WorldWideScience

Sample records for network media access

  1. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever-ch...

  2. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  3. [Exploration of the design of media access control layer of wireless body area network for medical healthcare].

    Science.gov (United States)

    Liu, Xuemei; Ge, Baofeng

    2012-04-01

    This paper proposes a media access control (MAC) layer design for wireless body area network (WBAN) systems. WBAN is a technology that targets for wireless networking of wearable and implantable body sensors which monitor vital body signs, such as heart-rate, body temperature, blood pressure, etc. It has been receiving attentions from international organizations, e. g. the Institute of Electrical and Electronics Engineers (IEEE), due to its capability of providing efficient healthcare services and clinical management. This paper reviews the standardization procedure of WBAN and summarizes the challenge of the MAC layer design. It also discusses the methods of improving power consumption performance, which is one of the major issues of WBAN systems.

  4. One4All Cooperative Media Access Strategy in Infrastructure Based Distributed Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    a cooperative cluster using their short-range air interface and one device contends the channel for all the devices within the cluster. This strategy reduces the number of mobile devices involved in the collision process for the wireless medium resulting in larger throughput, smaller access delay, and less...

  5. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  6. Remote Network Access (RNA)

    National Research Council Canada - National Science Library

    2002-01-01

    .... Remote Network Access (RNA) includes or is associated with all communication devices/software, firewalls, intrusion detection systems and virus protection applications to ensure security of the OIG, DoD, Network from remote...

  7. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 Background With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks

  8. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  9. IPTV based on IP network and streaming media service station

    Science.gov (United States)

    Sun, Jifeng; Gao, Songbo

    2007-11-01

    IPTV can be a new service performed on the Internet in that network transmission and streaming media technologies are getting mature. In this paper, IPTV system infrastructure of UTStarcom, key technologies deployed, and applications will be discussed and evaluated. The key technologies to achieve IPTV services include 1) codec and compression; 2) streaming media; and 3) broadband networks and access to such networks. The implementation of Media Switch IPTV system in Harbin CNC city network is also discussed.

  10. Multi-Channel Multi-Radio Using 802.11 Based Media Access for Sink Nodes in Wireless Sensor Networks

    OpenAIRE

    Campbell, Carlene E.-A.; Khan, Shafiullah; Singh, Dhananjay; Loo, Kok-Keong

    2011-01-01

    The next generation surveillance and multimedia systems will become increasingly deployed as wireless sensor networks in order to monitor parks, public places and for business usage. The convergence of data and telecommunication over IP-based networks has paved the way for wireless networks. Functions are becoming more intertwined by the compelling force of innovation and technology. For example, many closed-circuit TV premises surveillance systems now rely on transmitting their images and da...

  11. Multi-Channel Multi-Radio Using 802.11 Based Media Access for Sink Nodes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kok-Keong Loo

    2011-05-01

    Full Text Available The next generation surveillance and multimedia systems will become increasingly deployed as wireless sensor networks in order to monitor parks, public places and for business usage. The convergence of data and telecommunication over IP-based networks has paved the way for wireless networks. Functions are becoming more intertwined by the compelling force of innovation and technology. For example, many closed-circuit TV premises surveillance systems now rely on transmitting their images and data over IP networks instead of standalone video circuits. These systems will increase their reliability in the future on wireless networks and on IEEE 802.11 networks. However, due to limited non-overlapping channels, delay, and congestion there will be problems at sink nodes. In this paper we provide necessary conditions to verify the feasibility of round robin technique in these networks at the sink nodes by using a technique to regulate multi-radio multichannel assignment. We demonstrate through simulations that dynamic channel assignment scheme using multi-radio, and multichannel configuration at a single sink node can perform close to optimal on the average while multiple sink node assignment also performs well. The methods proposed in this paper can be a valuable tool for network designers in planning network deployment and for optimizing different performance objectives.

  12. Multi-channel multi-radio using 802.11 based media access for sink nodes in wireless sensor networks.

    Science.gov (United States)

    Campbell, Carlene E-A; Khan, Shafiullah; Singh, Dhananjay; Loo, Kok-Keong

    2011-01-01

    The next generation surveillance and multimedia systems will become increasingly deployed as wireless sensor networks in order to monitor parks, public places and for business usage. The convergence of data and telecommunication over IP-based networks has paved the way for wireless networks. Functions are becoming more intertwined by the compelling force of innovation and technology. For example, many closed-circuit TV premises surveillance systems now rely on transmitting their images and data over IP networks instead of standalone video circuits. These systems will increase their reliability in the future on wireless networks and on IEEE 802.11 networks. However, due to limited non-overlapping channels, delay, and congestion there will be problems at sink nodes. In this paper we provide necessary conditions to verify the feasibility of round robin technique in these networks at the sink nodes by using a technique to regulate multi-radio multichannel assignment. We demonstrate through simulations that dynamic channel assignment scheme using multi-radio, and multichannel configuration at a single sink node can perform close to optimal on the average while multiple sink node assignment also performs well. The methods proposed in this paper can be a valuable tool for network designers in planning network deployment and for optimizing different performance objectives.

  13. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  14. Networks in the news media

    DEFF Research Database (Denmark)

    Bro, Peter

    more formal types of social networks, but also complement or even substitute social networking elsewhere, and as such this particular type of social network offers people both inside and outside the news room new potentials - and problems. This article describe the basic vision of networks in the news......When news reporters connect people in a single news story or in a series of coherent news stories they essentially construct networks in the news media. Networks through which social actors are aligned symbolically in written, visible or audible form. These socio-symbolic networks not only copy...

  15. Editorial: Next Generation Access Networks

    Science.gov (United States)

    Ruffini, Marco; Cincotti, Gabriella; Pizzinat, Anna; Vetter, Peter

    2015-12-01

    Over the past decade we have seen an increasing number of operators deploying Fibre-to-the-home (FTTH) solutions in access networks, in order to provide home users with a much needed network access upgrade, to support higher peak rates, higher sustained rates and a better and more uniform broadband coverage of the territory.

  16. Media and youth: access, exposure, and privatization.

    Science.gov (United States)

    Roberts, D F

    2000-08-01

    To describe U.S. youth's access and exposure to the full array of media, as well as the social contexts in which media exposure occurs. A cross-sectional national random sample of 2065 adolescents aged 8 through 18 years, including oversamples of African-American and Hispanic youth, completed questionnaires about use of television, videotapes, movies, computers, video games, radio, compact discs, tape players, books, newspapers, and magazines. U.S. youngsters are immersed in media. Most households contain most media (computers and video game systems are the exception); the majority of youth have their own personal media. The average youth devotes 6 3/4 h to media; simultaneous use of multiple media increases exposure to 8 h of media messages daily. Overall, media exposure and exposure to individual media vary as a function of age, gender, race/ethnicity, and family socioeconomic level. Television remains the dominant medium. About one-half of the youth sampled uses a computer daily. A substantial proportion of children's and adolescents' media use occurs in the absence of parents. American youth devote more time to media than to any other waking activity, as much as one-third of each day. This demands increased parental attention and research into the effects of such extensive exposure.

  17. Personalised Access to Social Media

    NARCIS (Netherlands)

    Clements, M.

    2010-01-01

    On many websites users can personally contribute information, ranging from short text messages to photos and videos. Users can see the information contributed by others and respond to it. These social media actively engage their community in the structuring of the collection by making use of

  18. Personalised Access to Social Media

    NARCIS (Netherlands)

    M. Clements (Maarten)

    2010-01-01

    htmlabstractOn many websites users can personally contribute information, ranging from short text messages to photos and videos. Users can see the information contributed by others and respond to it. These social media actively engage their community in the structuring of the collection by making

  19. Unscrewing social media networks, twice

    DEFF Research Database (Denmark)

    Birkbak, Andreas

    2017-01-01

    Social media are often claimed to be an important new force in politics. One way to investigate such a claim is to follow an early call made in actor-network theory (ANT) to “unscrew” those entities that are assumed to be important and show how they are made up of heterogeneous networks of many...... different actors (Callon and Latour 1981). In this article I take steps towards unscrewing seven Facebook pages that were used to mobilize citizens for and against road pricing in Copenhagen in 2011-2012. But I encounter the difficulty that social media are already explicitly understood in Internet Studies...... that it can be combined with liberal notions of a singular public sphere (Somers 1995b; 1995a). In order to unscrew social media as a political force, I suggest that we need to work through both the assembling of social media networks and attend to corresponding reconstructions of liberal political narratives...

  20. Signed Networks in Social Media

    OpenAIRE

    Leskovec, Jure; Huttenlocher, Daniel; Kleinberg, Jon

    2010-01-01

    Relations between users on social media sites often reflect a mixture of positive (friendly) and negative (antagonistic) interactions. In contrast to the bulk of research on social networks that has focused almost exclusively on positive interpretations of links between people, we study how the interplay between positive and negative relationships affects the structure of on-line social networks. We connect our analyses to theories of signed networks from social psychology. We find that the c...

  1. Software defined access networks

    OpenAIRE

    Maricato, José Miguel Duarte

    2016-01-01

    With the increase of internet usage and the exponential growth of bandwidth consumption due to the increasing number of users of new generation equipments and the creation of new services that consume increasingly higher bandwidths, it's necessary to nd solutions to meet these new requirements. Passive optical networks (PONs) promise to solve these problems by providing a better service to users and providers. PON networks are very attractive since they don't depend on a...

