenatal care. Healthcare provider reliance on clinical diagnosis and poor adherence to treatment policy, especially in first versus other trimesters (28%, 95% CI 14%-47%, versus 72%, 95% CI 39%-91%, p = 0.02, was consistently reported. Prescribing practices were driven by concerns over side effects and drug safety, patient preference, drug availability, and cost. Determinants of provider practices were access to training and facility type (public versus private. Findings were

  12. Providing Access and Visualization to Global Cloud Properties from GEO Satellites

    Science.gov (United States)

    Chee, T.; Nguyen, L.; Minnis, P.; Spangenberg, D.; Palikonda, R.; Ayers, J. K.

    2015-12-01

    Providing public access to cloud macro and microphysical properties is a key concern for the NASA Langley Research Center Cloud and Radiation Group. This work describes a tool and method that allows end users to easily browse and access cloud information that is otherwise difficult to acquire and manipulate. The core of the tool is an application-programming interface that is made available to the public. One goal of the tool is to provide a demonstration to end users so that they can use the dynamically generated imagery as an input into their own work flows for both image generation and cloud product requisition. This project builds upon NASA Langley Cloud and Radiation Group's experience with making real-time and historical satellite cloud product imagery accessible and easily searchable. As we see the increasing use of virtual supply chains that provide additional value at each link there is value in making satellite derived cloud product information available through a simple access method as well as allowing users to browse and view that imagery as they need rather than in a manner most convenient for the data provider. Using the Open Geospatial Consortium's Web Processing Service as our access method, we describe a system that uses a hybrid local and cloud based parallel processing system that can return both satellite imagery and cloud product imagery as well as the binary data used to generate them in multiple formats. The images and cloud products are sourced from multiple satellites and also "merged" datasets created by temporally and spatially matching satellite sensors. Finally, the tool and API allow users to access information that spans the time ranges that our group has information available. In the case of satellite imagery, the temporal range can span the entire lifetime of the sensor.

  13. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Science.gov (United States)

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  14. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Directory of Open Access Journals (Sweden)

    Seungsoo Baek

    2014-01-01

    Full Text Available There has been an explosive increase in the population of the OSN (online social network in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  15. Convergent optical wired and wireless long-reach access network using high spectral-efficient modulation.

    Science.gov (United States)

    Chow, C W; Lin, Y H

    2012-04-09

    To provide broadband services in a single and low cost perform, the convergent optical wired and wireless access network is promising. Here, we propose and demonstrate a convergent optical wired and wireless long-reach access networks based on orthogonal wavelength division multiplexing (WDM). Both the baseband signal and the radio-over-fiber (ROF) signal are multiplexed and de-multiplexed in optical domain, hence it is simple and the operation speed is not limited by the electronic bottleneck caused by the digital signal processing (DSP). Error-free de-multiplexing and down-conversion can be achieved for all the signals after 60 km (long-reach) fiber transmission. The scalability of the system for higher bit-rate (60 GHz) is also simulated and discussed.

  16. Hand Society and Matching Program Web Sites Provide Poor Access to Information Regarding Hand Surgery Fellowship.

    Science.gov (United States)

    Hinds, Richard M; Klifto, Christopher S; Naik, Amish A; Sapienza, Anthony; Capo, John T

    2016-08-01

    The Internet is a common resource for applicants of hand surgery fellowships, however, the quality and accessibility of fellowship online information is unknown. The objectives of this study were to evaluate the accessibility of hand surgery fellowship Web sites and to assess the quality of information provided via program Web sites. Hand fellowship Web site accessibility was evaluated by reviewing the American Society for Surgery of the Hand (ASSH) on November 16, 2014 and the National Resident Matching Program (NRMP) fellowship directories on February 12, 2015, and performing an independent Google search on November 25, 2014. Accessible Web sites were then assessed for quality of the presented information. A total of 81 programs were identified with the ASSH directory featuring direct links to 32% of program Web sites and the NRMP directory directly linking to 0%. A Google search yielded direct links to 86% of program Web sites. The quality of presented information varied greatly among the 72 accessible Web sites. Program description (100%), fellowship application requirements (97%), program contact email address (85%), and research requirements (75%) were the most commonly presented components of fellowship information. Hand fellowship program Web sites can be accessed from the ASSH directory and, to a lesser extent, the NRMP directory. However, a Google search is the most reliable method to access online fellowship information. Of assessable programs, all featured a program description though the quality of the remaining information was variable. Hand surgery fellowship applicants may face some difficulties when attempting to gather program information online. Future efforts should focus on improving the accessibility and content quality on hand surgery fellowship program Web sites.

  17. Providing Access to Unique Information Sources: A Reusable Platform for Publishing Bibliographic Databases on the Web.

    Science.gov (United States)

    Jantz, Ronald C.

    2000-01-01

    Discussion of digital library projects at Rutgers University focuses on publishing bibliographic databases on the Web to provide access to information sources not likely to be published elsewhere. Describes the reusable technology platform concept, bibliographic platform architecture, metadata approach, data entry, and managing the process.…

  18. Another Look at "SourceOECD": Providing Access to Online Publications through the Library Catalog

    Science.gov (United States)

    Ragains, Patrick

    2004-01-01

    "SourceOECD," the online/print subscription service of the Organisation for Economic Co-operation and Development, is examined. Solutions for providing access in library online catalogs are described, as are recent technical improvements to the online subscription service.

  19. Beyond the Repository: A Mixed Method Approach to Providing Access to Collections Online

    Science.gov (United States)

    Garrison, Brian Wade

    2013-01-01

    After providing access to over 100 video interviews conducted by a professor with notable entertainers and personalities from film through an institutional repository, an experiment was conducted to discover whether a larger audience could be gained by adding a subset of 32 of these videos to YouTube. The results, over 400,000 views, indicate that…

  20. Does the edge effect impact on the measure of spatial accessibility to healthcare providers?

    Science.gov (United States)

    Gao, Fei; Kihal, Wahida; Le Meur, Nolwenn; Souris, Marc; Deguen, Séverine

    2017-12-11

    Spatial accessibility indices are increasingly applied when investigating inequalities in health. Although most studies are making mentions of potential errors caused by the edge effect, many acknowledge having neglected to consider this concern by establishing spatial analyses within a finite region, settling for hypothesizing that accessibility to facilities will be under-reported. Our study seeks to assess the effect of edge on the accuracy of defining healthcare provider access by comparing healthcare provider accessibility accounting or not for the edge effect, in a real-world application. This study was carried out in the department of Nord, France. The statistical unit we use is the French census block known as 'IRIS' (Ilot Regroupé pour l'Information Statistique), defined by the National Institute of Statistics and Economic Studies. The geographical accessibility indicator used is the "Index of Spatial Accessibility" (ISA), based on the E2SFCA algorithm. We calculated ISA for the pregnant women population by selecting three types of healthcare providers: general practitioners, gynecologists and midwives. We compared ISA variation when accounting or not edge effect in urban and rural zones. The GIS method was then employed to determine global and local autocorrelation. Lastly, we compared the relationship between socioeconomic distress index and ISA, when accounting or not for the edge effect, to fully evaluate its impact. The results revealed that on average ISA when offer and demand beyond the boundary were included is slightly below ISA when not accounting for the edge effect, and we found that the IRIS value was more likely to deteriorate than improve. Moreover, edge effect impact can vary widely by health provider type. There is greater variability within the rural IRIS group than within the urban IRIS group. We found a positive correlation between socioeconomic distress variables and composite ISA. Spatial analysis results (such as Moran's spatial

  1. Support networks and people with physical disabilities: social inclusion and access to health services

    National Research Council Canada - National Science Library

    Holanda, Cristina Marques de Almeida; De Andrade, Fabienne Louise Juvêncio Paes; Bezerra, Maria Aparecida; Nascimento, João Paulo da Silva; Neves, Robson da Fonseca; Alves, Simone Bezerra; Ribeiro, Kátia Suely Queiroz Silva

    2015-01-01

    This study seeks to identify the formation of social support networks of people with physical disabilities, and how these networks can help facilitate access to health services and promote social inclusion...

  2. Energy efficiency for cloud-radio access networks with imperfect channel state information

    KAUST Repository

    Al-Oquibi, Bayan

    2016-12-24

    The advent of smartphones and tablets over the past several years has resulted in a drastic increase of global carbon footprint, due to the explosive growth of data traffic. Improving energy efficiency (EE) becomes, therefore, a crucial design metric in next generation wireless systems (5G). Cloud radio access network (C-RAN), a promising 5G network architecture, provides an efficient framework for improving the EE performance, by means of coordinating the transmission across the network. This paper considers a C-RAN system formed by several clusters of remote radio heads (RRHs), each serving a predetermined set of mobile users (MUs), and assumes imperfect channel state information (CSI). The network performance becomes therefore a function of the intra-cluster and inter-cluster interference, as well as the channel estimation error. The paper optimizes the transmit power of each RRH in order to maximize the network global EE subject to MU service rate requirements and RRHs maximum power constraints. The paper proposes solving the optimization problem using a heuristic algorithm based on techniques from optimization theory via a two-stage iterative solution. Simulation results show that the proposed power allocation algorithm provides an appreciable performance improvement as compared to the conventional systems with maximum power transmission strategy. They further highlight the convergence of the proposed algorithm for different networks scenarios.

  3. A query result merging scheme for providing energy efficiency in underwater sensor networks.

    Science.gov (United States)

    Kim, Yunsung; Park, Soo-Hyun

    2011-01-01

    Underwater sensor networks are emerging as a promising distributed data management system for various applications in underwater environments, despite their limited accessibility and restricted energy capacity. With the aid of recent developments in ubiquitous data computing, an increasing number of users are expected to overcome low accessibility by applying queries to underwater sensor networks. However, when multiple users send queries to an underwater sensor network in a disorganized manner, it may incur lethal energy waste and problematic network traffic. The current query management mechanisms cannot effectively deal with this matter due to their limited applicability and unrealistic assumptions. In this paper, a novel query management scheme involving query result merging is proposed for underwater sensor networks. The mechanism is based on a relational database model and is adjusted to the practical restrictions affecting underwater communication environments. Network simulations will prove that the scheme becomes more efficient with a greater number of queries and a smaller period range.

  4. Integration of QoS provisioning in home and access networks

    DEFF Research Database (Denmark)

    Popov, Mikhail; Gavler, A.; Sköldström, P.

    2010-01-01

    Approaches for QoS provisioning using UPnP for home networks and GMPLS for access networks are described. A solution for interworking the UPnP and the GMPLS at the residential gateway is proposed.......Approaches for QoS provisioning using UPnP for home networks and GMPLS for access networks are described. A solution for interworking the UPnP and the GMPLS at the residential gateway is proposed....

  5. The PrePRINT Network: A New Dynamic in Information Access from the U.S. Department of Energy.

    Science.gov (United States)

    Traylor, Terry Dennis

    2001-01-01

    Describes the PrePRINT Network, initiated by the Department of Energy to provide access to online preprints and reprints in the sciences and some areas of technological development. Discusses posting preprints on the Internet to improve scientific communication; and explains other Web-based products created to provide scientists with professional…

  6. Economic Insights into Providing Access to Improved Groundwater Sources in Remote, Low-Resource Areas

    Science.gov (United States)

    Abramson, A.; Lazarovitch, N.; Adar, E.

    2013-12-01

    Groundwater is often the most or only feasible drinking water source in remote, low-resource areas. Yet the economics of its development have not been systematically outlined. We applied CBARWI (Cost-Benefit Analysis for Remote Water Improvements), a recently developed Decision Support System, to investigate the economic, physical and management factors related to the costs and benefits of non-networked groundwater supply in remote areas. Synthetic profiles of community water services (n = 17,962), defined across 14 parameters' values and ranges relevant to remote areas, were imputed into the decision framework, and the parameter effects on economic outcomes were investigated through regression analysis (Table 1). Several approaches were included for financing the improvements, after Abramson et al, 2011: willingness-to -pay (WTP), -borrow (WTB) and -work (WTW) in community irrigation (';water-for-work'). We found that low-cost groundwater development approaches are almost 7 times more cost-effective than conventional boreholes fitted with handpumps. The costs of electric, submersible borehole pumps are comparable only when providing expanded water supplies, and off-grid communities pay significantly more for such expansions. In our model, new source construction is less cost-effective than improvement of existing wells, but necessary for expanding access to isolated households. The financing approach significantly impacts the feasibility of demand-driven cost recovery; in our investigation, benefit exceeds cost in 16, 32 and 48% of water service configurations financed by WTP, WTB and WTW, respectively. Regressions of total cost (R2 = 0.723) and net benefit under WTW (R2 = 0.829) along with analysis of output distributions indicate that parameters determining the profitability of irrigation are different from those determining costs and other measures of net benefit. These findings suggest that the cost-benefit outcomes associated with groundwater-based water

  7. HyberLoc: Providing Physical Layer Location Privacy in Hybrid Sensor Networks

    CERN Document Server

    El-Badry, Rania; Youssef, Moustafa

    2010-01-01

    In many hybrid wireless sensor networks' applications, sensor nodes are deployed in hostile environments where trusted and un-trusted nodes co-exist. In anchor-based hybrid networks, it becomes important to allow trusted nodes to gain full access to the location information transmitted in beacon frames while, at the same time, prevent un-trusted nodes from using this information. The main challenge is that un-trusted nodes can measure the physical signal transmitted from anchor nodes, even if these nodes encrypt their transmission. Using the measured signal strength, un-trusted nodes can still tri-laterate the location of anchor nodes. In this paper, we propose HyberLoc, an algorithm that provides anchor physical layer location privacy in anchor-based hybrid sensor networks. The idea is for anchor nodes to dynamically change their transmission power following a certain probability distribution, degrading the localization accuracy at un-trusted nodes while maintaining high localization accuracy at trusted node...

  8. FRAMES-2.0 Software System: Providing Password Protection and Limited Access to Models and Simulations

    Energy Technology Data Exchange (ETDEWEB)

    Whelan, Gene; Pelton, Mitch A.

    2007-08-09

    One of the most important concerns for regulatory agencies is the concept of reproducibility (i.e., reproducibility means credibility) of an assessment. One aspect of reproducibility deals with tampering of the assessment. In other words, when multiple groups are engaged in an assessment, it is important to lock down the problem that is to be solved and/or to restrict the models that are to be used to solve the problem. The objective of this effort is to provide the U.S. Nuclear Regulatory Commission (NRC) with a means to limit user access to models and to provide a mechanism to constrain the conceptual site models (CSMs) when appropriate. The purpose is to provide the user (i.e., NRC) with the ability to “lock down” the CSM (i.e., picture containing linked icons), restrict access to certain models, or both.

  9. Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2015-01-01

    Full Text Available Within the challenging environment of intelligent transportation systems (ITS, networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However, cognitive radio (CR combines the capacity to sense the radio spectrum with the flexibility to adapt to transmission parameters in order to maximize system performance and has thus become an effective approach for the design of dynamic spectrum access (DSA mechanisms. This paper presents the enhanced noncooperative cognitive division multiple access (ENCCMA proposal combining time division multiple access (TDMA and frequency division multiple access (FDMA schemes with CR techniques to obtain a mechanism fulfilling the requirements of real-time communications. The analysis presented here considers the IEEE WAVE and 802.11p as reference standards; however, the proposed medium access control (MAC mechanism can be adapted to operate on the physical layer of different standards. The mechanism also offers the advantage of avoiding signaling, thus enhancing system autonomy as well as behavior in adverse scenarios.

  10. Delay-aware adaptive sleep mechanism for green wireless-optical broadband access networks

    Science.gov (United States)

    Wang, Ruyan; Liang, Alei; Wu, Dapeng; Wu, Dalei

    2017-07-01

    Wireless-Optical Broadband Access Network (WOBAN) is capacity-high, reliable, flexible, and ubiquitous, as it takes full advantage of the merits from both optical communication and wireless communication technologies. Similar to other access networks, the high energy consumption poses a great challenge for building up WOBANs. To shot this problem, we can make some load-light Optical Network Units (ONUs) sleep to reduce the energy consumption. Such operation, however, causes the increased packet delay. Jointly considering the energy consumption and transmission delay, we propose a delay-aware adaptive sleep mechanism. Specifically, we develop a new analytical method to evaluate the transmission delay and queuing delay over the optical part, instead of adopting M/M/1 queuing model. Meanwhile, we also analyze the access delay and queuing delay of the wireless part. Based on such developed delay models, we mathematically derive ONU's optimal sleep time. In addition, we provide numerous simulation results to show the effectiveness of the proposed mechanism.

  11. Access to finance from different finance provider types: Farmer knowledge of the requirements.

    Directory of Open Access Journals (Sweden)

    Eliana Wulandari

    Full Text Available Analysing farmer knowledge of the requirements of finance providers can provide valuable insights to policy makers about ways to improve farmers' access to finance. This study compares farmer knowledge of the requirements to obtain finance with the actual requirements set by different finance provider types, and investigates the relation between demographic and socioeconomic factors and farmer knowledge of finance requirements. We use a structured questionnaire to collect data from a sample of finance providers and farmers in Java Island, Indonesia. We find that the most important requirements to acquire finance vary among different finance provider types. We also find that farmers generally have little knowledge of the requirements, which are important to each type of finance provider. Awareness campaigns are needed to increase farmer knowledge of the diversity of requirements among the finance provider types.

  12. Access to finance from different finance provider types: Farmer knowledge of the requirements

    Science.gov (United States)

    Meuwissen, Miranda P. M.; Karmana, Maman H.; Oude Lansink, Alfons G. J. M.

    2017-01-01

    Analysing farmer knowledge of the requirements of finance providers can provide valuable insights to policy makers about ways to improve farmers’ access to finance. This study compares farmer knowledge of the requirements to obtain finance with the actual requirements set by different finance provider types, and investigates the relation between demographic and socioeconomic factors and farmer knowledge of finance requirements. We use a structured questionnaire to collect data from a sample of finance providers and farmers in Java Island, Indonesia. We find that the most important requirements to acquire finance vary among different finance provider types. We also find that farmers generally have little knowledge of the requirements, which are important to each type of finance provider. Awareness campaigns are needed to increase farmer knowledge of the diversity of requirements among the finance provider types. PMID:28877174

  13. Access to finance from different finance provider types: Farmer knowledge of the requirements.

    Science.gov (United States)

    Wulandari, Eliana; Meuwissen, Miranda P M; Karmana, Maman H; Oude Lansink, Alfons G J M

    2017-01-01

    Analysing farmer knowledge of the requirements of finance providers can provide valuable insights to policy makers about ways to improve farmers' access to finance. This study compares farmer knowledge of the requirements to obtain finance with the actual requirements set by different finance provider types, and investigates the relation between demographic and socioeconomic factors and farmer knowledge of finance requirements. We use a structured questionnaire to collect data from a sample of finance providers and farmers in Java Island, Indonesia. We find that the most important requirements to acquire finance vary among different finance provider types. We also find that farmers generally have little knowledge of the requirements, which are important to each type of finance provider. Awareness campaigns are needed to increase farmer knowledge of the diversity of requirements among the finance provider types.

  14. A Hub Location Problem with Fully Interconnected Backbone and Access Networks

    DEFF Research Database (Denmark)

    Thomadsen, Tommy; Larsen, Jesper

    2007-01-01

    This paper considers the design of two-layered fully interconnected networks. A two-layered network consists of clusters of nodes, each defining an access network and a backbone network. We consider the integrated problem of determining the access networks and the backbone network simultaneously...... problems. We obtain superior bounds using the column generation approach than with the linear programming relaxation. The column generation method is therefore developed into an exact approach using the Branch-and-Price framework. With this approach we are able to solve problems consisting of up to 25...

  15. Distributed Robust Power Minimization for the Downlink of Multi-Cloud Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb

    2017-02-07

    Conventional cloud radio access networks assume single cloud processing and treat inter-cloud interference as background noise. This paper considers the downlink of a multi-cloud radio access network (CRAN) where each cloud is connected to several base-stations (BS) through limited-capacity wireline backhaul links. The set of BSs connected to each cloud, called cluster, serves a set of pre-known mobile users (MUs). The performance of the system becomes therefore a function of both inter-cloud and intra-cloud interference, as well as the compression schemes of the limited capacity backhaul links. The paper assumes independent compression scheme and imperfect channel state information (CSI) where the CSI errors belong to an ellipsoidal bounded region. The problem of interest becomes the one of minimizing the network total transmit power subject to BS power and quality of service constraints, as well as backhaul capacity and CSI error constraints. The paper suggests solving the problem using the alternating direction method of multipliers (ADMM). One of the highlight of the paper is that the proposed ADMM-based algorithm can be implemented in a distributed fashion across the multi-cloud network by allowing a limited amount of information exchange between the coupled clouds. Simulation results show that the proposed distributed algorithm provides a similar performance to the centralized algorithm in a reasonable number of iterations.

  16. Algorithmic PON/P2P FTTH Access Network Design for CAPEX Minimization

    DEFF Research Database (Denmark)

    Papaefthimiou, Kostantinos; Tefera, Yonas; Mihylov, Dimitar

    2013-01-01

    Due to the emergence of high bandwidth-requiring services, telecommunication operators (telcos) are called to upgrade their fixed access network. In order to keep up with the competition, they must consider different optical access network solutions with Fiber To The Home (FTTH) as the prevailing...

  17. Subcutaneous placement of lap band port without fascial fixation provides safe and durable access.

    Science.gov (United States)

    Akkary, Ehab; Olgers, Forrest

    2014-11-01

    Laparoscopic adjustable gastric band access port has been routinely sutured to the anterior fascia of the abdominal wall using nonabsorbable sutures. We present our technique demonstrating that nonfascial fixation with using a mesh allows for a safe and durable placement of the port in the superficial subcutaneous tissue. Retrospective chart review included 102 consecutive patients who had Lap band surgery performed by single surgeon (EA) from June 2011 until April 2013. The port was sutured to a piece of polypropylene mesh and tunneled in the subcutaneous tissue away from the incision. Patients' demographics were analyzed as well as the following parameters: OR time for port placement, follow-up, port complications requiring revision, difficult access facilitated by fluoroscopy imaging, port infection, and skin erosion. The study included 102 consecutive patients (23 males and 79 females), mean age was 49 years old, mean weight was 284.7 lb, mean height was 66.2 in., and mean body mass index (BMI) was 46.3 kg/m(2). The average operative time for port placement was 4 min, mean follow-up was 12 months, port complications occurred in 2 % of the patients while fluoroscopy for difficult port access was required in 3 %. No cases of port infections or skin erosions occurred. Superficial subcutaneous placement of Lap Band Port using mesh fixation without anchoring the port to the fascia provides safe and durable access. Deep incisions to secure the port directly to the fascia might not be necessary.

  18. Knowledge Access in Rural Inter-connected Areas Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This phase will endeavor to expand the existing network to include two thematic networks on food security and rural enterprise, respectively. A third thematic network - on knowledge management strategies - will play an advisory and support role to the larger network. Project activities will include a call for research proposals ...

  19. Local empathy provides global minimization of congestion in communication networks

    Science.gov (United States)

    Meloni, Sandro; Gómez-Gardeñes, Jesús

    2010-11-01

    We present a mechanism to avoid congestion in complex networks based on a local knowledge of traffic conditions and the ability of routers to self-coordinate their dynamical behavior. In particular, routers make use of local information about traffic conditions to either reject or accept information packets from their neighbors. We show that when nodes are only aware of their own congestion state they self-organize into a hierarchical configuration that delays remarkably the onset of congestion although leading to a sharp first-order-like congestion transition. We also consider the case when nodes are aware of the congestion state of their neighbors. In this case, we show that empathy between nodes is strongly beneficial to the overall performance of the system and it is possible to achieve larger values for the critical load together with a smooth, second-order-like, transition. Finally, we show how local empathy minimize the impact of congestion as much as global minimization. Therefore, here we present an outstanding example of how local dynamical rules can optimize the system’s functioning up to the levels reached using global knowledge.

  20. Contraceptive service provider imposed restrictions to contraceptive access in Urban Nigeria.

    Science.gov (United States)

    Schwandt, Hilary M; Speizer, Ilene S; Corroon, Meghan

    2017-04-17

    Health service providers can restrict access to contraceptives through their own imposed biases about method appropriateness. In this study, provider biases toward contraceptive service provision among urban Nigerian providers was assessed. Health providers working in health facilities, as well as pharmacists and patent medical vendors (PMV), in Abuja, Benin City, Ibadan, Ilorin, Kaduna, and Zaria, were surveyed in 2011 concerning their self-reported biases in service provision based on age, parity, and marital status. Minimum age bias was the most common bias while minimum parity was the least common bias reported by providers. Condoms were consistently provided with the least amount of bias, followed by provision of emergency contraception (EC), pills, injectables, and IUDs. Experience of in-service training for health facility providers was associated with decreased prevalence of marital status bias for the pill, injectable, and IUD; however, training experience did not, or had the opposite effect on, pharmacists and PMV operator's reports of service provision bias. Provider imposed eligibility barriers in urban study sites in Nigeria were pervasive - the most prevalent restriction across method and provider type was minimum age. Given the large and growing adolescent population - interventions aimed at increasing supportive provision of contraceptives to youth in this context are urgently needed. The results show that the effect of in-service training on provider biases was limited. Future efforts to address provider biases in contraceptive service provision, among all provider types, must find creative ways to address this critical barrier to increased contraceptive use.

  1. Online Professional Development for Child Care Providers: Do They Have Appropriate Access to and Comfort with the Internet?

    Directory of Open Access Journals (Sweden)

    Lindsay E. Wright

    2014-10-01

    Full Text Available With the expansion of online trainings today, Extension professionals have an opportunity to reach child care providers in more convenient ways. However, having convenient, reliable Internet access can be a barrier to online training for some child care providers, especially those with limited financial resources. This study investigated child care providers’ ability to access online training through convenient, reliable Internet access by asking 494 child care providers in Georgia about their access to and comfort with the Internet. Participants completed a brief 12-question survey that included questions about their Internet access and use for both personal and professional purposes (i.e., whether or not they have Internet access, where they have access, how often they use it, and how comfortable they feel using it. The majority of child care providers reported having Internet access (89.68% and feeling comfortable using the Internet (68.62%, and therefore, have the technological resources to participate in online professional development.

  2. Accessing maternal and child health services in Melbourne, Australia: Reflections from refugee families and service providers

    Directory of Open Access Journals (Sweden)

    Riggs Elisha

    2012-05-01

    Full Text Available Abstract Background Often new arrivals from refugee backgrounds have experienced poor health and limited access to healthcare services. The maternal and child health (MCH service in Victoria, Australia, is a joint local and state government operated, cost-free service available to all mothers of children aged 0–6 years. Although well-child healthcare visits are useful in identifying health issues early, there has been limited investigation in the use of these services for families from refugee backgrounds. This study aims to explore experiences of using MCH services, from the perspective of families from refugee backgrounds and service providers. Methods We used a qualitative study design informed by the socioecological model of health and a cultural competence approach. Two geographical areas of Melbourne were selected to invite participants. Seven focus groups were conducted with 87 mothers from Karen, Iraqi, Assyrian Chaldean, Lebanese, South Sudanese and Bhutanese backgrounds, who had lived an average of 4.7 years in Australia (range one month-18 years. Participants had a total of 249 children, of these 150 were born in Australia. Four focus groups and five interviews were conducted with MCH nurses, other healthcare providers and bicultural workers. Results Four themes were identified: facilitating access to MCH services; promoting continued engagement with the MCH service; language challenges; and what is working well and could be done better. Several processes were identified that facilitated initial access to the MCH service but there were implications for continued use of the service. The MCH service was not formally notified of new parents arriving with young children. Pre-arranged group appointments by MCH nurses for parents who attended playgroups worked well to increase ongoing service engagement. Barriers for parents in using MCH services included access to transportation, lack of confidence in speaking English and making

  3. POPcorn: An Online Resource Providing Access to Distributed and Diverse Maize Project Data.

    Science.gov (United States)

    Cannon, Ethalinda K S; Birkett, Scott M; Braun, Bremen L; Kodavali, Sateesh; Jennewein, Douglas M; Yilmaz, Alper; Antonescu, Valentin; Antonescu, Corina; Harper, Lisa C; Gardiner, Jack M; Schaeffer, Mary L; Campbell, Darwin A; Andorf, Carson M; Andorf, Destri; Lisch, Damon; Koch, Karen E; McCarty, Donald R; Quackenbush, John; Grotewold, Erich; Lushbough, Carol M; Sen, Taner Z; Lawrence, Carolyn J

    2011-01-01

    The purpose of the online resource presented here, POPcorn (Project Portal for corn), is to enhance accessibility of maize genetic and genomic resources for plant biologists. Currently, many online locations are difficult to find, some are best searched independently, and individual project websites often degrade over time-sometimes disappearing entirely. The POPcorn site makes available (1) a centralized, web-accessible resource to search and browse descriptions of ongoing maize genomics projects, (2) a single, stand-alone tool that uses web Services and minimal data warehousing to search for sequence matches in online resources of diverse offsite projects, and (3) a set of tools that enables researchers to migrate their data to the long-term model organism database for maize genetic and genomic information: MaizeGDB. Examples demonstrating POPcorn's utility are provided herein.

  4. Media access control and resource allocation for next generation passive optical networks

    CERN Document Server

    Ansari, Nirwan

    2013-01-01

    This book focuses on various Passive optical networks (PONs)  types, including currently deployed Ethernet PON (EPON) and Gigabit PON (GPON) as well as next generation WDM PON and OFDM PON. Also this book examines the integrated optical and wireless access networks. Concentrating on two issues in these networks: media access control (MAC) and resource allocation. These two problems can greatly affect performances of PONs such as network resource utilization and QoS of end users. Finally this book will discuss various solutions to address the MAC and resource allocation issues in various PON networks.

  5. Experimental realization of an entanglement access network and secure multi-party computation

    Science.gov (United States)

    Chang, Xiuying; Deng, Donglin; Yuan, Xinxing; Hou, Panyu; Huang, Yuanyuan; Duan, Luming; Department of Physics, University of Michigan Collaboration; Center for Quantum Information in Tsinghua University Team

    2017-04-01

    To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access network, we report experimental demonstration of a secure multiparty computation protocol, the privacy-preserving secure sum problem, based on the network quantum cryptography.

  6. The Role of Social Network Locations in the College Access Mentoring of Urban Youth

    Science.gov (United States)

    Ahn, June

    2010-01-01

    This study uses social network analysis to describe the social network of college mentors in a college access program. Urban students in the program are paired with college mentors-students, professors, and other institutional agents-to help improve their college going process. The study analyzes the social networks within which the mentors are…

  7. Integrated self-management for future radio access networks: Vision and key challenges

    NARCIS (Netherlands)

    Eisenblätter, A.; Conzalez Rodríguez, B.; Gunnarsson, F.; Kürner, T.; Litjens, R.; Sas, B.; Sayrac, B.; Schmelz, L.C.; Willcock, C.

    2013-01-01

    Future radio access networks will require new self-management solutions to handle the increasing operational complexity caused by multi-technology and multi-layer deployments. Current networks already include stand-alone SON (Self-Organizing Networks) solutions, but these are not sufficient to

  8. Principals' Perceptions of Social Networking Access, Its Relationship to Cyberbullying, the Importance of Student Achievement, and the School Environment

    Science.gov (United States)

    Townsel, Andrae

    2015-01-01

    The purpose of this study was to examine the principals' perceptions of social networking access and its relationship to cyberbullying, the importance of student achievement, and the school environment across the United States. This research provides some evidence on how principals perceive and understand the threat of cyberbullying and its…

  9. Design and implementation of the broadband network access system over MoCA

    Science.gov (United States)

    Huang, Jing; Liu, Deming; Wu, Guangsheng

    2009-08-01

    In order to provide a high speed scheme for the access of the "last 100 meters", a composite access scheme of EPON and MoCA is proposed in this paper. At the terminal node of FTTX in EPON system, MoCA technique is used to implement broadband data access by distributing network entering household through Coax. A terminal equipment is designed in this scheme, which can receive the optical signal from the OLT of EPON and transform it into RF signal. The end users will receive the RF signal either from the coaxial cable or a RF antenna. This scheme is particularly applicable for FTTB application.There are many advantages in this system, it can provide a reliable room to room, peer to peer full mesh connectivity of digital content among MoCA devices using existing in-home coaxial cables. Plug and play at the majority of serviceable coax outlets in homes with no need to access or change splitters, or run new cables. What's more, it has higher bandwidth and better management. Two group of tests for the EPON+MoCA system were carried out, one for the coaxial cable and one for wireless. The experimental results showed that the average throughput of the system could reach to approximate 100 Mbps which approach to the theoretical throughput of MoCA 1.0 standard. And the transmission throughput had no remarkable change when the RF antenna replaced the coaxial cable.

  10. MetaNET--a web-accessible interactive platform for biological metabolic network analysis.

    Science.gov (United States)

    Narang, Pankaj; Khan, Shawez; Hemrom, Anmol Jaywant; Lynn, Andrew Michael

    2014-01-01

    Metabolic reactions have been extensively studied and compiled over the last century. These have provided a theoretical base to implement models, simulations of which are used to identify drug targets and optimize metabolic throughput at a systemic level. While tools for the perturbation of metabolic networks are available, their applications are limited and restricted as they require varied dependencies and often a commercial platform for full functionality. We have developed MetaNET, an open source user-friendly platform-independent and web-accessible resource consisting of several pre-defined workflows for metabolic network analysis. MetaNET is a web-accessible platform that incorporates a range of functions which can be combined to produce different simulations related to metabolic networks. These include (i) optimization of an objective function for wild type strain, gene/catalyst/reaction knock-out/knock-down analysis using flux balance analysis. (ii) flux variability analysis (iii) chemical species participation (iv) cycles and extreme paths identification and (v) choke point reaction analysis to facilitate identification of potential drug targets. The platform is built using custom scripts along with the open-source Galaxy workflow and Systems Biology Research Tool as components. Pre-defined workflows are available for common processes, and an exhaustive list of over 50 functions are provided for user defined workflows. MetaNET, available at http://metanet.osdd.net , provides a user-friendly rich interface allowing the analysis of genome-scale metabolic networks under various genetic and environmental conditions. The framework permits the storage of previous results, the ability to repeat analysis and share results with other users over the internet as well as run different tools simultaneously using pre-defined workflows, and user-created custom workflows.