  2. Wireless Multi Hop Access Networks and Protocols

    OpenAIRE

    Nilsson Plymoth, Anders

    2007-01-01

    As more and more applications and services in our society now depend on the Internet, it is important that dynamically deployed wireless multi hop networks are able to gain access to the Internet and other infrastructure networks and services. This thesis proposes and evaluates solutions for providing multi hop Internet Access. It investigates how ad hoc networks can be combined with wireless and mesh networks in order to create wireless multi hop access networks. When several access points t...

  3. One Health in social networks and social media.

    Science.gov (United States)

    Mekaru, S R; Brownstein, J S

    2014-08-01

    In the rapidly evolving world of social media, social networks, mobile applications and citizen science, online communities can develop organically and separately from larger or more established organisations. The One Health online community is experiencing expansion from both the bottom up and the top down. In this paper, the authors review social media's strengths and weaknesses, earlier work examining Internet resources for One Health, the current state of One Health in social media (e.g. Facebook, Twitter, YouTube) and online social networking sites (e.g. LinkedIn and ResearchGate), as well as social media in One Health-related citizen science projects. While One Health has a fairly strong presence on websites, its social media presence is more limited and has an uneven geographic distribution. In work following the Stone Mountain Meeting,the One Health Global Network Task Force Report recommended the creation of an online community of practice. Professional social networks as well as the strategic use of social media should be employed in this effort. Finally, One Health-related research projects using volunteers (citizen science) often use social media to enhance their recruitment. Including these researchers in a community of practitioners would take full advantage of their existing social media presence. In conclusion, the interactive nature of social media, combined with increasing global Internet access, provides the One Health community with opportunities to meaningfully expand their community and promote their message.

  4. Optical Subsystems for Next Generation Access Networks

    DEFF Research Database (Denmark)

    Lazaro, J.A; Polo, V.; Schrenk, B.

    2011-01-01

    Recent optical technologies are providing higher flexibility to next generation access networks: on the one hand, providing progressive FTTx and specifically FTTH deployment, progressively shortening the copper access network; on the other hand, also opening fixed-mobile convergence solutions...... in next generation PON architectures. It is provided an overview of the optical subsystems developed for the implementation of the proposed NG-Access Networks....

  5. Social media networking: Facebook and Twitter.

    Science.gov (United States)

    Schneider, Andrew; Jackson, Rem; Baum, Neil

    2010-01-01

    The new wave of marketing and practice promotion will include social media networking. This article will discuss Facebook and Twitter. After reading this article you, will have an understanding of these two important aspects of social media and how you might use Facebook and Twitter in your practice to enhance your communication with your existing patients and attract new patients.

  6. SAM: Secure Access of Media Independent Information Service with User Anonymity

    Directory of Open Access Journals (Sweden)

    Li Guangsong

    2010-01-01

    Full Text Available Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS and present a new access authentication scheme with user anonymity for MIIS. The protocol can be used to establish a secure channel between the mobile node and the information server. Security and performance of the protocol are also analyzed in this paper.

  7. Location-aware network operation for cloud radio access network

    KAUST Repository

    Wang, Fanggang; Ruan, Liangzhong; Win, Moe Z.

    2017-01-01

    One of the major challenges in effectively operating a cloud radio access network (C-RAN) is the excessive overhead signaling and computation load that scale rapidly with the size of the network. In this paper, the exploitation of location

  8. Determining Open Education Related Social Media Usage Trends in Turkey Using a Holistic Social Network Analysis

    Science.gov (United States)

    Firat, Mehmet; Altinpulluk, Hakan; Kilinç, Hakan; Büyük, Köksal

    2017-01-01

    The aim of this study is to reveal Open Education related social media usage in Turkey through social network analyses. To this end, the most widely used social media network in Turkey, Facebook, was chosen. All the pages and groups created on Facebook related to Open Education were found. A total of 207 groups and 521 pages were accessed and…

  9. Research of Ad Hoc Networks Access Algorithm

    Science.gov (United States)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  10. Joint control algorithm in access network

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To deal with long probing delay and inaccurate probing results in the endpoint admission control method,a joint local and end-to-end admission control algorithm is proposed,which introduces local probing of access network besides end-to-end probing.Through local probing,the algorithm accurately estimated the resource status of the access network.Simulation shows that this algorithm can improve admission control performance and reduce users' average waiting time when the access network is heavily loaded.

  11. Integration of Education: Using Social Media Networks to Engage Students

    Directory of Open Access Journals (Sweden)

    Risa Blair

    2014-10-01

    Full Text Available Any educator today will tell you that the strategies used in the classroom have evolved and changed with the access everyone has to technology. In a world with constant changes and shifts because of immediate access to information, the way course content is delivered must evolve and adjust to the new ways students learn. Engagement of students in course content and reaching learning objectives are the key elements educators strive for in every course. Enter social media networks and the ability to leverage the user activity with these applications in education. Now, educators can provide content which engages students and meets learning objectives the way students want to learn. By reviewing social media networks: Facebook, Pinterest, Instagram, Blogs, Twitter, and Evernote, educators can position themselves to be as technology-savvy as today's students.

  12. Secure Media Independent Handover Message Transport in Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Cho Choong-Ho

    2009-01-01

    Full Text Available The IEEE 802.21 framework for Media Independent Handover (MIH provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile terminals and access networks to facilitate seamless handover. This calls for the need to secure MIH messages against network security threats in the wireless medium. In this paper, we first analyze IPSec/IKEv2 and DTLS security solution for secure MIH message transport. We show that handover latency can be an impediment to the use of IPSec and DTLS solutions. To overcome the handover overhead and hence minimize authentication time, a new secure MIH message transport solution, referred as MIHSec in this paper, is proposed. Experimental results are obtained for MIH between WLAN and Ethernet networks and the impacts of MIH message security on the handover latency are evaluated for IPSec, DTLS, and MIHSec security solutions. The effectiveness of MIHSec is demonstrated.

  13. Personalizing Access to Learning Networks

    DEFF Research Database (Denmark)

    Dolog, Peter; Simon, Bernd; Nejdl, Wolfgang

    2008-01-01

    In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address in this fra......In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address...... in this framework, enabling personalized access to federated learning repositories with a vast number of learning offers. Our infrastructure includes personalization strategies both at the query and the query results level. Query rewriting is based on learning and language preferences; rule-based and ranking...

  14. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  15. Optimizing the next generation optical access networks

    DEFF Research Database (Denmark)

    Amaya Fernández, Ferney Orlando; Soto, Ana Cardenas; Tafur Monroy, Idelfonso

    2009-01-01

    Several issues in the design and optimization of the next generation optical access network (NG-OAN) are presented. The noise, the distortion and the fiber optic nonlinearities are considered to optimize the video distribution link in a passive optical network (PON). A discussion of the effect...

  16. Multiple-Access Quantum-Classical Networks

    Science.gov (United States)

    Razavi, Mohsen

    2011-10-01

    A multi-user network that supports both classical and quantum communication is proposed. By relying on optical code-division multiple access techniques, this system offers simultaneous key exchange between multiple pairs of network users. A lower bound on the secure key generation rate will be derived for decoy-state quantum key distribution protocols.

  17. Achieving universal access to next generation networks

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders

    The paper examines investment dimensions of next generation networks in a universal service perspective in a European context. The question is how new network infrastructures for getting access to communication, information and entertainment services in the present and future information society...

  18. Accessing ANSA Objects from OSI Network Management

    OpenAIRE

    Berrah, Karrim; Gay, David; Genilloud, Guy

    1994-01-01

    OSI network management provides a general framework for the management of OSI systems, and by extension of any distributed system. However, it is not yet possible to tell to what extent the tools developed for network management will be applicable to distributed systems management. This paper assumes that network managers will want to have some control of the distributed infrastructure and applications. It examines how access to some of the ANSA management interfaces can be given to OSI netwo...

  19. THE DISTRIBUTION NETWORK DEVELOPEMENT IN PRINT MEDIA

    Directory of Open Access Journals (Sweden)

    Loredana Iordache

    2012-09-01

    Full Text Available In this article, we identify the characteristics of the distribution networks in print media and the features ofmarketing in mass media, emphasising the attempts initiated by the press in the context of the financial crisis. Theresearch was conducted through a case study on regional newspaper,, Gazeta de Sud'' The main problems analyzedwere decreasing newspaper circulation and advertising. The research taken into account trends and developmentsworldwide print media as well as print media particularities of Romania, with a focus on identifying factors thatcontributed to the closure of a significant number of newspapers, or their transition from printed version online format.The paper is mainly focused on some practical issues related to the way of organizing the print media sales networks,the authors elaborating proposals for the implementation of certain measures to increase the circulation, on the onehand, and on the hand, to increase the sale of ad space in the newspaper. Compared with other products, thenewspaper has unique characteristics caused by daily changing content, and therefore the product itself. Having ahighly perishable, the content of media products should always seen in relation to time, which requires more rapiddistribution and continuous production.