  11. Medium access control and network layer design for 60 GHz wireless personal area networks

    NARCIS (Netherlands)

    An, X.

    2010-01-01

    The unlicensed frequency band around 60 GHz is a very promising spectrum due to its potential to provide multiple gigabits per second based data rates for short range wireless communication. Hence, 60 GHz radio is an attractive candidate to enable ultra high rate Wireless Personal Area Networks

  12. Self-management for unified heterogeneous radio access networks

    NARCIS (Netherlands)

    Litjens, R.; Gunnarsson, F.; Sayrac, B.; Spaey, K.; Willcock, C.; Eisenblätter, A.; Rodríguez, B.G.; Kürner, T.

    2013-01-01

    The development of self-management solutions for (multi-technology, multi-layer) mobile communication networks is driven by their increasing operational complexity. Initial stand-alone SON (Self-Organizing Networks) solutions are already available, but are not sufficient to handle the networks of

  13. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey.

    Science.gov (United States)

    Zareei, Mahdi; Islam, A K M Muzahidul; Baharun, Sabariah; Vargas-Rosales, Cesar; Azpilicueta, Leyre; Mansoor, Nafees

    2017-09-16

    New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.

  14. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    Science.gov (United States)

    Islam, A. K. M. Muzahidul; Baharun, Sabariah; Mansoor, Nafees

    2017-01-01

    New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective. PMID:28926952

  15. Structural equation modelling of determinants of customer satisfaction of mobile network providers: Case of Kolkata, India

    Directory of Open Access Journals (Sweden)

    Shibashish Chakraborty

    2014-12-01

    Full Text Available The Indian market of mobile network providers is growing rapidly. India is the second largest market of mobile network providers in the world and there is intense competition among existing players. In such a competitive market, customer satisfaction becomes a key issue. The objective of this paper is to develop a customer satisfaction model of mobile network providers in Kolkata. The results indicate that generic requirements (an aggregation of output quality and perceived value, flexibility, and price are the determinants of customer satisfaction. This study offers insights for mobile network providers to understand the determinants of customer satisfaction.

  16. Impact of Users Identities and Access Conditions on Downlink Performance in Closed Small-Cell Networks

    KAUST Repository

    Radaydeh, Redha

    2015-05-26

    This paper investigates the effect of various operation parameters on the downlink user performance in overlaid small-cell networks. The case study considers closed-access small cells (e.g., femtocells), wherein only active authorized user equipments (UEs) can be served, and each of which is allocated single downlink channel at a time. On the other hand, the macrocell base station can unconditionally serve macrocell UEs that exist inside its coverage space. The available channels can be shared simultaneously in the macrocell network and the femtocell network. Moreover, a channel can be reused only at the macrocell base station. The analysis provides quantitative approaches to model UEs identities, their likelihoods of being active, and their likelihoods of producing interference, considering UEs classifications, locations, and access capabilities. Moreover, it develops models for various interference sources observed from effective interference femtocells, considering femtocells capacities and operation conditions. The associated formulations to describe a desired UE performance and the impact of the number of available channels as well as the adopted channel assignment approach are thoroughly investigated. The results are generally presented for any channel models of interference sources as well as the desired source of the served UE. Moreover, specific channel models are then adopted, for which generalized closedform analytical results for the desired UE outage probability performance are obtained. Numerical and simulation results are presented to further clarify the main outcomes of the developed analysis.

  17. Providing Morphological Information for SMT Using Neural Networks

    Directory of Open Access Journals (Sweden)

    Passban Peyman

    2017-06-01

    Full Text Available Treating morphologically complex words (MCWs as atomic units in translation would not yield a desirable result. Such words are complicated constituents with meaningful subunits. A complex word in a morphologically rich language (MRL could be associated with a number of words or even a full sentence in a simpler language, which means the surface form of complex words should be accompanied with auxiliary morphological information in order to provide a precise translation and a better alignment. In this paper we follow this idea and propose two different methods to convey such information for statistical machine translation (SMT models. In the first model we enrich factored SMT engines by introducing a new morphological factor which relies on subword-aware word embeddings. In the second model we focus on the language-modeling component. We explore a subword-level neural language model (NLM to capture sequence-, word- and subword-level dependencies. Our NLM is able to approximate better scores for conditional word probabilities, so the decoder generates more fluent translations. We studied two languages Farsi and German in our experiments and observed significant improvements for both of them.

  18. Secure wide area network access to CMS analysis data using the Lustre filesystem

    Science.gov (United States)

    Bourilkov, D.; Avery, P.; Cheng, M.; Fu, Y.; Kim, B.; Palencia, J.; Budden, R.; Benninger, K.; Rodriquez, J. L.; Dilascio, J.; Dykstra, D.; Seenu, N.

    2012-12-01

    This paper reports the design and implementation of a secure, wide area network (WAN), distributed filesystem by the ExTENCI project (Extending Science Through Enhanced National CyberInfrastructure), based on the Lustre filesystem. The system is used for remote access to analysis data from the Compact Muon Solenoid (CMS) experiment at the Large Hadron Collider (LHC), and from the Lattice Quantum ChromoDynamics (LQCD) project. Security is provided by Kerberos authentication and authorization with additional fine grained control based on Lustre ACLs (Access Control List) and quotas. We investigate the impact of using various Kerberos security flavors on the I/O rates of CMS applications on client nodes reading and writing data to the Lustre filesystem, and on LQCD benchmarks. The clients can be real or virtual nodes. We are investigating additional options for user authentication based on user certificates.

  19. Interoperable Medical Instrument Networking and Access System with Security Considerations for Critical Care

    Directory of Open Access Journals (Sweden)

    Deniz Gurkan

    2010-01-01

    Full Text Available The recent influx of electronic medical records in the health care field, coupled with the need of providing continuous care to patients in the critical care environment, has driven the need for interoperability of medical devices. Open standards are needed to support flexible processes and interoperability of medical devices, especially in intensive care units. In this paper, we present an interoperable networking and access architecture based on the CAN protocol. Predictability of the delay of medical data reports is a desirable attribute that can be realized using a tightly-coupled system architecture. Our simulations on network architecture demonstrate that a bounded delay for event reports offers predictability. In addition, we address security issues related to the storage of electronic medical records. We present a set of open source tools and tests to identify the security breaches, and appropriate measures that can be implemented to be compliant with the HIPAA rules.

  20. Digital Signal Processing for a Sliceable Transceiver for Optical Access Networks

    DEFF Research Database (Denmark)

    Saldaña Cercos, Silvia; Wagner, Christoph; Vegas Olmos, Juan José

    2015-01-01

    also for implementing full signal path symmetry in real-time oscilloscopes to provide performance and signal fidelity (i.e. lower noise and jitter). In this paper the key digital signal processing (DSP) subsystems required to achieve signal slicing are surveyed. It also presents, for the first time......Methods to upgrade the network infrastructure to cope with current traffic demands has attracted increasing research efforts. A promising alternative is signal slicing. Signal slicing aims at re-using low bandwidth equipment to satisfy high bandwidth traffic demands. This technique has been used...... penalty is reported for 10 Gbps. Power savings of the order of hundreds of Watts can be obtained when using signal slicing as an alternative to 10 Gbps implemented access networks....

  1. 41 CFR 102-79.95 - Who is responsible for the costs associated with providing access to antenna sites?

    Science.gov (United States)

    2010-07-01

    ... providing access to antenna sites? The telecommunications service provider is responsible for any reasonable... support of constructing new and improving existing telecommunication infrastructures provided that such installation does not negatively impact on the Government. ...

  2. A modified transmission tip-enhanced Raman scattering (TERS) setup provides access to opaque samples.

    Science.gov (United States)

    Deckert-Gaudig, Tanja; Richter, Marc; Knebel, Detlef; Jähnke, Torsten; Jankowski, Tilo; Stock, Erik; Deckert, Volker

    2014-01-01

    The combination of scanning probe microscopy and Raman spectroscopy enables chemical characterization of surfaces at highest spatial resolution. This so-called tip-enhanced Raman scattering (TERS) can be employed for a variety of samples where a label-free characterization or identification of constituents on the nanometer scale is pursued. Present TERS setup geometries are always a compromise for specific dedicated applications and show different advantages and disadvantages: Transmission back-reflection setups, when using immersion objectives with a high numerical aperture, intrinsically provide the highest collection efficiency but cannot be applied for opaque samples. Those samples demand upright setups, at the cost of lower collection efficiency, even though very efficient systems using a parabolic mirror for illumination and collection have been demonstrated. In this contribution it is demonstrated that the incorporation of a dichroic mirror to a transmission TERS setup provides easy access to opaque samples without further modification of the setup.

  3. [Dentistry and healthcare legislation 7. The duty to provide care: availability and accessibility].

    Science.gov (United States)

    Brands, W G; van der Ven, J M; Eijkman, M A J

    2013-12-01

    Dentists have a duty to provide care. This duty, which interestingly enough has a limited legal basis, is for the most part given form by jurisprudence. In that process, the disciplinary judge and the grievance committees pay attention especially to 2 rules of conduct and 1 regulation governing practice. In practice, it appears to be the case that rules of conduct and regulations do not always provide an unambiguous guide. The domain within which dentists operate is striking. The availability and the accessibility of dentists are not always harmonious with the personal perception of a patient. It is sometimes difficult to find a proper balance between what is a dentist is able to manage and what a patient wants.

  4. Security of social network credentials for accessing course portal: Users' experience

    Science.gov (United States)

    Katuk, Norliza; Fong, Choo Sok; Chun, Koo Lee

    2015-12-01

    Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications' database. Although it has been used by many web application providers, its' applicability in accessing learning materials is not yet fully investigated. Hence, this research aims to explore users' (i.e., instructors' and students') perception and experience on the security of SL for accessing learning contents. A course portal was developed for students at a higher learning institution and it provides two types of user authentications (i) traditional user authentication, and (ii) SL facility. Users comprised instructors and students evaluated the login facility of the course portal through a controlled lab experimental study following the within-subject design. The participants provided their feedback in terms of the security of SL for accessing learning contents. The study revealed that users preferred to use SL over the traditional authentication, however, they concerned on the security of SL and their privacy.

  5. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.

    Science.gov (United States)

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-11-17

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  6. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP

    Directory of Open Access Journals (Sweden)

    Dan Garcia-Carrillo

    2017-11-01

    Full Text Available The Internet-of-Things (IoT landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN, the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP, which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA infrastructures and the Extensible Authentication Protocol (EAP protocol. For this integration, we use the Constrained Application Protocol (CoAP to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  7. Quality in Family Child Care Networks: An Evaluation of All Our Kin Provider Quality

    Science.gov (United States)

    Porter, Toni; Reiman, Kayla; Nelson, Christina; Sager, Jessica; Wagner, Janna

    2016-01-01

    This article presents findings from a quasi-experimental evaluation of quality with a sample of 28 family child care providers in the All Our Kin Family Child Care Network, a staffed family child care network which offers a range of services including relationship-based intensive consultation, and 20 family child care providers who had no…

  8. The dynamics of socio-connective trust within support networks accessed by informal caregivers.

    Science.gov (United States)

    Ray, Robin A; Street, Annette F

    2011-03-01

    This article introduces the concept of socio-connective trust, the synapse between the social structures and processes that underpin relationships in supportive care networks. Data from an ethnographic case study of 18 informal caregivers providing in-home care for people with life-limiting illness were analysed drawing on theoretical concepts from the work of Giddens and writings on social capital, as well as the construction of trust in the caregiving literature. While conceptions of trust were found to contribute to understanding supportive care relationships, they did not account for the dynamic nature of the availability and use of support networks. Instead, informal caregivers undertook ongoing reflexive negotiation of relationship boundaries in response to their own conception of the current situation and their perception of trust in their relationships with the various members of the support network. The concept of socio-connective trust describes the movement and flow of the flexible bonds that influence relationships among care networks and determine the type and range of support accessed by informal caregivers. Understanding the complexities of socio-connective trust in caregiving relationships will assist health and social care workers to mobilize relevant resources to support informal caregivers.

  9. Network Physics - the only company to provide physics-based network management - secures additional funding and new executives

    CERN Multimedia

    2003-01-01

    "Network Physics, the only provider of physics-based network management products, today announced an additional venture round of $6 million in funding, as well as the addition of David Jones as president and CEO and Tom Dunn as vice president of sales and business development" (1 page).

  10. Providing Access to Census-based Interaction Data in the UK: That's WICID!

    Directory of Open Access Journals (Sweden)

    John Stillwell

    2006-08-01

    Full Text Available The Census Interaction Data Service (CIDS is funded by the Economic and Social Research Council in the UK to provide access for social science researchers and students to the detailed migration and journey-to-work statistics that are collected by the national statistical agencies. These interaction data sets are known collectively as the Special Migration Statistics (SMS and the Special Workplace Statistics (SWS. This paper outlines how problems of user access to these data have been tackled through the development of a web-based system known as WICID (Web-based Interface to Census Interaction Data. The paper illustrates various interface features including some of the query building facilities that enable users to extract counts of flows of particular groups of individuals between selected origin and destination areas. New tools are outlined for assisting area selection using digital maps of census geographies, for planning output and for adding value to the data through analysis. Mapping of flows of migrants between London boroughs and the rest of the UK demonstrates the value of the data. The paper begins with a summary of the data sets that are contained within the system and an outline of the system architecture.

  11. Transport network extensions for accessibility analysis in geographic information systems

    NARCIS (Netherlands)

    Jong, Tom de; Tillema, T.

    2005-01-01

    In many developed countries high quality digital transport networks are available for GIS based analysis. Partly this is due to the requirements of route planning software for internet and car navigation systems. Properties of these networks consist among others of road quality attributes,

  12. Resource Sharing in Heterogeneous and Cloud Radio Access Networks

    DEFF Research Database (Denmark)

    Zakrzewska, Anna; Iversen, Villy Bæk

    2012-01-01

    This paper analyzes performance of cellular systems with shared resources, where the network with overlapping cells is modeled as a circuit switched network with direct routing. The influence of the degree of sharing, represented by cell overlap percentage, on the call blocking probability is inv...

  13. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  14. ABCDecision: A Simulation Platform for Access Selection Algorithms in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Guy Pujolle

    2010-01-01

    Full Text Available We present a simulation platform for access selection algorithms in heterogeneous wireless networks, called “ABCDecision”. The simulator implements the different parts of an Always Best Connected (ABC system, including Access Technology Selector (ATS, Radio Access Networks (RANs, and users. After describing the architecture of the simulator, we show an overview of the existing decision algorithms for access selection. Then we propose a new selection algorithm in heterogeneous networks and we run a set of simulations to evaluate the performance of the proposed algorithm in comparison with the existing ones. The performance results, in terms of the occupancy rate, show that our algorithm achieves a load balancing distribution between networks by taking into consideration the capacities of the available cells.

  15. JavaScript Access to DICOM Network and Objects in Web Browser.

    Science.gov (United States)

    Drnasin, Ivan; Grgić, Mislav; Gogić, Goran

    2017-10-01

    Digital imaging and communications in medicine (DICOM) 3.0 standard provides the baseline for the picture archiving and communication systems (PACS). The development of Internet and various communication media initiated demand for non-DICOM access to PACS systems. Ever-increasing utilization of the web browsers, laptops and handheld devices, as opposed to desktop applications and static organizational computers, lead to development of different web technologies. The DICOM standard officials accepted those subsequently as tools of alternative access. This paper provides an overview of the current state of development of the web access technology to the DICOM repositories. It presents a different approach of using HTML5 features of the web browsers through the JavaScript language and the WebSocket protocol by enabling real-time communication with DICOM repositories. JavaScript DICOM network library, DICOM to WebSocket proxy and a proof-of-concept web application that qualifies as a DICOM 3.0 device were developed.

  16. Biological approaches for addressing the grand challenge of providing access to clean drinking water

    Science.gov (United States)

    2011-01-01

    The U.S. National Academy of Engineering (NAE) recently published a document presenting "Grand Challenges for Engineering". This list was proposed by leading engineers and scientists from around the world at the request of the U.S. National Science Foundation (NSF). Fourteen topics were selected for these grand challenges, and at least seven can be addressed using the tools and methods of biological engineering. Here we describe how biological engineers can address the challenge of providing access to clean drinking water. This issue must be addressed in part by removing or inactivating microbial and chemical contaminants in order to properly deliver water safe for human consumption. Despite many advances in technologies this challenge is expanding due to increased pressure on fresh water supplies and to new opportunities for growth of potentially pathogenic organisms. PMID:21453515

  17. Primary Health Care Providers' Perspectives: Facilitating Older Patients' Access to Community Support Services.

    Science.gov (United States)

    Ploeg, Jenny; Denton, Margaret; Hutchison, Brian; McAiney, Carrie; Moore, Ainsley; Brazil, Kevin; Tindale, Joseph; Wu, Amina; Lam, Annie

    2016-12-01

    The purpose of the study examined in this article was to understand how non-physician health care professionals working in Canadian primary health care settings facilitate older persons' access to community support services (CSSs). The use of CSSs has positive impacts for clients, yet they are underused from lack of awareness. Using a qualitative description approach, we interviewed 20 health care professionals from various disciplines and primary health care models about the processes they use to link older patients to CSSs. Participants collaborated extensively with interprofessional colleagues within and outside their organizations to find relevant CSSs. They actively engaged patients and families in making these linkages and ensured follow-up. It was troubling to find that they relied on out-of-date resources and inefficient search strategies to find CSSs. Our findings can be used to develop resources and approaches to better support primary health care providers in linking older adults to relevant CSSs.

  18. Medium Access Control for Wireless Sensor Networks based on Impulse Radio Ultra Wideband

    OpenAIRE

    Berthe, Abdoulaye; Lecointre, Aubin; Dragomirescu, Daniela; Plana, Robert

    2010-01-01

    This paper describes a detailed performance evaluation of distributed Medium Access Control (MAC) protocols for Wireless Sensor Networks based on Impulse Radio Ultra Wideband (IR-UWB) Physical layer (PHY). Two main classes of Medium Access Control protocol have been considered: Slotted and UnSlotted with reliability. The reliability is based on Automatic Repeat ReQuest (ARQ). The performance evaluation is performed using a complete Wireless Sensor Networks (WSN) simulator built on the Global ...

  19. Implementation the NASA Planetary Data System PDS4 Providing Access to LADEE Data

    Science.gov (United States)

    Beebe, Reta F.; Huber , Lyle; Neakrase, Lynn; Reese, Shannon; Crichton, Daniel; Hardman, Sean; Delory, Gregory; Neese, Carol

    2014-11-01

    The NASA Planetary Data System (PDS) is responsible for archiving all planetary data acquired by robotic missions, and observational campaigns with ground/space-based observatories. PDS has moved to version 4 of its archive system. PDS4 uses XML to enhance search and retrieval capabilities. Although the efforts are system wide, the Atmospheres Node has acted as the lead node and is presenting a preliminary users interface for retrieval of LADEE data. LADEE provides the first opportunity to test out the end-to-end process of archiving data from an active mission into the new PDS4 architecture. The limited number of instruments, with simple data structures, is an ideal test of PDS4. XML uses schema (analogous to blueprints) to control the structure of the corresponding XML labels. In the case of PDS4, these schemas allow management of the labels and their content by forcing validation dictated by the underlying Information Model (IM). The use of a central IM is a vast improvement over PDS3 because of the uniformity it provides across all nodes. PDS4 has implemented a product-centric approach for archiving data and supplemental documentation. Another major change involves the Central Registry, where all products are registered and accessible to search engines. Under PDS4, documents, data, and other ancillary data are all products that are registered in the system. Together with the XML implementation, the Registry allows the search routines to be more complex and inclusive than they have been in the past. For LADEE, the PDS nodes and LADEE instrument teams worked together to identify data products that LADEE would produce. Documentation describing instruments and data products were produced by the teams and peer reviewed by PDS. XML label templates were developed by the PDS and provided to the instrument teams to integrate into their pipelines. Data from the primary mission (100 days) have been certified and harvested into the registry and are accessible through the

  20. E-health: potential benefits and challenges in providing and accessing sexual health services.

    Science.gov (United States)

    Minichiello, Victor; Rahman, Saifur; Dune, Tinashe; Scott, John; Dowsett, Gary

    2013-08-30

    E-health has become a burgeoning field in which health professionals and health consumers create and seek information. E-health refers to internet-based health care and information delivery and seeks to improve health service locally, regionally and worldwide. E-sexual health presents new opportunities to provide online sexual health services irrespective of gender, age, sexual orientation and location. The paper used the dimensions of the RE-AIM model (reach, efficacy, adoption, implementation and maintenance) as a guiding principle to discuss potentials of E-health in providing and accessing sexual health services. There are important issues in relation to utilising and providing online sexual health services. For healthcare providers, e-health can act as an opportunity to enhance their clients' sexual health care by facilitating communication with full privacy and confidentiality, reducing administrative costs and improving efficiency and flexibility as well as market sexual health services and products. Sexual health is one of the common health topics which both younger and older people explore on the internet and they increasingly prefer sexual health education to be interactive, non-discriminate and anonymous. This commentary presents and discusses the benefits of e-sexual health and provides recommendations towards addressing some of the emerging challenges. The provision of sexual health services can be enhanced through E-health technology. Doing this can empower consumers to engage with information technology to enhance their sexual health knowledge and quality of life and address some of the stigma associated with diversity in sexualities and sexual health experiences. In addition, e-sexual health may better support and enhance the relationship between consumers and their health care providers across different locations. However, a systematic and focused approach to research and the application of findings in policy and practice is required to ensure that

  1. AGRIS: providing access to agricultural research data exploiting open data on the web.

    Science.gov (United States)

    Celli, Fabrizio; Malapela, Thembani; Wegner, Karna; Subirats, Imma; Kokoliou, Elena; Keizer, Johannes

    2015-01-01

    AGRIS is the International System for Agricultural Science and Technology. It is supported by a large community of data providers, partners and users. AGRIS is a database that aggregates bibliographic data, and through this core data, related content across online information systems is retrieved by taking advantage of Semantic Web capabilities. AGRIS is a global public good and its vision is to be a responsive service to its user needs by facilitating contributions and feedback regarding the AGRIS core knowledgebase, AGRIS's future and its continuous development. Periodic AGRIS e-consultations, partner meetings and user feedback are assimilated to the development of the AGRIS application and content coverage. This paper outlines the current AGRIS technical set-up, its network of partners, data providers and users as well as how AGRIS's responsiveness to clients' needs inspires the continuous technical development of the application. The paper concludes by providing a use case of how the AGRIS stakeholder input and the subsequent AGRIS e-consultation results influence the development of the AGRIS application, knowledgebase and service delivery.

  2. A Novel Dual Separate Paths (DSP) Algorithm Providing Fault-Tolerant Communication for Wireless Sensor Networks.

    Science.gov (United States)

    Tien, Nguyen Xuan; Kim, Semog; Rhee, Jong Myung; Park, Sang Yoon

    2017-07-25

    Fault tolerance has long been a major concern for sensor communications in fault-tolerant cyber physical systems (CPSs). Network failure problems often occur in wireless sensor networks (WSNs) due to various factors such as the insufficient power of sensor nodes, the dislocation of sensor nodes, the unstable state of wireless links, and unpredictable environmental interference. Fault tolerance is thus one of the key requirements for data communications in WSN applications. This paper proposes a novel path redundancy-based algorithm, called dual separate paths (DSP), that provides fault-tolerant communication with the improvement of the network traffic performance for WSN applications, such as fault-tolerant CPSs. The proposed DSP algorithm establishes two separate paths between a source and a destination in a network based on the network topology information. These paths are node-disjoint paths and have optimal path distances. Unicast frames are delivered from the source to the destination in the network through the dual paths, providing fault-tolerant communication and reducing redundant unicast traffic for the network. The DSP algorithm can be applied to wired and wireless networks, such as WSNs, to provide seamless fault-tolerant communication for mission-critical and life-critical applications such as fault-tolerant CPSs. The analyzed and simulated results show that the DSP-based approach not only provides fault-tolerant communication, but also improves network traffic performance. For the case study in this paper, when the DSP algorithm was applied to high-availability seamless redundancy (HSR) networks, the proposed DSP-based approach reduced the network traffic by 80% to 88% compared with the standard HSR protocol, thus improving network traffic performance.

  3. Joint Mode Selection and Resource Allocation for Downlink Fog Radio Access Networks Supported D2D

    Directory of Open Access Journals (Sweden)

    Xiang Hongyu

    2015-09-01

    Full Text Available Presented as an innovative paradigm incorporating the cloud computing into radio access network, Cloud radio access networks (C-RANs have been shown advantageous in curtailing the capital and operating expenditures as well as providing better services to the customers. However, heavy burden on the non-ideal fronthaul limits performances of CRANs. Here we focus on the alleviation of burden on the fronthaul via the edge devices’ caches and propose a fog computing based RAN (F-RAN architecture with three candidate transmission modes: device to device, local distributed coordination, and global C-RAN. Followed by the proposed simple mode selection scheme, the average energy efficiency (EE of systems optimization problem considering congestion control is presented. Under the Lyapunov framework, the problem is reformulated as a joint mode selection and resource allocation problem, which can be solved by block coordinate descent method. The mathematical analysis and simulation results validate the benefits of F-RAN and an EE-delay tradeoff can be achieved by the proposed algorithm.

  4. Community access networks: how to connect the next billion to the ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Community access networks: how to connect the next billion to the Internet. Despite recent progress with mobile technology diffusion, more than four billion people worldwide are unconnected and have limited access to global communication infrastructure. The cost of implementing connectivity infrastructure in underserved ...

  5. An Ounce of Prevention: Technologists Use Network-Access Control to Protect System Resources, Students

    Science.gov (United States)

    Bolch, Matt

    2009-01-01

    Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…

  6. The Cybermobile: A Gateway for Public Access to Network-Based Information.

    Science.gov (United States)

    Drumm, John E.; Groom, Frank M.

    1997-01-01

    Though the bookmobile has fallen on hard times, the cybermobile, a technology platform combining personal computing, CD-ROMs, fiber network, and wireless access to the Internet, may be the next step in mobile library services. Discusses standard vehicle, computer hardware, software, wireless access, and alliances with users, vendors, and community…

  7. An Efficient Medium Access Control Strategy for High Speed WDM Multiaccess Networks

    NARCIS (Netherlands)

    Laarhuis, Jan H.; Laarhuis, Jan; Koonen, A.M.J.

    1993-01-01

    A medium access control (MAC) strategy that accounts for the limited tunability of present-day lasers and filters and yet supports a large total number of wavelengths in the network is proposed. Full interconnectivity, contention-free access and a high value of concurrency are achieved by dividing

  8. Transport capacity of wireless networks: benefits from multi-access computation coding

    NARCIS (Netherlands)

    Goseling, Jasper; Gastpar, Michael; Weber, Jos H.

    2009-01-01

    We consider the effect on the transport capacity of wireless networks of different physical layer coding mechanisms. We compare the performance of traditional channel coding techniques, turning the wireless network in reliable point-to-point channels, with multi-access computation coding, in which

  9. mCRAN: A radio access network architecture for 5G indoor ccommunications

    NARCIS (Netherlands)

    Chandra, Kishor; Cao, Zizheng; Bruintjes, Tom; Prasad, R.V.; Karagiannis, Georgios; Tangdiongga, E.; van den Boom, H.P.A.; Kokkeler, Andre B.J.

    2015-01-01

    Millimeter wave (mmWave) communication is being seen as a disruptive technology for 5G era. In particular, 60GHz frequency band has emerged as a promising candidate for multi-Gbps connectivity in indoor and hotspot areas. In terms of network architecture, cloud radio access network (CRAN) has

  10. Hybrid InP-SiGe photoreceiver for the access network

    NARCIS (Netherlands)

    Urban, P.J.; Leijtens, X.J.M.; Smalbrugge, E.; Vries, T. de; Noetzel, R.; Oei, Y.S.; Xu, L.; Heijningen, M. van; Bent, G. van der; Waardt, H. de; Smit, M.K.

    2008-01-01

    In this paper, we present a low cost and polarization independent photoreceiver which is part of the optical network unit (ONU) for the fiber access network. It consists of one InPphotodetector and a low cost SiGe amplifier. It operates error free with 223 − 1 PRBS word length at 1.25 Gbit/s with

  11. Converged wireline and wireless signal distribution in optical fiber access networks

    DEFF Research Database (Denmark)

    Prince, Kamau

    This thesis presents results obtained during the course of my doctoral studies into the transport of fixed and wireless signaling over a converged otpical access infrastructure. In the formulation, development and assessment of a converged paradigma for multiple-services delivery via optical access...... networking infrastructure, I have demonstrated increased functionalities with existing optical technologies and commercially available optoelectronic devices. I have developed novel systems for extending the range of optical access systems, and have demonstrated the repurposing of standard digital devices...

  12. Making the Most out of Direct-Access Network Attached Storage

    OpenAIRE

    Fedorova, Alexandra; Magoutis, Kostas; Addetia, Salimah; Seltzer, Margo

    2003-01-01

    The performance of high-speed network-attached storage applications is often limited by end-system overhead, caused primarily by memory copying and network protocol processing. In this paper, we examine alternative strategies for reducing overhead in such systems. We consider optimizations to remote procedure call (RPC)-based data transfer using either remote direct memory access (RDMA) or network interface support for pre-posting of application receive buffers. We demonstrate that b...

  13. A network of experimental forests and ranges: Providing soil solutions for a changing world

    Science.gov (United States)

    Mary Beth. Adams

    2010-01-01

    The network of experimental forests and ranges of the USDA Forest Service represents significant opportunities to provide soil solutions to critical issues of a changing world. This network of 81 experimental forests and ranges encompasses broad geographic, biological, climatic and physical scales, and includes long-term data sets, and long-term experimental...

  14. The challenges of M2M massive access in wireless cellular networks

    Directory of Open Access Journals (Sweden)

    Andrea Biral

    2015-02-01

    Full Text Available The next generation of communication systems, which is commonly referred to as 5G, is expected to support, besides the traditional voice and data services, new communication paradigms, such as Internet of Things (IoT and Machine-to-Machine (M2M services, which involve communication between Machine-Type Devices (MTDs in a fully automated fashion, thus, without or with minimal human intervention. Although the general requirements of 5G systems are progressively taking shape, the technological issues raised by such a vision are still partially unclear. Nonetheless, general consensus has been reached upon some specific challenges, such as the need for 5G wireless access networks to support massive access by MTDs, as a consequence of the proliferation of M2M services. In this paper, we describe the main challenges raised by the M2M vision, focusing in particular on the problems related to the support of massive MTD access in current cellular communication systems. Then we analyze the most common approaches proposed in the literature to enable the coexistence of conventional and M2M services in the current and next generation of cellular wireless systems. We finally conclude by pointing out the research challenges that require further investigation in order to provide full support to the M2M paradigm.

  15. Revenue-Maximizing Radio Access Technology Selection with Net Neutrality Compliance in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Elissar Khloussy

    2018-01-01

    Full Text Available The net neutrality principle states that users should have equal access to all Internet content and that Internet Service Providers (ISPs should not practice differentiated treatment on any of the Internet traffic. While net neutrality aims to restrain any kind of discrimination, it also grants exemption to a certain category of traffic known as specialized services (SS, by allowing the ISP to dedicate part of the resources for the latter. In this work, we consider a heterogeneous LTE/WiFi wireless network and we investigate revenue-maximizing Radio Access Technology (RAT selection strategies that are net neutrality-compliant, with exemption granted to SS traffic. Our objective is to find out how the bandwidth reservation for SS traffic would be made in a way that allows maximizing the revenue while being in compliance with net neutrality and how the choice of the ratio of reserved bandwidth would affect the revenue. The results show that reserving bandwidth for SS traffic in one RAT (LTE can achieve higher revenue. On the other hand, when the capacity is reserved across both LTE and WiFi, higher social benefit in terms of number of admitted users can be realized, as well as lower blocking probability for the Internet access traffic.

  16. Reconfigurable radio access unit to dynamically distribute W-band signals in 5G wireless access networks

    DEFF Research Database (Denmark)

    Rodríguez Páez, Juan Sebastián; Rommel, Simon; Vegas Olmos, Juan José

    2017-01-01

    In this paper a new type of radio access unit is proposed and demonstrated. This unit is composed only of the reduced amount of components (compared to conventional unit designs) to optically generate wireless signals on the W-band (75–110 GHz) in combination with a switching system. The proposed...... system not only achieves BER values below the FEC limit, but gives an extra level of flexibility to the network by easing the redirection of the signal to different antennas....

  17. Throughput fairness enhancement using differentiated channel access in heterogeneous sensor networks.

    Science.gov (United States)

    Kim, Eui-Jik; Shon, Taeshik; Park, James Jong Hyuk; Jeong, Young-Sik

    2011-01-01

    Nowadays, with wireless sensor networks (WSNs) being widely applied to diverse applications, heterogeneous sensor networks (HSNs), which can simultaneously support multiple sensing tasks in a common sensor field, are being considered as the general form of WSN system deployment. In HSNs, each application generates data packets with a different size, thereby resulting in fairness issues in terms of the network performance. In this paper, we present the design and performance evaluation of a differentiated channel access scheme (abbreviated to DiffCA) to resolve the fairness problem in HSNs. DiffCA achieves fair performance among the application groups by providing each node with an additional backoff counter, whose value varies according to the size of the packets. A mathematical model based on the discrete time Markov chain is presented and is analyzed to measure the performance of DiffCA. The numerical results show that the performance degradation of disadvantaged application groups can be effectively compensated for by DiffCA. Simulation results are given to verify the accuracy of the numerical model.

  18. Radiofrequency exposure near an attocell as part of an ultra-high density access network.

    Science.gov (United States)

    Thielens, Arno; Vermeeren, Günter; Caytan, Olivier; Torfs, Guy; Demeester, Piet; Bauwelinck, Johan; Rogier, Hendrik; Martens, Luc; Joseph, Wout

    2017-05-01

    In the future, wireless radiofrequency (RF) telecommunications networks will provide users with gigabit-per-second data rates. Therefore, these networks are evolving toward hybrid networks, which will include commonly used macro- and microcells in combination with local ultra-high density access networks consisting of so-called attocells. The use of attocells requires a proper compliance assessment of exposure to RF electromagnetic radiation. This paper presents, for the first time, such a compliance assessment of an attocell operating at 3.5 GHz with an input power of 1 mW, based on both root-mean-squared electric field strength (Erms ) and peak 10 g-averaged specific absorption rate (SAR10g ) values. The Erms values near the attocell were determined using finite-difference time-domain (FDTD) simulations and measurements by a tri-axial probe. They were compared to the International Commission on Non-Ionizing Radiation Protection's (ICNIRP) reference levels. All measured and simulated Erms values above the attocell were below 5.9 V/m and lower than reference levels. The SAR10g values were measured in a homogeneous phantom, which resulted in an SAR10g of 9.7 mW/kg, and used FDTD simulations, which resulted in an SAR10g of 7.2 mW/kg. FDTD simulations of realistic exposure situations were executed using a heterogeneous phantom, which yielded SAR10g values lower than 2.8 mW/kg. The studied dosimetric quantities were in compliance with ICNIRP guidelines when the attocell was fed an input power <1 mW. The deployment of attocells is thus a feasible solution for providing broadband data transmission without drastically increasing personal RF exposure. Bioelectromagnetics. 38:295-306, 2017. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  19. Improved Data Transmission Scheme of Network Coding Based on Access Point Optimization in VANET

    Directory of Open Access Journals (Sweden)

    Zhe Yang

    2014-01-01

    Full Text Available VANET is a hot spot of intelligent transportation researches. For vehicle users, the file sharing and content distribution through roadside access points (AP as well as the vehicular ad hoc networks (VANET have been an important complement to that cellular network. So the AP deployment is one of the key issues to improve the communication performance of VANET. In this paper, an access point optimization method is proposed based on particle swarm optimization algorithm. The transmission performances of the routing protocol with random linear network coding before and after the access point optimization are analyzed. The simulation results show the optimization model greatly affects the VANET transmission performances based on network coding, and it can enhance the delivery rate by 25% and 14% and reduce the average delay of transmission by 38% and 33%.

  20. African Copyright and Access to Knowledge Network (ACA2K ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Africa is a net importer of intellectual property covered by copyright rules. The African Comparative Copyright Review (ACCR) believes that a stringent copyright climate could limit access to knowledge goods and thereby hinder the emergence of local innovation and learning. This project will allow the ACCR to bring ...

  1. African Copyright and Access to Knowledge Network (ACA2K ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Legislative review : review of IPR Act and regulations : Intellectual Property Rights from Publically Financed Research and Development Act, Act No. 51 of 2008, Republic of South Africa. Download PDF. Journal articles. Copyright and education : lessons on African copyright and access to knowledge. Download PDF ...

  2. Sophisticated Online Learning Scheme for Green Resource Allocation in 5G Heterogeneous Cloud Radio Access Networks

    KAUST Repository

    Alqerm, Ismail

    2018-01-23

    5G is the upcoming evolution for the current cellular networks that aims at satisfying the future demand for data services. Heterogeneous cloud radio access networks (H-CRANs) are envisioned as a new trend of 5G that exploits the advantages of heterogeneous and cloud radio access networks to enhance spectral and energy efficiency. Remote radio heads (RRHs) are small cells utilized to provide high data rates for users with high quality of service (QoS) requirements, while high power macro base station (BS) is deployed for coverage maintenance and low QoS users service. Inter-tier interference between macro BSs and RRHs and energy efficiency are critical challenges that accompany resource allocation in H-CRANs. Therefore, we propose an efficient resource allocation scheme using online learning, which mitigates interference and maximizes energy efficiency while maintaining QoS requirements for all users. The resource allocation includes resource blocks (RBs) and power. The proposed scheme is implemented using two approaches: centralized, where the resource allocation is processed at a controller integrated with the baseband processing unit and decentralized, where macro BSs cooperate to achieve optimal resource allocation strategy. To foster the performance of such sophisticated scheme with a model free learning, we consider users\\' priority in RB allocation and compact state representation learning methodology to improve the speed of convergence and account for the curse of dimensionality during the learning process. The proposed scheme including both approaches is implemented using software defined radios testbed. The obtained results and simulation results confirm that the proposed resource allocation solution in H-CRANs increases the energy efficiency significantly and maintains users\\' QoS.

  3. Data Access Based on a Guide Map of the Underwater Wireless Sensor Network.

    Science.gov (United States)

    Wei, Zhengxian; Song, Min; Yin, Guisheng; Song, Houbing; Wang, Hongbin; Ma, Xuefei; Cheng, Albert M K

    2017-10-17

    Underwater wireless sensor networks (UWSNs) represent an area of increasing research interest, as data storage, discovery, and query of UWSNs are always challenging issues. In this paper, a data access based on a guide map (DAGM) method is proposed for UWSNs. In DAGM, the metadata describes the abstracts of data content and the storage location. The center ring is composed of nodes according to the shortest average data query path in the network in order to store the metadata, and the data guide map organizes, diffuses and synchronizes the metadata in the center ring, providing the most time-saving and energy-efficient data query service for the user. For this method, firstly the data is stored in the UWSN. The storage node is determined, the data is transmitted from the sensor node (data generation source) to the storage node, and the metadata is generated for it. Then, the metadata is sent to the center ring node that is the nearest to the storage node and the data guide map organizes the metadata, diffusing and synchronizing it to the other center ring nodes. Finally, when there is query data in any user node, the data guide map will select a center ring node nearest to the user to process the query sentence, and based on the shortest transmission delay and lowest energy consumption, data transmission routing is generated according to the storage location abstract in the metadata. Hence, specific application data transmission from the storage node to the user is completed. The simulation results demonstrate that DAGM has advantages with respect to data access time and network energy consumption.

  4. Robotics and telecommunication systems to provide better access to ultrasound expertise in the OR.

    Science.gov (United States)

    Angelini, L; Papaspyropoulos, V

    2000-01-01

    Surgery has begun to evolve as a result of the intense use of technological innovations. The result of this is better services for patients and enormous opportunities for the producers of biomedical instruments. The surgeon and the technologist are fast becoming allies in applying the latest developments of robotics, image treatment, simulation, sensors and telecommunications to surgery, in particular to the emerging field of minimally-invasive surgery. Ultrasonography is at present utilised both for diagnostic and therapeutic purposes in various fields. Intraoperative US examination can be of primary importance, especially when dealing with space-occupying lesions. The widening use of minimally-invasive surgery has furthered the development of US for use during this type of surgery. The success of a US examination requires not only a correct execution of the procedure, but also a correct interpretation of the images. We describe two projects that combine robotics and telecommunication systems to provide better access to US expertise in the operating room. The Midstep project has as its object the realisation of two robotic arms, one for the distant control of the US probe during laparoscopic surgery and the second to perform tele-interventional US. The second project, part of the Strategic CNR Project-'Robotics in Surgery', involves the realisation of a common platform for tracking and targeting surgical instruments in video-assisted surgery.

  5. Providing Open-Access Know How for Directors of Quantitative and Mathematics Support Centers

    Directory of Open Access Journals (Sweden)

    Michael Schuckers

    2017-01-01

    Full Text Available The purpose of this editorial is to introduce the quantitative literacy community to the newly published A Handbook for Directors of Quantitative and Mathematics Centers. QMaSCs (pronounced “Q-masks” can be broadly defined as centers that have supporting students in quantitative fields of study as part of their mission. Some focus only on calculus or mathematics; others concentrate on numeracy or quantitative literacy, and some do all of that. A QMaSC may be embedded in a mathematics department, or part of a learning commons, or a stand-alone center. There are hundreds of these centers in the U.S. The new handbook, which is the outgrowth of a 2013 NSF-sponsored, national workshop attended by 23 QMaSC directors from all quarters of the U.S., is available open access on the USF Scholar Commons and in hard copy from Amazon.com. This editorial by the handbook’s editors provides background and overview of the 20 detailed chapters on center leadership and management; community interactions; staffing, hiring and training; center assessment; and starting a center; and then a collection of ten case studies from research universities, four-year state colleges, liberal arts colleges, and a community college. The editorial ends by pointing out the need and potential benefits of a professional organization for QMaSC directors.

  6. PIMS Data Storage, Access, and Neural Network Processing

    Science.gov (United States)

    McPherson, Kevin M.; Moskowitz, Milton E.

    1998-01-01

    The Principal Investigator Microgravity Services (PIMS) project at NASA's Lewis Research Center has supported microgravity science Principal Investigator's (PIs) by processing, analyzing, and storing the acceleration environment data recorded on the NASA Space Shuttles and the Russian Mir space station. The acceleration data recorded in support of the microgravity science investigated on these platforms has been generated in discrete blocks totaling approximately 48 gigabytes for the Orbiter missions and 50 gigabytes for the Mir increments. Based on the anticipated volume of acceleration data resulting from continuous or nearly continuous operations, the International Space Station (ISS) presents a unique set of challenges regarding the storage of and access to microgravity acceleration environment data. This paper presents potential microgravity environment data storage, access, and analysis concepts for the ISS era.

  7. Free Access to Point of Care Resource Results in Increased Use and Satisfaction by Rural Healthcare Providers

    Directory of Open Access Journals (Sweden)

    Lindsay Alcock

    2016-12-01

    Full Text Available A Review of: Eldredge, J. D., Hall, L. J., McElfresh, K. R., Warner, T. D., Stromberg, T. L., Trost, J. T., & Jelinek, D. A. (2016. Rural providers’ access to online resources: A randomized controlled trial. Journal of the Medical Library Association, 104(1, 33-41. http://dx.doi.org/10.3163/1536-5050.104.1.005 Objective – To determine whether free access to the point of care (PoC resource Dynamed or the electronic book collection AccessMedicine was more useful to rural health care providers in answering clinical questions in terms of usage and satisfaction. Design – Randomized controlled trial. Setting – Rural New Mexico. Subjects – Twenty-eight health care providers (physicians, nurses, physician assistants, and pharmacists with no reported access to PoC resources, (specifically Dynamed and AccessMedicine or electronic textbook collections prior to enrollment.

  8. Opportunistic Access in Frequency Hopping Cognitive Radio Networks

    Science.gov (United States)

    2014-03-27

    frequency hopping radio to mitigate the interference caused by other transmitters in a contentious environment such as the unlicensed 2.4 GHz region...Avionics Circle WPAFB, OH 45433 vasu.chakravarthy@us.af.mil 937- 528 -8269 AFRL/RYWE 12. DISTRIBUTION / AVAILABILITY STATEMENT DISTRIBUTION STATEMENT A...unlicensed 2.4 GHz region. Additionally, this work demonstrates how dynamic spectrum access techniques can be used not only to prevent interfering with

  9. Admission Control and Interference Management in Dynamic Spectrum Access Networks

    Directory of Open Access Journals (Sweden)

    Jorge Martinez-Bauset

    2010-01-01

    Full Text Available We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs. In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.

  10. Performance evaluation of multilevel modulation formats using partial response for capacity upgrade in access network with limited electronic bandwidth

    DEFF Research Database (Denmark)

    Madsen, Peter; Suhr, Lau Frejstrup; Rodríguez Páez, Juan Sebastián

    2016-01-01

    We present a successful experimental evaluation of 4 level Pulse Amplitude Modulation (4-PAM) and Duobinary modulation. An experimental performance evaluation is presented for Duobinary 4 PAM and other modulation formats. All modulation formants used, may be considered to be implemented in future...... Passive Optical Network (PON) class access networks with limited electrical bandwidth. We compared NRZ, Duobinary, 4-PAM and Duobinary 4-PAM operating at 9 Gbaud over 20 km single mode fiber. The results provides an insight and guidelines on the utilization of these advanced modulation formats....

  11. Market opening and third party access in district heating networks

    Energy Technology Data Exchange (ETDEWEB)

    Soederholm, Patrik; Waarell, Linda [Luleaa University of Technology, Department of Business Administration and Social Sciences, Economics Unit, SE-971 87 Luleaa (Sweden)

    2011-02-15

    The purpose of this paper is to analyse the possible effects of introducing TPA in district heating networks by identifying and scrutinizing a number of possible scenarios for increased competition. The analysis builds on a theoretical discussion of economic efficiency in district heating operations, and the possible impacts on consumer prices of a market opening. An important conclusion is that regulated TPA may have small positive effects on competition, and at the same time it can have a negative impact on the possibility to run the integrated district heating operations in a cost-effective manner. This conclusion stems in part from the observation that most district heating networks are local in scope. Moreover, district heating operations are highly interdependent in, for instance, that the level of the return temperature of the water will affect the efficiency of combined heat and power plants. For these reasons, the introduction of the so-called single-buyer model or, perhaps even more preferable, an extended and more transparent producer market could represent more efficient market designs. Moreover, in networks with clear natural monopoly characteristics an ex ante price regulation must be considered. (author)

  12. CHORUS – providing a scalable solution for public access to scholarly research

    Directory of Open Access Journals (Sweden)

    Howard Ratner

    2014-03-01

    Full Text Available CHORUS (Clearinghouse for the Open Research of the United States offers an open technology platform in response to the public access requirements of US federal funding agencies, researchers, institutions and the public. It is focused on five principal sets of functions: 'identification', 'preservation', 'discovery', 'access', and 'compliance' . CHORUS facilitates public access to peer-reviewed publications, after a determined embargo period (where applicable, for each discipline and agency. By leveraging existing tools such as CrossRef, FundRef and ORCID, CHORUS allows a greater proportion of funding to remain focused on research. CHORUS identifies articles that report on federally funded research and enables a reader to access the ‘best available version’ free of charge, via the publisher. It is a scalable solution that offers maximum efficiency for all parties by automating as much of the process as is possible. CHORUS launched in pilot phase in September 2013, and the production phase will begin in early 2014.

  13. An Open-Access Modeled Passenger Flow Matrix for the Global Air Network in 2010

    Science.gov (United States)

    Huang, Zhuojie; Wu, Xiao; Garcia, Andres J.; Fik, Timothy J.; Tatem, Andrew J.

    2013-01-01

    The expanding global air network provides rapid and wide-reaching connections accelerating both domestic and international travel. To understand human movement patterns on the network and their socioeconomic, environmental and epidemiological implications, information on passenger flow is required. However, comprehensive data on global passenger flow remain difficult and expensive to obtain, prompting researchers to rely on scheduled flight seat capacity data or simple models of flow. This study describes the construction of an open-access modeled passenger flow matrix for all airports with a host city-population of more than 100,000 and within two transfers of air travel from various publicly available air travel datasets. Data on network characteristics, city population, and local area GDP amongst others are utilized as covariates in a spatial interaction framework to predict the air transportation flows between airports. Training datasets based on information from various transportation organizations in the United States, Canada and the European Union were assembled. A log-linear model controlling the random effects on origin, destination and the airport hierarchy was then built to predict passenger flows on the network, and compared to the results produced using previously published models. Validation analyses showed that the model presented here produced improved predictive power and accuracy compared to previously published models, yielding the highest successful prediction rate at the global scale. Based on this model, passenger flows between 1,491 airports on 644,406 unique routes were estimated in the prediction dataset. The airport node characteristics and estimated passenger flows are freely available as part of the Vector-Borne Disease Airline Importation Risk (VBD-Air) project at: www.vbd-air.com/data. PMID:23691194

  14. Louisiana coastal GIS network: Graphical user interface for access to spatial data

    Science.gov (United States)

    Hiland, Matteson; McBride, Randolph A.; Davis, Donald; Braud, Dewitt; Streiffer, Henry; Jones, Farrell; Lewis, Anthony; Williams, S.

    1991-01-01

    Louisiana's coastal wetlands support a large percentage of the nation's seafood and fur industries, vast deposits of oil and natural gas, habitat for thousands of species of plants and animals, winter nesting grounds and migratory paths for numerous waterfowl, and many recreational resources enjoyed by residents and tourists. Louisiana's wetlands also have the highest rates of coastal erosion and wetland loss in the nation. While numerous studies across many disciplines have been conducted on both local and regional scales, no complete inventory exists for this information. The Louisiana Coastal Geographic Information System Network (LCGISN) is currently being developed to facilitate access to existing data for coastal zone planners, managers, and researchers. The Louisiana Geological Survey (LGS), in cooperation with the LSU Department of Geography and Anthropology, the Computer Aided Design and Geographic Information Systems Research Laboratory (CADGIS), and others, is pursuing this project under the terms of a cooperative agreement with the U.S. Geological Survey. LCGISN is an automated system for searching and retrieving geographic, cartographic, and bibliographic data. By linking original programming with an existing GIS software package and an industry standard relational database management system, LCGISN will provide the capability for users to search for data references by interactively defining the area of interest on a displayed map/image reference background. Several agencies will be networked to provide easy access to a wide variety of information. LCGISN, with its headquarters at LGS, will serve as the central node on the network, providing data format conversions, projection and datum transformations, and storage of several of the most commonly used data sets. Thematic mapper data, USGS 7.5-minute quadrangle map boundaries, political and legal boundaries, major transportation routes, and other digital data will provide a base map to aid the user in

  15. Impact of the 'Providing Access to Continued Education' Programme on Repeat Teenage Pregnancy in the Bahamas.

    Science.gov (United States)

    Sakharkar, V P; Frankson, M A; Sakharkar, P R

    2015-05-15

    To determine the relationship of determinants such as age, ethnicity, education and sexual behaviour with repeat teenage pregnancy and to determine the impact of 'Providing Access to Continued Education' (PACE) programme in reducing repeat teenage pregnancy amongst its participants in The Bahamas. This retrospective cohort study included 397 attendees of the Adolescent Health Centre (AHC). Eighty-eight out of 139 registered participants completed the PACE programme. Data on age, ethnicity, education, sexual behaviour and repeat pregnancy in two years were analysed for descriptive statistics, and association of demographic characteristics and participation in the PACE programme with repeat pregnancy using the Chi-squared test. Mean age of participants was 16.4 ± 1.1 years; median school grade and mean grade point average (GPA) was 11 and 1.97 ± 0.7, respectively. The mean age at the first sexual activity was 14.9 ± 1.2 years. The mean age and number of sexual partners were 21 ± 4.3 years and 2 ± 1, respectively. Overall, repeat pregnancy rate was 39%: 37.4% amongst PACE registered and 31.8% amongst PACE completed mothers. No significant difference was observed in repeat pregnancy between registered and non-registered as well as those who completed the programme and those who did not. The odds ratio of 0.525 suggested that completion of the PACE programme had a moderate protective effect on reducing repeat pregnancy. Age, ethnicity, education and sexual behaviour showed no association with repeat pregnancy. The PACE programme did not reduce repeat pregnancy rate significantly. However, completion of the programme offered a moderate protection.

  16. Shared networks of interpreter services, at relatively low cost, can help providers serve patients with limited english skills.

    Science.gov (United States)

    Jacobs, Elizabeth A; Leos, Ginelle Sanchez; Rathouz, Paul J; Fu, Paul

    2011-10-01

    Language barriers in health care-a large and growing problem in the United States-contribute to disparities in health care quality and outcomes in populations with limited English proficiency. Providing access to adequate interpreter services has been shown to reduce health disparities in these populations. However, many health care organizations do not provide such services because of the perceived high cost. In this observational study we calculated the costs incurred by a group of California public hospitals that formed a network to make trained interpreters available via videoconference and telephone. We found that encounters in this network where interpreters helped patients and providers communicate lasted an average of 10.6 minutes and cost an average of $24.86 per encounter. Such costs should be weighed against the likely alternatives, such as the opportunity costs of having other hospital staff act as ad hoc interpreters; medical errors that could result from inadequate interpretation; and the fact that not providing such services may leave providers out of compliance with federal law. We also discuss ways in which providers could be compensated for providing interpreter services.

  17. Adaptive Information Access in Multiple Applications Support Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2012-01-01

    set of requirements. Lastly, the paper suggests a mechanism by which the information access or acquisition can be adapted as per the requirements of the application. The main parameters focused in this paper are mismatch probability [1] and power dissipation with respect to sampling rate....... specific WSN considering its resource constraints, neglecting the return-of-investment and usefulness of the system. In this paper, we bring out the WSN scenario which supports multiple applications and study the challenges that would pose in implementation as each specific application has its own specific...

  18. Fairness problems at the media access level for high-speed networks

    Science.gov (United States)

    Maly, Kurt J.; Zhang, L.; Game, David

    1990-01-01

    Most lower speed (approx. 10 Mbps) local area networks use adaptive or random access protocols like Ethernet. Others at higher speed use demand assignment like token or slotted rings. These include Cambridge ring and electronic token ring systems. Fairness issues in representatives of such protocols are discussed. In particular, Fiber Distributed Data Interface (FDDI) was selected as a demand access protocol using tokens, Carrier Sensed Multiple Access/Ring Network (CSMA/RN) a random access protocol, and Distributed Queue Dual Bus (DQDB) a demand access protocol using reservations. Fairness at the media access level was the focus, i.e., attaining access or being excessively delayed when a message is queued to be sent as a function of network location. Within that framework, the essential fairness of FDDI was observed along with severe fairness problems in DQDB and some problems for CSMA/RN. Several modifications were investigated and their ameliorative effect is shown. Finally, a unified presentation which allows comparisons of the three protocols' fairness when normalized to their capacity is given.

  19. Setting Access Permission through Transitive Relationship in Web-based Social Networks

    Science.gov (United States)

    Hong, Dan; Shen, Vincent Y.

    The rising popularity of various social networking websites has created a huge problem on Internet privacy. Although it is easy to post photos, comments, opinions on some events, etc. on the Web, some of these data (such as a person’s location at a particular time, criticisms of a politician, etc.) are private and should not be accessed by unauthorized users. Although social networks facilitate sharing, the fear of sending sensitive data to a third party without knowledge or permission of the data owners discourages people from taking full advantage of some social networking applications. We exploit the existing relationships on social networks and build a ‘‘trust network’’ with transitive relationship to allow controlled data sharing so that the privacy and preferences of data owners are respected. The trust network linking private data owners, private data requesters, and intermediary users is a directed weighted graph. The permission value for each private data requester can be automatically assigned in this network based on the transitive relationship. Experiments were conducted to confirm the feasibility of constructing the trust network from existing social networks, and to assess the validity of permission value assignments in the query process. Since the data owners only need to define the access rights of their closest contacts once, this privacy scheme can make private data sharing easily manageable by social network participants.

  20. Passive Optical Access Networks: State of the Art and Future Evolution

    Directory of Open Access Journals (Sweden)

    Tommaso Muciaccia

    2014-10-01

    Full Text Available In the very last years, optical access networks are growing very rapidly, from both the network operators and the research interests points of view. Fiber To The Home (FTTH is already a reality in plenty of real contexts and there has been a further stimulus to the proposal of new solutions and the investigation of new possibilities, in order to optimize network performance and reduce capital and operational expenditure. A complete and systematic overview of passive optical access networks is presented in this paper, concerning both the hot research topics and the main operative issues about the design guidelines and the deployment of Passive Optical Networks (PON architectures, nowadays the most commonly implemented approach to realize optical fiber links in the access networks. A comparison of advantages and disadvantages of different multiplexing techniques is discussed, with specific reference to WDM-based networks, almost universally considered as the enabling technology for future proof bandwidth requirements. An exhaustive summary is also given about the-state-of-the-art of modulation and encoding techniques recently proposed by the scientific community, as well as the open challenges (such as colorless and coolerless ONUs for telecom companies and international standardization compliance.

  1. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  2. A novel root-index based prioritized random access scheme for 5G cellular networks

    Directory of Open Access Journals (Sweden)

    Taehoon Kim

    2015-12-01

    Full Text Available Cellular networks will play an important role in realizing the newly emerging Internet-of-Everything (IoE. One of the challenging issues is to support the quality of service (QoS during the access phase, while accommodating a massive number of machine nodes. In this paper, we show a new paradigm of multiple access priorities in random access (RA procedure and propose a novel root-index based prioritized random access (RIPRA scheme that implicitly embeds the access priority in the root index of the RA preambles. The performance evaluation shows that the proposed RIPRA scheme can successfully support differentiated performance for different access priority levels, even though there exist a massive number of machine nodes.

  3. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  4. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abdul Razaque

    2014-03-01

    Full Text Available This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC for wireless sensor networks (WSNs, which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN, which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS, which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS, which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  5. Geographic Disparities in Access to Agencies Providing Income-Related Social Services.

    Science.gov (United States)

    Bauer, Scott R; Monuteaux, Michael C; Fleegler, Eric W

    2015-10-01

    Geographic location is an important factor in understanding disparities in access to health-care and social services. The objective of this cross-sectional study is to evaluate disparities in the geographic distribution of income-related social service agencies relative to populations in need within Boston. Agency locations were obtained from a comprehensive database of social services in Boston. Geographic information systems mapped the spatial relationship of the agencies to the population using point density estimation and was compared to census population data. A multivariate logistic regression was conducted to evaluate factors associated with categories of income-related agency density. Median agency density within census block groups ranged from 0 to 8 agencies per square mile per 100 population below the federal poverty level (FPL). Thirty percent (n = 31,810) of persons living below the FPL have no access to income-related social services within 0.5 miles, and 77 % of persons living below FPL (n = 83,022) have access to 2 or fewer agencies. 27.0 % of Blacks, 30.1 % of Hispanics, and 41.0 % of non-Hispanic Whites with incomes below FPL have zero access. In conclusion, some neighborhoods in Boston with a high concentration of low-income populations have limited access to income-related social service agencies.

  6. Impact of green technologies in optical networks case study: green wireless optical broadband access network

    Science.gov (United States)

    Puche, William S.; Sierra, Javier E.

    2014-09-01

    This article analyzes the current state of green technologies in optical telecommunications networks, analyzing in detail the basic structure of a hybrid network (Optical-Wireless), taking into account energy consumption by proposing a mathematical model is presented to establish the optimum number of ONUs in a network.

  7. Building a multimodal network and determining individual accessibility by public transportation

    DEFF Research Database (Denmark)

    Djurhuus, Sune; Hansen, Henning Sten; Aadahl, Mette

    2016-01-01

    time thresholds. The method is used successfully to create a multimodal travel-time network model of the Capital Region of Denmark comprising bus, train, light rail, metro, and ferry as well as integrating walking or cycling to stops. Here, the individual accessibility is defined as accessibility areas......The increased availability of transit schedules from web sites or travel planners as well as more disaggregate data has led to a growing interest in creating individual public transportation accessibility measures. However, used extensively, standard GIS software does not have direct capabilities...... to integrate transit schedules into multimodal networks and measure space–time-based accessibility. This has caused authors to either simplify travel time elements or develop tools to overcome these challenges. In this paper we aim to describe and implement a method that enables integrating time-table data...

  8. A Framework Design for Load-balanced Green Access Networks supporting GSM Femtocell

    Directory of Open Access Journals (Sweden)

    Ray-Guang Cheng

    2015-02-01

    Full Text Available Reducing the energy consumption and carbon footprint emissions to improve the global climate change has become the global concern. However, CO2 generated from the current mobile devices and infrastructure has increased. Many researchers intended to develop the communication systems with low energy-consumption technologies, called the green communication. This paper proposes a framework of the load balanced green access network supporting the GSM femtocell service. By using the USRP software-defined radio device, we can build a GSM femtocell base station by software configuration. Besides, the proposed network can also extend the coverage of base stations by integrating with radio over fiber technology. With the load balancer, the proposed green access network can accomplish low power consumption, high energy efficiency, and easy to maintain. The experimental results showed that it can effectively save 24% energy consumption for the overall network and meet the quality-of-service of user when the proposed framework is applied.

  9. A Method for Upper Bounding Long Term Growth of Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Pedersen, Jens Myrup; Madsen, Ole Brun

    2004-01-01

    The development in home Internet access speed has shown an exponential development with growth rates averaging 25% per year. For resource management in network provisioning it becomes an urgent question how long such growth can continue. This paper presents a method for calculating an upper bound...... to visual content driven growth, proceeding from datarate requirements for a full virtual environment. Scenarios and approaches for reducing datarate requirements are considered and discussed. The presented figures for an upper bound on network access speed are discussed and perspectives on further research...

  10. Low-complexity co-tier interference reduction scheme in open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh

    2011-12-01

    This paper addresses the effect of co-tier interference on the performance of multiuser overlaid cellular networks that share the same available resources. It assumed that each macrocell contains a number of self-configurable and randomly located femtocells that employ the open-access control strategy to reduce the effect of cross-tier interference. It is also assumed that the desired user equipment (UE) can access only one of the available channels, maintains simple decoding circuitry with single receive antenna, and has limited knowledge of the instantaneous channel state information (CSI) due to resource limitation. To mitigate the effect of co-tier interference in the absence of the CSI of the desired UE, a low-complexity switched-based scheme for single channel selection based on the predicted interference levels associated with available channels is proposed for the case of over-loaded channels. Through the analysis, new general formulation for the statistics of the resulting instantaneous interference power and some performance measures are presented. The effect of the switching threshold on the efficiency and performance of the proposed scheme is studied. Numerical and simulation results to clarify the usefulness of the proposed scheme in reducing the impact of co-tier interference are also provided. © 2011 IEEE.

  11. Broadband and scalable mobile satellite communication system for future access networks

    Science.gov (United States)

    Ohata, Kohei; Kobayashi, Kiyoshi; Nakahira, Katsuya; Ueba, Masazumi

    2005-07-01

    Due to the recent market trends, NTT has begun research into next generation satellite communication systems, such as broadband and scalable mobile communication systems. One service application objective is to provide broadband Internet access for transportation systems, temporal broadband access networks and telemetries to remote areas. While these are niche markets the total amount of capacity should be significant. We set a 1-Gb/s total transmission capacity as our goal. Our key concern is the system cost, which means that the system should be unified system with diversified services and not tailored for each application. As satellites account for a large portion of the total system cost, we set the target satellite size as a small, one-ton class dry mass with a 2-kW class payload power. In addition to the payload power and weight, the mobile satellite's frequency band is extremely limited. Therefore, we need to develop innovative technologies that will reduce the weight and maximize spectrum and power efficiency. Another challenge is the need for the system to handle up to 50 dB and a wide data rate range of other applications. This paper describes the key communication system technologies; the frequency reuse strategy, multiplexing scheme, resource allocation scheme, and QoS management algorithm to ensure excellent spectrum efficiency and support a variety of services and quality requirements in the mobile environment.

  12. Channel Access and Power Control for Mobile Crowdsourcing in Device-to-Device Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yue Ma

    2018-01-01

    Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.

  13. A scalable and continuous-upgradable optical wireless and wired convergent access network.

    Science.gov (United States)

    Sung, J Y; Cheng, K T; Chow, C W; Yeh, C H; Pan, C-L

    2014-06-02

    In this work, a scalable and continuous upgradable convergent optical access network is proposed. By using a multi-wavelength coherent comb source and a programmable waveshaper at the central office (CO), optical millimeter-wave (mm-wave) signals of different frequencies (from baseband to > 100 GHz) can be generated. Hence, it provides a scalable and continuous upgradable solution for end-user who needs 60 GHz wireless services now and > 100 GHz wireless services in the future. During the upgrade, user only needs to upgrade their optical networking unit (ONU). A programmable waveshaper is used to select the suitable optical tones with wavelength separation equals to the desired mm-wave frequency; while the CO remains intact. The centralized characteristics of the proposed system can easily add any new service and end-user. The centralized control of the wavelength makes the system more stable. Wired data rate of 17.45 Gb/s and w-band wireless data rate up to 3.36 Gb/s were demonstrated after transmission over 40 km of single-mode fiber (SMF).

  14. Coordinated Scheduling and Power Control in Cloud-Radio Access Networks

    KAUST Repository

    Douik, Ahmed

    2015-12-01

    This paper addresses the joint coordinated scheduling and power control problem in cloud-enabled networks. Consider the downlink of a cloud-radio access network (CRAN), where the cloud is only responsible for the scheduling policy, power control, and synchronization of the transmit frames across the single-antenna base-stations (BS). The transmit frame consists of several time/frequency blocks, called power-zones (PZ). The paper considers the problem of scheduling users to PZs and determining their power levels (PL), by maximizing the weighted sum-rate under the practical constraints that each user cannot be served by more than one base-station, but can be served by one or more power-zones within each base-station frame. The paper solves the problem using a graph theoretical approach by introducing the joint scheduling and power control graph formed by several clusters, where each is formed by a set of vertices, representing the possible association of users, BSs, and PLs for one specific PZ. The problem is, then, formulated as a maximumweight clique problem, in which the weight of each vertex is the sum of the benefits of the individual associations belonging to that vertex. Simulation results suggest that the proposed crosslayer scheme provides appreciable performance improvement as compared to schemes from recent literature.