  20. Multimedia Information Networks in Social Media

    Science.gov (United States)

    Cao, Liangliang; Qi, Guojun; Tsai, Shen-Fu; Tsai, Min-Hsuan; Pozo, Andrey Del; Huang, Thomas S.; Zhang, Xuemei; Lim, Suk Hwan

    The popularity of personal digital cameras and online photo/video sharing community has lead to an explosion of multimedia information. Unlike traditional multimedia data, many new multimedia datasets are organized in a structural way, incorporating rich information such as semantic ontology, social interaction, community media, geographical maps, in addition to the multimedia contents by themselves. Studies of such structured multimedia data have resulted in a new research area, which is referred to as Multimedia Information Networks. Multimedia information networks are closely related to social networks, but especially focus on understanding the topics and semantics of the multimedia files in the context of network structure. This chapter reviews different categories of recent systems related to multimedia information networks, summarizes the popular inference methods used in recent works, and discusses the applications related to multimedia information networks. We also discuss a wide range of topics including public datasets, related industrial systems, and potential future research directions in this field.

  1. Planning Multitechnology Access Networks with Performance Constraints

    Science.gov (United States)

    Chamberland, Steven

    Considering the number of access network technologies and the investment needed for the “last mile” of a solution, in today’s highly competitive markets, planning tools are crucial for the service providers to optimize the network costs and accelerate the planning process. In this paper, we propose to tackle the problem of planning access networks composed of four technologies/architectures: the digital subscriber line (xDSL) technologies deployed directly from the central office (CO), the fiber-to-the-node (FTTN), the fiber-to-the-micro-node (FTTn) and the fiber-to-the-premises (FTTP). A mathematical programming model is proposed for this planning problem that is solved using a commercial implementation of the branch-and-bound algorithm. Next, a detailed access network planning example is presented followed by a systematic set of experiments designed to assess the performance of the proposed approach.

  2. Streaming movies, media, and instant access

    CERN Document Server

    Dixon, Wheeler Winston

    2013-01-01

    Film stocks are vanishing, but the iconic images of the silver screen remain -- albeit in new, sleeker formats. Today, viewers can instantly stream movies on televisions, computers, and smartphones. Gone are the days when films could only be seen in theaters or rented at video stores: movies are now accessible at the click of a button, and there are no reels, tapes, or discs to store. Any film or show worth keeping may be collected in the virtual cloud and accessed at will through services like Netflix, Hulu, and Amazon Instant.The movies have changed, and we are changing with them.

  3. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  4. Survey on Cloud Radio Access Network

    Directory of Open Access Journals (Sweden)

    Reeta Chhatani

    2016-01-01

    Full Text Available The existing wireless network will face the challenge of data tsunami in the near future. Densification of network will deal huge data traffic but will increase the interferences and network cost. At the same time, the existing wireless network is underutilized due to dynamic traffic. To deal with this adverse scenario, a change in the current network architecture is required. Based on virtualization, Cloud Radio Access Network (CRAN was proposed for wireless network. In CRAN the functionality of base station will be distributed into base band unit (BBU and remote radio heads (RRH which will achieve benefits of centralization. This paper presents a survey on CRAN centring on optimized resource allocation, energy efficiency and throughput maximization under fronthaul capacity. The existing solution and future opportunities in CRAN are also summarized.

  5. Designing Broadband Access Networks with Triple Redundancy

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Riaz, Muhammad Tahir; Knudsen, Thomas Phillip

    2005-01-01

    An architecture is proposed for designing broadband access networks, which offer triple redundancy to the end users, resulting in networks providing connectivity even in case of any two independent node or line failures. Two physically independent connections are offered by fiber, and the last...... provided by some wireless solution. Based on experience with planning Fiber To The Home, the architecture is designed to meet a number of demands, making it practicable and useful in realworld network planning. The proposed wired topology is planar, and suitable for being fitted onto the road network...

  6. Scalable Lunar Surface Networks and Adaptive Orbit Access, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Innovative network architecture, protocols, and algorithms are proposed for both lunar surface networks and orbit access networks. Firstly, an overlaying...

  7. THE IMAGE OF BALI TOURISM IN SOCIAL NETWORKING MEDIA

    Directory of Open Access Journals (Sweden)

    Ni Gusti Ayu Dewi Paramita Arisandi

    2016-03-01

    Full Text Available Tourism is growing very rapidly with the development of technology, especially information technology .Through information technology people can easily get access to information about various destinations and tourist attractions as well as hotel by online media communication. Therefore, this study was trying to use social media such as facebook and twitter, where both social media were widely used by companies engaged in tourism in the world as well as in Bali. Internet consists of several websites, but the most effective one to conduct the research on tourism such as webseries 2.0 or commonly called as social networking media. Social medias - Facebook and Twitter - both were wildly used by the companies running in the sector of tourism in Bali, such as Hotels, Villas, Restaurants, Spas, Travel Agents, Airlines, and Tourist Attraction Managements, to advertised their products and services in their respective field. Through those social media, tourists will be able to access the comments or reviews about the companies. The problem raised in this research is how Bali’s tourism data in social networking media were used and considered, and how was the image of Bali’s tourism in their point of viewbased on the research. The method used here was descriptive qualitative method which describes this phenomenon descriptively by analyzing the obtained comments on social networking media such as facebook and twitter, and then classified in the form of comments positive, negative, and unidentified comment. Afterwards comments were re-analyzed through 4A Approach which consist of Attraction, amenities, Ancillary, and Accessibility. Data which has been obtained re-analyzed via the data obtained from the homepage of (TripAdvisor and Agoda.com. In addition, to strengthen the research data obtained from the homepage of TripAdvisor and Agoda.com , then it has been elaborated on the point rating system which indicatedthat the company were registered in both of

  8. Protocol and networking design issues for local access WDM networks

    NARCIS (Netherlands)

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this

  9. Protocol and networking design issues for local access WDM networks

    OpenAIRE

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    1999-01-01

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this report. A brief introduction to optical networks and WDM as well as a brief description of Flamingo are also included in this report.

  10. TCP Performance Enhancement for UMTS Access Network

    DEFF Research Database (Denmark)

    Hu, Liang

    2008-01-01

    is between UMTS access network and Internet. The split proxy divides the bandwidth delay product into two parts, resulting in two TCP connections with smaller bandwidth delay products. Simulation results show, the split TCP proxy can significantly improve the TCP performance under high bit rate DCH channel......We aim at optimize the TCP performance over UMTS access network challenged by the large delay bandwidth product that is mainly caused by the latency from the link layer ARQ retransmissions and diversity technique at physical layer. We propose to place a split TCP proxy at GGSN nodes which...

  11. [Pathology in social media networks. Recruitment campaign].

    Science.gov (United States)

    Alcaraz Mateos, Eduardo; Guerra Pastrián, Laura; Pijuan Andújar, Lara; López Solache, Laura; Zucchiatti, Adriana; García Ángel, Rubén; Prieto Cuadra, Juan Daniel; Labiano Miravalles, Tania; Carvalho, Rita; Gardner, Jerad M; Terrádez, Cristina; de Álava, Enrique

    Pathology is a speciality that is often poorly understood, not only by the general public, but also by clinicians. However, the recent widespread use of social media provides an opportunity to increase the visibility and comprehension of our profession. A working group was formed to carry out this task. The members of the Spanish Society of Pathology were contacted through its Communication and Social Projection Subcommittee to engage in the campaign #IWantYouForSEAP, to form a network on Twitter. The recruitment period was one month (August, 2016). The resulting project, developed during the XXVIII Congress of the SEAP-IAP, was registered using the analytical tools Symplur and Tweet Binder. 32 applications (29 pathologists, 2 histotechnicians, 1 administrative personnel) were received from all over Spain, including participants from 14 of the 17 Autonomous Regions, from 22 cities and 25 medical centres. The activity in relation to the hashtag #SEAP2017V used in the congress included 685 participants with 6704 tweets and 8,837,435 impressions. 28 of the 32 recruited by the #IWantYouForSEAP campaign participated, contributing with 2410 tweets, and generating 2,090,423 impressions (36% and 24% of the total, respectively). It is possible to promote and motivate teamwork within our discipline through social media networks. This preliminary experience of the use of social media networks in our scientific community has had encouraging results which have raised high expectations among participants. An appropriate use of social media networks could help to narrow the gap between pathologists and society. Copyright © 2017 Sociedad Española de Anatomía Patológica. Publicado por Elsevier España, S.L.U. All rights reserved.

  12. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  13. Spectrum access games for cognitive radio networks

    CSIR Research Space (South Africa)

    Masonta, MT

    2010-09-01

    Full Text Available received a wide acceptance in next generation and intelligent wireless communication systems. In this paper the authors make use of game theory approach to model and analyze cognitive radio networks in order to allow dynamic spectrum access in broadband...

  14. Media access and reliability for forest conservation support ...

    African Journals Online (AJOL)

    However majority (63.3%) of the respondents could not compare extension agents and mass media messages because they do not have access to extension agents. The study also observed a significant difference in the effectiveness of the different modes of receiving information in the three senatorial districts and a strong ...

  15. File access prediction using neural networks.

    Science.gov (United States)

    Patra, Prashanta Kumar; Sahu, Muktikanta; Mohapatra, Subasish; Samantray, Ronak Kumar

    2010-06-01

    One of the most vexing issues in design of a high-speed computer is the wide gap of access times between the memory and the disk. To solve this problem, static file access predictors have been used. In this paper, we propose dynamic file access predictors using neural networks to significantly improve upon the accuracy, success-per-reference, and effective-success-rate-per-reference by using neural-network-based file access predictor with proper tuning. In particular, we verified that the incorrect prediction has been reduced from 53.11% to 43.63% for the proposed neural network prediction method with a standard configuration than the recent popularity (RP) method. With manual tuning for each trace, we are able to improve upon the misprediction rate and effective-success-rate-per-reference using a standard configuration. Simulations on distributed file system (DFS) traces reveal that exact fit radial basis function (RBF) gives better prediction in high end system whereas multilayer perceptron (MLP) trained with Levenberg-Marquardt (LM) backpropagation outperforms in system having good computational capability. Probabilistic and competitive predictors are the most suitable for work stations having limited resources to deal with and the former predictor is more efficient than the latter for servers having maximum system calls. Finally, we conclude that MLP with LM backpropagation algorithm has better success rate of file prediction than those of simple perceptron, last successor, stable successor, and best k out of m predictors.

  16. An access alternative for mobile satellite networks

    Science.gov (United States)

    Wu, W. W.

    1988-01-01

    Conceptually, this paper discusses strategies of digital satellite communication networks for a very large number of low density traffic stations. These stations can be either aeronautical, land mobile, or maritime. The techniques can be applied to international, domestic, regional, and special purpose satellite networks. The applications can be commercial, scientific, military, emergency, navigational or educational. The key strategy is the use of a non-orthogonal access method, which tolerates overlapping signals. With n being either time or frequency partitions, and with a single overlapping signal allowed, a low cost mobile satellite system can be designed with n squared (n squared + n + 1) number of terminals.

  17. Neural networks in continuous optical media

    International Nuclear Information System (INIS)

    Anderson, D.Z.

    1987-01-01

    The authors' interest is to see to what extent neural models can be implemented using continuous optical elements. Thus these optical networks represent a continuous distribution of neuronlike processors rather than a discrete collection. Most neural models have three characteristic features: interconnections; adaptivity; and nonlinearity. In their optical representation the interconnections are implemented with linear one- and two-port optical elements such as lenses and holograms. Real-time holographic media allow these interconnections to become adaptive. The nonlinearity is achieved with gain, for example, from two-beam coupling in photorefractive media or a pumped dye medium. Using these basic optical elements one can in principle construct continuous representations of a number of neural network models. The authors demonstrated two devices based on continuous optical elements: an associative memory which recalls an entire object when addressed with a partial object and a tracking novelty filter which identifies time-dependent features in an optical scene. These devices demonstrate the potential of distributed optical elements to implement more formal models of neural networks

  18. Think tanks in Denmark - Media Visibility and Network Relations

    DEFF Research Database (Denmark)

    Ørsten, Mark; Nørgaard Kristensen, Nete

    and the social democratic think thank the Economic Council of the Labor Movement (ECLM), and their influence on two of the three arenas: the media arena and the administrative arena. Theoretically, we draw on theories of neo-corporatism (Rommetvedt et al., 2012) and mediatization (Hjarvard, 2013; Strömbäck...... & Esser, 2014), and argue that media visibility and attention have become increasingly important for political actors seeking to influence decision makers (Rich & Weaver, 2000), but that corporatist networks and access to the administrative sphere are also still important arenas of influence (Binderkrantz...... have necessitated that actors seeking to influence political decisions mak-ing, such as interest groups, have had to find new ways of influencing policy making (Rom-metvedt et al., 2012). Studies of special interest groups in Denmark have pointed towards three important arenas of influence...

  19. Cloud Radio Access Network architecture. Towards 5G mobile networks

    DEFF Research Database (Denmark)

    Checko, Aleksandra

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges that mobile operators face while trying to support ever-growing end-users’ needs towards 5th generation of mobile networks (5G). The main idea behind C-RAN is to split the base...... stations into radio and baseband parts, and pool the Baseband Units (BBUs) from multiple base stations into a centralized and virtualized BBU Pool. This gives a number of benefits in terms of cost and capacity. However, the challenge is then to find an optimal functionality splitting point as well...... as to design the socalled fronthaul network, interconnecting those parts. This thesis focuses on quantifying those benefits and proposing a flexible and capacity-optimized fronthaul network. It is shown that a C-RAN with a functional split resulting in a variable bit rate on the fronthaul links brings cost...

  20. Using Social Media to Increase Accessibility to Online Teaching Resources.

    Science.gov (United States)

    O'Kelly, B; McHugh, S; McHugh, T; Fady, N; Boyle, E; Hill, A D K

    2015-09-01

    The key learning points of Surgical Grand Rounds (SGR) are often not accessible at times of exam revision for students. We sought to use Twitter as an online teaching repository. A SGR Twitter profile was created. 23 SGR presentations were made accessible on Twitter over a 3 month period. 93 students were invited to complete a questionnaire assessing usage of the repository. 84 (90%) in total responded, of these, 25 (80.6%) felt that the online provision of SGR through twitter was "useful". The majority (71%) felt that the online content was easily accessible. The novel use of social media is a useful adjunctive educational tool in accessing an online repository of SGR presentations.

  1. Accessible virtual reality therapy using portable media devices.

    Science.gov (United States)

    Bruck, Susan; Watters, Paul A

    2010-01-01

    Simulated immersive environments displayed on large screens are a valuable therapeutic asset in the treatment of a range of psychological disorders. Permanent environments are expensive to build and maintain, require specialized clinician training and technical support and often have limited accessibility for clients. Ideally, virtual reality exposure therapy (VRET) could be accessible to the broader community if we could use inexpensive hardware with specifically designed software. This study tested whether watching a handheld non-immersive media device causes nausea and other cybersickness responses. Using a repeated measure design we found that nausea, general discomfort, eyestrain, blurred vision and an increase in salivation significantly increased in response to handheld non-immersive media device exposure.

  2. STAR-TYPE LOCAL AREA NETWORK ACCESS CONTROL

    Institute of Scientific and Technical Information of China (English)

    逯昭义; 齐藤忠夫

    1990-01-01

    The multiple access fashion is a new resolution for the star-type local area network (LAN) access control and star-type optical fibre LAN. Arguments about this network are discussed, and the results are introduced.

  3. Wi-Fi Networks Security and Accessing Control

    OpenAIRE

    Tarek S. Sobh

    2013-01-01

    As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP) problem has raised more attention and resulted in obtaining wireless access without subscriber permission.This work assumes Wi-Fi...

  4. Approximate Networking for Universal Internet Access

    Directory of Open Access Journals (Sweden)

    Junaid Qadir

    2017-12-01

    Full Text Available Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost-efficient ways of provisioning high-performance, global Internet. In this paper, we argue that instead of an exclusive focus on a utopian goal of universally accessible “ideal networking” (in which we have a high throughput and quality of service as well as low latency and congestion, we should consider providing “approximate networking” through the adoption of context-appropriate trade-offs. In this regard, we propose to leverage the advances in the emerging trend of “approximate computing” that rely on relaxing the bounds of precise/exact computing to provide new opportunities for improving the area, power, and performance efficiency of systems by orders of magnitude by embracing output errors in resilient applications. Furthermore, we propose to extend the dimensions of approximate computing towards various knobs available at network layers. Approximate networking can be used to provision “Global Access to the Internet for All” (GAIA in a pragmatically tiered fashion, in which different users around the world are provided a different context-appropriate (but still contextually functional Internet experience.

  5. Network value and optimum analysis on the mode of networked marketing in TV media

    Directory of Open Access Journals (Sweden)

    Xiao Dongpo

    2012-12-01

    Full Text Available Purpose: With the development of the networked marketing in TV media, it is important to do the research on network value and optimum analysis in this field.Design/methodology/approach: According to the research on the mode of networked marketing in TV media and Correlation theory, the essence of media marketing is creating, spreading and transferring values. The Participants of marketing value activities are in network, and value activities proceed in networked form. Network capability is important to TV media marketing activities.Findings: This article raises the direction of research of analysis and optimization about network based on the mode of networked marketing in TV media by studying TV media marketing Development Mechanism , network analysis and network value structure.

  6. Research on optical access network remote management technology

    Science.gov (United States)

    Wang, Wayne; Zou, Chen; Luo, Wenyi

    2008-11-01

    This paper goal is to provide a framework for the remote configuration and management of services for PON (Passive Optical Network) access and fiber access. Also it defines how Auto-Configuration Servers (ACS) in the network can remotely configure, troubleshoot and manage a Passive Optical Network (PON) optical network termination (ONT) with layer 3 capabilities using the CPE WAN management protocol, TR-069.

  7. Knowledge Access in Rural Inter-connected Areas Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... the existing network to include two thematic networks on food security and rural ... Woman conquering male business in Yemen : Waleya's micro-enterprise.

  8. Optical solutions for unbundled access network

    Science.gov (United States)

    Bacîş Vasile, Irina Bristena

    2015-02-01

    The unbundling technique requires finding solutions to guarantee the economic and technical performances imposed by the nature of the services that can be offered. One of the possible solutions is the optic one; choosing this solution is justified for the following reasons: it optimizes the use of the access network, which is the most expensive part of a network (about 50% of the total investment in telecommunications networks) while also being the least used (telephone traffic on the lines has a low cost); it increases the distance between the master station/central and the terminal of the subscriber; the development of the services offered to the subscribers is conditioned by the subscriber network. For broadband services there is a need for support for the introduction of high-speed transport. A proper identification of the factors that must be satisfied and a comprehensive financial evaluation of all resources involved, both the resources that are in the process of being bought as well as extensions are the main conditions that would lead to a correct choice. As there is no single optimal technology for all development scenarios, which can take into account all access systems, a successful implementation is always done by individual/particularized scenarios. The method used today for the selection of an optimal solution is based on statistics and analysis of the various, already implemented, solutions, and on the experience that was already gained; the main evaluation criterion and the most unbiased one is the ratio between the cost of the investment and the quality of service, while serving an as large as possible number of customers.