  15. Arkansas Special Populations Access Network perception versus reality--cancer screening in primary care clinics.

    Science.gov (United States)

    Rutledge, William; Gibson, Regina; Siegel, Eric; Duke, Kelly; Jones, Rise; Rucinski, Diane; Nunn, Gary; Torrence, W Alvin; Lewellen-Williams, Charlotte; Stewart, Chara; Blann, Kimberly; Belleton, Larry; Fincher, Lindsey; Klimberg, V Suzanne; Greene, Paul; Thomas, Billy; Erwin, Deborah; Henry-Tillman, Ronda

    2006-10-15

    The origin of cancer health disparities and mortality in Arkansas is multifactorial. In response to a cooperative agreement with the National Cancer Institute's Center to Reduce Cancer Health Disparities, the Arkansas Special Populations Access Network (ASPAN) was developed to reduce these disparities. ASPAN's partnership with local primary care physicians of the Arkansas Medical, Dental, and Pharmaceutical Association through the Cancer Education Awareness Program is the focus of this article. A quasi-experimental intervention, the Community Cancer Education Awareness Program, was employed that included 1) physician education to increase awareness of risk factors and cancer screening; and 2) patient education to increase screening, and 3) patient-generated screening questionnaires to prompt discussion of cancer risk and screening recommendations between patients and physicians. Two urban and 2 rural clinics were targeted during a 12-month period with interval intervention assessments. Baseline review of records (n = 200) from patients >/=40 were utilized to assess the rate of breast, prostate, and colorectal screenings among clinics. For the patient education intervention, patients (n = 120) were interviewed via a 34-item assessment. Physician awareness of cancer risk factors and screening recommendations significantly increased. Statistically significant increases were seen for prostate (P = .028), breast (P = .036), and colorectal (P change agent, the ASPAN provider network successfully enhanced cancer screening awareness of minority physicians and their patients. Cancer 2006. (c) 2006 American Cancer Society.

  16. Traffic Control Algorithm Offering Multi-Class Fairness in PON Based Access Networks

    Science.gov (United States)

    Okumura, Yasuyuki

    This letter proposes a dynamic bandwidth allocation algorithm for access networks based PON (Passive Optical Network). It considers the mixture of transport layer protocols when responding to traffic congestion at the SNI (Service Node Interface). Simulations on a mixture of TCP (Transmission Control Protocol), and UDP (User Datagram Protocol) traffic flows show that the algorithm increases the throughput of TCP, improves the fairness between the two protocols, and solves the congestion problem at the SNI.

  17. How to Cut the Electric Bill in Mobile Access Networks: A Mobile Operator's Perspective

    OpenAIRE

    Chatzimichail, Konstantinos

    2014-01-01

    One of the major challenges that mobile operators are facing is the increasing power consumption costs as a consequence of the network densication experienced in current and future mobile access networks. This power increase causes both financial and environmental concerns to operators, since both the operational expenses and the CO2 emissions are affected. This Master Thesis investigates and analyses various deployment architectures in urban and suburban areas, considering both the radio acc...

  18. Unsynchronized Energy-Efficient Medium Access Control and Routing in Wireless Sensor Networks

    Science.gov (United States)

    Hurni, Philipp

    This master thesis investigates optimizations on recently proposed fully unsynchronized power saving sensor MAC protocols. In contrast to many other sensor MAC protocols, unsynchronized sensor MAC protocols renounce on any kind of network- or cluster-wide synchronization for channel access coordination and maintenance of a common wake-sleep pattern, because in wireless sensor networks with low traffic requirements, the overhead for maintaining synchronization is likely to exceed the energy spent for the actual data traffic.

  19. ONU power saving modes in next generation optical access networks: progress, efficiency and challenges.

    Science.gov (United States)

    Dixit, Abhishek; Lannoo, Bart; Colle, Didier; Pickavet, Mario; Demeester, Piet

    2012-12-10

    The optical network unit (ONU), installed at a customer's premises, accounts for about 60% of power in current fiber-to-the-home (FTTH) networks. We propose a power consumption model for the ONU and evaluate the ONU power consumption in various next generation optical access (NGOA) architectures. Further, we study the impact of the power savings of the ONU in various low power modes such as power shedding, doze and sleep.

  20. College Access and Success for Students Experiencing Homelessness: A Toolkit for Educators and Service Providers

    Science.gov (United States)

    Dukes, Christina

    2013-01-01

    This toolkit serves as a comprehensive resource on the issue of higher education access and success for homeless students, including information on understanding homeless students, assisting homeless students in choosing a school, helping homeless students pay for application-related expenses, assisting homeless students in finding financial aid…

  1. Barriers to accessing ATLS provider course for junior doctors at a ...

    African Journals Online (AJOL)

    Sixty-two percent (65/105) of all respondents had completed their mandatory rotation in surgery. ... The primary barriers for JDs to attending ATLS training is difficulty in accessing the course due to oversubscription, financial reasons, followed by difficulty in obtaining professional development leave due to staff shortage.

  2. Challenges in Providing End-of-Life Care for People with Intellectual Disability: Health Services Access

    Science.gov (United States)

    Wark, Stuart; Hussain, Rafat; Müller, Arne; Ryan, Peta; Parmenter, Trevor

    2017-01-01

    Background: Increasing life expectancy for people with intellectual disability is resulting in greater need for end-of-life care services. However, limited knowledge is available regarding what barriers to accessing end-of-life care support are evident, particularly comparatively across rural and metropolitan locations. Methods: Focus group…

  3. It's the Law! A Review of the Laws that Provide Americans with Access for All

    Science.gov (United States)

    Raimondo, Barbara

    2013-01-01

    The United States is more accessible to deaf and hard of hearing individuals and people with disabilities today than it was 50, 20, or even 10 years ago. A variety of laws ensures equality in the treatment of deaf and hard of hearing people. Communication barriers have been addressed, and wider opportunities are available in education, employment,…

  4. Migrant beer promoters' experiences accessing reproductive health care in Cambodia, Laos, Thailand, and Vietnam: lessons for planners and providers.

    Science.gov (United States)

    Webber, Gail C; Spitzer, Denise L; Somrongthong, Ratana; Dat, Truong Cong; Kounnavongsa, Somphone

    2015-03-01

    Migrant beer promoters in Cambodia, Laos, Thailand, and Vietnam were surveyed to determine their experiences in accessing reproductive health care services in the cities of Phnom Penh, Vientiane, Bangkok, and Hanoi. A total of 7 health care institutions were chosen as popular with migrant beer promoters. Staff at these institutions provided information on the institution, and 390 beer promoters were surveyed about their experiences while accessing services. There were discrepancies between findings from the staff interviews and the experiences of the beer promoters. In general, the migrant women were satisfied with the cost, location, friendliness of the health care providers, and knowledge and skills of the providers. They were less positive about confidentiality and waiting times, though many still agreed that these were not an issue. Health care planners and providers should take note of the issues affecting access to reproductive health care services for migrant women when they design and implement services. © 2012 APJPH.

  5. Energy latency tradeoffs for medium access and sleep scheduling in wireless sensor networks

    Science.gov (United States)

    Gang, Lu

    Wireless sensor networks are expected to be used in a wide range of applications from environment monitoring to event detection. The key challenge is to provide energy efficient communication; however, latency remains an important concern for many applications that require fast response. The central thesis of this work is that energy efficient medium access and sleep scheduling mechanisms can be designed without necessarily sacrificing application-specific latency performance. We validate this thesis through results from four case studies that cover various aspects of medium access and sleep scheduling design in wireless sensor networks. Our first effort, DMAC, is to design an adaptive low latency and energy efficient MAC for data gathering to reduce the sleep latency. We propose staggered schedule, duty cycle adaptation, data prediction and the use of more-to-send packets to enable seamless packet forwarding under varying traffic load and channel contentions. Simulation and experimental results show significant energy savings and latency reduction while ensuring high data reliability. The second research effort, DESS, investigates the problem of designing sleep schedules in arbitrary network communication topologies to minimize the worst case end-to-end latency (referred to as delay diameter). We develop a novel graph-theoretical formulation, derive and analyze optimal solutions for the tree and ring topologies and heuristics for arbitrary topologies. The third study addresses the problem of minimum latency joint scheduling and routing (MLSR). By constructing a novel delay graph, the optimal joint scheduling and routing can be solved by M node-disjoint paths algorithm under multiple channel model. We further extended the algorithm to handle dynamic traffic changes and topology changes. A heuristic solution is proposed for MLSR under single channel interference. In the fourth study, EEJSPC, we first formulate a fundamental optimization problem that provides tunable

  6. Future Scenarios for Software-Defined Metro and Access Networks and Software-Defined Photonics

    Directory of Open Access Journals (Sweden)

    Tommaso Muciaccia

    2017-01-01

    Full Text Available In recent years, architectures, devices, and components in telecommunication networks have been challenged by evolutionary and revolutionary factors which are drastically changing the traffic features. Most of these changes imply the need for major re-configurability and programmability not only in data-centers and core networks, but also in the metro-access segment. In a wide variety of contexts, this necessity has been addressed by the proposed introduction of the innovative paradigm of software-defined networks (SDNs. Several solutions inspired by the SDN model have been recently proposed also for metro and access networks, where the adoption of a new generation of software-defined reconfigurable integrated photonic devices is highly desirable. In this paper, we review the possible future application scenarios for software-defined metro and access networks and software-defined photonics (SDP, on the base of analytics, statistics, and surveys. This work describes the reasons underpinning the presented radical change of paradigm and summarizes the most significant solutions proposed in literature, with a specific emphasis to physical-layer reconfigurable networks and a focus on both architectures and devices.

  7. Comparison of adherence to chlamydia screening guidelines among Title X providers and non-Title X providers in the California Family Planning, Access, Care, and Treatment Program.

    Science.gov (United States)

    Chow, Joan M; de Bocanegra, Heike Thiel; Hulett, Denis; Park, Hye-Youn; Darney, Philip

    2012-08-01

    Annual chlamydia screening is recommended for adolescent and young adult females and targeted screening is recommended for women ≥26 years based on risk. Although screening levels have increased over time, adherence to these guidelines varies, with high levels of adherence among Title X family planning providers. However, previous studies of provider variation in screening rates have not adjusted for differences in clinic and client population characteristics. Administrative claims from the California Family Planning, Access, Care, and Treatment (Family PACT) program were used to (1) examine clinic and client sociodemographic characteristics by provider group-Title X-funded public sector, non-Title X public sector, and private sector providers, and (2) estimate age-specific screening and differences in rates by provider group during 2009. Among 833 providers, Title X providers were more likely than non-Title X public sector providers and private sector providers to serve a higher client volume, a higher proportion of clients aged ≤25 years, and a higher proportion of African American clients. Non-Title X public providers were more likely to be located in rural areas, compared with Title X grantees and private sector providers. Title X providers had the largest absolute difference in screening rates for young females vs. older females (10.9%). Unadjusted screening rates for young clients were lower among non-Title X public sector providers (54%) compared with private sector and Title X providers (64% each). After controlling for provider group, urban location, client volume, and percent African American, private sector providers had higher screening rates than Title X and non-Title X public providers. Screening rates for females were higher among private providers compared with Title X and non-Title X public providers. However, only Title X providers were more likely to adhere to screening guidelines through high screening rates for young females and low

  8. Service Class Resource Management For Green Wireless-Optical Broadband Access NetworksWOBAN

    Directory of Open Access Journals (Sweden)

    SRUTHY.S

    2015-08-01

    Full Text Available Abstract-Broadband access networks have become an essential part of worldwide communication systems because of the exponential growth of broadband services such as video on demand high definition TV internet protocol TV and video conferencing. Exponential growth in the volume of wireless data boosted by the growing popularity of mobile devices such as smartphone and tablets has forced the telecommunication industries to rethink the way networks are currently designed and to focus on the development of high-capacity mobile broadband networks. In response to this challenge researchers have been working toward the development of an integrated wireless optical broadband access network. Two major candidate technologies which are currently known for their high capacity as well as quality of service QoS for multimedia traffic are passive optical networks PON and fourth generation 4G wireless networks. PON is a wired access technology well known for its cost efficiency and high capacity whereas 4G is a wireless broadband access technology which has achieved broad market acceptance because of its ease of deployment ability to offer mobility and its cost efficiency. Integration of PON and 4G technologies in the form of wireless-optical broadband access networks offers advantages such as extension of networks in rural areas support for mobile broadband services and quick deployment of broadband networks. These two technologies however have different design architectures for handling broadband services that require quality of service. For example 4G networks use traffic classification for supporting different QoS demands whereas the PON architecture has no such mechanism to differentiate between types of traffic. These two technologies also differ in their power saving mechanisms. Propose a service class mapping for the integrated PON-4G network which is based on the MG1 queuing model and class-based power saving mechanism which significantly improves the

  9. Formats and Network Protocols for Browser Access to 2D Raster Data

    Science.gov (United States)

    Plesea, L.

    2015-12-01

    Tiled web maps in browsers are a major success story, forming the foundation of many current web applications. Enabling tiled data access is the next logical step, and is likely to meet with similar success. Many ad-hoc approaches have already started to appear, and something similar is explored within the Open Geospatial Consortium. One of the main obstacles in making browser data access a reality is the lack of a well-known data format. This obstacle also represents an opportunity to analyze the requirements and possible candidates, applying lessons learned from web tiled image services and protocols. Similar to the image counterpart, a web tile raster data format needs to have good intrinsic compression and be able to handle high byte count data types including floating point. An overview of a possible solution to the format problem, a 2D data raster compression algorithm called Limited Error Raster Compression (LERC) will be presented. In addition to the format, best practices for high request rate HTTP services also need to be followed. In particular, content delivery network (CDN) caching suitability needs to be part of any design, not an after-thought. Last but not least, HTML 5 browsers will certainly be part of any solution since they provide improved access to binary data, as well as more powerful ways to view and interact with the data in the browser. In a simple but relevant application, digital elevation model (DEM) raster data is served as LERC compressed data tiles which are used to generate terrain by a HTML5 scene viewer.

  10. Measuring geographic access to health care: raster and network-based methods

    Directory of Open Access Journals (Sweden)

    Delamater Paul L

    2012-05-01

    Full Text Available Abstract Background Inequalities in geographic access to health care result from the configuration of facilities, population distribution, and the transportation infrastructure. In recent accessibility studies, the traditional distance measure (Euclidean has been replaced with more plausible measures such as travel distance or time. Both network and raster-based methods are often utilized for estimating travel time in a Geographic Information System. Therefore, exploring the differences in the underlying data models and associated methods and their impact on geographic accessibility estimates is warranted. Methods We examine the assumptions present in population-based travel time models. Conceptual and practical differences between raster and network data models are reviewed, along with methodological implications for service area estimates. Our case study investigates Limited Access Areas defined by Michigan’s Certificate of Need (CON Program. Geographic accessibility is calculated by identifying the number of people residing more than 30 minutes from an acute care hospital. Both network and raster-based methods are implemented and their results are compared. We also examine sensitivity to changes in travel speed settings and population assignment. Results In both methods, the areas identified as having limited accessibility were similar in their location, configuration, and shape. However, the number of people identified as having limited accessibility varied substantially between methods. Over all permutations, the raster-based method identified more area and people with limited accessibility. The raster-based method was more sensitive to travel speed settings, while the network-based method was more sensitive to the specific population assignment method employed in Michigan. Conclusions Differences between the underlying data models help to explain the variation in results between raster and network-based methods. Considering that the

  11. Unifying Water Data Sources: How the CUAHSI Water Data Center is Enabling and Improving Access to a Growing Catalog of over 100 Data Providers

    Science.gov (United States)

    Pollak, J.; Berry, K.; Couch, A.; Arrigo, J.; Hooper, R. P.

    2013-12-01

    Scientific data about water are collected and distributed by numerous sources which can differ tremendously in scale. As competition for water resources increases, increasing access to and understanding of information about water will be critical. The mission of the new CUAHSI Water Data Center (WDC) is to provide those researchers who collect data a medium to publish their datasets and give those wanting to discover data the proper tools to efficiently find the data that they seek. These tools include standards-based data publication, data discovery tools based upon faceted and telescoping search, and a data analysis tool HydroDesktop that downloads and unifies data in standardized formats. The CUAHSI Hydrologic Information System (HIS) is a community developed and open source system for sharing water data. As a federated, web service oriented system it enables data publication for a diverse user population including scientific investigators (Research Coordination Networks, Critical Zone Observatories), government agencies (USGS, NASA, EPA), and citizen scientists (watershed associations). HydroDesktop is an end user application for data consumption in this system that the WDC supports. This application can be used for finding, downloading, and analyzing data from the HIS. It provides a GIS interface that allows users to incorporate spatial data that are not accessible via HIS, simple analysis tools to facilitate graphing and visualization, tools to export data to common file types, and provides an extensible architecture that developers can build upon. HydroDesktop, however, is just one example of a data access client for HIS. The web service oriented architecture enables data access by an unlimited number of clients provided they can consume the web services used in HIS. One such example developed at the WDC is the 'Faceted Search Client', which capitalizes upon exploratory search concepts to improve accuracy and precision during search. We highlight such

  12. Physical Science Informatics: Providing Open Science Access to Microheater Array Boiling Experiment Data

    Science.gov (United States)

    McQuillen, John; Green, Robert D.; Henrie, Ben; Miller, Teresa; Chiaramonte, Fran

    2014-01-01

    The Physical Science Informatics (PSI) system is the next step in this an effort to make NASA sponsored flight data available to the scientific and engineering community, along with the general public. The experimental data, from six overall disciplines, Combustion Science, Fluid Physics, Complex Fluids, Fundamental Physics, and Materials Science, will present some unique challenges. Besides data in textual or numerical format, large portions of both the raw and analyzed data for many of these experiments are digital images and video, requiring large data storage requirements. In addition, the accessible data will include experiment design and engineering data (including applicable drawings), any analytical or numerical models, publications, reports, and patents, and any commercial products developed as a result of the research. This objective of paper includes the following: Present the preliminary layout (Figure 2) of MABE data within the PSI database. Obtain feedback on the layout. Present the procedure to obtain access to this database.

  13. Laws requiring health plans to provide direct access to obstetricians and gynecologists, and use of cancer screening by women.

    Science.gov (United States)

    Baker, Laurence C; Chan, Jia

    2007-06-01

    Many states have passed legislation mandating that health plans provide direct access to obstetricians/gynecologists (hereinafter "ob/gyns") for women, limiting the ability of plans to require referrals or otherwise restrict access. One benefit of these laws may be improved preventive screening rates, but no literature has examined the relationship between ob/gyn direct access laws and use of breast cancer and cervical cancer screening. We use repeated cross-sections of privately insured women age 18-64 (Pap test) and 40-64 (mammography) from the Behavioral Risk Factor Surveillance System for 1996-2000, linked to data on the presence of ob/gyn direct access laws by state. Outcome measures are receipt of mammography and receipt of a Pap test within the past 2 years. Regression analyses are used to assess the relationship between the presence of ob/gyn direct access laws and screening, adjusting for a range of individual characteristics, fixed state characteristics, and time trends. We find no statistically significant relationships between the presence of an ob/gyn direct access law and receipt of either mammography or Pap test screening. We explore a range of alternate specifications and find none that yield clear evidence of a relationship. Laws requiring direct access to ob/gyns are not associated with large or consistent measurable impacts on use of cancer screening.

  14. An Evaluation of the Quality of Nursing Care Provided for Vascular Access in Hemodialysis Patients

    Directory of Open Access Journals (Sweden)

    Hamid Reza Chamanzari

    2015-10-01

    Full Text Available Introduction: Care for vascular access of patients undergoing hemodialysis is a critical issue. Inflammation and subsequent infection are the major factors which threaten patients' health and diminish effectiveness of hemodialysis. Therefore, this study aimed to evaluate the severity and incidence of inflammation of vascular access in hemodialysis patients. Materials and Methods: This cross-sectional study was conducted on 90 patients undergoing hemodialysis in Emam Reza and Montazerie Hospitals in Mashhad, June, 2014. Evaluation of inflammation severity over the course of one month (12 hemodialysis sessions was performed by means of an inflammation tool designed by the Board of Nursing. Data were analyzed using SPSS version 16, and performing descriptive and Chi-square tests.  Results:The mean and standard deviation of incidence of inflammation in the first session of hemodialysis was 3.2±1.3 cases. The mean and standard deviation of the intensity of inflammation was 12.5±4.7. Conclusion: Since inflammation of vascular access in hemodialysis patients impairs their safety and health improvement, necessary measures to reduce this complication must be taken.

  15. Comparison of a Ring On-Chip Network and a Code-Division Multiple-Access On-Chip Network

    OpenAIRE

    Xin Wang; Jari Nurmi

    2007-01-01

    Two network-on-chip (NoC) designs are examined and compared in this paper. One design applies a bidirectional ring connection scheme, while the other design applies a code-division multiple-access (CDMA) connection scheme. Both of the designs apply globally asynchronous locally synchronous (GALS) scheme in order to deal with the issue of transferring data in a multiple-clock-domain environment of an on-chip system. The two NoC designs are compared with each other by their network structures, ...

  16. Giving rheumatology patients online home access to their electronic medical record (EMR): advantages, drawbacks and preconditions according to care providers.

    Science.gov (United States)

    van der Vaart, Rosalie; Drossaert, Constance H C; Taal, Erik; van de Laar, Mart A F J

    2013-09-01

    Technology enables patients home access to their electronic medical record (EMR), via a patient portal. This study aims to analyse (dis)advantages, preconditions and suitable content for this service, according to rheumatology health professionals. A two-phase policy Delphi study was conducted. First, interviews were performed with nurses/nurse practitioners (n = 9) and rheumatologists (n = 13). Subsequently, collected responses were quantified, using a questionnaire among the interviewees. The following advantages of patient home access to the EMR were reported: (1) enhancement of patient participation in treatment, (2) increased knowledge and self-management, (3) improved patient-provider interaction, (4) increased patient safety, and (5) better communication with others. Foreseen disadvantages of the service included: (1) problems with interpretation of data, (2) extra workload, (3) a change in consultation content, and (4) disturbing the patient-provider interaction. Also, the following preconditions emerged from the data: (1) optimal security, (2) no extra record, but a patient-accessible section, (3) no access to clinical notes, and (4) a lag time on the release of lab data. Most respondents reported that data on diagnosis, medication, treatment plan and consultations could be released to patients. On releasing more complex data, such as bodily examinations, lab results and radiological images the opinions differed considerably. Providing patients home access to their medical record might be a valuable next step into patient empowerment and in service towards the patient, provided that security is optimal and content and presentation of data are carefully considered.

  17. Advance reservation access control using software-defined networking and tokens

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar; Rao, Nageswara S. V.; Foster, Ian T.; Clark, Russ; Owen, Henry

    2018-02-01

    Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present here a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization. We use SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. We conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network. (C) 2017 Elsevier B.V. All rights reserved.

  18. Automation in accession classification of Brazilian Capsicum germplasm through artificial neural networks

    Directory of Open Access Journals (Sweden)

    Mariane Gonçalves Ferreira

    Full Text Available ABSTRACT Germplasm classification by species requires specific knowledge on/of the culture of interest. Therefore, efforts aimed at automation of this process are necessary for the efficient management of collections. Automation of germplasm classification through artificial neural networks may be a viable and less laborious strategy. The aims of this study were to verify the classification potential of Capsicum accessions regarding/ the species based on morphological descriptors and artificial neural networks, and to establish the most important descriptors and the best network architecture for this purpose. Five hundred and sixty-four plants from 47 Brazilian Capsicum accessions were evaluated. Neural networks of multilayer perceptron type were used in order to automate the species identification through 17 morphological descriptors. Six network architectures were evaluated, and the number of neurons in the hidden layer ranged from 1 to 6. The relative importance of morphological descriptors in the classification process was established by Garson's method. Corolla color, corolla spot color, calyx annular constriction, fruit shape at pedicel attachment, and fruit color at mature stage were the most important descriptors. The network architecture with 6 neurons in the hidden layer is the most appropriate in this study. The possibility of classifying Capsicum plants regarding/ the species through artificial neural networks with 100 % accuracy was verified.

  19. A Low-Latency, Information-Centric Medium Access Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.; Chatterjea, Supriyo

    In this paper we present a novel TDMA-based medium access control (MAC) protocol for wireless sensor networks. Unlike conventional MAC protocols which function independently of the application, we introduce an Adaptive, Information-centric and Lightweight MAC(AI-LMAC) protocol that adapts its

  20. Request-TDMA: A multiple-access protocol for wireless multimedia networks

    NARCIS (Netherlands)

    Linnenbank, G.R.J.; Havinga, Paul J.M.; Smit, Gerardus Johannes Maria; Mullender, Sape J.; Smulders, P.; van den Meerendonk, H.

    1995-01-01

    This paper describes a cellular multiple-access scheme based on TDMA for multimedia communication networks. The scheme proposes an admission control of two different multimedia application stream types: real-time and non-real-time. We do not consider interference between cells. The proposed

  1. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  2. Modeling the video distribution link in the Next Generation Optical Access Networks

    DEFF Research Database (Denmark)

    Amaya, F.; Cárdenas, A.; Tafur Monroy, Idelfonso

    2011-01-01

    In this work we present a model for the design and optimization of the video distribution link in the next generation optical access network. We analyze the video distribution performance in a SCM-WDM link, including the noise, the distortion and the fiber optic nonlinearities. Additionally, we c...

  3. Data Archiving and Networked Services (DANS) promotes sustained access to digital research data

    NARCIS (Netherlands)

    van Berchum, M.; Kraaikamp, Emilie

    2015-01-01

    Data Archiving and Networked Services (DANS) promotes sustained access to digital research data. For this purpose, DANS encourages researchers to archive and reuse data in a sustained form. In the online archiving system EASY research data is stored in a permanent and sustainable manner, according

  4. Dynamic optical fiber delivery of Ka-band packet transmissions for wireless access networks

    DEFF Research Database (Denmark)

    Rodríguez Páez, Juan Sebastián; Madsen, Peter; Tafur Monroy, Idelfonso

    2017-01-01

    A Reconfigurable Radio Access Unit is presented and experimentally demonstrated. In the unit, an optical switching system is set to dynamically deliver different packets to different points in the network. The packets are transmitted wirelesslty on the Ka-band (26–40 GHz), achieving BER values...

  5. Use and benefits of public access defibrillation in a nation-wide network

    DEFF Research Database (Denmark)

    Nielsen, Anne Møller; Folke, Fredrik; Lippert, Freddy Knudsen

    2013-01-01

    BACKGROUND: Automated External Defibrillators (AEDs) are known to increase survival after out-of-hospital cardiac arrest (OHCA). The aim of this study was to examine the use and benefit of public-access defibrillation (PAD) in a nation-wide network. We primarily sought to assess survival at 1 month...

  6. Analysis of the Decoupled Access for Downlink and Uplink in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Smiljkovikj, K.; Popovski, Petar; Gavrilovska, L.

    2015-01-01

    Wireless cellular networks evolve towards a heterogeneous infrastructure, featuring multiple types of Base Stations (BSs), such as Femto BSs (FBSs) and Macro BSs (MBSs). A wireless device observes multiple points (BSs) through which it can access the infrastructure and it may choose to receive th...

  7. Geographic Accessibility - Providing government servies in an spatially equitable manner: Perspectives for Fire Station location

    CSIR Research Space (South Africa)

    Green, Cheri A

    2012-10-01

    Full Text Available stream_source_info Green1_2012.pdf.txt stream_content_type text/plain stream_size 6780 Content-Encoding ISO-8859-1 stream_name Green1_2012.pdf.txt Content-Type text/plain; charset=ISO-8859-1 Geographic Accessibility... - Rural 8 878 7 820 28533 Cato Ridge E - Special 45 140 6698 Craigieburn A - High 1 411 160 6698 Craigieburn B - Moderate 177 20 6698 Craigieburn C - Low 28 262 2 460 6698 Craigieburn D - Rural 25 875 10 660 6698 Craigieburn E - Special 2 203 180...

  8. Conversion of tunneled hemodialysis catheter into HeRO device can provide immediate access for hemodialysis.

    Science.gov (United States)

    Vasquez, Julio C; DeLaRosa, Jacob; Rahim, Fahim; Rahim, Naeem

    2010-11-01

    Patients with central venous occlusion who are ''tunneled catheter dependent'' are a challenge for hemodialysis access. A relatively new option for them is the hemodialysis reliable outflow (HeRO) device that can be totally implanted subcutaneously. However, patients still require a tunneled hemodialysis catheter that is used until the HeRO device is mature, 4 to 6 weeks later. Here, we describe a conversion of an existing tunneled hemodialysis catheter into a HeRO device, which was combined with a ''self-sealing'' Flixene graft. This allowed almost immediate use of the HeRO device without the need for placement of a catheter.

  9. Building the Bridge between Operations and Outcomes : Modelling and Evaluation of Health Service Provider Networks

    NARCIS (Netherlands)

    M. Mahdavi (Mahdi)

    2015-01-01

    markdownabstract__Abstract__ The PhD research has two objectives: - To develop generally applicable operational models which allow developing the evidence base for health service operations in provider networks. - To contribute to the evidence base by validating the model through

  10. 76 FR 28226 - Southwest Health Alliances, Inc., Doing Business as BSA Provider Network; Analysis of Agreement...

    Science.gov (United States)

    2011-05-16

    ... Southwest Health Alliances, Inc., Doing Business as BSA Provider Network; Analysis of Agreement Containing... or deceptive acts or practices or unfair methods of competition. The attached Analysis To Aid Public.... The following Analysis To Aid Public Comment describes the terms of the consent agreement, and the...

  11. Parents and Peers as Providers of Support in Adolescents' Social Network: A Developmental Perspective

    Science.gov (United States)

    del Valle, Jorge F.; Bravo, Amaia; Lopez, Monica

    2010-01-01

    The authors carried out an assessment of social support networks with a sample of 884 Spanish adolescents aged 12 to 17. The main goal was to analyze the development of the figures of parents and peers as providers of social support in the two basic dimensions of emotional and instrumental support. In peers, they distinguished between the contexts…

  12. One4All Cooperative Media Access Strategy in Infrastructure Based Distributed Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    a cooperative cluster using their short-range air interface and one device contends the channel for all the devices within the cluster. This strategy reduces the number of mobile devices involved in the collision process for the wireless medium resulting in larger throughput, smaller access delay, and less......In this paper we propose the one4all cooperative access strategy to introduce a more efficient media access strategy for wireless networks. The one4all scheme is designed for the infrastructure based distributed wireless network architecture. The basic idea is that mobile devices can form...... energy consumption. Based on an analytical model, the proposed strategy is compared with the two existing strategies RTS/CTS (request to send/ clear to send) and packet aggregation. The results show that the proposed cooperative scheme has similar throughput performance as packet aggregation and it has...

  13. Bandwidth Impacts of Localizing Peer-to-Peer IP Video Traffic in Access and Aggregation Networks

    Directory of Open Access Journals (Sweden)

    Kerpez Kenneth

    2008-01-01

    Full Text Available Abstract This paper examines the burgeoning impact of peer-to-peer (P2P traffic IP video traffic. High-quality IPTV or Internet TV has high-bandwidth requirements, and P2P IP video could severely strain broadband networks. A model for the popularity of video titles is given, showing that some titles are very popular and will often be available locally; making localized P2P attractive for video titles. The bandwidth impacts of localizing P2P video to try and keep traffic within a broadband access network area or within a broadband access aggregation network area are examined. Results indicate that such highly localized P2P video can greatly lower core bandwidth usage.

  14. Bandwidth Impacts of Localizing Peer-to-Peer IP Video Traffic in Access and Aggregation Networks

    Directory of Open Access Journals (Sweden)

    Kenneth Kerpez

    2008-10-01

    Full Text Available This paper examines the burgeoning impact of peer-to-peer (P2P traffic IP video traffic. High-quality IPTV or Internet TV has high-bandwidth requirements, and P2P IP video could severely strain broadband networks. A model for the popularity of video titles is given, showing that some titles are very popular and will often be available locally; making localized P2P attractive for video titles. The bandwidth impacts of localizing P2P video to try and keep traffic within a broadband access network area or within a broadband access aggregation network area are examined. Results indicate that such highly localized P2P video can greatly lower core bandwidth usage.

  15. The Role of the Social Network in Access to Psychosocial Services for Migrant Elderly-A Qualitative Study.

    Science.gov (United States)

    Schoenmakers, Daphne; Lamkaddem, Majda; Suurmond, Jeanine

    2017-10-11

    Abstract : Background: Despite high prevalence of mental problems among elderly migrants in The Netherlands, the use of psychosocial care services by this group is low. Scientific evidence points at the crucial role of social support for mental health and the use of psychosocial services. We therefore explored the role of social networks in the access to psychosocial care among elderly migrants in The Netherlands. Methods: A qualitative study was conducted using semi-structured group interviews and individual interviews. The eight group and eleven individual interviews (respectively n = 58 and n = 11) were conducted in The Netherlands with Turkish, Moroccan, Surinamese, and Dutch elderly. The data were analysed through coding and comparing fragments and recognizing patterns. Results: Support of the social network is important to navigate to psychosocial care and is most frequently provided by children. However, the social network of elderly migrants is generally not able to meet the needs of the elderly. This is mostly due to poor mental health literacy of the social network, taboo, and stigma around mental illness and the busy lives of the social network members. Conclusion s : Strategies to address help-seeking barriers should consider mental health literacy in elderly migrants as well as their social networks, and counteract taboos and stigma of mental health problems.