  9. Location-aware network operation for cloud radio access network

    KAUST Repository

    Wang, Fanggang

    2017-06-20

    One of the major challenges in effectively operating a cloud radio access network (C-RAN) is the excessive overhead signaling and computation load that scale rapidly with the size of the network. In this paper, the exploitation of location information of the mobile devices is proposed to address this challenge. We consider an approach in which location-assisted channel state information (CSI) acquisition methods are introduced to complement conventional pilot-based CSI acquisition methods and avoid excessive overhead signaling. A low-complexity algorithm is designed to maximize the sum rate. An adaptive algorithm is also proposed to address the uncertainty issue in CSI acquisition. Both theoretical and numerical analyses show that location information provides a new dimension to improve throughput for next-generation massive cooperative networks.

  10. Resource Allocation for Cloud Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama

    2016-04-01

    Cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio system. In CRANs, joint signal processing is performed at multiple cloud computing centers (clouds) that are connected to several base stations (BSs) via high capacity backhaul links. As a result, large-scale interference management and network power consumption reduction can be effectively achieved. Unlike recent works on CRANs which consider a single cloud processing and treat inter-cloud interference as background noise, the first part of this thesis focuses on the more practical scenario of the downlink of a multi-cloud radio access network where BSs are connected to each cloud through wireline backhaul links. Assume that each cloud serves a set of pre-known single-antenna mobile users (MUs). This part focuses on minimizing the network total power consumption subject to practical constraints. The problems are solved using sophisticated techniques from optimization theory (e.g. Dual Decomposition-based algorithm and the alternating direction method of multipliers (ADMM)-based algorithm). One highlight of this part is that the proposed solutions can be implemented in a distributed fashion by allowing a reasonable information exchange between the coupled clouds. Additionally, feasible solutions of the considered optimization problems can be estimated locally at each iteration. Simulation results show that the proposed distributed algorithms converge to the centralized algorithms in a reasonable number of iterations. To further account of the backhaul congestion due to densification in CRANs, the second part of this thesis considers the downlink of a cache-enabled CRAN where each BS is equipped with a local-cache with limited size used to store the popular files without the need for backhauling. Further, each cache-enabled BS is connected to the cloud via limited capacity backhaul link and can serve a set of pre-known single antenna MUs. This part

  11. Content, Accessibility, and Dissemination of Disaster Information via Social Media During the 2016 Louisiana Floods.

    Science.gov (United States)

    Scott, Katherine K; Errett, Nicole A

    2017-12-27

    Social media is becoming increasingly integrated into disaster response communication strategies of public health and emergency response agencies. We sought to assess the content, accessibility, and dissemination of social media communications made by government agencies during a disaster response. A cross-sectional analysis of social media posts made by federal, state, and local government, public health and emergency management agencies before, during, and after the 2016 Louisiana floods was conducted to determine their content, accessibility, and dissemination by level of government and time relative to disaster onset. Facebook and/or Twitter posts made by public agencies involved in the response to the 2016 Louisiana Flooding events (FEMA Disaster Declaration [DR-4277]) published between August 4 and September 16, 2016, publicly available online between February 21 and March 31, 2017, were included in the analysis. Content: The text of each post was assessed to determine whether it contained information on provision of situational awareness; addressing misconception, actionable requests; mental, behavioral, and emotional support; and/or recovery and rebuilding resources. Accessibility: A Flesh-Kincaid grade level of each post was calculated, and information on post language, originality, hyperlinks, visuals, videos, or hash tag was recorded. Dissemination: The average number of reacts/likes, shares/retweets, and comments per post was calculated. Most posts contained information related to situational awareness and recovery resources. There was an increase in messages during the first week of the disaster at all levels. Few posts were made in languages other than English. Compared with state and federal posts, local Facebook posts averaged fewer reacts, comments, and shares throughout the analysis period. Government agencies may maximize the use of social media platforms for disaster communications by establishing their social media network in advance of a

  12. Social networks as ICT collaborative and supportive learning media ...

    African Journals Online (AJOL)

    ... ICT collaborative and supportive learning media utilisation within the Nigerian educational system. The concept of ICT was concisely explained vis-à-vis the social network concept, theory and collaborative and supportive learning media utilisation. Different types of social network are highlighted among which Facebook, ...

  13. Social Media and Social Networking Applications for Teaching and Learning

    Science.gov (United States)

    Yeo, Michelle Mei Ling

    2014-01-01

    This paper aims to better understand the experiences of the youth and the educators with the tapping of social media like YouTube videos and the social networking application of Facebook for teaching and learning. This paper is interested in appropriating the benefits of leveraging of social media and networking applications like YouTube and…

  14. The Impact of Social Network Media on Brand Equity in SMEs

    OpenAIRE

    Mohammad Reza Nemat Gorgani

    2016-01-01

    Given the virtual world’s controlling role in everyday life, no one can ignore its crucial impacts on the physical world. In this term social network media play a considerable role in peoples’ daily lives and business by information sharing and the impressions of friends’ comments on own view. Dealing with change, continuing to develop in the dynamic marketplace furthermore, access to information on a level never experienced before are possible benefits to companies;Social media influences co...

  15. Networking, or What the Social Means in Social Media

    OpenAIRE

    Taina Bucher

    2015-01-01

    This article questions the meaning of the social in social media. It does this by revisiting boyd and Ellison’s seminal paper and definition of social network sites. The article argues that social media are not so much about articulating or making an existing network visible. Rather, being social in the context of social media simply means creating connections within the boundaries of adaptive algorithmic architectures. Every click, share, like, and post creates a connection, initiates a rela...

  16. Social media for professional development and networking opportunities in academia

    OpenAIRE

    Donelan, Helen

    2016-01-01

    The research reported on in this article explores the use of social media for work-related or professional purposes. In particular, it focuses on the perceptions and use of social media by academics in the UK. The purpose of the research was to explore the potential social media has to facilitate the changing landscape of higher education and support the individual academic in their role. Of particular interest is how specific social media tools are being used to enhance networking opportunit...

  17. Sierra Stars Observatory Network: An Accessible Global Network

    Science.gov (United States)

    Williams, Richard; Beshore, Edward

    2011-03-01

    The Sierra Stars Observatory Network (SSON) is a unique partnership among professional observatories that provides its users with affordable high-quality calibrated image data. SSON comprises observatories in the Northern and Southern Hemisphere and is in the process of expanding to a truly global network capable of covering the entire sky 24 hours a day in the near future. The goal of SSON is to serve the needs of science-based projects and programs. Colleges, universities, institutions, and individuals use SSON for their education and research projects. The mission of SSON is to promote and expand the use of its facilities among the thousands of colleges and schools worldwide that do not have access to professional-quality automated observatory systems to use for astronomy education and research. With appropriate leadership and guidance educators can use SSON to help teach astronomy and do meaningful scientific projects. The relatively small cost of using SSON for this type of work makes it affordable and accessible for educators to start using immediately. Remote observatory services like SSON need to evolve to better support education and research initiatives of colleges, institutions and individual investigators. To meet these needs, SSON is developing a sophisticated interactive scheduling system to integrate among the nodes of the observatory network. This will enable more dynamic observations, including immediate priority interrupts, acquiring moving objects using ephemeris data, and more.

  18. Radio Access Sharing Strategies for Multiple Operators in Cellular Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Iversen, Villy Bæk

    2015-01-01

    deployments (required for coverage enhancement), increased base station utilization, and reduced overall power consumption. Today, network sharing in the radio access part is passive and limited to cell sites. With the introduction of Cloud Radio Access Network and Software Defined Networking adoption...... to the radio access network, the possibility for sharing baseband processing and radio spectrum becomes an important aspect of network sharing. This paper investigates strategies for active sharing of radio access among multiple operators, and analyses the individual benefits depending on the sharing degree...

  19. Public service in the age of social network media

    DEFF Research Database (Denmark)

    Hjarvard, Stig

    2018-01-01

    This chapter addresses how, and to what extent, public service obligations and institutions may be redefined and extended to facilitate information flows and public deliberation using social network media as a remedy for democratic deficiencies of both older mass media and newer forms of network...... media. I make a case for three public service functions that have particular importance in social network media: curation, moderation, and monitoring. Building on a critique of the individualistic perspective underlying both cyber-optimist and -pessimist accounts of the potentials of social network...... media, an alternative and institutional perspective based on mediatization theory is introduced. I focus on the ongoing restructuring of societal spheres through which strategic and sociable forms of communication are challenging deliberative forms of communication. Based on recent studies on public...

  20. Next Generation Access Network Deployment in Croatia: Optical Access Networks and Current IoT/5G Status

    Science.gov (United States)

    Breskovic, Damir; Sikirica, Mladen; Begusic, Dinko

    2018-05-01

    This paper gives an overview and background of optical access network deployment in Croatia. Optical access network development in Croatia has been put into a global as well as in the European Union context. All the challenges and the driving factors for optical access networks deployment are considered. Optical access network architectures that have been deployed by most of the investors in Croatian telecommunication market are presented, as well as the architectures that are in early phase of deployment. Finally, an overview on current status of mobile networks of the fifth generation and Internet of Things is given.

  1. The entire network topology display system of terminal communication access network

    OpenAIRE

    An Yi

    2016-01-01

    Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...

  2. Social network media exposure and adolescent eating pathology in Fiji

    Science.gov (United States)

    Becker, Anne E.; Fay, Kristen E.; Agnew-Blais, Jessica; Khan, A. Nisha; Striegel-Moore, Ruth H.; Gilman, Stephen E.

    2011-01-01

    Background Mass media exposure has been associated with an increased risk of eating pathology. It is unknown whether indirect media exposure – such as the proliferation of media exposure in an individual’s social network – is also associated with eating disorders. Aims To test hypotheses that both individual (direct) and social network (indirect) mass media exposures were associated with eating pathology in Fiji. Method We assessed several kinds of mass media exposure, media influence, cultural orientation and eating pathology by self-report among adolescent female ethnic Fijians (n = 523). We fitted a series of multiple regression models of eating pathology, assessed by the Eating Disorder Examination Questionnaire (EDE–Q), in which mass media exposures, sociodemographic characteristics and body mass index were entered as predictors. Results Both direct and indirect mass media exposures were associated with eating pathology in unadjusted analyses, whereas in adjusted analyses only social network media exposure was associated with eating pathology. This result was similar when eating pathology was operationalised as either a continuous or a categorical dependent variable (e.g. odds ratio OR = 1.60, 95% CI 1.15–2.23 relating social network media exposure to upper-quartile EDE–Q scores). Subsequent analyses pointed to individual media influence as an important explanatory variable in this association. Conclusions Social network media exposure was associated with eating pathology in this Fijian study sample, independent of direct media exposure and other cultural exposures. Findings warrant further investigation of its health impact in other populations. PMID:21200076

  3. Scalable Lunar Surface Networks and Adaptive Orbit Access

    Science.gov (United States)

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  4. LTER network data access policy revision: report and recommendations.

    Science.gov (United States)

    James Brunt; Peter McCartney; Stuart Gage; Don. Henshaw

    2004-01-01

    This document is a report on work carried out to update the LTER Network Data Access Policy. The current LTER Network Data Access Policy, approved by the coordinating committee in 1997, has been in use since 1990. An analysis of the current policies related to the release, access, and use of LTER data has been undertaken by a sub-committee of the LTER Network...

  5. Distributed cloud association in downlink multicloud radio access networks

    KAUST Repository

    Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    This paper considers a multicloud radio access network (M-CRAN), wherein each cloud serves a cluster of base-stations (BS's) which are connected to the clouds through high capacity digital links. The network comprises several remote users, where

  6. Knowledge Access in Rural Inter-connected Areas Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... poor by sharing innovations, best practices and indigenous knowledge using ... A third thematic network - on knowledge management strategies - will play an ...

  7. Media, social networking, and pediatric obesity.

    Science.gov (United States)

    Vandewater, Elizabeth A; Denis, Laurence M

    2011-12-01

    The 5 years leading up to 2011 witnessed unprecedented transformations in the technology and media available to American consumers. These changes have led to major paradigmatic shifts in the way people think about media, how they use it, and the role they expect it to play in their lives. This article discusses the new media landscape and summarizes the evidence regarding media influences on pediatric obesity. Various effects on pediatric obesity are discussed and some conclusions and implications are provided, including possibilities and future directions for clinical practice and research. Copyright © 2011. Published by Elsevier Inc.

  8. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  9. The impacts of post-media networks on the traditional media

    Directory of Open Access Journals (Sweden)

    Dr. Francisco Campos Freire

    2008-01-01

    Full Text Available The fast and successful penetration in society of the so-called social networks in the past two or three years has alarmed the traditional media. The new phenomenon reaches a wider audience, enhances advertising, achieves customization, and breaches some of the barriers of traditional media. The new communication channel is used already by millions of Internet users as their main source of information and entertainment. This research paper analyses the structure of eleven global social networks, which feature contents in Spanish and other languages, in relation to the electronic version (e-version of the main Spanish newspapers. The aim is to prove if the so-called social networks are a new type of media, a new platform for social relationships and post-media contents, which look more like the audiovisual media than the traditional newspapers.

  10. Network interventions - How citizens’ social media networks influence their political participation

    DEFF Research Database (Denmark)

    Ohme, Jakob; de Vreese, Claes Holger; Albæk, Erik

    Social media platforms are special places of information exposure because they are structured around a user’s social network and not around content, like other news media. Studies could show that news exposure on social media can affect citizens’ political participation due to the personalized......, targeted, & inadvertent exposure. However, previous research did not strongly focus on how the characteristics of a citizens’ social media network might alter this relationship. We tests how political information exposure via three different media channels affects political participation among Danish...... citizens and examine possible moderation effects of users network size, network diversity and the newly introduced parameter of perceived network activity. To this end, a two-wave online survey (n=858) among the Danish population was conducted, applying a smartphone-based media diary study. We find strong...

  11. A Unified Access Model for Interconnecting Heterogeneous Wireless Networks

    Science.gov (United States)

    2015-05-01

    validation of the proposed network design for unified network access, and it lays the foundation for implementing a Software - Defined Networking ( SDN ...York (NY): Springer; 2014. Chapter 2, Software - defined networking ; p. 19–32. 5. Sharma S, Staessens D, Colle D, Pickavet M, Demeester P. A...demonstration of fast failure recovery in software defined networking . In: Korakis T, Zink M, Ott, M, editors. Testbeds and research infrastructure

  12. Effects of network node consolidation in optical access and aggregation networks on costs and power consumption

    Science.gov (United States)

    Lange, Christoph; Hülsermann, Ralf; Kosiankowski, Dirk; Geilhardt, Frank; Gladisch, Andreas

    2010-01-01

    The increasing demand for higher bit rates in access networks requires fiber deployment closer to the subscriber resulting in fiber-to-the-home (FTTH) access networks. Besides higher access bit rates optical access network infrastructure and related technologies enable the network operator to establish larger service areas resulting in a simplified network structure with a lower number of network nodes. By changing the network structure network operators want to benefit from a changed network cost structure by decreasing in short and mid term the upfront investments for network equipment due to concentration effects as well as by reducing the energy costs due to a higher energy efficiency of large network sites housing a high amount of network equipment. In long term also savings in operational expenditures (OpEx) due to the closing of central office (CO) sites are expected. In this paper different architectures for optical access networks basing on state-of-the-art technology are analyzed with respect to network installation costs and power consumption in the context of access node consolidation. Network planning and dimensioning results are calculated for a realistic network scenario of Germany. All node consolidation scenarios are compared against a gigabit capable passive optical network (GPON) based FTTH access network operated from the conventional CO sites. The results show that a moderate reduction of the number of access nodes may be beneficial since in that case the capital expenditures (CapEx) do not rise extraordinarily and savings in OpEx related to the access nodes are expected. The total power consumption does not change significantly with decreasing number of access nodes but clustering effects enable a more energyefficient network operation and optimized power purchase order quantities leading to benefits in energy costs.

  13. Evaluation of Advertising Campaigns on Social Media Networks

    Directory of Open Access Journals (Sweden)

    Jurgita Raudeliūnienė

    2018-03-01

    Full Text Available As the virtual environment is constantly changing, not only users’ informational and knowledge needs but also the means and channels of communication with customers applied by organizations change. There is a noticeable trend to move more and more advertising campaigns to social media networks because of the opportunities they provide to organizations and users, which results in the ever-increasing popularity of social media networks and a number of their users. Such a transition is explained by one of the main objectives organizations have: to inform their customers in an appropriate way and receive feedback on social media networks, which is difficult when traditional advertising channels and means are applied. Since advertising campaigns on social media networks are evolving rapidly, their assessment factors and methods, which receive controversial opinions in both scientific literature and practice, change too. Researchers assess and interpret the factors that influence the effectiveness of advertising campaigns on social media networks differently. Thus, a problem arises: how should we evaluate which approach is more capable of accurately and fully reflecting and conveying reality? In this research, this problem is studied by connecting approaches of different researchers. These approaches are linked to the effectiveness assessment of advertising campaigns on social media network aspects. To achieve the objective of this study, such research methods as analysis of scientific literature, multiple criteria and expert assessment (a structured survey and an interview were applied. During the study, out of 39 primary assessment factors, eight primary factors that influence the effectiveness of advertising campaigns on social media networks were identified: sales, content reach, traffic to website, impressions, frequency, relevance score, leads and audience growth.