  16. The Role of the Social Network in Access to Psychosocial Services for Migrant Elderly—A Qualitative Study

    Directory of Open Access Journals (Sweden)

    Daphne Schoenmakers

    2017-10-01

    Full Text Available Abstract: Background: Despite high prevalence of mental problems among elderly migrants in The Netherlands, the use of psychosocial care services by this group is low. Scientific evidence points at the crucial role of social support for mental health and the use of psychosocial services. We therefore explored the role of social networks in the access to psychosocial care among elderly migrants in The Netherlands. Methods: A qualitative study was conducted using semi-structured group interviews and individual interviews. The eight group and eleven individual interviews (respectively n = 58 and n = 11 were conducted in The Netherlands with Turkish, Moroccan, Surinamese, and Dutch elderly. The data were analysed through coding and comparing fragments and recognizing patterns. Results: Support of the social network is important to navigate to psychosocial care and is most frequently provided by children. However, the social network of elderly migrants is generally not able to meet the needs of the elderly. This is mostly due to poor mental health literacy of the social network, taboo, and stigma around mental illness and the busy lives of the social network members. Conclusions: Strategies to address help-seeking barriers should consider mental health literacy in elderly migrants as well as their social networks, and counteract taboos and stigma of mental health problems.

  17. Hybrid Scheduling/Signal-Level Coordination in the Downlink of Multi-Cloud Radio-Access Networks

    KAUST Repository

    Douik, Ahmed

    2016-03-28

    In the context of resource allocation in cloud- radio access networks, recent studies assume either signal-level or scheduling-level coordination. This paper, instead, considers a hybrid level of coordination for the scheduling problem in the downlink of a multi-cloud radio- access network, so as to benefit from both scheduling policies. Consider a multi-cloud radio access network, where each cloud is connected to several base-stations (BSs) via high capacity links, and therefore allows joint signal processing between them. Across the multiple clouds, however, only scheduling-level coordination is permitted, as it requires a lower level of backhaul communication. The frame structure of every BS is composed of various time/frequency blocks, called power- zones (PZs), and kept at fixed power level. The paper addresses the problem of maximizing a network-wide utility by associating users to clouds and scheduling them to the PZs, under the practical constraints that each user is scheduled, at most, to a single cloud, but possibly to many BSs within the cloud, and can be served by one or more distinct PZs within the BSs\\' frame. The paper solves the problem using graph theory techniques by constructing the conflict graph. The scheduling problem is, then, shown to be equivalent to a maximum- weight independent set problem in the constructed graph, in which each vertex symbolizes an association of cloud, user, BS and PZ, with a weight representing the utility of that association. Simulation results suggest that the proposed hybrid scheduling strategy provides appreciable gain as compared to the scheduling-level coordinated networks, with a negligible degradation to signal-level coordination.

  18. Demonstration of flexible and reconfigurable WDM multicast scheme supporting downstream emergency multicast communication for WDM optical access network

    Science.gov (United States)

    Li, Ze; Zhang, Min; Wang, Danshi; Cui, Yue

    2017-09-01

    We propose a flexible and reconfigurable wavelength-division multiplexing (WDM) multicast scheme supporting downstream emergency multicast communication for WDM optical access network (WDM-OAN) via a multicast module (MM) based on four-wave mixing (FWM) in a semiconductor optical amplifier. It serves as an emergency measure to dispose of the burst, large bandwidth, and real-time multicast service with fast service provisioning and high resource efficiency. It also plays the role of physical backup in cases of big data migration or network disaster caused by invalid lasers or modulator failures. It provides convenient and reliable multicast service and emergency protection for WDM-OAN without modifying WDM-OAN structure. The strategies of an MM setting at the optical line terminal and remote node are discussed to apply this scheme to passive optical networks and active optical networks, respectively. Utilizing the proposed scheme, we demonstrate a proof-of-concept experiment in which one-to-six/eight 10-Gbps nonreturn-to-zero-differential phase-shift keying WDM multicasts in both strategies are successfully transmitted over single-mode fiber of 20.2 km. One-to-many reconfigurable WDM multicasts dealing with higher data rate and other modulation formats of multicast service are possible through the proposed scheme. It can be applied to different WDM access technologies, e.g., time-wavelength-division multiplexing-OAN and coherent WDM-OAN, and upgraded smoothly.

  19. The IRIS Education and Outreach Program: Providing access to data and equipment for educational and public use

    Science.gov (United States)

    Taber, J.; Toigo, M.; Bravo, T. K.; Hubenthal, M.; McQuillan, P. J.; Welti, R.

    2009-12-01

    The IRIS Education and Outreach Program has been an integral part of IRIS for the past 10 years and during that time has worked to advance awareness and understanding of seismology and earth science while inspiring careers in geophysics. The focus on seismology and the use of seismic data has allowed the IRIS E&O program to develop and disseminate a unique suite of products and services for a wide range of audiences. One result of that effort has been increased access to the IRIS Data Management System by non-specialist audiences and simplified use of location and waveform data. The Seismic Monitor was one of the first Web-based tools for observing near-real-time seismicity. It continues to be the most popular IRIS web page, and thus it presents aspects of seismology to a very wide audience. For individuals interested in more detailed ground motion information, waveforms can be easily viewed using the Rapid Earthquake Viewer, developed by the University of South Carolina in collaboration with IRIS E&O. The Seismographs in Schools program gives schools the opportunity to apply for a low-cost educational seismograph and to receive training for its use in the classroom. To provide better service to the community, a new Seismographs in Schools website was developed in the past year with enhanced functions to help teachers improve their teaching of seismology. The site encourages schools to make use of seismic data and communicate with other educational seismology users throughout the world. Users can view near-real-time displays of other participating schools, upload and download data, and use the “find a teacher” tool to contact nearby schools that also may be operating seismographs. In order to promote and maintain program participation and communication, the site features a discussion forum to encourage and support the growing global community of educational seismograph users. Any data that is submitted to the Seismographs in Schools Website is also accessible

  20. Stability of multiple access network control schemes with carrier sensing and exponential backoff

    Science.gov (United States)

    Barany, Ernest; Krupa, Maciej

    2006-05-01

    A new approach to determine the stability of multiple access network control schemes is presented. A “busy” network (the precise meaning of the term “busy” will be presented in the text) is modelled as a switched single-server hybrid dynamical system whose switching laws are stochastic and are based on typical multiple access network control protocols such as ALOHA and ethernet. The techniques are used to compute the critical ratio of traffic production per network node to total available bandwidth that ensures that data packets will not accumulate unboundedly in waiting queues at each node. This is a measure of stability of the network and is an emergent, global, property determined by decentralized, autonomous behavior of each node. The behavior of each individual node is regarded as “microscopic” and the collective behavior of the network as a whole are emergent consequences of such microscopic laws. The results follow from the stationary distribution property of ergodic Markov chains.

  1. Revisiting the picture-superiority effect in symbolic comparisons: do pictures provide privileged access?

    Science.gov (United States)

    Amrhein, Paul C; McDaniel, Mark A; Waddill, Paula

    2002-09-01

    In 4 experiments, symbolic comparisons were investigated to test semantic-memory retrieval accounts espousing processing advantages for picture over word stimuli. In Experiment 1, participants judged pairs of animal names or pictures by responding to questions probing concrete or abstract attributes (texture or size, ferocity or intelligence). Per pair, attributes were salient or nonsalient concerning their prerated relevance to animals being compared. Distance (near or far) between attribute magnitudes was also varied. Pictures did not significantly speed responding relative to words across all other variables. Advantages were found forfar attribute magnitudes (i.e., the distance effect) and salient attributes. The distance effect was much less for salient than nonsalient concrete-attribute comparisons. These results were consistently found in additional experiments with increased statistical power to detect modality effects. Our findings argue against dual-coding and some common-code accounts of conceptual attribute processing, urging reexamination of the assumption that pictures confer privileged access to long-term knowledge.

  2. Access, engagement, networks, and norms: Dimensions of social capital at work in a first grade classroom

    Science.gov (United States)

    Wexler-Robock, Stephanie

    Social capital refers to access and use of resources available through one's networks to solve problems, and the norms that reflect inclusive or exclusive access to those networks and resources. Research has found positive relationships between social capital, academic achievement, and attainment. Studies, however, have generally examined social capital through factors that occur outside the classroom; students who have social capital, acquired through their family and community relationships, seem to be more successful academically. Limited research has explored what if any factors within the classroom might impact the production, and nature of social capital, or its workings in a classroom. The purpose of this study was to explore the workings and nature of classroom social capital, including its possible relationships to engagement and cognition among 5 student participants. Using methods of qualitative data collection, mixed methods were used to analyze information resources, participants' networking, student work, and classroom discourse. Eight interdependent networking factors and 3 overarching patterns of norms were discovered. The networking factors reflected the structure, content, processes, purposes, and acceptability of participants' networking. The norms, also working interdependently, appeared to promote or inhibit among other things, engagement in networking, help seeking, access, sharing, and intertextual use of diverse, often complex sources of information. Through interaction of the 8 factors and 3 overarching norms, ongoing outcomes of networking appeared to include the creation of bridging (inclusive) and bonding (exclusive) forms of social capital, and depth of scientific conceptual understanding, in this case, about birds. Bridging social capital appeared related to willingness to engage in strong and weak tie networking, help seeking, intertextuality, and possibly to mastery goal orientation for all participants, regardless of reading level

  3. Changes in perceptions of quality of, and access to, services among clients of a fractional franchise network in Nepal.

    Science.gov (United States)

    Agha, Sohail; Gage, Anastasia; Balal, Asma

    2007-05-01

    With declining levels of international donor funding for financing reproductive health programmes, developing country governments and international donors are looking towards private sector strategies to expand the supply of quality reproductive health services. One of the challenges of a health franchise is to improve the quality of services provided by independent private practitioners. Private providers are more likely to abide by the quality standards set by a franchiser if they see a financial benefit resulting from franchise participation. This study was conducted to measure whether (a) there were improvements in perceived quality of care and perceived access to health facilities once these facilities became part of a franchise and (b) improvements in perceived quality and perceived access were associated with increased client loyalty to franchised clinics. Franchisees were given basic reproductive health training for seven days and services marketing training for two days. Exit interviews were conducted with male and female clients at health facilities. A pre-test measurement was taken in April 2001, prior to the start of project activities. A post-test measurement was taken in February/March 2002, about 9 months after the pre-test. Multilevel regression analysis, which takes the hierarchical structure of the data into account, was used for the analysis. After taking provider-level variation into account and controlling for client characteristics, the analyses showed significant improvements in perceived quality of care and perceived access to services. Private provider participation in a franchise network helps improve client perceptions of quality of, and access to, services. Improvements in client perceptions of quality and access contribute to increased client loyalty to franchised clinics. Once increased client loyalty translates into higher client volumes, providers are likely to see the benefits of franchise participation. In turn, this should lead to

  4. Providers of Free MOOC's Now Charge Employers for Access to Student Data

    Science.gov (United States)

    Young, Jeffrey R.

    2012-01-01

    The author describes how providers of free online courses are officially in the headhunting business, bringing in revenue by selling to employers information about high-performing students who might be a good fit for open jobs. Coursera, which works with high-profile colleges to provide massive open online courses, or MOOC's, announced its…

  5. Regional Labour Markets and Job Accessibility in City Network Systems in Germany

    OpenAIRE

    Reggiani, A; Bucci, P.; Russo, G.; Haas, A.; P. Nijkamp

    2011-01-01

    See also the article in the (2011). Volume 19, issue 4, pages 528-536. Commuting is, therefore, an important equilibrating vehicle in a city network constellation. Cities act as attractors of commuters, as most economic activity occurs in cities, thus providing a high share of attractive workplaces. Cities that are centrally connected in a network may act as both centripetal and centrifugal forces in the whole system. The present paper focuses on what is named the City Network (CN) approach. ...

  6. Comparison of a Ring On-Chip Network and a Code-Division Multiple-Access On-Chip Network

    Directory of Open Access Journals (Sweden)

    Xin Wang

    2007-01-01

    Full Text Available Two network-on-chip (NoC designs are examined and compared in this paper. One design applies a bidirectional ring connection scheme, while the other design applies a code-division multiple-access (CDMA connection scheme. Both of the designs apply globally asynchronous locally synchronous (GALS scheme in order to deal with the issue of transferring data in a multiple-clock-domain environment of an on-chip system. The two NoC designs are compared with each other by their network structures, data transfer principles, network node structures, and their asynchronous designs. Both the synchronous and the asynchronous designs of the two on-chip networks are realized using a hardware-description language (HDL in order to make the entire designs suit the commonly used synchronous design tools and flow. The performance estimation and comparison of the two NoC designs which are based on the HDL realizations are addressed. By comparing the two NoC designs, the advantages and disadvantages of applying direct connection and CDMA connection schemes in an on-chip communication network are discussed.

  7. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad

    2017-02-07

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  8. Switched-based interference reduction scheme for open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh

    2012-06-01

    Femtocells have been proposed to enhance the spatial coverage and system capacity of existing cellular networks. However, this technology may result in significant performance loss due to the increase in co-channel interference, particularly when coordination between access points is infeasible. This paper targets interference management in such overlaid networks. It is assumed that the femtocells employ the open-access strategy to reduce cross-tier interference, and can share resources concurrently. It is also assumed that each end user (EU) can access one channel at a time, and transfer limited feedback. To reduce the effect of co-tier interference in the absence of the desired EU channel state information (CSI) at the serving access point as well as coordination between active access points, a switched scheme based on the interference levels associated with available channels is proposed. Through the analysis, the scheme modes of operation in under-loaded and over-loaded channels are studied, from which the statistics of the resulting interference power are quantified. The impact of the proposed scheme on the received desired power is thoroughly discussed. In addition, the effect of the switching threshold on the achieved performance of the desired EU is investigated. The results clarify that the proposed scheme can improve the performance while reducing the number of examined channels and feedback load. © 2012 IEEE.

  9. Discordant indigenous and provider frames explain challenges in improving access to arthritis care: a qualitative study using constructivist grounded theory.

    Science.gov (United States)

    Thurston, Wilfreda E; Coupal, Stephanie; Jones, C Allyson; Crowshoe, Lynden F J; Marshall, Deborah A; Homik, Joanne; Barnabe, Cheryl

    2014-06-11

    Access to health services is a determinant of population health and is known to be reduced for a variety of specialist services for Indigenous populations in Canada. With arthritis being the most common chronic condition experienced by Indigenous populations and causing high levels of disability, it is critical to resolve access disparities through an understanding of barriers and facilitators to care. The objective of this study was to inform future health services reform by investigating health care access from the perspective of Aboriginal people with arthritis and health professionals. Using constructivist grounded theory methodology we investigated Indigenous peoples' experiences in accessing arthritis care through the reports of 16 patients and 15 healthcare providers in Alberta, Canada. Semi-structured interviews were conducted between July 2012 and February 2013 and transcribed verbatim. The patient and provider data were first analyzed separately by two team members then brought together to form a framework. The framework was refined through further analysis following the multidisciplinary research team's discussions. Once the framework was developed, reports on the patient and provider data were shared with each participant group independently and participants were interviewed to assess validity of the summary. In the resulting theoretical framework Indigenous participants framed their experience with arthritis as 'toughing it out' and spoke of racism encountered in the healthcare setting as a deterrent to pursuing care. Healthcare providers were frustrated by high disease severity and missed appointments, and framed Indigenous patients as lacking 'buy-in'. Constraints imposed by complex healthcare systems contributed to tensions between Indigenous peoples and providers. Low specialist care utilization rates among Indigenous people cannot be attributed to cultural and social preferences. Further, the assumptions made by providers lead to stereotyping and

  10. Gain transient control for wavelength division multiplexed access networks using semiconductor optical amplifiers

    DEFF Research Database (Denmark)

    Gibbon, Timothy Braidwood; Osadchiy, Alexey Vladimirovich; Kjær, Rasmus

    2009-01-01

    measurements how a near-saturated semiconductor optical amplifier (SOA) can be used to control these gain transients. An SOA is shown to reduce the penalty of transients originating in an EDFA from 2.3 dB to 0.2 dB for 10 Gb/s transmission over standard single mode fiber using a 231-1 PRBS pattern. The results......Gain transients can severely hamper the upstream network performance in wavelength division multiplexed (WDM) access networks featuring erbium doped fiber amplifiers (EDFAs) or Raman amplification. We experimentally demonstrate for the first time using 10 Gb/s fiber transmission bit error rate...

  11. New resource allocation scheme for cognitive relay networks with opportunistic access

    KAUST Repository

    Zafar, Ammar

    2012-06-01

    In this paper, a new resource allocation scheme to minimize Symbol Error rate (SER) for relay assisted cognitive radio networks is studied. A cognitive relay network with amplify-and-forward (AF) fixed gain relays and opportunistic access to the licensed spectrum is considered. The SER objective function and the optimization constraints are derived first. The resource allocation algorithm is then derived using the Langrangian multiplier method. Closed form expressions are derived for the source and relay powers and, symbol time. Analytical results show that the optimal power allocation follows an extended water-filling solution. © 2012 IEEE.

  12. MaNIDA: Insight into the German Marine Network for Integrated Data Access

    Science.gov (United States)

    Schäfer, Angela; Scientific MaNIDA Team

    2013-04-01

    The Marine Network for Integrated Data Access (MaNIDA) builds a sustainable e-Infrastructure to support discovery and re-use of data from distinct marine and earth science data providers in Germany (see ESSI1.2 and ESSI2.2). Thereby we implement the "Data Portal of German Marine Research" for coherent discovery, view, download and dissemination of aggregated content. MaNIDA receives a unique momentum from the cooperation and financial partnership between main German marine research institutes (AWI, MARUM, HZG, GEOMAR, Uni Hamburg, Uni Kiel, Uni Bremen) and the Federal Maritime and Hydrographic Agency as well as active participation in international and major EU-initiatives (ICSU, GEOSS, SeaDataNet, EMODNET, ODIP). Together with a coherent management strategy coordinated by the Alfred Wegener Institute, Helmholtz Center for Polar and Marine Research, sustainability will be achieved via the long-term commitment of framework funding by the Helmholtz Association, Germany's largest scientific research organization for large-scale facilities and scientific infrastructure. Strategic Aims The installation of the "Data Portal of German Marine Research" will address the urgent demands of the German research community for reliable and easy access to marine research data at one single point of access and truth. Primary focus will be given to data derived from nationally operated research and monitoring facilities (vessels, observatories, alert systems, etc), whereby related contextual content and publications will become an integral part of the aggregation effort. For the scientific community we define responsibilities and commitments across partners while complementing existing data repositories and the new portal with well-articulated workflows from the instrument to the data product. Necessary level of quality assurance and user support will be implemented to achieve substantial enhancements in the whole lifecycle management of marine scientific data. The creation of a data

  13. 48 CFR 1837.203-70 - Providing contractors access to sensitive information.

    Science.gov (United States)

    2010-10-01

    ... submit with its proposal a preliminary analysis of possible organizational conflicts of interest that... the NASA organizational element or activity that requires specified services to be provided. (3) As... organizational conflicts of interest avoidance plan. (d) This comprehensive plan shall incorporate any previous...

  14. Nectar accessibility determines fitness, flower choice and abundance of hoverflies that provide natural pest control

    NARCIS (Netherlands)

    van Rijn, P.C.J.; Wäckers, F.L.

    2016-01-01

    1. In modern agricultural landscapes, many organisms providing ecosystem services such as pollination and natural pest control are likely constrained by shortage of nectar and/or pollen required for adult nutrition. More and more flower-rich field margin strips and other habitats are created to

  15. Providing Interactive Access to Cave Geology for All Students, Regardless of Physical Ability

    Science.gov (United States)

    Atchison, C. `; Stredney, D.; Hittle, B.; Irving, K.; Toomey, R. S., III; Lemon, N. N.; Price, A.; Kerwin, T.

    2013-12-01

    Based on an identified need to accommodate students with mobility impairments in field-based instructional experiences, this presentation will discuss current efforts to promote participation, broaden diversity, and impart a historical perspective in the geosciences through the use of an interactive virtual environment. Developed through the integration of emerging simulation technologies, this prototypical virtual environment is created from LIDAR data of the Historic Tour route of Mammoth Cave National Park. The educational objectives of the simulation focus on four primary locations within the tour route that provide evidence of the hydrologic impact on the cave and karst formation. The overall objective is to provide a rich experience of a geological field-based learning for all students, regardless of their physical abilities. Employing a virtual environment that interchangeably uses two and three-dimensional representation of geoscience content, this synthetic field-based cave and karst module will provide an opportunity to assess the effectiveness in engaging the student community, and its efficacy in the curriculum when used as an alternative representation of a traditional field experience. The expected outcome is that based on the level of interactivity, the simulated environment will provide adequate pedagogical representation for content transfer without the need for physical experience in the uncontrolled field environment. Additionally, creating such an environment will impact all able-bodied students by providing supplemental resources that can both precede a traditional field experience and allow for students to re-examine a field site long after a the field experience, in both current formal and informal educational settings.

  16. Coalitional Games in Partition Form for Joint Spectrum Sensing and Access in Cognitive Radio Networks

    CERN Document Server

    Saad, Walid; Zheng, Rong; Hjørungnes, Are; Başar, Tamer; Poor, H Vincent

    2012-01-01

    Unlicensed secondary users (SUs) in cognitive radio networks are subject to an inherent tradeoff between spectrum sensing and spectrum access. Although each SU has an incentive to sense the primary user (PU) channels for locating spectrum holes, this exploration of the spectrum can come at the expense of a shorter transmission time, and, hence, a possibly smaller capacity for data transmission. This paper investigates the impact of this tradeoff on the cooperative strategies of a network of SUs that seek to cooperate in order to improve their view of the spectrum (sensing), reduce the possibility of interference among each other, and improve their transmission capacity (access). The problem is modeled as a coalitional game in partition form and an algorithm for coalition formation is proposed. Using the proposed algorithm, the SUs can make individual distributed decisions to join or leave a coalition while maximizing their utilities which capture the average time spent for sensing as well as the capacity achi...

  17. Design and implementation of fingerprint access control system based on ZigBee wireless network

    Directory of Open Access Journals (Sweden)

    Zhang Jin

    2017-01-01

    Full Text Available this paper mainly introduces a kind of fingerprint access control system based on ZigBee wireless network design and implementation method, specify when passengers should fingerprints collected and stored in the system at the information desk PC, and then assign rooms;Guests entered the room according to the fingerprint module, the system will be fingerprint information through ZigBee coordinator node module and network to transmit the fingerprint characteristic value to management system and the fingerprint information stored, if consistent with the electromagnetic lock open, allowed to enter the room, does not conform to the issued a warning sound.Additional access control system can control the corresponding fingerprint information storage room and remove, such as is required for a security incident broke in situation is special open mode can be set up.System software design consists of two aspects of the bottom and upper machine.

  18. Quantitative analysis of access strategies to remote information in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach...... initiated by the requesting entity, and two versions of proactive approaches in which the entity that contains the information element actively propagates its changes to potential requesters, either (2) periodically or triggered by changes of the information element (3). This paper first develops a set...... of analytic models to compute different performance metrics for these approaches, with special focus on the so-called mismatch probability. The results of the analytic models allow for design decisions on which strategy to implement for specific input parameters (change rate of the information element...

  19. E-health: potential benefits and challenges in providing and accessing sexual health services

    OpenAIRE

    Minichiello, Victor; Rahman, Saifur; Dune, Tinashe; Scott, John; Dowsett, Gary

    2013-01-01

    Background E-health has become a burgeoning field in which health professionals and health consumers create and seek information. E-health refers to internet-based health care and information delivery and seeks to improve health service locally, regionally and worldwide. E-sexual health presents new opportunities to provide online sexual health services irrespective of gender, age, sexual orientation and location. Discussion The paper used the dimensions of the RE-AIM model (reach, efficacy, ...

  20. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing.

    Science.gov (United States)

    McCluskey, Kevin; Barker, Katharine B; Barton, Hazel A; Boundy-Mills, Kyria; Brown, Daniel R; Coddington, Jonathan A; Cook, Kevin; Desmeth, Philippe; Geiser, David; Glaeser, Jessie A; Greene, Stephanie; Kang, Seogchan; Lomas, Michael W; Melcher, Ulrich; Miller, Scott E; Nobles, David R; Owens, Kristina J; Reichman, Jerome H; da Silva, Manuela; Wertz, John; Whitworth, Cale; Smith, David

    2017-08-15

    The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.

  1. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    Directory of Open Access Journals (Sweden)

    Kevin McCluskey

    2017-08-01

    Full Text Available The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD. The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.

  2. Situational Awareness based Risk-Adapatable Access Control in Enterprise Networks

    OpenAIRE

    Lee, Brian; Vanickis, Roman; Rogelio, Franklin; Jacob, Paul

    2017-01-01

    As the computing landscape evolves towards distributed architectures such as Internet of Things (IoT),enterprises are moving away from traditional perimeter based security models toward so called zero trust networking (ZTN) models that treat both the intranet and Internet as equally untrustworthy. Such security models incorporate risk arising from dynamic and situational factors, such as device location and security risk level risk, into the access control decision. Researchers have developed...

  3. Optimizing data access for wind farm control over hierarchical communication networks

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Findrik, Mislav; Madsen, Tatiana Kozlova

    2016-01-01

    In this paper we investigate a centralized wind farm controller which runs periodically. The controller attempts to reduce the damage a wind turbine sustains during operation by estimating fatigue based on the wind turbine state. The investigation focuses on the impact of information access...... with respect to the communication network delays. These measurements are done in regards to packet loss and communication delays, and the simulations are rerun using either the traces from the measurements or scenarios constructed from the delay parameters....

  4. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  5. The accessibility of Poland’s Space to the Trans-European Transport Network

    Directory of Open Access Journals (Sweden)

    Wiśniewski Szymon

    2017-09-01

    Full Text Available The aim of the article is to analyse the land transport accessibility of two trans-European corridors within the boundaries of Poland. The adjustment of the course of transport routes to the distribution of the population and the country’s land development (including economic potential and logistic infrastructure was outlined using measurements of cumulative accessibility. The results were presented in both cartographic form (isochrone approach and tabular form (cumulative approach. Research was conducted adopting different forms of transport used for relocation (including foot traffic, car, rail and multimodal transport and both the current and target layout of the transport network. This made it possible to determine the changes that will effectively run the process of investment in transport infrastructure on Polish territory. This allowed the identification of the areas of Poland which are particularly conveniently located in relation to domestic connections (in terms of the international network and those for which the European transport network remains difficult to access.

  6. Providing Efficient Network Access to Green Power Generators : A Long-term Property Rights Perspective

    NARCIS (Netherlands)

    Petropoulos, G.; Willems, Bert

    2017-01-01

    Coordinating the timing of new production facilities is one of the challenges of liberalized power sectors. It is complicated by the presence of transmission bottlenecks, oligopolistic competition and the unknown prospects of low-carbon technologies. We build a model encompassing a late and early

  7. Access to high-volume surgeons and the opportunity cost of performing radical prostatectomy by low-volume providers.

    Science.gov (United States)

    Barzi, Afsaneh; Klein, Eric A; Daneshmand, Siamak; Gill, Inderbir; Quinn, David I; Sadeghi, Sarmad

    2017-07-01

    Evidence suggests that redirecting surgeries to high-volume providers may be associated with better outcomes and significant societal savings. Whether such referrals are feasible remains unanswered. Medicare Provider Utilization and Payment Data, SEER 18, and US Incidence data were used to determine the geographic distribution and radical prostatectomy volume for providers. Access was defined as availability of a high-volume provider within driving distance of 100 miles. The opportunity cost was defined as the value of benefits achievable by performing the surgery by a high-volume provider that was forgone by not making a referral. The savings per referral were derived from a published Markov model for radical prostatectomy. A total of 14% of providers performed>27% of the radical prostatectomies with>30 cases per year and were designated high-volume providers. Providers with below-median volume (≤16 prostatectomies per year) performed>32% of radical prostatectomies. At least 47% of these were within a 100-mile driving distance (median = 22 miles), and therefore had access to a high-volume provider (>30 prostatectomies per year). This translated into a discounted savings of more than $24 million per year, representing the opportunity cost of not making a referral. The average volume for high- and low-volume providers was 55 and 13, respectively, resulting in an annual experience gap of 43 and a cumulative gap of 125 surgeries over 3 years. In 2014, the number of surgeons performing radical prostatectomy decreased by 5% while the number of high- and low-volume providers decreased by 25% and 11% showing a faster decline in the number of high-volume providers compared with low-volume surgeons. About half of prostatectomies performed by surgeons with below-median annual volume were within a 100-mile driving distance (median of 22 miles) of a high-volume surgeon. Such a referral may result in minimal additional costs and substantially improved outcomes. Copyright

  8. Wireless and wireline service convergence in next generation optical access networks - the FP7 WISCON project

    DEFF Research Database (Denmark)

    Vegas Olmos, Juan José; Pang, Xiaodan; Lebedev, Alexander

    2014-01-01

    The next generation of information technology demands both high capacity and mobility for applications such as high speed wireless access capable of supporting broadband services. The transport of wireless and wireline signals is converging into a common telecommunication infrastructure. In this ......The next generation of information technology demands both high capacity and mobility for applications such as high speed wireless access capable of supporting broadband services. The transport of wireless and wireline signals is converging into a common telecommunication infrastructure...... radio-over-fiber (RoF) systems; this is a promising solution to implement broadband seamless wireless -wireline access networks. This project successfully concluded in autumn 2013, and is being follow up by another Marie Curie project entitled “flexible edge nodes for dynamic optical interconnection...

  9. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    Science.gov (United States)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  10. The Effects of a Dynamic Spectrum Access Overlay in LTE-Advanced Networks

    Energy Technology Data Exchange (ETDEWEB)

    Juan D. Deaton; Ryan E. lrwin; Luiz A. DaSilva

    2011-05-01

    As early as 2014, wireless network operators spectral capacity will be overwhelmed by a data tsunami brought on by new devices and applications. To augment spectral capacity, operators could deploy a Dynamic Spectrum Access (DSA) overlay. In the light of the many planned Long Term Evolution (LTE) network deployments, the affects of a DSA overlay have not been fully considered into the existing LTE standards. Coalescing many different aspects of DSA, this paper develops the Spectrum Accountability (SA) framework. The SA framework defines specific network element functionality, protocol interfaces, and signaling flow diagrams for LTE to support service requests and enforce rights of responsibilities of primary and secondary users, respectively. We also include a network simulation to quantify the benefits of using DSA channels to augment capacity. Based on our simulation we show that, network operators can benefit up to %40 increase in operating capacity when sharing DSA bands to augment spectral capacity. With our framework, this paper could serve as an guide in developing future LTE network standards that include DSA.

  11. Support networks and people with physical disabilities: social inclusion and access to health services

    Directory of Open Access Journals (Sweden)

    Cristina Marques de Almeida Holanda

    2015-01-01

    Full Text Available This study seeks to identify the formation of social support networks of people with physical disabilities, and how these networks can help facilitate access to health services and promote social inclusion. It is a cross-sectional study, with data collected via a form applied to physically disabled persons over eighteen years of age registered with the Family Health Teams of the municipal district of João Pessoa in the state of Paraíba. It was observed that the support networks of these individuals predominantly consist of family members (parents, siblings, children, spouses and people outside the family (friends and neighbors. However, 50% of the interviewees declared that they could not count on any support from outside the family. It was observed that the support network contributes to access to the services and participation in social groups. However, reduced social inclusion was detected, due to locomotion difficulties, this being the main barrier to social interaction. Among those individuals who began to interact in society, the part played by social support was fundamental.

  12. Support networks and people with physical disabilities: social inclusion and access to health services.

    Science.gov (United States)

    Holanda, Cristina Marques de Almeida; De Andrade, Fabienne Louise Juvêncio Paes; Bezerra, Maria Aparecida; Nascimento, João Paulo da Silva; Neves, Robson da Fonseca; Alves, Simone Bezerra; Ribeiro, Kátia Suely Queiroz Silva

    2015-01-01

    This study seeks to identify the formation of social support networks of people with physical disabilities, and how these networks can help facilitate access to health services and promote social inclusion. It is a cross-sectional study, with data collected via a form applied to physically disabled persons over eighteen years of age registered with the Family Health Teams of the municipal district of João Pessoa in the state of Paraíba. It was observed that the support networks of these individuals predominantly consist of family members (parents, siblings, children, spouses) and people outside the family (friends and neighbors). However, 50% of the interviewees declared that they could not count on any support from outside the family. It was observed that the support network contributes to access to the services and participation in social groups. However, reduced social inclusion was detected, due to locomotion difficulties, this being the main barrier to social interaction. Among those individuals who began to interact in society, the part played by social support was fundamental.

  13. A Novel Architecture for Adaptive Traffic Control in Network on Chip using Code Division Multiple Access Technique

    OpenAIRE

    Fatemeh. Dehghani; Shahram. Darooei

    2016-01-01

    Network on chip has emerged as a long-term and effective method in Multiprocessor System-on-Chip communications in order to overcome the bottleneck in bus based communication architectures. Efficiency and performance of network on chip is so dependent on the architecture and structure of the network. In this paper a new structure and architecture for adaptive traffic control in network on chip using Code Division Multiple Access technique is presented. To solve the problem of synchronous acce...

  14. On the Evaluation of a Secure Solution to Access 802.11 Networks

    Science.gov (United States)

    da Costa, Fernando; Gaspary, Luciano; Barbosa, Jorge; Cavalheiro, Gerson; Pfitscher, Luciano; Ramos, José Dirceu G.

    Despite offering the possibility to develop and distribute a new set of applications to its users, the widespread and unrestricted use of mobile computing depends on the provisioning of a secure network environment. Regarding the communication established from mobile devices such as PDAs (Personal Digital Assistants), one of the most currently used standards is the IEEE 802.11b, which presents known security flaws. To overcome them, some alternative setups are commonly deployed, based on link, network, transport or application-layer. In this paper we evaluate the impact on data reception rate and energy consumption of IPSec-based PDAs access to 802.11b (WiFi) wireless LANs. As a result of this work we identify the overhead imposed by the security mechanisms and the capacity of the device to run CPU and network-intensive applications.

  15. Statistics of the uplink co-tier interference in closed access heterogeneous networks

    KAUST Repository

    Tabassum, Hina

    2013-09-01

    In this paper, we derive a statistical model of the co-tier interference in closed access two tier heterogeneous wireless cellular networks with femtocell deployments. The derived model captures the impact of bounded path loss model, wall penetration loss, user distributions, random locations, and density of the femtocells. Firstly, we derive the analytical expressions for the probability density function (PDF) and moment generating function (MGF) of the co-tier interference considering a single femtocell interferer by exploiting the random disc line picking theory from geometric probability. We then derive the MGF of the cumulative interference from all femtocell interferers considering full spectral reuse in each femtocell. Orthogonal spectrum partitioning is assumed between the macrocell and femtocell networks to avoid any cross-tier interference. Finally, the accuracy of the derived expressions is validated through Monte-Carlo simulations and the expressions are shown to be useful in quantifying important network performance metrics such as ergodic capacity. © 2013 IEEE.

  16. Providing access to risk prediction tools via the HL7 XML-formatted risk web service.

    Science.gov (United States)

    Chipman, Jonathan; Drohan, Brian; Blackford, Amanda; Parmigiani, Giovanni; Hughes, Kevin; Bosinoff, Phil

    2013-07-01

    Cancer risk prediction tools provide valuable information to clinicians but remain computationally challenging. Many clinics find that CaGene or HughesRiskApps fit their needs for easy- and ready-to-use software to obtain cancer risks; however, these resources may not fit all clinics' needs. The HughesRiskApps Group and BayesMendel Lab therefore developed a web service, called "Risk Service", which may be integrated into any client software to quickly obtain standardized and up-to-date risk predictions for BayesMendel tools (BRCAPRO, MMRpro, PancPRO, and MelaPRO), the Tyrer-Cuzick IBIS Breast Cancer Risk Evaluation Tool, and the Colorectal Cancer Risk Assessment Tool. Software clients that can convert their local structured data into the HL7 XML-formatted family and clinical patient history (Pedigree model) may integrate with the Risk Service. The Risk Service uses Apache Tomcat and Apache Axis2 technologies to provide an all Java web service. The software client sends HL7 XML information containing anonymized family and clinical history to a Dana-Farber Cancer Institute (DFCI) server, where it is parsed, interpreted, and processed by multiple risk tools. The Risk Service then formats the results into an HL7 style message and returns the risk predictions to the originating software client. Upon consent, users may allow DFCI to maintain the data for future research. The Risk Service implementation is exemplified through HughesRiskApps. The Risk Service broadens the availability of valuable, up-to-date cancer risk tools and allows clinics and researchers to integrate risk prediction tools into their own software interface designed for their needs. Each software package can collect risk data using its own interface, and display the results using its own interface, while using a central, up-to-date risk calculator. This allows users to choose from multiple interfaces while always getting the latest risk calculations. Consenting users contribute their data for future

  17. A comparison of lightning data provided by ZEUS and LINET networks over Western Europe

    Directory of Open Access Journals (Sweden)

    K. Lagouvardos

    2009-10-01

    Full Text Available In the framework of this paper, one-year of lightning data from the experimental network ZEUS operated by the National Observatory of Athens is compared to collocated data provided by the LINET detection network. The area of comparison is limited to a part of Central-Western Europe, where LINET data exhibits the highest data quality, permitting thus to be used as the validation dataset. The location error of ZEUS was calculated to be ~6.8 km, while the detection efficiency was ~25%, with a characteristic under-detection during nighttime. Moreover, the analysis revealed that ZEUS is also capable to detect not only cloud-to-ground but also intra-cloud strokes. Analysis of a specific case study revealed that the spatial distribution of ZEUS was very close to that of LINET, although the total number of strokes as seen by ZEUS is much lower than the one from LINET. The overall analysis permitted to assess the main characteristics of ZEUS network, information considered of paramount importance before the use of ZEUS data for a variety of observational and modeling work.

  18. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  19. Partnering with community agencies to provide nursing students with cultural awareness experiences and refugee health promotion access.

    Science.gov (United States)

    Sullivan, Catherine H

    2009-09-01

    Refugees' cultural beliefs, communication barriers, and low health literacy may lead to health disparities within the Western health care system. This article describes a teaching-learning strategy emphasizing the community partnership between a baccalaureate school of nursing, an immigrant-refugee program, and a community literacy program in a rural state. Senior community health nursing students partnered with an immigrant-refugee program and a community literacy program to provide health promotion and prevention services to recently immigrated Hmong and Russian refugees. Priority health needs were identified and culturally appropriate health promotion and prevention education modules were designed and implemented by students. Students collaborated with community agencies and businesses to increase access to health resources for these vulnerable populations. Outcomes were the provision of cultural awareness experiences for nursing students and access to health care with increased knowledge of Western health care practices and beliefs for refugees.

  20. Advanced digital signal processing for short-haul and access network

    Science.gov (United States)

    Zhang, Junwen; Yu, Jianjun; Chi, Nan

    2016-02-01

    Digital signal processing (DSP) has been proved to be a successful technology recently in high speed and high spectrum-efficiency optical short-haul and access network, which enables high performances based on digital equalizations and compensations. In this paper, we investigate advanced DSP at the transmitter and receiver side for signal pre-equalization and post-equalization in an optical access network. A novel DSP-based digital and optical pre-equalization scheme has been proposed for bandwidth-limited high speed short-distance communication system, which is based on the feedback of receiver-side adaptive equalizers, such as least-mean-squares (LMS) algorithm and constant or multi-modulus algorithms (CMA, MMA). Based on this scheme, we experimentally demonstrate 400GE on a single optical carrier based on the highest ETDM 120-GBaud PDM-PAM-4 signal, using one external modulator and coherent detection. A line rate of 480-Gb/s is achieved, which enables 20% forward-error correction (FEC) overhead to keep the 400-Gb/s net information rate. The performance after fiber transmission shows large margin for both short range and metro/regional networks. We also extend the advanced DSP for short haul optical access networks by using high order QAMs. We propose and demonstrate a high speed multi-band CAP-WDM-PON system on intensity modulation, direct detection and digital equalizations. A hybrid modified cascaded MMA post-equalization schemes are used to equalize the multi-band CAP-mQAM signals. Using this scheme, we successfully demonstrates 550Gb/s high capacity WDMPON system with 11 WDM channels, 55 sub-bands, and 10-Gb/s per user in the downstream over 40-km SMF.

  1. Basset: learning the regulatory code of the accessible genome with deep convolutional neural networks.

    Science.gov (United States)

    Kelley, David R; Snoek, Jasper; Rinn, John L

    2016-07-01

    The complex language of eukaryotic gene expression remains incompletely understood. Despite the importance suggested by many noncoding variants statistically associated with human disease, nearly all such variants have unknown mechanisms. Here, we address this challenge using an approach based on a recent machine learning advance-deep convolutional neural networks (CNNs). We introduce the open source package Basset to apply CNNs to learn the functional activity of DNA sequences from genomics data. We trained Basset on a compendium of accessible genomic sites mapped in 164 cell types by DNase-seq, and demonstrate greater predictive accuracy than previous methods. Basset predictions for the change in accessibility between variant alleles were far greater for Genome-wide association study (GWAS) SNPs that are likely to be causal relative to nearby SNPs in linkage disequilibrium with them. With Basset, a researcher can perform a single sequencing assay in their cell type of interest and simultaneously learn that cell's chromatin accessibility code and annotate every mutation in the genome with its influence on present accessibility and latent potential for accessibility. Thus, Basset offers a powerful computational approach to annotate and interpret the noncoding genome. © 2016 Kelley et al.; Published by Cold Spring Harbor Laboratory Press.

  2. LigoDV-web: Providing easy, secure and universal access to a large distributed scientific data store for the LIGO scientific collaboration

    Science.gov (United States)

    Areeda, J. S.; Smith, J. R.; Lundgren, A. P.; Maros, E.; Macleod, D. M.; Zweizig, J.

    2017-01-01

    Gravitational-wave observatories around the world, including the Laser Interferometer Gravitational-Wave Observatory (LIGO), record a large volume of gravitational-wave output data and auxiliary data about the instruments and their environments. These data are stored at the observatory sites and distributed to computing clusters for data analysis. LigoDV-web is a web-based data viewer that provides access to data recorded at the LIGO Hanford, LIGO Livingston and GEO600 observatories, and the 40 m prototype interferometer at Caltech. The challenge addressed by this project is to provide meaningful visualizations of small data sets to anyone in the collaboration in a fast, secure and reliable manner with minimal software, hardware and training required of the end users. LigoDV-web is implemented as a Java Enterprise Application, with Shibboleth Single Sign On for authentication and authorization, and a proprietary network protocol used for data access on the back end. Collaboration members with proper credentials can request data be displayed in any of several general formats from any Internet appliance that supports a modern browser with Javascript and minimal HTML5 support, including personal computers, smartphones, and tablets. Since its inception in 2012, 634 unique users have visited the LigoDV-web website in a total of 33 , 861 sessions and generated a total of 139 , 875 plots. This infrastructure has been helpful in many analyses within the collaboration including follow-up of the data surrounding the first gravitational-wave events observed by LIGO in 2015.

  3. Adaptation of AMO-FBMC-OQAM in optical access network for accommodating asynchronous multiple access in OFDM-based uplink transmission

    Science.gov (United States)

    Jung, Sun-Young; Jung, Sang-Min; Han, Sang-Kook

    2015-01-01

    Exponentially expanding various applications in company with proliferation of mobile devices make mobile traffic exploded annually. For future access network, bandwidth efficient and asynchronous signals converged transmission technique is required in optical network to meet a huge bandwidth demand, while integrating various services and satisfying multiple access in perceived network resource. Orthogonal frequency division multiplexing (OFDM) is highly bandwidth efficient parallel transmission technique based on orthogonal subcarriers. OFDM has been widely studied in wired-/wireless communication and became a Long term evolution (LTE) standard. Consequently, OFDM also has been actively researched in optical network. However, OFDM is vulnerable frequency and phase offset essentially because of its sinc-shaped side lobes, therefore tight synchronism is necessary to maintain orthogonality. Moreover, redundant cyclic prefix (CP) is required in dispersive channel. Additionally, side lobes act as interference among users in multiple access. Thus, it practically hinders from supporting integration of various services and multiple access based on OFDM optical transmission In this paper, adaptively modulated optical filter bank multicarrier system with offset QAM (AMO-FBMC-OQAM) is introduced and experimentally investigated in uplink optical transmission to relax multiple access interference (MAI), while improving bandwidth efficiency. Side lobes are effectively suppressed by using FBMC, therefore the system becomes robust to path difference and imbalance among optical network units (ONUs), which increase bandwidth efficiency by reducing redundancy. In comparison with OFDM, a signal performance and an efficiency of frequency utilization are improved in the same experimental condition. It enables optical network to effectively support heterogeneous services and multiple access.

  4. Decentralized Group Sparse Beamforming for Multi-Cloud Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb

    2015-12-06

    Recent studies on cloud-radio access networks (CRANs) assume the availability of a single processor (cloud) capable of managing the entire network performance; inter-cloud interference is treated as background noise. This paper considers the more practical scenario of the downlink of a CRAN formed by multiple clouds, where each cloud is connected to a cluster of multiple-antenna base stations (BSs) via high-capacity wireline backhaul links. The network is composed of several disjoint BSs\\' clusters, each serving a pre-known set of single-antenna users. To account for both inter- cloud and intra-cloud interference, the paper considers the problem of minimizing the total network power consumption subject to quality of service constraints, by jointly determining the set of active BSs connected to each cloud and the beamforming vectors of every user across the network. The paper solves the problem using Lagrangian duality theory through a dual decomposition approach, which decouples the problem into multiple and independent subproblems, the solution of which depends on the dual optimization problem. The solution then proceeds in updating the dual variables and the active set of BSs at each cloud iteratively. The proposed approach leads to a distributed implementation across the multiple clouds through a reasonable exchange of information between adjacent clouds. The paper further proposes a centralized solution to the problem. Simulation results suggest that the proposed algorithms significantly outperform the conventional per-cloud update solution, especially at high signal-to-interference-plus- noise ratio (SINR) target.

  5. Stochastic geometry model for multi-channel fog radio access networks

    KAUST Repository

    Emara, Mostafa

    2017-06-29

    Cache-enabled base station (BS) densification, denoted as a fog radio access network (F-RAN), is foreseen as a key component of 5G cellular networks. F-RAN enables storing popular files at the network edge (i.e., BS caches), which empowers local communication and alleviates traffic congestions at the core/backhaul network. The hitting probability, which is the probability of successfully transmitting popular files request from the network edge, is a fundamental key performance indicator (KPI) for F-RAN. This paper develops a scheduling aware mathematical framework, based on stochastic geometry, to characterize the hitting probability of F-RAN in a multi-channel environment. To this end, we assess and compare the performance of two caching distribution schemes, namely, uniform caching and Zipf caching. The numerical results show that the commonly used single channel environment leads to pessimistic assessment for the hitting probability of F-RAN. Furthermore, the numerical results manifest the superiority of the Zipf caching scheme and quantify the hitting probability gains in terms of the number of channels and cache size.

  6. Medium Access Control Protocols for Wireless Sensor Networks with Energy Harvesting

    CERN Document Server

    Iannello, Fabio; Spagnolini, Umberto

    2011-01-01

    The design of Medium Access Control (MAC) protocols for wireless sensor networks (WSNs) has been conventionally tackled by assuming battery-powered devices and by adopting the network lifetime as the main performance criterion. While WSNs operated by energy-harvesting (EH) devices are not limited by network lifetime, they pose new design challenges due to the uncertain amount of harvestable energy. Novel design criteria are thus required to capture the trade-offs between the potentially infinite network lifetime and the uncertain energy availability. This paper addresses the analysis and design of WSNs with EH devices by focusing on conventional MAC protocols, namely TDMA, Framed-ALOHA (FA) and Dynamic-FA (DFA), and by accounting for the performance trade-offs and design issues arising due to EH. A novel metric, referred to as delivery probability, is introduced to measure the capability of a MAC protocol to deliver the measure of any sensor in the network to the intended destination (or fusion center, FC). T...

  7. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  8. A Novel Approach for Transmission of 56 Gbit/s NRZ Signal in Access Network Using Spectrum Slicing Technique

    DEFF Research Database (Denmark)

    Spolitis, S.; Vegas Olmos, Juan José; Bobrovs, V.

    2013-01-01

    We present the spectrum slicing and stitching concept for high-capacity low optics complexity optical access networks. Spectrum slicing and stitching of a 56 Gbit/s NRZ electrical signal is experimentally demonstrated for the first time....

  9. An Optimal Medium Access Control with Partial Observations for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Servetto Sergio D

    2005-01-01

    Full Text Available We consider medium access control (MAC in multihop sensor networks, where only partial information about the shared medium is available to the transmitter. We model our setting as a queuing problem in which the service rate of a queue is a function of a partially observed Markov chain representing the available bandwidth, and in which the arrivals are controlled based on the partial observations so as to keep the system in a desirable mildly unstable regime. The optimal controller for this problem satisfies a separation property: we first compute a probability measure on the state space of the chain, namely the information state, then use this measure as the new state on which the control decisions are based. We give a formal description of the system considered and of its dynamics, we formalize and solve an optimal control problem, and we show numerical simulations to illustrate with concrete examples properties of the optimal control law. We show how the ergodic behavior of our queuing model is characterized by an invariant measure over all possible information states, and we construct that measure. Our results can be specifically applied for designing efficient and stable algorithms for medium access control in multiple-accessed systems, in particular for sensor networks.

  10. Hybrid Access Femtocells in Overlaid MIMO Cellular Networks with Transmit Selection under Poisson Field Interference

    KAUST Repository

    Abdel Nabi, Amr A

    2017-09-21

    This paper analyzes the performance of hybrid control-access schemes for small cells (such as femtocells) in the context of two-tier overlaid cellular networks. The proposed hybrid access schemes allow for sharing the same downlink resources between the small-cell network and the original macrocell network, and their mode of operations are characterized considering post-processed signal-to-interference-plus-noise ratios (SINRs) or pre-processed interference-aware operation. The work presents a detailed treatment of achieved performance of a desired user that benefits from MIMO arrays configuration through the use of transmit antenna selection (TAS) and maximal ratio combining (MRC) in the presence of Poisson field interference processes on spatial links. Furthermore, based on the interference awareness at the desired user, two TAS approaches are treated, which are the signal-to-noise (SNR)-based selection and SINR-based selection. The analysis is generalized to address the cases of highly-correlated and un-correlated aggregated interference on different transmit channels. In addition, the effect of delayed TAS due to imperfect feedback and the impact of arbitrary TAS processing are investigated. The analytical results are validated by simulations, to clarify some of the main outcomes herein.

  11. Perspectives on providing good access to dental services for elderly people: patient selection, dentists' responsibility and budget management.

    Science.gov (United States)

    Grytten, Jostein; Holst, Dorthe

    2013-06-01

    To suggest a model for organizing and financing dental services for elderly people so that they have good access to services. There are few studies on how dental services for elderly people should be organized and financed. This is surprising if we take into consideration the fact that the proportion of elderly people is growing faster than any other group in the population, and that elderly people have more dental diseases and poorer access to dental services than the rest of the adult population. In several countries, dental services are characterized by private providers who often operate in a market with competition and free price-setting. Private dentists have no community responsibility, and they are free to choose which patients they treat. Literature review and critical reasoning. In order to avoid patient selection, a patient list system for elderly people is recommended, with per capita remuneration for the patients that the dentist is given responsibility for. The patient list system means that the dentist assumes responsibility for a well-defined list of elderly people. Our model will lead to greater security in the dentist/patient relationship, and patients with great treatment needs will be ensured access to dental services. © 2012 John Wiley & Sons A/S and The Gerodontology Society. Published by John Wiley & Sons Ltd.

  12. #Socialmedia: A Preliminary Report of Social Networking Use among University and College Counseling Center Mental Health Providers

    Science.gov (United States)

    Reif, Carrie; Much, Kari

    2017-01-01

    The social networking use of university and college counseling center (UCCC) mental health providers has not been widely researched. Most of the 20 providers surveyed in this preliminary study reported engaging in social networking despite identifying pros and cons to its use. Participants' reported use of social media may indicate that social…

  13. Geographical accessibility and spatial coverage modeling of the primary health care network in the Western Province of Rwanda

    Directory of Open Access Journals (Sweden)

    Huerta Munoz Ulises

    2012-09-01

    greatly increases the population being served to 58% of inhabitants. When considering Scenario 3, the total population served is 34.3%. Conclusions Significant spatial variations in geographical accessibility and spatial coverage were observed across the three travel scenarios. The analysis demonstrates that regardless of which travel scenario is used, the majority of the population in the Western Province does not have access to the existing primary health facility network. Our findings also demonstrate the usefulness of GIS methods to leverage multiple datasets from different sources in a spatial framework to provide support to evidence-based planning and resource allocation decision-making in developing countries.

  14. Geographical accessibility and spatial coverage modeling of the primary health care network in the Western Province of Rwanda.

    Science.gov (United States)

    Huerta Munoz, Ulises; Källestål, Carina

    2012-09-17

    . When considering Scenario 3, the total population served is 34.3%. Significant spatial variations in geographical accessibility and spatial coverage were observed across the three travel scenarios. The analysis demonstrates that regardless of which travel scenario is used, the majority of the population in the Western Province does not have access to the existing primary health facility network. Our findings also demonstrate the usefulness of GIS methods to leverage multiple datasets from different sources in a spatial framework to provide support to evidence-based planning and resource allocation decision-making in developing countries.

  15. Development of the Moffitt Cancer Network as a Telemedicine and Teleconferencing Educational Tool for Health Care Providers

    National Research Council Canada - National Science Library

    Krischer, Jeffrey

    2001-01-01

    The Moffitt Cancer Network's (MCN) goal is to provide up-to-date oncology related information, resources, and education to oncology health care providers and researchers for the prevention and cure of cancer...

  16. Development of the Moffitt Cancer Network as a Telemedicine and Teleconferencing Educational Tool for Health Care Providers

    National Research Council Canada - National Science Library

    Krischer, Jeffrey

    2002-01-01

    The Moffitt Cancer Network's (MCN) goal is to provide up-to-date oncology related information, resources, and education to oncology health care providers and researchers for the prevention and cure of cancer...

  17. Combining Social Networks and Semantic Web Technologies for Personalizing Web Access

    Science.gov (United States)

    Carminati, Barbara; Ferrari, Elena; Perego, Andrea

    The original purpose of Web metadata was to protect end-users from possible harmful content and to simplify search and retrieval. However they can also be also exploited in more enhanced applications, such as Web access personalization on the basis of end-users’ preferences. In order to achieve this, it is however necessary to address several issues. One of the most relevant is how to assess the trustworthiness of Web metadata. In this paper, we discuss how such issue can be addressed through the use of collaborative and Semantic Web technologies. The system we propose is based on a Web-based Social Network, where members are able not only to specify labels, but also to rate existing labels. Both labels and ratings are then used to assess the trustworthiness of resources’ descriptions and to enforce Web access personalization.

  18. Proof-of-Concept System for Opportunistic Spectrum Access in Multi-user Decentralized Networks

    Directory of Open Access Journals (Sweden)

    Sumit J. Darak

    2016-09-01

    Full Text Available Poor utilization of an electromagnetic spectrum and ever increasing demand for spectrum have led to surge of interests in opportunistic spectrum access (OSA based paradigms like cognitive radio and unlicensed LTE. In OSA for decentralized networks, frequency band selection from wideband spectrum is a challenging task since secondary users (SUs do not share any information with each other. In this paper, a new decision making policy (DMP has been proposed for OSA in the multi-user decentralized networks. First contribution is an accurate characterization of frequency bands using Bayes-UCB algorithm. Then, a novel SU orthogonization scheme using Bayes-UCB algorithm is proposed replacing randomization based scheme. At the end, USRP testbed has been developed for analyzing the performance of DMPs using real radio signals. Experimental results show that the proposed DMP offers significant improvement in spectrum utilization, fewer subband switching and collisions compared to other DMPs.

  19. Repeated Auctions with Learning for Spectrum Access in Cognitive Radio Networks

    CERN Document Server

    Han, Zhu; Poor, Vincent H

    2009-01-01

    In this paper, spectrum access in cognitive radio networks is modeled as a repeated auction game subject to monitoring and entry costs. For secondary users, sensing costs are incurred as the result of primary users' activity. Furthermore, each secondary user pays the cost of transmissions upon successful bidding for a channel. Knowledge regarding other secondary users' activity is limited due to the distributed nature of the network. The resulting formulation is thus a dynamic game with incomplete information. In this paper, an efficient bidding learning algorithm is proposed based on the outcome of past transactions. As demonstrated through extensive simulations, the proposed distributed scheme outperforms a myopic one-stage algorithm, and can achieve a good balance between efficiency and fairness.

  20. Proposal of Novel Optical Burst Signal Receiver for ONU in Optical Switched Access Network

    Science.gov (United States)

    Ueda, Hiromi; Hamasaki, Keita; Kuriyama, Takashi; Tsuboi, Toshinori; Kasai, Hiroyuki

    To realize economical optical burst signal receivers for the Optical Network Unit (ONU) of the Ethernet Optical Switched Access Network (E-OSAN), we previously implemented optical burst receivers with AC-coupling and DC-coupling using off-the-shelf components, and showed that the former offers better performance. This paper proposes a new optical burst signal receiver that uses the transfer function, Gn(s) =1-Hn(s), where Hn(s) denotes a Bessel filter transfer function of order n. We also present a method for designing the proposed receiver and clarify that it has better performance than the conventional AC-coupling one. We then present an LCR circuit synthesis of Gn(s), which is necessary to actually implement a burst receiver based on the proposal.

  1. A Cloud-Assisted Random Linear Network Coding Medium Access Control Protocol for Healthcare Applications

    Directory of Open Access Journals (Sweden)

    Elli Kartsakli

    2014-03-01

    Full Text Available Relay sensor networks are often employed in end-to-end healthcare applications to facilitate the information flow between patient worn sensors and the medical data center. Medium access control (MAC protocols, based on random linear network coding (RLNC, are a novel and suitable approach to efficiently handle data dissemination. However, several challenges arise, such as additional delays introduced by the intermediate relay nodes and decoding failures, due to channel errors. In this paper, we tackle these issues by adopting a cloud architecture where the set of relays is connected to a coordinating entity, called cloud manager. We propose a cloud-assisted RLNC-based MAC protocol (CLNC-MAC and develop a mathematical model for the calculation of the key performance metrics, namely the system throughput, the mean completion time for data delivery and the energy efficiency. We show the importance of central coordination in fully exploiting the gain of RLNC under error-prone channels.

  2. Towards convergence of wireless and wireline signal transport in broadband access networks

    DEFF Research Database (Denmark)

    Yu, Xianbin; Prince, Kamau; Tafur Monroy, Idelfonso

    2010-01-01

    Hybrid optical wireless access networks are to play an important role in the realization of the vision of delivery of broadband services to the end-user any time, anywhere and at affordable costs. We present results of experiments conducted over a field deployed optical fibre links we successfully...... demonstrated converged wireless and wireline signal transport over a common fibre infrastructure. The type of signal used in this field deployed experiments cover WiMax, Impulse-radio ultra-wideband (UWB) and coherent transmission of baseband QPSK and radio-over-fibre signals....

  3. Channel capacity of TDD-OFDM-MIMO for multiple access points in a wireless single-frequency-network

    DEFF Research Database (Denmark)

    Takatori, Y.; Fitzek, Frank; Tsunekawa, K.

    2005-01-01

    MIMO data transmission scheme, which combines Single-Frequency-Network (SFN) with TDD-OFDM-MIMO applied for wireless LAN networks. In our proposal, we advocate to use SFN for multiple access points (MAP) MIMO data transmission. The goal of this approach is to achieve very high channel capacity in both...

  4. Reducing the power consumption in LTE-Advanced wireless access networks by a capacity based deployment tool

    Science.gov (United States)

    Deruyck, Margot; Joseph, Wout; Tanghe, Emmeric; Martens, Luc

    2014-09-01

    As both the bit rate required by applications on mobile devices and the number of those mobile devices are steadily growing, wireless access networks need to be expanded. As wireless networks also consume a lot of energy, it is important to develop energy-efficient wireless access networks in the near future. In this study, a capacity-based deployment tool for the design of energy-efficient wireless access networks is proposed. Capacity-based means that the network responds to the instantaneous bit rate requirements of the users active in the selected area. To the best of our knowledge, such a deployment tool for energy-efficient wireless access networks has never been presented before. This deployment tool is applied to a realistic case in Ghent, Belgium, to investigate three main functionalities incorporated in LTE-Advanced: carrier aggregation, heterogeneous deployments, and Multiple-Input Multiple-Output (MIMO). The results show that it is recommended to introduce femtocell base stations, supporting both MIMO and carrier aggregation, into the network (heterogeneous deployment) to reduce the network's power consumption. For the selected area and the assumptions made, this results in a power consumption reduction up to 70%. Introducing femtocell base stations without MIMO and carrier aggregation can already result in a significant power consumption reduction of 38%.

  5. Regulating the access and use of the British gas network; Le modalita` di accesso alla rete britannica

    Energy Technology Data Exchange (ETDEWEB)

    Bianchi, Alessandro [RIE Srl, Bologna (Italy)

    1997-03-01

    In the UK the Network Code, regulating the access and use of the British gas network and stating gas transportation companies` rights and duties, has fully come into effect since September 1996: in practice, it comprises all rules applying to BG TransCo, the proper British Gas unit transporting and storing gas on third parties` account.

  6. A heterogeneous approach to achieve QoS in fixed access networks -- results from FP6 project MUSE

    NARCIS (Netherlands)

    Nooren, P.; Deventer, M.O. van; Gamelas, A.; Elizondo, A.J.; Vimel, R.; Eriksson, A.E.

    2005-01-01

    Next-generation networks are composed of different types of access, aggregation and core networks and they are expected to offer a wide range of services. Based on an analysis of the requirements that this heterogeneity introduces for QoS control, this paper concludes that a single QoS solution can

  7. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    Directory of Open Access Journals (Sweden)

    Du Bing

    2010-01-01

    Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.

  8. Coordinated scheduling for the downlink of cloud radio-access networks

    KAUST Repository

    Douik, Ahmed S.

    2015-09-11

    This paper addresses the coordinated scheduling problem in cloud-enabled networks. Consider the downlink of a cloud-radio access network (CRAN), where the cloud is only responsible for the scheduling policy and the synchronization of the transmit frames across the connected base-stations (BS). The transmitted frame of every BS consists of several time/frequency blocks, called power-zones (PZ), maintained at fixed transmit power. The paper considers the problem of scheduling users to PZs and BSs in a coordinated fashion across the network, by maximizing a network-wide utility under the practical constraint that each user cannot be served by more than one base-station, but can be served by one or more power-zones within each base-station frame. The paper solves the problem using a graph theoretical approach by introducing the scheduling graph in which each vertex represents an association of users, PZs and BSs. The problem is formulated as a maximum weight clique, in which the weight of each vertex is the benefit of the association represented by that vertex. The paper further presents heuristic algorithms with low computational complexity. Simulation results show the performance of the proposed algorithms and suggest that the heuristics perform near optimal in low shadowing environments. © 2015 IEEE.

  9. Measuring the Gap Between Car and Transit Accessibility : Estimating Access Using a High-Resolution Transit Network Geographic Information System

    NARCIS (Netherlands)

    Benenson, I.; Martens, C.J.C.M.; Rofé, Y.

    2010-01-01

    Accessibility is increasingly identified in the academic literature and in planning practice as a key criterion to assess transport policies and urban land use development. This paper contributes in two respects to the growing body of literature on accessibility and accessibility measurement. First,

  10. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Meng Yi

    2016-11-01

    Full Text Available This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  11. Non-Orthogonal Multiple Access and Carrierless Amplitude Phase Modulation for 5G Mobile Networks

    DEFF Research Database (Denmark)

    Altabas, Jose A.; Rommel, Simon; Puerta Ramírez, Rafael

    2017-01-01

    A combined NOMA and multiCAP scheme is proposed for capacity enhancement of 5G mobile networks and experimentally tested over a W-band millimeter-wave radio-over-fiber system. The evaluated NOMA-CAP system provides an aggregated transmission rate of 30Gbps.......A combined NOMA and multiCAP scheme is proposed for capacity enhancement of 5G mobile networks and experimentally tested over a W-band millimeter-wave radio-over-fiber system. The evaluated NOMA-CAP system provides an aggregated transmission rate of 30Gbps....

  12. Access to emergency hospital care provided by the public sector in sub-Saharan Africa in 2015: a geocoded inventory and spatial analysis.

    Science.gov (United States)

    Ouma, Paul O; Maina, Joseph; Thuranira, Pamela N; Macharia, Peter M; Alegana, Victor A; English, Mike; Okiro, Emelda A; Snow, Robert W

    2018-01-25

    Timely access to emergency care can substantially reduce mortality. International benchmarks for access to emergency hospital care have been established to guide ambitions for universal health care by 2030. However, no Pan-African database of where hospitals are located exists; therefore, we aimed to complete a geocoded inventory of hospital services in Africa in relation to how populations might access these services in 2015, with focus on women of child bearing age. We assembled a geocoded inventory of public hospitals across 48 countries and islands of sub-Saharan Africa, including Zanzibar, using data from various sources. We only included public hospitals with emergency services that were managed by governments at national or local levels and faith-based or non-governmental organisations. For hospital listings without geographical coordinates, we geocoded each facility using Microsoft Encarta (version 2009), Google Earth (version 7.3), Geonames, Fallingrain, OpenStreetMap, and other national digital gazetteers. We obtained estimates for total population and women of child bearing age (15-49 years) at a 1 km2 spatial resolution from the WorldPop database for 2015. Additionally, we assembled road network data from Google Map Maker Project and OpenStreetMap using ArcMap (version 10.5). We then combined the road network and the population locations to form a travel impedance surface. Subsequently, we formulated a cost distance algorithm based on the location of public hospitals and the travel impedance surface in AccessMod (version 5) to compute the proportion of populations living within a combined walking and motorised travel time of 2 h to emergency hospital services. We consulted 100 databases from 48 sub-Saharan countries and islands, including Zanzibar, and identified 4908 public hospitals. 2701 hospitals had either full or partial information about their geographical coordinates. We estimated that 287 282 013 (29·0%) people and 64 495 526 (28·2

  13. Communication technology access, use, and preferences among primary care patients: from the Residency Research Network of Texas (RRNeT).

    Science.gov (United States)

    Hill, Jason H; Burge, Sandra; Haring, Anna; Young, Richard A

    2012-01-01

    The digital revolution is changing the manner in which patients communicate with their health care providers, yet many patients still lack access to communication technology. We conducted this study to evaluate access to, use of, and preferences for using communication technology among a predominantly low-income patient population. We determined whether access, use, and preferences were associated with type of health insurance, sex, age, and ethnicity. In 2011, medical student researchers administered questionnaires to patients of randomly selected physicians within 9 primary care clinics in the Residency Research Network of Texas. Surveys addressed access to and use of cell phones and home computers and preferences for communicating with health care providers. In this sample of 533 patients (77% response rate), 448 (84%) owned a cell phone and 325 (62%) owned computers. Only 48% reported conducting Internet searches, sending and receiving E-mails, and looking up health information on the Internet. Older individuals, those in government sponsored insurance programs, and individuals from racial/ethnic minority groups had the lowest levels of technology adoption. In addition, more than 60% of patients preferred not to send and receive health information over the Internet, by instant messaging, or by text messaging. Many patients in this sample did not seek health information electronically nor did they want to communicate electronically with their physicians. This finding raises concerns about the vision of the patient-centered medical home to enhance the doctor-patient relationship through communication technology. Our patients represent some of the more vulnerable populations in the United States and, as such, deserve attention from health care policymakers who are promoting widespread use of communication technology.