  14. Army Social Media: Harnessing the Power of Networked Communications

    Science.gov (United States)

    2011-09-01

    Social Networking : – Facebook – MySpace – Friendster 9/1/2011 Content sharing: -You Tube -Flickr -Vimeo -Photobucket Collaborating/ knowledge...Americans use social media tools and Web sites monthly Social networking is now the #1 activity on the web • Twitter: 54 Million users • Facebook ...anyone you don’t know on Facebook or social networking platforms -Don’t post deployment information, when you’re going on vacation or when

  15. Applications of social media and social network analysis

    CERN Document Server

    Kazienko, Przemyslaw

    2015-01-01

    This collection of contributed chapters demonstrates a wide range of applications within two overlapping research domains: social media analysis and social network analysis. Various methodologies were utilized in the twelve individual chapters including static, dynamic and real-time approaches to graph, textual and multimedia data analysis. The topics apply to reputation computation, emotion detection, topic evolution, rumor propagation, evaluation of textual opinions, friend ranking, analysis of public transportation networks, diffusion in dynamic networks, analysis of contributors to commun

  16. Fiber Access Networks: Reliability Analysis and Swedish Broadband Market

    Science.gov (United States)

    Wosinska, Lena; Chen, Jiajia; Larsen, Claus Popp

    Fiber access network architectures such as active optical networks (AONs) and passive optical networks (PONs) have been developed to support the growing bandwidth demand. Whereas particularly Swedish operators prefer AON, this may not be the case for operators in other countries. The choice depends on a combination of technical requirements, practical constraints, business models, and cost. Due to the increasing importance of reliable access to the network services, connection availability is becoming one of the most crucial issues for access networks, which should be reflected in the network owner's architecture decision. In many cases protection against failures is realized by adding backup resources. However, there is a trade off between the cost of protection and the level of service reliability since improving reliability performance by duplication of network resources (and capital expenditures CAPEX) may be too expensive. In this paper we present the evolution of fiber access networks and compare reliability performance in relation to investment and management cost for some representative cases. We consider both standard and novel architectures for deployment in both sparsely and densely populated areas. While some recent works focused on PON protection schemes with reduced CAPEX the current and future effort should be put on minimizing the operational expenditures (OPEX) during the access network lifetime.

  17. Open Orchestration Cloud Radio Access Network (OOCRAN) Testbed

    OpenAIRE

    Floriach-Pigem, Marti; Xercavins-Torregrosa, Guillem; Marojevic, Vuk; Gelonch-Bosch, Antoni

    2017-01-01

    The Cloud radio access network (C-RAN) offers a revolutionary approach to cellular network deployment, management and evolution. Advances in software-defined radio (SDR) and networking technology, moreover, enable delivering software-defined everything through the Cloud. Resources will be pooled and dynamically allocated leveraging abstraction, virtualization, and consolidation techniques; processes will be automated using common application programming interfaces; and network functions and s...

  18. Digital Humanities and networked digital media

    DEFF Research Database (Denmark)

    Finnemann, Niels Ole

    2014-01-01

    This article discusses digital humanities and the growing diversity of digital media, digital materials and digital methods. The first section describes the humanities computing tradition formed around the interpretation of computation as a rule-based process connected to a concept of digital...... materials centred on the digitisation of non-digital, finite works, corpora and oeuvres. The second section discusses “the big tent” of contemporary digital humanities. It is argued that there can be no unifying interpretation of digital humanities above the level of studying digital materials with the help...... of software-supported methods. This is so, in part, because of the complexity of the world and, in part, because digital media remain open to the projection of new epistemologies onto the functional architecture of these media. The third section discusses the heterogeneous character of digital materials...

  19. Easy Access: Auditing the System Network

    Science.gov (United States)

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  20. Rural women and violence situation: access and accessibility limits to the healthcare network.

    Science.gov (United States)

    Costa, Marta Cocco da; Silva, Ethel Bastos da; Soares, Joannie Dos Santos Fachinelli; Borth, Luana Cristina; Honnef, Fernanda

    2017-07-13

    To analyze the access and accessibility to the healthcare network of women dwelling in rural contexts undergoing violence situation, as seen from the professionals' speeches. A qualitative, exploratory, descriptive study with professionals from the healthcare network services about coping with violence in four municipalities in the northern region of Rio Grande do Sul. The information derived from interviews, which have been analyzed by thematic modality. (Lack of) information of women, distance, restricted access to transportation, dependence on the partner and (lack of) attention by professionals to welcome women undergoing violence situation and (non)-articulation of the network are factors that limit the access and, as a consequence, they result in the lack of confrontation of this problem. To bring closer the services which integrate the confrontation network of violence against women and to qualify professionals to welcome these situations are factors that can facilitate the access and adhesion of rural women to the services.

  1. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  2. A Method for Upper Bounding on Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Patel, A.; Pedersen, Jens Myrup

    2004-01-01

    This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management.......This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management....

  3. Securing Social Media : A Network Structure Approach

    NARCIS (Netherlands)

    Chiluka, N.J.

    2013-01-01

    Due to its democratized nature, online social media (OSM) attracts millions of users to publish and share their content with friends as well as a wider audience at little cost. Such a vast user base and a wealth of content, however, presents its own challenges. First, the amount of user-generated

  4. Self-optimized admission control for multi-tenant radio access networks

    OpenAIRE

    Pérez Romero, Jordi; Sallent Roig, José Oriol; Ferrús Ferré, Ramón Antonio; Agustí Comes, Ramon

    2018-01-01

    © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes,creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Multi-tenant Radio Access Networks (RANs) are envisaged to play a key role in highly dense scenarios for fulfil...

  5. Spreadable media: Creating value and meaning in a networked culture

    Directory of Open Access Journals (Sweden)

    Moderated by Louisa Stein

    2014-09-01

    Full Text Available Online Roundtable on Spreadable Media, by Henry Jenkins, Sam Ford, and Joshua Green, with participants Paul Booth, Kristina Busse, Melissa Click, Sam Ford, Henry Jenkins, Xiaochang Li, and Sharon Ross. Section 1 first published as the article "Spreadable Media: Creating Value and Meaning in a Networked Culture", by Louisa Stein, from Cinema Journal Volume 53 Issue 3, pp152-177. Copyright 2014 by The University of Texas Press. All rights reserved.

  6. Mass media influence spreading in social networks with community structure

    Science.gov (United States)

    Candia, Julián; Mazzitello, Karina I.

    2008-07-01

    We study an extension of Axelrod's model for social influence, in which cultural drift is represented as random perturbations, while mass media are introduced by means of an external field. In this scenario, we investigate how the modular structure of social networks affects the propagation of mass media messages across a society. The community structure of social networks is represented by coupled random networks, in which two random graphs are connected by intercommunity links. Considering inhomogeneous mass media fields, we study the conditions for successful message spreading and find a novel phase diagram in the multidimensional parameter space. These findings show that social modularity effects are of paramount importance for designing successful, cost-effective advertising campaigns.

  7. Measuring sustainable accessibility potential using the mobility infrastructure's network configuration

    NARCIS (Netherlands)

    Gil, J.; Read, S.

    2012-01-01

    This paper is an exploration into the analysis of public transport networks using space syntax approaches combined with concepts of sustainable accessibility. Present urban development policy aims to achieve sustainable mobility patterns, shifting mobility to soft transportation modes such as

  8. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... control. Highlights of my research include my proposal and experimental proof of principle of an optical coherent detection based optical access network architecture providing support for a large number of users over a single distribution fiber; a spectral amplitude encoded label detection technique...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...

  9. A New Hybrid Channel Access Scheme for Ad Hoc Networks

    National Research Council Canada - National Science Library

    Wang, Yu; Garcia-Luna-Aceves, J. J

    2002-01-01

    Many contention-based channel access schemes have been proposed for multi-hop ad hoc networks in the recent past, and they can be divided into two categories, sender-initiated and receiver-initiated...

  10. The utilization of social networking as promotion media (Case study: Handicraft business in Palembang)

    OpenAIRE

    Rahadi, Dedi Rianto; Abdillah, Leon Andretti

    2013-01-01

    Nowadays social media (Twitter, Facebook, etc.), not only simply as communication media, but also for promotion. Social networking media offers many business benefits for companies and organizations. Research purposes is to determine the model of social network media utilization as a promotional media for handicraft business in Palembang city. Qualitative and quantitative research design are used to know how handicraft business in Palembang city utilizing social media networking as a promotio...

  11. Cooperative Media Streaming Using Adaptive Network Compression

    DEFF Research Database (Denmark)

    Møller, Janus Heide; Sørensen, Jesper Hemming; Krigslund, Rasmus

    2008-01-01

    as an adaptive hybrid between LC and MDC. In order to facilitate the use of MDC-CC, a new overlay network approach is proposed, using tree of meshes. A control system for managing description distribution and compression in a small mesh is implemented in the discrete event simulator NS-2. The two traditional...... approaches, MDC and LC, are used as references for the performance evaluation of the proposed scheme. The system is simulated in a heterogeneous network environment, where packet errors are introduced. Moreover, a test is performed at different network loads. Performance gain is shown over both LC and MDC....

  12. A Method for Automated Planning of FTTH Access Network Infrastructures

    DEFF Research Database (Denmark)

    Riaz, Muhammad Tahir; Pedersen, Jens Myrup; Madsen, Ole Brun

    2005-01-01

    In this paper a method for automated planning of Fiber to the Home (FTTH) access networks is proposed. We introduced a systematic approach for planning access network infrastructure. The GIS data and a set of algorithms were employed to make the planning process more automatic. The method explains...... method. The method, however, does not fully automate the planning but make the planning process significantly fast. The results and discussion are presented and conclusion is given in the end....

  13. Security Issues in Networks with Internet Access

    National Research Council Canada - National Science Library

    Landwehr, Carl E; Goldschlag, David M

    1997-01-01

    .... The principles are illustrated by describing the security issues a hypothetical company faces as the networks that support its operations evolve from strictly private, through a mix of Internet...