  14. The Zika Contraception Access Network: a feasibility programme to increase access to contraception in Puerto Rico during the 2016-17 Zika virus outbreak.

    Science.gov (United States)

    Lathrop, Eva; Romero, Lisa; Hurst, Stacey; Bracero, Nabal; Zapata, Lauren B; Frey, Meghan T; Rivera, Maria I; Berry-Bibee, Erin N; Honein, Margaret A; Monroe, Judith; Jamieson, Denise J

    2018-02-01

    Prevention of unintended pregnancy is a primary strategy to reduce adverse pregnancy and birth outcomes related to Zika virus infection. The Zika Contraception Access Network (Z-CAN) aimed to build a network of health-care providers offering client-centred contraceptive counselling and the full range of reversible contraception at no cost to women in Puerto Rico who chose to prevent pregnancy during the 2016-17 Zika virus outbreak. Here, we describe the Z-CAN programme design, implementation activities, and baseline characteristics of the first 21 124 participants. Z-CAN was developed by establishing partnerships between federal agencies, territorial health agencies, private corporations, and domestic philanthropic and non-profit organisations in the continental USA and Puerto Rico. Private donations to the National Foundation for the Centers for Disease Control and Prevention (CDCF) secured a supply of reversible contraceptive methods (including long-acting reversible contraception), made available to non-sterilised women of reproductive age at no cost through provider reimbursements and infrastructure supported by the CDCF. To build capacity in contraception service provision, doctors and clinic staff from all public health regions and nearly all municipalities in Puerto Rico were recruited into the programme. All providers completed 1 day of comprehensive training in contraception knowledge, counselling, and initiation and management, including the insertion and removal of long-acting reversible contraceptives (LARCs). Z-CAN was announced through health-care providers, word of mouth, and a health education campaign. Descriptive characteristics of programme providers and participants were recorded, and we estimated the factors associated with choosing and receiving a LARC method. As part of a Z-CAN programme monitoring plan, participants were invited to complete a patient satisfaction survey about whether they had obtained free, same-day access to their chosen

  15. Fiber-Wireless (FiWi Broadband Access Networks in an Age of Convergence: Past, Present, and Future

    Directory of Open Access Journals (Sweden)

    Martin Maier

    2014-01-01

    Full Text Available After describing the beginnings and state of the art of integrated fiber-wireless (FiWi broadband access networks in great detail, we briefly review recent progress and point to various ongoing research activities, including the design of energy-efficient “green” FiWi access networks, advanced survivability techniques, and integration of wireless and fiber optic sensors, towards realizing adaptable, dependable, and ecoconscious future-proof broadband access networks based on both wireless and shared passive fiber media. Furthermore, we discuss service, application, business, and operation related aspects, which motivate access technology to move into a substantially different direction in the long run than continued capacity provisioning. Given that most 4G cellular mobile network researches so far have been focusing on the achievable performance gains in the wireless front-end only without looking into the details of backhaul implementations and possible backhaul bottlenecks, we identify open key research challenges for FiWi broadband access networks. We explore ways of how they can be deployed across relevant economic sectors other than telecommunications per se, taking major paradigm shifts such as the Third Industrial Revolution, Energy Internet, smart grid, and explosion of mobile data traffic in today’s cellular networks into account.

  16. An extreme events laboratory to provide network centric collaborative situation assessment and decision making

    Science.gov (United States)

    Panulla, Brian J.; More, Loretta D.; Shumaker, Wade R.; Jones, Michael D.; Hooper, Robert; Vernon, Jeffrey M.; Aungst, Stanley G.

    2009-05-01

    Rapid improvements in communications infrastructure and sophistication of commercial hand-held devices provide a major new source of information for assessing extreme situations such as environmental crises. In particular, ad hoc collections of humans can act as "soft sensors" to augment data collected by traditional sensors in a net-centric environment (in effect, "crowd-sourcing" observational data). A need exists to understand how to task such soft sensors, characterize their performance and fuse the data with traditional data sources. In order to quantitatively study such situations, as well as study distributed decision-making, we have developed an Extreme Events Laboratory (EEL) at The Pennsylvania State University. This facility provides a network-centric, collaborative situation assessment and decision-making capability by supporting experiments involving human observers, distributed decision making and cognition, and crisis management. The EEL spans the information chain from energy detection via sensors, human observations, signal and image processing, pattern recognition, statistical estimation, multi-sensor data fusion, visualization and analytics, and modeling and simulation. The EEL command center combines COTS and custom collaboration tools in innovative ways, providing capabilities such as geo-spatial visualization and dynamic mash-ups of multiple data sources. This paper describes the EEL and several on-going human-in-the-loop experiments aimed at understanding the new collective observation and analysis landscape.

  17. Beyond the Hypercube: Evolutionary Accessibility of Fitness Landscapes with Realistic Mutational Networks

    Science.gov (United States)

    Zagorski, Marcin; Burda, Zdzislaw; Waclaw, Bartlomiej

    2016-01-01

    Evolutionary pathways describe trajectories of biological evolution in the space of different variants of organisms (genotypes). The probability of existence and the number of evolutionary pathways that lead from a given genotype to a better-adapted genotype are important measures of accessibility of local fitness optima and the reproducibility of evolution. Both quantities have been studied in simple mathematical models where genotypes are represented as binary sequences of two types of basic units, and the network of permitted mutations between the genotypes is a hypercube graph. However, it is unclear how these results translate to the biologically relevant case in which genotypes are represented by sequences of more than two units, for example four nucleotides (DNA) or 20 amino acids (proteins), and the mutational graph is not the hypercube. Here we investigate accessibility of the best-adapted genotype in the general case of K > 2 units. Using computer generated and experimental fitness landscapes we show that accessibility of the global fitness maximum increases with K and can be much higher than for binary sequences. The increase in accessibility comes from the increase in the number of indirect trajectories exploited by evolution for higher K. As one of the consequences, the fraction of genotypes that are accessible increases by three orders of magnitude when the number of units K increases from 2 to 16 for landscapes of size N ∼ 106 genotypes. This suggests that evolution can follow many different trajectories on such landscapes and the reconstruction of evolutionary pathways from experimental data might be an extremely difficult task. PMID:27935934

  18. Reasons military patients with primary care access leave an emergency department waiting room before seeing a provider.

    Science.gov (United States)

    Varney, Shawn M; Vargas, Toni E; Pitotti, Rebecca L; Bebarta, Vikhyat S

    2012-10-01

    Our objective was to assess patients' understanding of emergency department (ED) wait times and why patients may leave the waiting room before seeing a provider. Survey of patients in the ED waiting room of an urban tertiary care military hospital where civilian and military patients are treated. A total of 508/517 surveys (98%) were completed. Age ranges were 18 to 35 years (49%), 36 to 60 (31%), or older than 60 (20%). Education levels were high school (20%), some college (37%), or college graduate (39%). Of 503 respondents, 125 (25%) had left an ED waiting room before seeing a provider. The reasons included excessive wait times (91%) and family responsibilities (5%). Five hundred eight reported the factors that would motivate them to wait to see the physician (not leave without being seen [LWOBS]) were the severity of illness (64%), and if they received an update of wait times (26%); 82% (391/480) understood that severely ill patients were seen first. Patients attributed long wait times to doctors and nurses caring for other patients (292/583, 50%) and insufficient physician and nurse staffing (245, 42%). Of 802 responses for ideas to improve the wait, 34% said regular updates on estimated wait times, 21% said television shows or movies to view, 20% said books and magazines to read, and 11% said computers to access. Long wait times were the primary reason that patients left before seeing a provider, despite having ready access to care. Respondents attributed long wait times to patient volume and inadequate staffing. Regular updates on wait times and material for entertainment may improve the waiting experience and reduce LWOBS.

  19. On the Impact of Closed Access and Users Identities in Spectrum-Shared Overlaid Wireless Networks

    KAUST Repository

    Radaydeh, Redha M.

    2016-03-28

    © 2015 IEEE. This paper develops analytical models to investigate the impact of various operation terms and parameters on the downlink performance of spectrum-shared overlaid networks under closed-access small cells deployment. It is considered that closed-access small cells (i.e., femtocells) can not reuse available channels, and can serve only active authorized user equipments (UEs). On the other hand, the macrocell base station can unconditionally reuse available channels to serve active macrocell UEs. The analysis characterizes UEs identities, their likelihoods of being active, and their likelihoods of initiating interference. Moreover, it quantifies interference sources observed from effective femtocells considering their over-loaded and under-loaded cell scenarios. The developed results to characterize an active UE performance and the impact of the number of available channels are thoroughly examined. The obtained results are generally applicable for any performance measure and any network channel models. Numerical and simulation examples are presented to clarify the main outcomes of this paper.

  20. At the intersection of lay and professional social networks: how community ties shape perceptions of mental health treatment providers.

    Science.gov (United States)

    Perry, B L; Pullen, E; Pescosolido, B A

    2016-01-01

    The therapeutic alliance is a critical determinant of individuals' persistence and outcomes in mental health treatment. Simultaneously, individuals' community networks shape decisions about whether, when, and what kind of treatment are used. Despite the similar focus on social relationship influence for individuals with serious mental illness, each line of research has maintained an almost exclusive focus on either 'inside' (i.e. treatment) networks or 'outside' (i.e. community) networks, respectively. For this study, we integrate these important insights by employing a network-embedded approach to understand the therapeutic alliance. Using data from the Indianapolis Network Mental Health Study (INMHS, n = 169, obs = 2206), we target patients experiencing their first major contact with the mental health treatment system. We compare patients' perceptions of support resources available through treatment providers and lay people, and ask whether evaluations of interpersonal dimensions of the therapeutic alliance are contingent on characteristics of community networks. Analyses reveal that providers make up only 9% of the whole social network, but are generally perceived positively. However, when community networks are characterized by close relationships and frequent contact, patients are significantly more likely to report that treatment providers offer useful advice and information. Conversely, when community networks are in conflict, perceptions of treatment providers are more negative. Community-based social networks are critical for understanding facilitators of and barriers to effective networks inside treatment, including the therapeutic alliance. Implications for community-based systems of care are discussed in the context of the USA and global patterns of deinstitutionalization and community reintegration.

  1. Connectivity and conditional models of access and abundance of species in stream networks.

    Science.gov (United States)

    Chelgren, Nathan D; Dunham, Jason B

    2015-07-01

    Barriers to passage of aquatic organisms at stream road crossings are a major cause of habitat fragmentation in stream networks. Accordingly, large investments have been made to restore passage at these crossings, but often without estimation of population-level benefits. Here, we describe a broad-scale approach to quantifying the effectiveness of passage restoration in terms interpretable at population levels, namely numbers of fish and length of stream gained through restoration, by sampling abundance in a study design that accounts for variable biogeographic species pools, variable stream and barrier configurations, and variable probabilities of capture and detectability for multiple species. We modified an existing zero-inflated negative-binomial model to estimate the probability of site access, abundance conditional on access, and capture probability of individual fish. Therein, we modeled probability of access as a function of gradient, stream road-crossing type, and downstream access by fish simultaneously with a predictive model for abundance at sites accessible to fish. Results indicated that replacement of barriers with new crossing designs intended to allow for greater movement was associated with dramatically higher probability of access for all fishes, including migratory Pacific salmon, trout, sculpin, and lamprey. Conversely, existing non-replaced crossings negatively impacted fish distributions. Assuming no downstream constraints on access, we estimated the potential length of stream restored by the program ranged between 7.33 (lamprey) and 15.28 km (small coastal cutthroat and rainbow trout). These contributions represented a fraction of the total length available upstream (187 km) of replaced crossings. When limited ranges of species were considered, the estimated contributions of culvert replacement were reduced (1.65-km range, for longnose dace to 12.31 km for small coastal cutthroat and rainbow trout). Numbers of fish contributed ranged from

  2. Layer-specific chromatin accessibility landscapes reveal regulatory networks in adult mouse visual cortex

    Science.gov (United States)

    Gray, Lucas T; Yao, Zizhen; Nguyen, Thuc Nghi; Kim, Tae Kyung; Zeng, Hongkui; Tasic, Bosiljka

    2017-01-01

    Mammalian cortex is a laminar structure, with each layer composed of a characteristic set of cell types with different morphological, electrophysiological, and connectional properties. Here, we define chromatin accessibility landscapes of major, layer-specific excitatory classes of neurons, and compare them to each other and to inhibitory cortical neurons using the Assay for Transposase-Accessible Chromatin with high-throughput sequencing (ATAC-seq). We identify a large number of layer-specific accessible sites, and significant association with genes that are expressed in specific cortical layers. Integration of these data with layer-specific transcriptomic profiles and transcription factor binding motifs enabled us to construct a regulatory network revealing potential key layer-specific regulators, including Cux1/2, Foxp2, Nfia, Pou3f2, and Rorb. This dataset is a valuable resource for identifying candidate layer-specific cis-regulatory elements in adult mouse cortex. DOI: http://dx.doi.org/10.7554/eLife.21883.001 PMID:28112643

  3. Non-Orthogonal Multiple Access for Large-Scale 5G Networks: Interference Aware Design

    KAUST Repository

    Ali, Konpal S.

    2017-09-18

    Non-orthogonal multiple access (NOMA) is promoted as a key component of 5G cellular networks. As the name implies, NOMA operation introduces intracell interference (i.e., interference arising within the cell) to the cellular operation. The intracell interference is managed by careful NOMA design (e.g., user clustering and resource allocation) along with successive interference cancellation. However, most of the proposed NOMA designs are agnostic to intercell interference (i.e., interference from outside the cell), which is a major performance limiting parameter in 5G networks. This article sheds light on the drastic negative-impact of intercell interference on the NOMA performance and advocates interference-aware NOMA design that jointly accounts for both intracell and intercell interference. To this end, a case study for fair NOMA operation is presented and intercell interference mitigation techniques for NOMA networks are discussed. This article also investigates the potential of integrating NOMA with two important 5G transmission schemes, namely, full duplex and device-to-device communication. This is important since the ambitious performance defined by the 3rd Generation Partnership Project (3GPP) for 5G is foreseen to be realized via seamless integration of several new technologies and transmission techniques.

  4. Threats and risks to information security: a practical analysis of free access wireless networks

    Science.gov (United States)

    Quirumbay, Daniel I.; Coronel, Iván. A.; Bayas, Marcia M.; Rovira, Ronald H.; Gromaszek, Konrad; Tleshova, Akmaral; Kozbekova, Ainur

    2017-08-01

    Nowadays, there is an ever-growing need to investigate, consult and communicate through the internet. This need leads to the intensification of free access to the web in strategic and functional points for the benefit of the community. However, this open access is also related to the increase of information insecurity. The existing works on computer security primarily focus on the development of techniques to reduce cyber-attacks. However, these approaches do not address the sector of inexperienced users who have difficulty understanding browser settings. Two methods can solve this problem: first the development of friendly browsers with intuitive setups for new users and on the other hand, by implementing awareness programs on essential security without deepening on technical information. This article addresses an analysis of the vulnerabilities of wireless equipment that provides internet service in the open access zones and the potential risks that could be found when using these means.

  5. Wavelet-based compression with ROI coding support for mobile access to DICOM images over heterogeneous radio networks.

    Science.gov (United States)

    Maglogiannis, Ilias; Doukas, Charalampos; Kormentzas, George; Pliakas, Thomas

    2009-07-01

    Most of the commercial medical image viewers do not provide scalability in image compression and/or region of interest (ROI) encoding/decoding. Furthermore, these viewers do not take into consideration the special requirements and needs of a heterogeneous radio setting that is constituted by different access technologies [e.g., general packet radio services (GPRS)/ universal mobile telecommunications system (UMTS), wireless local area network (WLAN), and digital video broadcasting (DVB-H)]. This paper discusses a medical application that contains a viewer for digital imaging and communications in medicine (DICOM) images as a core module. The proposed application enables scalable wavelet-based compression, retrieval, and decompression of DICOM medical images and also supports ROI coding/decoding. Furthermore, the presented application is appropriate for use by mobile devices activating in heterogeneous radio settings. In this context, performance issues regarding the usage of the proposed application in the case of a prototype heterogeneous system setup are also discussed.

  6. Potential applications of micro-optic technology for next-generation fibre optic connectivity solutions exploitable in access networks

    Science.gov (United States)

    Watté, Jan; Petersen, Rainer

    2010-05-01

    The potential of fibre-optic connectivity based on micro-optical components for deployment at particular nodes of telecom access networks will be addressed. Low-cost micro-optic components which can be manufactured by high volume replication techniques can provide new functionalities or lead to optical performance improvements of permanent or demateable fibre connections. Some of the most interesting applications involving refractive micro lenses and new fibre alignment structures will be highlighted. Numerical simulations will be presented showing that expanded beam connectors are more robust to pollution than physical contact ferrule-based connectors. The advantages and drawbacks of expanded beam fibre coupling versus physical contact connectivity based on existing and micro-optical structures are discussed.

  7. World-wide interactive access to scientific databases via satellite and terrestrial data network

    Science.gov (United States)

    Sanderson, T. R.; Albrecht, M. A.; Ciarlo, A.; Brett, M.; Blank, K.; Hughes, P. M. T.; Wallum, G.; Hills, H. K.; Green, J. L.; Mcguire, R. E.; hide

    1990-01-01

    In order to demonstrate the possibilities for scientific networking and data transfer, a first temporary satellite network link was installed between Czecholovakia and the European space operations center in Darmstadt, during the meeting of the inter-agency consultative group for space science in Prague. Several experiments to show interactive nature of the facility and the capability of the system were carried out, and it was proven that, despite the temporary nature of the installation, the planned demonstrations could be conducted in real time. Demonstrations included electronic mail message, orbit prediction and solar X-ray data. The results of the experiment provided insight into possibilities of data exchange.

  8. Teleradiotherapy Network: Applications and Feasibility for Providing Cost-Effective Comprehensive Radiotherapy Care in Low- and Middle-Income Group Countries for Cancer Patients.

    Science.gov (United States)

    Datta, Niloy Ranjan; Heuser, Michael; Samiei, Massoud; Shah, Ragesh; Lutters, Gerd; Bodis, Stephan

    2015-07-01

    Globally, new cancer cases will rise by 57% within the next two decades, with the majority in the low- and middle-income countries (LMICs). Consequently, a steep increase of about 40% in cancer deaths is expected there, mainly because of lack of treatment facilities, especially radiotherapy. Radiotherapy is required for more than 50% of patients, but the capital cost for equipment often deters establishment of such facilities in LMICs. Presently, of the 139 LMICs, 55 do not even have a radiotherapy facility, whereas the remaining 84 have a deficit of 61.4% of their required radiotherapy units. Networking between centers could enhance the effectiveness and reach of existing radiotherapy in LMICs. A teleradiotherapy network could enable centers to share and optimally utilize their resources, both infrastructure and staffing. This could be in the form of a three-tier radiotherapy service consisting of primary, secondary, and tertiary radiotherapy centers interlinked through a network. The concept has been adopted in some LMICs and could also be used as a "service provider model," thereby reducing the investments to set up such a network. Teleradiotherapy networks could be a part of the multipronged approach to address the enormous gap in radiotherapy services in a cost-effective manner and to support better accessibility to radiotherapy facilities, especially for LMICs.

  9. Medium access control and hardware prototype designs for low-energy wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Kohvakka, M.

    2009-07-01

    A Wireless Sensor Network (WSN) is an emerging technology consisting of small, cheap, and ultra-low energy sensor nodes, which cooperatively monitor physical quantities, actuate, and perform data processing tasks. A deployment may comprise thousands of randomly distributed autonomous nodes, which must self-configure and create a multi-hop network topology.This thesis focuses on low-energy WSNs targeting to long network lifetime. The main research problem is the combination of adaptive and scalable multi-hop networking with constrained energy budget, processing power, and communication bandwidth. The research problem is approached by energy-efficient protocols and low-power sensor node platforms. The main contribution of this thesis is an energy-efficient Medium Access Control (MAC) design for TUTWSN (Tampere University of Technology Wireless Sensor Network). The design comprises channel access and networking mechanisms, which specify data exchange, link synchronization, network self-configuration, and neighbor discovery operations. The second outcome are several low-power sensor node platforms, which have been designed and implemented to evaluate the performance of the MAC design and hardware components in real deployments. The third outcome are the performance models and analysis of several MAC designs including TUTWSN, IEEE 802.15.4, and the most essential research proposals.The results and conclusion of this Thesis indicate that it is possible to implement multi-hop WSNs in harsh and dynamic operation conditions with years of lifetime using current low-cost components and batteries. Energy analysis results indicate that the lowest energy consumption is achieved by using simple and high data-rate transceivers. It is also critical to minimize sleep mode power consumption of all components and to use accurate wake-up timers. However, the selection of components constitutes only a minor part of the solution, and an energy-efficient MAC layer design being able to

  10. Untangling complex networks: risk minimization in financial markets through accessible spin glass ground states.

    Science.gov (United States)

    Lisewski, Andreas Martin; Lichtarge, Olivier

    2010-08-15

    Recurrent international financial crises inflict significant damage to societies and stress the need for mechanisms or strategies to control risk and tamper market uncertainties. Unfortunately, the complex network of market interactions often confounds rational approaches to optimize financial risks. Here we show that investors can overcome this complexity and globally minimize risk in portfolio models for any given expected return, provided the relative margin requirement remains below a critical, empirically measurable value. In practice, for markets with centrally regulated margin requirements, a rational stabilization strategy would be keeping margins small enough. This result follows from ground states of the random field spin glass Ising model that can be calculated exactly through convex optimization when relative spin coupling is limited by the norm of the network's Laplacian matrix. In that regime, this novel approach is robust to noise in empirical data and may be also broadly relevant to complex networks with frustrated interactions that are studied throughout scientific fields.

  11. Design of Active Queue Management for Robust Control on Access Router for Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Åhlund Christer

    2011-01-01

    Full Text Available The Internet architecture is a packet switching technology that allows dynamic sharing of bandwidth among different flows with in an IP network. Packets are stored and forwarded from one node to the next until reaching their destination. Major issues in this integration are congestion control and how to meet different quality of service requirements associated with various services. In other words streaming media quality degrades with increased packet delay and jitter caused by network congestion. To mitigate the impact of network congestion, various techniques have been used to improve multimedia quality and one of those techniques is Active Queue Management (AQM. Access routers require a buffer to hold packets during times of congestion. A large buffer can absorb the bursty arrivals, and this tends to increase the link utilizations but results in higher queuing delays. Traffic burstiness has a considerable negative impact on network performance. AQM is now considered an effective congestion control mechanism for enhancing transport protocol performance over wireless links. In order to have good link utilization, it is necessary for queues to adapt to varying traffic loads. This paper considers a particular scheme which is called Adaptive AQM (AAQM and studies its performance in the presence of feedback delays and its ability to maintain a small queue length as well as its robustness in the presence of traffic burstiness. The paper also presents a method based on the well-known Markov Modulated Poisson Process (MPP to capture traffic burstiness and buffer occupancy. To demonstrate the generality of the presented method, an analytic model is described and verified by extensive simulations of different adaptive AQM algorithms. The analysis and simulations show that AAQM outperforms the other AQMs with respect to responsiveness and robustness.

  12. Isolated user security enhancement in optical code division multiple access network against eavesdropping

    Science.gov (United States)

    Jyoti, Vishav; Kaler, Rajinder Singh

    2012-09-01

    A novel virtual user system is modeled for enhancing the security of an optical code division multiple access (OCDMA) network. Although the OCDMA system implementing code shift keying (CSK) is secure against a conventional power detector, it is susceptible to differential eavesdropping. An analytical framework is developed for the CSK-OCDMA system to show eavesdropper's code interception performance for a single transmitting user in the presence of a virtual user. It is shown that the eavesdropper's probability of correct bit interception decreases from 7.1×10-1 to 1.85×10-5 with the inclusion of the virtual user. Furthermore, the results confirm that the proposed virtual user scheme increases the confidentiality of the CSK-OCDMA system and outperforms the conventional OCDMA scheme in terms of security.

  13. Enhancing the Performance of Random Access Networks with Random Packet CDMA and Joint Detection

    Directory of Open Access Journals (Sweden)

    Behrouz Farhang-Boroujeny

    2008-09-01

    Full Text Available Random packet CDMA (RP-CDMA is a recently proposed random transmission scheme which has been designed from the beginning as a cross-layer method to overcome the restrictive nature of the Aloha protocol. Herein, we more precisely model its performance and investigate throughput and network stability. In contrast to previous works, we adopt the spread Aloha model for header transmission, and the performance of different joint detection methods for the payload data is investigated. Furthermore, we introduce performance measures for multiple access systems based on the diagonal elements of a modified multipacket reception matrix, and show that our measures describe the upper limit of the vector of stable arrival rates for a finite number of users. Finally, we simulate queue sizes and throughput characteristics of RP-CDMA with various receiver structures and compare them to spread Aloha.

  14. NRZ versus RZ over Absolute Added Correlative coding in optical metro-access networks

    Science.gov (United States)

    Dong-Nhat, Nguyen; Elsherif, Mohamed A.; Le Minh, Hoa; Malekmohammadi, Amin

    2017-03-01

    This paper comparatively investigates the transmission performance of absolute added correlative coding (AACC) using non-return-to-zero (NRZ) and return-to-zero (RZ) pulse shapes with a binary intensity modulation direct detection receiver in 40 Gb/s optical metro-access networks operating at 1550 nm. It is shown that, for AACC transmission, the NRZ impulse shaping is superior in comparison to RZ in spectral efficiency, dispersion tolerance, residual dispersion and self-phase modulation (SPM) tolerance. However, RZ-AACC experiences a 1-2 dB advantage in receiver sensitivity over NRZ-AACC for back-to-back configuration as well as after 300-km single-mode fiber delivery.

  15. Enhancing the Performance of Random Access Networks with Random Packet CDMA and Joint Detection

    Science.gov (United States)

    Kempter, Roland; Amini, Peiman; Farhang-Boroujeny, Behrouz

    2008-12-01

    Random packet CDMA (RP-CDMA) is a recently proposed random transmission scheme which has been designed from the beginning as a cross-layer method to overcome the restrictive nature of the Aloha protocol. Herein, we more precisely model its performance and investigate throughput and network stability. In contrast to previous works, we adopt the spread Aloha model for header transmission, and the performance of different joint detection methods for the payload data is investigated. Furthermore, we introduce performance measures for multiple access systems based on the diagonal elements of a modified multipacket reception matrix, and show that our measures describe the upper limit of the vector of stable arrival rates for a finite number of users. Finally, we simulate queue sizes and throughput characteristics of RP-CDMA with various receiver structures and compare them to spread Aloha.

  16. Revenue-Maximizing Radio Access Technology Selection with Net Neutrality Compliance in Heterogeneous Wireless Networks

    OpenAIRE

    Khloussy, Elissar; Jiang, Yuming

    2018-01-01

    The net neutrality principle states that users should have equal access to all Internet content and that Internet Service Providers (ISPs) should not practice differentiated treatment on any of the Internet traffic. While net neutrality aims to restrain any kind of discrimination, it also grants exemption to a certain category of traffic known as specialized services (SS), by allowing the ISP to dedicate part of the resources for the latter. In this work, we consider a heterogeneous LTE/WiFi ...

  17. Social network analysis of wild chimpanzees provides insights for predicting infectious disease risk.

    Science.gov (United States)

    Rushmore, Julie; Caillaud, Damien; Matamba, Leopold; Stumpf, Rebecca M; Borgatti, Stephen P; Altizer, Sonia

    2013-09-01

    1. Heterogeneity in host association patterns can alter pathogen transmission and strategies for control. Great apes are highly social and endangered animals that have experienced substantial population declines from directly transmitted pathogens; as such, network approaches to quantify contact heterogeneity could be crucially important for predicting infection probability and outbreak size following pathogen introduction, especially owing to challenges in collecting real-time infection data for endangered wildlife. 2. We present here the first study using network analysis to quantify contact heterogeneity in wild apes, with applications for predicting community-wide infectious disease risk. Specifically, within a wild chimpanzee community, we ask how associations between individuals vary over time, and we identify traits of highly connected individuals that might contribute disproportionately to pathogen spread. 3. We used field observations of behavioural encounters in a habituated wild chimpanzee community in Kibale National Park, Uganda to construct monthly party level (i.e. subgroup) and close-contact (i.e. ≤ 5 m) association networks over a 9-month period. 4. Network analysis revealed that networks were highly dynamic over time. In particular, oestrous events significantly increased pairwise party associations, suggesting that community-wide disease outbreaks should be more likely to occur when many females are in oestrus. 5. Bayesian models and permutation tests identified traits of chimpanzees that were highly connected within the network. Individuals with large families (i.e. mothers and their juveniles) that range in the core of the community territory and to a lesser extent high-ranking males were central to association networks, and thus represent the most important individuals to target for disease intervention strategies. 6. Overall, we show striking temporal variation in network structure and traits that predict association patterns in a wild

  18. MetNetAPI: A flexible method to access and manipulate biological network data from MetNet.

    Science.gov (United States)

    Sucaet, Yves; Wurtele, Eve Syrkin

    2010-11-18

    Convenient programmatic access to different biological databases allows automated integration of scientific knowledge. Many databases support a function to download files or data snapshots, or a webservice that offers "live" data. However, the functionality that a database offers cannot be represented in a static data download file, and webservices may consume considerable computational resources from the host server. MetNetAPI is a versatile Application Programming Interface (API) to the MetNetDB database. It abstracts, captures and retains operations away from a biological network repository and website. A range of database functions, previously only available online, can be immediately (and independently from the website) applied to a dataset of interest. Data is available in four layers: molecular entities, localized entities (linked to a specific organelle), interactions, and pathways. Navigation between these layers is intuitive (e.g. one can request the molecular entities in a pathway, as well as request in what pathways a specific entity participates). Data retrieval can be customized: Network objects allow the construction of new and integration of existing pathways and interactions, which can be uploaded back to our server. In contrast to webservices, the computational demand on the host server is limited to processing data-related queries only. An API provides several advantages to a systems biology software platform. MetNetAPI illustrates an interface with a central repository of data that represents the complex interrelationships of a metabolic and regulatory network. As an alternative to data-dumps and webservices, it allows access to a current and "live" database and exposes analytical functions to application developers. Yet it only requires limited resources on the server-side (thin server/fat client setup). The API is available for Java, Microsoft.NET and R programming environments and offers flexible query and broad data- retrieval methods. Data

  19. MetNetAPI: A flexible method to access and manipulate biological network data from MetNet

    Directory of Open Access Journals (Sweden)

    Sucaet Yves

    2010-11-01

    Full Text Available Abstract Background Convenient programmatic access to different biological databases allows automated integration of scientific knowledge. Many databases support a function to download files or data snapshots, or a webservice that offers "live" data. However, the functionality that a database offers cannot be represented in a static data download file, and webservices may consume considerable computational resources from the host server. Results MetNetAPI is a versatile Application Programming Interface (API to the MetNetDB database. It abstracts, captures and retains operations away from a biological network repository and website. A range of database functions, previously only available online, can be immediately (and independently from the website applied to a dataset of interest. Data is available in four layers: molecular entities, localized entities (linked to a specific organelle, interactions, and pathways. Navigation between these layers is intuitive (e.g. one can request the molecular entities in a pathway, as well as request in what pathways a specific entity participates. Data retrieval can be customized: Network objects allow the construction of new and integration of existing pathways and interactions, which can be uploaded back to our server. In contrast to webservices, the computational demand on the host server is limited to processing data-related queries only. Conclusions An API provides several advantages to a systems biology software platform. MetNetAPI illustrates an interface with a central repository of data that represents the complex interrelationships of a metabolic and regulatory network. As an alternative to data-dumps and webservices, it allows access to a current and "live" database and exposes analytical functions to application developers. Yet it only requires limited resources on the server-side (thin server/fat client setup. The API is available for Java, Microsoft.NET and R programming environments and offers

  20. The Impact of Mobile Offloading on Energy Consumption and Capacity of Radio Access Networks – Case of Finland

    Directory of Open Access Journals (Sweden)

    Michail Katsigiannis

    2015-08-01

    Full Text Available The Finnish Mobile Operators face two main challenges: (i mobile data subscriptions penetration and traffic are experiencing rapid growth; and (ii government intervenes in the market to attain contradictory goals related to extensive high-speed mobile networks and energy consumption reduction. The mobile operators have to increase the capacity in their networks, taking energy efficiency into account. The reduction of energy consumption in mobile networks results to the reducing carbon emissions, and possibly to cost savings. The purpose of this study is to investigate the wide-to-local area offloading in urban regions in Finland and examine the impact of such a network on the wide area access network in terms of energy and capacity. The results show that the capacity relief ranges from 9.7 to 38.7 %, depending on the penetration of local area service, but the energy savings in macro cellular network are negligible.

  1. Real-time Measurements of an Optical Reconfigurable Radio Access Unit for 5G Wireless Access Networks

    DEFF Research Database (Denmark)

    Rodríguez, Sebastián; Morales Vicente, Alvaro; Rommel, Simon

    2017-01-01

    A reconfigurable radio access unit able to switch wavelength, RF carrier frequency and optical path is experimentally demonstrated. The system is able to do the switching processes correctly, while achieving BER values below FEC limit.......A reconfigurable radio access unit able to switch wavelength, RF carrier frequency and optical path is experimentally demonstrated. The system is able to do the switching processes correctly, while achieving BER values below FEC limit....

  2. Multi-channel Dual Clocks three-dimensional probability Random Multiple Access protocol for Wireless Public Bus Networks based on RTS/CTS mechanism

    Directory of Open Access Journals (Sweden)

    Zhou Sheng Jie

    2016-01-01

    Full Text Available A MAC protocol for public bus networks, called Bus MAC protocol, designed to provide high quality Internet service for bus passengers. The paper proposed a multi-channel dual clocks three-demission probability random multiple access protocol based on RTS/CTS mechanism, decreasing collisions caused by multiple access from multiple passengers. Use the RTS/CTS mechanism increases the reliability and stability of the system, reducing the collision possibility of the information packets to a certain extent, improves the channel utilization; use the multi-channel mechanism, not only enables the channel load balancing, but also solves the problem of the hidden terminal and exposed terminal. Use the dual clocks mechanism, reducing the system idle time. At last, the different selection of the three-dimensional probabilities can make the system throughput adapt to the network load which could realize the maximum of the system throughput.

  3. [Access and comprehensiveness: the viewpoint of users of a mental health network].

    Science.gov (United States)

    de Oliveira, Raimunda Félix; de Andrade, Luiz Odorico Monteiro; Goya, Neusa

    2012-11-01

    This article analyzes user viewpoints regarding mental health care, with a focus on comprehensiveness and access at Psychosocial Care Centers (PCCs). It is a qualitative study with theoretical and methodological references of the Fourth Generation Evaluation and application of the Hermeneutic Dialectic Circle technique. Twelve users of ten mental health services in Fortaleza were interviewed from March to May 2011. Themes of the study were grouped from the narratives, with the hermeneutics of Paul Ricoeur as the benchmark for analysis. The thematic categories were: viewpoints on mental healthcare; conflicts between supply and the subjective need to receive; similarities and differences: from tutelage to autonomy; absence and belonging: open PCCs and non-community centers; between stigma and humanization. The main findings are: the PCCs are seen as spaces for conviviality able to establish affective and social networks; stigma, prejudice and tutelage are present in the services, in their families and in the community; asylum practices persist in alternative services; the humanization of care extends access and bonding in the services; the trajectory of users of the Unified Health System occurs due to their social and health needs.

  4. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  5. MAC-Layer Active Dropping for Real-Time Video Streaming in 4G Access Networks

    KAUST Repository

    She, James

    2010-12-01

    This paper introduces a MAC-layer active dropping scheme to achieve effective resource utilization, which can satisfy the application-layer delay for real-time video streaming in time division multiple access based 4G broadband wireless access networks. When a video frame is not likely to be reconstructed within the application-layer delay bound at a receiver for the minimum decoding requirement, the MAC-layer protocol data units of such video frame will be proactively dropped before the transmission. An analytical model is developed to evaluate how confident a video frame can be delivered within its application-layer delay bound by jointly considering the effects of time-varying wireless channel, minimum decoding requirement of each video frame, data retransmission, and playback buffer. Extensive simulations with video traces are conducted to prove the effectiveness of the proposed scheme. When compared to conventional cross-layer schemes using prioritized-transmission/retransmission, the proposed scheme is practically implementable for more effective resource utilization, avoiding delay propagation, and achieving better video qualities under certain conditions.

  6. Energy Efficiency in TDMA-Based Next-Generation Passive Optical Access Networks

    KAUST Repository

    Dhaini, Ahmad R.

    2014-06-01

    Next-generation passive optical network (PON) has been considered in the past few years as a cost-effective broadband access technology. With the ever-increasing power saving concern, energy efficiency has been an important issue in its operations. In this paper, we propose a novel sleep-time sizing and scheduling framework for the implementation of green bandwidth allocation (GBA) in TDMA-PONs. The proposed framework leverages the batch-mode transmission feature of GBA to minimize the overhead due to frequent ONU on-off transitions. The optimal sleeping time sequence of each ONU is determined in every cycle without violating the maximum delay requirement. With multiple ONUs possibly accessing the shared media simultaneously, a collision may occur. To address this problem, we propose a new sleep-time sizing mechanism, namely Sort-And-Shift (SAS), in which the ONUs are sorted according to their expected transmission start times, and their sleep times are shifted to resolve any possible collision while ensuring maximum energy saving. Results show the effectiveness of the proposed framework and highlight the merits of our solutions.

  7. Cross-Layer Design of an Energy-Efficient Cluster Formation Algorithm with Carrier-Sensing Multiple Access for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Buratti Chiara

    2005-01-01

    Full Text Available A new energy-efficient scheme for data transmission in a wireless sensor network (WSN is proposed, having in mind a typical application including a sink, which periodically triggers the WSN, and nodes uniformly distributed over a specified area. Routing, multiple access control (MAC, physical, energy, and propagation aspects are jointly taken into account through simulation; however, the protocol design is based on some analytical considerations reported in the appendix. Information routing is based on a clustered self-organized structure; a carrier-sensing multiple access (CSMA protocol is chosen at MAC layer. Two different scenarios are examined, characterized by different channel fading rates. Four versions of our protocol are presented, suitably oriented to the two different scenarios; two of them implement a cross-layer (CL approach, where MAC parameters influence both the network and physical layers. Performance is measured in terms of network lifetime (related to energy efficiency and packet loss rate (related to network availability. The paper discusses the rationale behind the selection of MAC protocols for WSNs and provides a complete model characterization spanning from the network layer to the propagation channel. The advantages of the CL approach, with respect to an algorithm which belongs to the well-known class of low-energy adaptive clustering hierarchy (LEACH protocols, are shown.

  8. Assessing internet access and use in a medically underserved population: implications for providing enhanced health information services.

    Science.gov (United States)

    Zach, Lisl; Dalrymple, Prudence W; Rogers, Michelle L; Williver-Farr, Heather

    2012-03-01

    The relationship between health information seeking, patient engagement and health literacy is not well understood. This is especially true in medically underserved populations, which are often viewed as having limited access to health information. To improve communication between an urban health centre and the community it serves, a team of library and information science researchers undertook an assessment of patients' level and methods of access to and use of the Internet. Data were collected in 53 face-to-face anonymous interviews with patients at the centre. Interviews were tape-recorded for referential accuracy, and data were analysed to identify patterns of access and use. Seventy-two percentage of study participants reported having access to the Internet through either computers or cell phones. Barriers to Internet access were predominantly lack of equipment or training rather than lack of interest. Only 21% of those with Internet access reported using the Internet to look for health information. The findings suggest that lack of access to the Internet in itself is not the primary barrier to seeking health information in this population and that the digital divide exists not at the level of information access but rather at the level of information use. © 2011 The authors. Health Information and Libraries Journal © 2011 Health Libraries Group.

  9. Low-Complexity Scheduling and Power Adaptation for Coordinated Cloud-Radio Access Networks

    KAUST Repository

    Douik, Ahmed

    2017-07-17

    In practical wireless systems, the successful implementation of resource allocation techniques strongly depends on the algorithmic complexity. Consider a cloud-radio access network (CRAN), where the central cloud is responsible for scheduling devices to the frames’ radio resources blocks (RRBs) of the single-antenna base-stations (BSs), adjusting the transmit power levels, and for synchronizing the transmit frames across the connected BSs. Previous studies show that the jointly coordinated scheduling and power control problem in the considered CRAN can be solved using an approach that scales exponentially with the number of BSs, devices, and RRBs, which makes the practical implementation infeasible for reasonably sized networks. This paper instead proposes a low-complexity solution to the problem, under the constraints that each device cannot be served by more than one BS but can be served by multiple RRBs within each BS frame, and under the practical assumption that the channel is constant during the duration of each frame. The paper utilizes graph-theoretical based techniques and shows that constructing a single power control graph is sufficient to obtain the optimal solution with a complexity that is independent of the number of RRBs. Simulation results reveal the optimality of the proposed solution for slow-varying channels, and show that the solution performs near-optimal for highly correlated channels.

  10. Strategies for P2P connectivity in reconfigurable converged wired/wireless access networks.

    Science.gov (United States)

    Puerto, Gustavo; Mora, José; Ortega, Beatriz; Capmany, José

    2010-12-06

    This paper presents different strategies to define the architecture of a Radio-Over-Fiber (RoF) Access networks enabling Peer-to-Peer (P2P) functionalities. The architectures fully exploit the flexibility of a wavelength router based on the feedback configuration of an Arrayed Waveguide Grating (AWG) and an optical switch to broadcast P2P services among diverse infrastructures featuring dynamic channel allocation and enabling an optical platform for 3G and beyond wireless backhaul requirements. The first architecture incorporates a tunable laser to generate a dedicated wavelength for P2P purposes and the second architecture takes advantage of reused wavelengths to enable the P2P connectivity among Optical Network Units (ONUs) or Base Stations (BS). While these two approaches allow the P2P connectivity in a one at a time basis (1:1), the third architecture enables the broadcasting of P2P sessions among different ONUs or BSs at the same time (1:M). Experimental assessment of the proposed architecture shows approximately 0.6% Error Vector Magnitude (EVM) degradation for wireless services and 1 dB penalty in average for 1 x 10(-12) Bit Error Rate (BER) for wired baseband services.

  11. Joint Distributed Access Point Selection and Power Allocation in Cognitive Radio Networks

    CERN Document Server

    Hong, Mingyi; Alviar, Jorge

    2011-01-01

    Spectrum management has been identified as a crucial step towards enabling the technology of the cognitive radio network (CRN). Most of the current works dealing with spectrum management in the CRN focus on a single task of the problem, e.g., spectrum sensing, spectrum decision, spectrum sharing or spectrum mobility. In this work, we argue that for certain network configurations, jointly performing several tasks of the spectrum management improves the spectrum efficiency. Specifically, we study the uplink resource management problem in a CRN where there exist multiple cognitive users (CUs) and access points (APs), with each AP operates on a set of non-overlapping channels. The CUs, in order to maximize their uplink transmission rates, have to associate to a suitable AP (spectrum decision), and to share the channels belong to this AP with other CUs (spectrum sharing). These tasks are clearly interdependent, and the problem of how they should be carried out efficiently and distributedly is still open in the lit...

  12. A Spectrum Access Based on Quality of Service (QoS) in Cognitive Radio Networks.

    Science.gov (United States)

    Zhai, Linbo; Wang, Hua; Gao, Chuangen

    2016-01-01

    The quality of service (QoS) is important issue for cognitive radio networks. In the cognitive radio system, the licensed users, also called primary users (PUs), are authorized to utilize the wireless spectrum, while unlicensed users, also called secondary users (SUs), are not authorized to use the wireless spectrum. SUs access the wireless spectrum opportunistically when the spectrum is idle. While SUs use an idle channel, the instance that PUs come back makes SUs terminate their communications and leave the current channel. Therefore, quality of service (QoS) is difficult to be ensured for SUs. In this paper, we first propose an analysis model to obtain QoS for cognitive radio networks such as blocking probability, completed traffic and termination probability of SUs. When the primary users use the channels frequently, QoS of SUs is difficult to be ensured, especially the termination probability. Then, we propose a channel reservation scheme to improve QoS of SUs. The scheme makes the terminated SUs move to the reserved channels and keep on communications. Simulation results show that our scheme can improve QoS of SUs especially the termination probability with a little cost of blocking probability in dynamic environment.

  13. Optimized green operation of LTE networks in the presence of multiple electricity providers

    KAUST Repository

    Ghazzai, Hakim

    2012-12-01

    Energy efficiency aspects in cellular networks can significantly contribute to the reduction of greenhouse gas emissions and help to save the environment. The base station (BS) sleeping strategy has become a well-known technique to achieve energy savings by switching off redundant BSs mainly for lightly loaded networks. Besides, introducing renewable energies as alternative power sources becomes a real challenge to network operators. In this paper, we propose a method that reduces the energy consumption of BSs by not only shutting down underutilized BSs but also by optimizing the amounts of energy procured from different retailers (Renewable energy and electricity retailers). We formulate an optimization problem that leads to the maximization of the profit of a Long-Term Evolution (LTE) cellular operator, and at the same time to the minimization of CO2 emissions in green wireless cellular networks without affecting the desired Quality of Service. © 2012 IEEE.

  14. Access to new medications for the treatment of drug-resistant tuberculosis: Patient, provider and community perspectives

    Directory of Open Access Journals (Sweden)

    Erica Lessem

    2015-03-01

    Full Text Available Multidrug-resistant tuberculosis (MDR-TB is on the rise, and is difficult to treat. The approval of two new drugs, bedaquiline and delamanid, and growing evidence for the use of linezolid, offer renewed hope for addressing MDR-TB. However, access to these medicines remains a significant challenge. These drugs have not been registered for TB in most settings; barriers to preapproval access persist; and high pricing and intellectual property restrictions limit access. Many unanswered research questions about optimal use of these drugs also limit access, particularly for vulnerable populations. This review outlines challenges in accessing drugs encountered from the perspective of clinicians, patients and affected communities, and offers potential solutions.

  15. Cultural transmission of tool use by Indo-Pacific bottlenose dolphins (Tursiops sp.) provides access to a novel foraging niche.

    Science.gov (United States)

    Krützen, Michael; Kreicker, Sina; MacLeod, Colin D; Learmonth, Jennifer; Kopps, Anna M; Walsham, Pamela; Allen, Simon J

    2014-06-07

    Culturally transmitted tool use has important ecological and evolutionary consequences and has been proposed as a significant driver of human evolution. Such evidence is still scarce in other animals. In cetaceans, tool use has been inferred using indirect evidence in one population of Indo-Pacific bottlenose dolphins (Tursiops sp.), where particular dolphins ('spongers') use marine sponges during foraging. To date, evidence of whether this foraging tactic actually provides access to novel food items is lacking. We used fatty acid (FA) signature analysis to identify dietary differences between spongers and non-spongers, analysing data from 11 spongers and 27 non-spongers from two different study sites. Both univariate and multivariate analyses revealed significant differences in FA profiles between spongers and non-spongers between and within study sites. Moreover, FA profiles differed significantly between spongers and non-spongers foraging within the same deep channel habitat, whereas the profiles of non-spongers from deep channel and shallow habitats at this site could not be distinguished. Our results indicate that sponge use by bottlenose dolphins is linked to significant differences in diet. It appears that cultural transmission of tool use in dolphins, as in humans, allows the exploitation of an otherwise unused niche.

  16. Integrated social facility location planning for decision support: Accessibility studies provide support to facility location and integration of social service provision

    CSIR Research Space (South Africa)

    Green, Cheri A

    2012-09-01

    Full Text Available in facility provision ?Identification of suitable location(s) for selected new facilities and assisting in the development of a integrated facility provision location plans ?Evaluation of the impact of planned project or budget requests on facility backlog... the people?s access to transport ? Road network ? the road network is used to simulate the way in which people traverse across spaces. Different types of roads also have different speeds at which traffic or a person can move on it or impedances. Using...

  17. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  18. The Economic and Social Benefits and the Barriers of Providing People with Disabilities Accessible Clean Water and Sanitation

    Directory of Open Access Journals (Sweden)

    Gregor Wolbring

    2012-11-01

    Full Text Available Resolution A/HRC/RES/16/2 adopted by the UN Human Rights Council on 8 April 2011 declared access to safe drinking water and sanitation a human right. However many people around the globe including people with disabilities do not have access to safe drinking water, hygiene or sanitation facilities. Inaccessibility of clean water sources, hygiene and sanitation facilities negatively impacts among others health, education, the ability to work, and the ability to partake in social activities. This paper looks at the benefits of, and access barriers to, clean water and sanitation for people with disabilities.

  19. Health care provider social network analysis: A systematic review.

    Science.gov (United States)

    Bae, Sung-Heui; Nikolaev, Alexander; Seo, Jin Young; Castner, Jessica

    2015-01-01

    Although considerable progress has been made in understanding networks, their structure, and their development, little has been known about their effectiveness in the health care setting and their contributions to quality of care and patient safety.The purpose of this study was to examine studies using social network analysis (SNA) in the health care workforce and assess factors contributing to social network and their relationships with care processes and patient outcomes. We identified all published peer-reviewed SNA articles in CINAHL, PubMed, PsycINFO, JSTOR, Medline (OVID), and Web of Science databases up to April 2013. Twenty-nine published articles met the inclusion criteria. Current evidence of the health care workforce's social networks reveals the nature of social ties are related to personal characteristics, practice setting, and types of patients. A few studies also revealed the social network effects adoption and the use of a health information system, patient outcomes, and coordination. Current studies on the social ties of health care workforce professionals include several assessments of inefficiencies. The level of technical sophistication in these studies tended to be low. Future study using enhanced sophistication in study design, analysis, and patient outcome testing are warranted to fully leverage the potential of SNA in health care studies. Copyright © 2015 Elsevier Inc. All rights reserved.

  20. Pharma Pricing & Market Access Europe 2016--Health Network Communications' Tenth Annual Conference (February 23-25, 2016--London, UK).

    Science.gov (United States)

    D'Souza, P

    2016-03-01

    Tighter national budgets and escalating drug prices continue to present challenges for pharmaceutical market access strategies and societal cost of care. As pharmaceutical companies and medical governmental advisory organizations enter tougher negotiations, hospital trusts and other dispensary firms face barriers to receiving the best medical treatment, and as a result patient access is limited. The 2016 HealthNetwork Communications' Pharma Pricing & Market Access Europe meeting brought together pharmaceutical, medical governmental advisory and stakeholders and market access/pricing consultants, to encourage discussions and negotiations into how to improve the drug pricing system and consequential market access strategies while achieving the respective reimbursement and affordability objectives. Copyright 2016 Prous Science, S.A.U. or its licensors. All rights reserved.

  1. Untangling complex networks: Risk minimization in financial markets through accessible spin glass ground states

    Science.gov (United States)

    Lisewski, Andreas Martin; Lichtarge, Olivier

    2010-08-01

    Recurrent international financial crises inflict significant damage to societies and stress the need for mechanisms or strategies to control risk and tamper market uncertainties. Unfortunately, the complex network of market interactions often confounds rational approaches to optimize financial risks. Here we show that investors can overcome this complexity and globally minimize risk in portfolio models for any given expected return, provided the margin requirement remains below a critical, empirically measurable value. In practice, for markets with centrally regulated margin requirements, a rational stabilization strategy would be keeping margins small enough. This result follows from ground states of the random field spin glass Ising model that can be calculated exactly through convex optimization when relative spin coupling is limited by the norm of the network’s Laplacian matrix. In that regime, this novel approach is robust to noise in empirical data and may be also broadly relevant to complex networks with frustrated interactions that are studied throughout scientific fields.

  2. Access Point Backhaul Resource Aggregation as a Many-to-One Matching Game in Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Kawther Hassine

    2017-01-01

    Full Text Available This paper studies backhaul bandwidth aggregation in the context of a wireless local area network composed of two different types of access points: those with spare backhaul capacity (which we term providers and those in shortage of it (beneficiaries; the aim is to transfer excess capacity from providers to beneficiaries. We model the system as a matching game with many-to-one setting wherein several providers can be matched to one beneficiary and adopt the so-called deferred acceptance algorithm to reach an optimal and stable solution. We consider two flavors, when the beneficiaries are limited in their resource demands and when they are not, and two scenarios, when resources are abundant and when they are scarce. Our results show that the many-to-one setting outperforms the one-to-one case in terms of overall throughput gain, resource usage, and individual beneficiaries satisfaction by up to 50%, whether resources are scarce or abundant. As of the limited versus nonlimited case, the former ensures more fair sharing of spectral resources and higher satisfaction percentage between beneficiaries.

  3. Gene Expression Networks in the Murine Pulmonary Myocardium Provide Insight into the Pathobiology of Atrial Fibrillation

    Science.gov (United States)

    Boutilier, Jordan K.; Taylor, Rhonda L.; Mann, Tracy; McNamara, Elyshia; Hoffman, Gary J.; Kenny, Jacob; Dilley, Rodney J.; Henry, Peter; Morahan, Grant; Laing, Nigel G.; Nowak, Kristen J.

    2017-01-01

    The pulmonary myocardium is a muscular coat surrounding the pulmonary and caval veins. Although its definitive physiological function is unknown, it may have a pathological role as the source of ectopic beats initiating atrial fibrillation. How the pulmonary myocardium gains pacemaker function is not clearly defined, although recent evidence indicates that changed transcriptional gene expression networks are at fault. The gene expression profile of this distinct cell type in situ was examined to investigate underlying molecular events that might contribute to atrial fibrillation. Via systems genetics, a whole-lung transcriptome data set from the BXD recombinant inbred mouse resource was analyzed, uncovering a pulmonary cardiomyocyte gene network of 24 transcripts, coordinately regulated by chromosome 1 and 2 loci. Promoter enrichment analysis and interrogation of publicly available ChIP-seq data suggested that transcription of this gene network may be regulated by the concerted activity of NKX2-5, serum response factor, myocyte enhancer factor 2, and also, at a post-transcriptional level, by RNA binding protein motif 20. Gene ontology terms indicate that this gene network overlaps with molecular markers of the stressed heart. Therefore, we propose that perturbed regulation of this gene network might lead to altered calcium handling, myocyte growth, and contractile force contributing to the aberrant electrophysiological properties observed in atrial fibrillation. We reveal novel molecular interactions and pathways representing possible therapeutic targets for atrial fibrillation. In addition, we highlight the utility of recombinant inbred mouse resources in detecting and characterizing gene expression networks of relatively small populations of cells that have a pathological significance. PMID:28720711

  4. At the threshold of american personalism: providing the personal access to God’s Word in Elizabethan Bible translations

    Directory of Open Access Journals (Sweden)

    Vasyl O. Patsan

    2016-01-01

    Full Text Available The article is aimed at defining the ways to the exposure of theistic basis of personhood which were paved by the personalist philosophy founded in the USA in the late nineteenth – early twentieth centuries. Having become an initiator of historical-philosophical reconstructing the genesis of American personalism in Ukraine, the author actualizes the problem of perceiving the Scripture text by the personalistic trend sprung from the Protestant soil in North America. The article substantiates the approach to reflecting this process based upon the meta-ontology of personality expounded by patristic trinitology at the turn of Antiquity and the Middle Ages and disclosed for rational consciousness of the modern era by the personalistic mode of thinking appealed to Orthodox theology. Prepared by the previous results of the author’s elaboration of the actualized problematics (represented in his publications in Ukrainian and foreign periodical scientific editions the article focuses on the theological foundations of the personalist philosophy of the USA connecting its unsteadiness with the departure of Protestantism from Christian dogmata affirming personal principle of being, Absolute Personality of God and godlikeness of the human person uncovered by the Revelation. Correlating horizons of personalistic perception of God Breathed Book with reconstructions of the Bible topology of personhood which were performed in the Scripture translations providing the personal access to God’s Word, the author analyzes the transmission of Biblical concepts of personal being in English Scripture versions appeared during the reign of Elizabeth I (the Geneva Bible, the Bishops’ Bible, initially accepted by the Protestant denominations of North America and formed the Biblical background of personalistic thinking in the New World. The study reveals the premises of reducing the spiritual source of personality to personalized ratio in the doctrine of the classical

  5. The 3 A's of the access process to long-term care for elderly: providers experiences in a multiple case study in the Netherlands.

    Science.gov (United States)

    Schipper, Lisette; Luijkx, Katrien; Meijboom, Bert; Schols, Jos

    2015-01-01

    The access process is an important step in the care provision to independently living elderly. Still, little attention has been given to the process of access to long-term care for older clients. Access can be described by three dimensions: availability, affordability and acceptability (three A's). In this paper we address the following question: How do care providers take the three dimensions of access into account for the access process to their care and related service provision to independently living elderly? To answer this question we performed a qualitative study. We used data gathered in a multiple case study in the Netherlands. This study provides insight in the way long-term care organizations organize their access process. Not all dimensions were equally present or acknowledged by the case organizations. The dimension acceptability seems an important dimension in the access process, as shown by the efforts done in building a relationship with their clients, mainly through a strong personal relationship between client and care advisor. In that respect it is remarkable that the case organizations do not structurally evaluate their access process. Availability is compromised by practical issues and organizational choices. Affordability hardly seems an issue. Further research can reveal the underlying factors that influence the three A dimensions. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  6. Book Review - V Pogoretskyy, Freedom of Transit and Access to Gas Pipeline Networks Under WTO Law (Cambridge University Press, 2017)

    NARCIS (Netherlands)

    Marhold, Anna

    2017-01-01

    In Freedom of Transit and Access to Pipeline Networks under WTO Law, the author appropriately introduces the topic by stating that energy is featuring increasingly prominently as a topic in international trade law. Indeed, while being a dormant issue in the World Trade Organization (“WTO” forum for

  7. Multigigabit W-Band (75–110 GHz) Bidirectional Hybrid Fiber-Wireless Systems in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Lebedev, Alexander; Vegas Olmos, Juan José

    2014-01-01

    We experimentally demonstrate multigigabit capacity bidirectional hybrid fiber-wireless systems with RF carrier frequencies at the W-band (75-110 GHz) that enables the seamless convergence between wireless and fiber-optic data transmission systems in access networks. In this study, we evaluate...

  8. Performance of Non-Orthogonal Multiple Access (NOMA) in mmWave wireless communications for 5G networks

    DEFF Research Database (Denmark)

    Marcano, Andrea; Christiansen, Henrik Lehrmann

    2017-01-01

    Among the key technologies that have been identified as capacity boosters for fifth generation - 5G - mobile networks, are millimeter wave (mmWave) transmissions and non-orthogonal multiple access (NOMA). The large amount of spectrum available at mmWave frequencies combined with a more effective...

  9. Access to Grey Literature in the Netherlands : Grey Literature at Data Archiving and Networked Services – DANS

    NARCIS (Netherlands)

    Dijk, E.M.S.; Doorn, P.K.

    Data Archiving and Networked Services (DANS) is the national Dutch organization for permanent access to research data, with a focus on the humanities and social sciences. DANS offers three services to the scholarly community: DataverseNL, EASY, and NARCIS. DataverseNL is intended to support data

  10. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    Science.gov (United States)

    Kevin McCluskey; Katharine B. Barker; Hazel A. Barton; Kyria Boundy-Mills; Daniel R. Brown; Jonathan A. Coddington; Kevin Cook; Philippe Desmeth; David Geiser; Jessie A. Glaeser; Stephanie Greene; Seogchan Kang; Michael W. Lomas; Ulrich Melcher; Scott E. Miller; David R. Nobles; Kristina J. Owens; Jerome H. Reichman; Manuela da Silva; John Wertz; Cale Whitworth; David Smith; Steven E. Lindow

    2017-01-01

    The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD). The meeting included representatives...

  11. Improving Accessibility for Seniors in a Life-Long Learning Network: A Usability Study of Learning Websites

    Science.gov (United States)

    Gu, Xiaoqing; Ding, Rui; Fu, Shirong

    2011-01-01

    Senior citizens are comparatively vulnerable in accessing learning opportunities offered on the Internet due to usability problems in current web design. In an effort to build a senior-friendly learning web as a part of the Life-long Learning Network in Shanghai, usability studies of two websites currently available to Shanghai senior citizens…

  12. The US Culture Collection Network responding to the requirements of the Nagoya Protocol on Access and Benefit Sharing

    Science.gov (United States)

    The US Culture Collection Network held a meeting to share information about how collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Bio...

  13. Functional classification of the Gauteng provincial road network using the South African road classification and access management manual (TRH26)

    CSIR Research Space (South Africa)

    Veramoothea, P

    2015-08-01

    Full Text Available classification of the Gauteng provincial road network using the South African Road Classification and Access Management Manual (TRH26) as a guideline. In combination with high resolution up-to-date satellite reference imagery, dwelling and building inventories...

  14. Cost-Effectiveness of Access Expansion to Treatment of Hepatitis C Virus Infection Through Primary Care Providers.

    Science.gov (United States)

    Rattay, Thilo; Dumont, Ian P; Heinzow, Hauke S; Hutton, David W

    2017-12-01

    Chronic hepatitis C virus (HCV) infection is a major burden on individuals and health care systems. The Extension for Community Healthcare Outcomes (Project ECHO) enables primary care providers to deliver best-practice care for complex conditions to underserved populations. The US Congress passed the ECHO Act in late 2016, requiring the Department of Health and Human Services to investigate the model. We performed a cost-effectiveness analysis to assess diagnosis and treatment of HCV infection in a primary care patient panel with and without the implementation of Project ECHO. We used Markov models to simulate disease progression, quality of life, and life expectancy among individuals with HCV infection and for the general population. Data from the University of New Mexico's ECHO operation for HCV show an increase in treatment rates. Corresponding increases in survival, quality-adjusted life years (QALYs), costs, and resulting budget impact between ECHO and non-ECHO patients with HCV were then compared. Project ECHO increased costs and QALYs. The incremental cost-effectiveness ratio of ECHO was $10,351 per QALY compared with the status quo; >99.9% of iterations fell below the willingness-to-pay threshold of $100,000 per QALY. We were unable to confirm whether the increase in rates of treatment associated with Project ECHO were due to increased or more targeted screening, higher adherence, or access to treatment. Our sensitivity analyses show that the results are largely independent of the cause. Budget impact analysis shows payers would have to invest an additional $339.54 million over a 5-year period to increase treatment by 4446 patients, per 1 million covered lives. Using a simulated primary care patient panel, we showed that Project ECHO is a cost-effective way to find and treat patients with HCV infection at scale using existing primary care providers. This approach could substantially reduce the burden of chronic HCV infection in the United States, but high

  15. Internet Service Provider Network Evolution in the Presence of Changing Environmental Conditions

    Science.gov (United States)

    2010-03-01

    290). New York, NY: Springer. Fortz, B., & Thorup, M. (2000). Internet traffic engineering by optimizing OSPF weights. Proceedings of the IEEE...press). Robust Network Planning. Sridharan, A., Gurin, R., & Diot, C. (2005). Achieving near-optimal traffic engineering solutions for current OSPF

  16. SUNSEED - An evolutionary path to smart grid comms over converged telco and energy provider networks

    NARCIS (Netherlands)

    Stefanovic, C.; Popovski, P.; Jorguseski, L.; Sernec, R.

    2014-01-01

    SUNSEED, 'Sustainable and robust networking for smart electricity distribution', is a 3-year project started in 2014 and partially funded under call FP7-ICT-2013-11. The project objective is to research, design and implement methods for exploitation of existing communication infrastructure of energy

  17. Work Study Program Provides Revenue to School and Experience to Students: Cristo Rey Network, Nationwide

    Science.gov (United States)

    Stewart, Sarah

    2016-01-01

    Thirty-two Catholic Cristo Rey schools, all independently owned and operated, serve 9,953 students in grades 9-12. Cristo Rey calls itself "the largest network of high schools in the United States whose enrollment is limited to low-income youth." Students' average family income is $35,000; 97 percent are students of color. To fund the…

  18. Strategic plan : providing high precision search to NASA employees using the NASA engineering network

    Science.gov (United States)

    Dutra, Jayne E.; Smith, Lisa

    2006-01-01

    The goal of this plan is to briefly describe new technologies available to us in the arenas of information discovery and discuss the strategic value they have for the NASA enterprise with some considerations and suggestions for near term implementations using the NASA Engineering Network (NEN) as a delivery venue.

  19. First experiences with Personal Networks as an enabling platform for service providers

    NARCIS (Netherlands)

    Hartog, F.T.H. den; Blom, M.A.; Lageweg, C.R.; Peeters, E.M.; Schmidt, J.R.; Veer, R. van der; Veldhuis, R.N.J.; Baken, N.H.G.; Selgert, F.; Vries, A. de; Werff, M.R. van der; Tao, Q.

    2007-01-01

    By developing demonstrators and performing small-scale user trials, we found various opportunities and pitfalls for deploying Personal Networks (PNs) on a commercial basis. The demonstrators were created using as many as possible legacy devices and proven technologies. They deal with applications in

  20. A method for analyzing the business case for provider participation in the National Cancer Institute's Community Clinical Oncology Program and similar federally funded, provider-based research networks.

    Science.gov (United States)

    Reiter, Kristin L; Song, Paula H; Minasian, Lori; Good, Marjorie; Weiner, Bryan J; McAlearney, Ann Scheck

    2012-09-01

    The Community Clinical Oncology Program (CCOP) plays an essential role in the efforts of the National Cancer Institute (NCI) to increase enrollment in clinical trials. Currently, there is little practical guidance in the literature to assist provider organizations in analyzing the return on investment (ROI), or business case, for establishing and operating a provider-based research network (PBRN) such as the CCOP. In this article, the authors present a conceptual model of the business case for PBRN participation, a spreadsheet-based tool and advice for evaluating the business case for provider participation in a CCOP organization. A comparative, case-study approach was used to identify key components of the business case for hospitals attempting to support a CCOP research infrastructure. Semistructured interviews were conducted with providers and administrators. Key themes were identified and used to develop the financial analysis tool. Key components of the business case included CCOP start-up costs, direct revenue from the NCI CCOP grant, direct expenses required to maintain the CCOP research infrastructure, and incidental benefits, most notably downstream revenues from CCOP patients. The authors recognized the value of incidental benefits as an important contributor to the business case for CCOP participation; however, currently, this component is not calculated. The current results indicated that providing a method for documenting the business case for CCOP or other PBRN involvement will contribute to the long-term sustainability and expansion of these programs by improving providers' understanding of the financial implications of participation. Copyright © 2011 American Cancer Society.