  14. Social Media for Networking, Professional Development, and Patient Engagement.

    Science.gov (United States)

    Markham, Merry Jennifer; Gentile, Danielle; Graham, David L

    2017-01-01

    Social media has become an established method of communication, and many physicians are finding these interactive tools and platforms to be useful for both personal and professional use. Risks of social media, or barriers to its use, include perceived lack of time, privacy concerns, and the risk of damage to one's reputation by unprofessional behavior. Of the social media platforms, Twitter has become favored by physicians and other health care professionals. Although one of the most obvious uses of social media is for rapid dissemination and receipt of information, oncologists are finding that social media is important for networking through blogs, Facebook, and Twitter. These platforms also have potential for providing opportunities for professional development, such as finding collaborators through networking, participation in Twitter journal clubs, and participating in online case-based tumor boards. Social media can also be used for patient engagement, such as through participation in tweet chats. There is emerging data that patient engagement through these platforms may lead to improvement in some health-related outcomes; however, data are sparse for oncology-specific outcomes. Efforts are underway to determine how to assess how social media engagement impacts health outcomes in oncology patients.

  15. IP access networks with QoS support

    Science.gov (United States)

    Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique

    2001-07-01

    The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.

  16. Wavelength-converted long-reach reconfigurable optical access network

    NARCIS (Netherlands)

    Tran, N.C.; Tangdiongga, E.; Koonen, A.M.J.

    2012-01-01

    Next generation optical access networks should not only increase the capacity but also be able to redistribute the capacity on the fly in order to manage more fluctuated traffic patterns. Wavelength reconfigurability is the instrument to enable such capability of network-wide bandwidth

  17. Public Access; Public Interest. The Network Project. Notebook Number 11.

    Science.gov (United States)

    Columbia Univ., New York, NY. Network Project.

    The transcript of a panel discussion and an essay on public access to and control of society's information resources are presented. It is contended that the electronic Media--including radio, television, and communication satellites--are controlled by a select group of individuals and corporations and that they are not meeting the public interest.…

  18. Reliability Demands in FTTH Access Networks

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Knudsen, Thomas Phillip; Madsen, Ole Brun

    2004-01-01

    In this paper reliability and bandwidth demands of existing, new and expected classes of applications running over Fiber To The Home (FTTH) networks to private users and small enterprises are analyzed and discussed. Certain applications such as home security and telemedicine are likely to require...

  19. Reliability Demands in FTTH Access Networks

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Knudsen, Thomas Phillip; Madsen, Ole Brun

    2005-01-01

    In this paper reliability and bandwidth demands of existing, new and expected classes of applications running over Fiber To The Home (FTTH) networks to private users and small enterprises are analysed and discussed. Certain applications such as home security and telemedicine are likely to require...

  20. Joint Hybrid Backhaul and Access Links Design in Cloud-Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    The cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio systems. In this paper, we consider the downlink of a CRAN formed of one central processor (the cloud) and several base station

  1. Social Media for Enhancing Stakeholders' Innovation Networks in Ontario, Canada

    NARCIS (Netherlands)

    Kaushik, Pawandeep; Chowdhuy, Ataharul; Hambly Odame, Helen; Passen, van Annemarie

    2018-01-01

    This case study assessed local food stakeholders' use of Facebook and Twitter to support interaction and build their networks of innovation in Ontario. Data were collected using Netlytic − an online data mining tool from the social media platforms − and key informant interviews. Findings revealed

  2. Spatial Tiling and Streaming in an Immersive Media Delivery Network

    NARCIS (Netherlands)

    Niamut, O.A.; Prins, M.J.; Brandenburg, R. van; Havekes, A.

    2011-01-01

    Within the EU FP7 project FascinatE, a capture, production and delivery system capable of supporting pan/tilt/zoom interaction with immersive media is being developed. Intelligent networks with processing components are needed to repurpose the content to suit different device types and framing

  3. Recommending access control decisions to social media users

    OpenAIRE

    Misra, Gaurav; Such, Jose M.

    2017-01-01

    Social media has become an integral part of the Internet and has revolutionized interpersonal communication. The lines of separation between content creators and content consumers have blurred as normal users have platforms such as social media sites, blogs and microblogs at their disposal on which they can create and consume content as well as have the opportunity to interact with other users. This change has also led to several well documented privacy problems for the users. The privacy pro...

  4. Accessing the nanostructural analysis network organisation (NANO)

    International Nuclear Information System (INIS)

    Hicks, R.; Ringer, S.

    2003-01-01

    Full text: As a Major National Research Facility (MNRF), NANO unites five Australian microscopy and microanalysis centres to form the peak Australian facility for nanometric analysis of the structure and chemistry of materials. NANO is headquartered at the Australian Key Centre for Microscopy and Microanalysis at the University of Sydney and involves the Centres for Microscopy and Microanalysis at the Universities of Queensland and Western Australia, the Electron Microscope Unit at the University of New South Wales and the Microanalytical Research Centre at the University of Melbourne. Together these major centres maintain a wide range of complementary instrumentation for the characterisation of nanostructure. NANO links them into a co-ordinated national facility with unified charges and booking systems. The facility will provide open access to a wide range of present and future partners involving local and international linkages. For this reason, NANO is designed to allow the incorporation of other groups as additional nodes. All Australian researchers are eligible to apply for support to use NANO through the Travel and Access Program (NANO-TAP), which will support basic travel and accommodation costs as well as instrument time. Access to the national grid may involve on-site presence at a particular node or remote telemicroscopy. Both passive (observation) and active (operation) modes of telemicroscopy are available. This presentation will address the NANO-TAP application procedure, the use of remote telemicroscopy and the formation of additional nodes. Copyright (2003) Australian Microbeam Analysis Society

  5. Social Network Perspective: Model of Student Knowledge Sharing On Social Network Media

    OpenAIRE

    Bentar Priyopradono; Danny Manongga; Wiranto H. Utomo

    2012-01-01

    Recently, the role and development of information technology especially the internet, gives impact and influence in social relationship especially for social network site services users. The impact and influence the use of Internet which is related to exchange information and knowledge sharing still become one of the interesting topics to be researched. Now, the use of social media network by students are the best way to them to increase their knowledge as communication media such as, exchang...

  6. Semantic network analysis of vaccine sentiment in online social media.

    Science.gov (United States)

    Kang, Gloria J; Ewing-Nelson, Sinclair R; Mackey, Lauren; Schlitt, James T; Marathe, Achla; Abbas, Kaja M; Swarup, Samarth

    2017-06-22

    To examine current vaccine sentiment on social media by constructing and analyzing semantic networks of vaccine information from highly shared websites of Twitter users in the United States; and to assist public health communication of vaccines. Vaccine hesitancy continues to contribute to suboptimal vaccination coverage in the United States, posing significant risk of disease outbreaks, yet remains poorly understood. We constructed semantic networks of vaccine information from internet articles shared by Twitter users in the United States. We analyzed resulting network topology, compared semantic differences, and identified the most salient concepts within networks expressing positive, negative, and neutral vaccine sentiment. The semantic network of positive vaccine sentiment demonstrated greater cohesiveness in discourse compared to the larger, less-connected network of negative vaccine sentiment. The positive sentiment network centered around parents and focused on communicating health risks and benefits, highlighting medical concepts such as measles, autism, HPV vaccine, vaccine-autism link, meningococcal disease, and MMR vaccine. In contrast, the negative network centered around children and focused on organizational bodies such as CDC, vaccine industry, doctors, mainstream media, pharmaceutical companies, and United States. The prevalence of negative vaccine sentiment was demonstrated through diverse messaging, framed around skepticism and distrust of government organizations that communicate scientific evidence supporting positive vaccine benefits. Semantic network analysis of vaccine sentiment in online social media can enhance understanding of the scope and variability of current attitudes and beliefs toward vaccines. Our study synthesizes quantitative and qualitative evidence from an interdisciplinary approach to better understand complex drivers of vaccine hesitancy for public health communication, to improve vaccine confidence and vaccination coverage

  7. Auctioning access to networks: evidence and expectations

    International Nuclear Information System (INIS)

    McDaniel, T.

    2003-01-01

    Under very strict assumptions the outcomes that make common auction designs theoretically attractive can be expected to emerge: goods will go to those who value them most and the allocation will maximize revenue for the auctioneer. In network industries such as electricity, gas, telecommunications, rail, and airlines where agents are of different sizes and incumbency these assumptions do not always apply for a number of reasons. For example, the auctioned product may be an intermediate good, bidders are not symmetric with respect to values and information, markets are mixed, and property rights are hard to define. We discuss why it is not straightforward to make theoretical predictions about expected outcomes for these industries and use the British gas industry to discuss the importance of competition and scarcity for auctions of network capacity. (Author)

  8. Build your own social network laboratory with Social Lab: a tool for research in social media.

    Science.gov (United States)

    Garaizar, Pablo; Reips, Ulf-Dietrich

    2014-06-01

    Social networking has surpassed e-mail and instant messaging as the dominant form of online communication (Meeker, Devitt, & Wu, 2010). Currently, all large social networks are proprietary, making it difficult to impossible for researchers to make changes to such networks for the purpose of study design and access to user-generated data from the networks. To address this issue, the authors have developed and present Social Lab, an Internet-based free and open-source social network software system available from http://www.sociallab.es . Having full availability of navigation and communication data in Social Lab allows researchers to investigate behavior in social media on an individual and group level. Automated artificial users ("bots") are available to the researcher to simulate and stimulate social networking situations. These bots respond dynamically to situations as they unfold. The bots can easily be configured with scripts and can be used to experimentally manipulate social networking situations in Social Lab. Examples for setting up, configuring, and using Social Lab as a tool for research in social media are provided.

  9. Access Denied: School Librarians' Responses to School District Policies on the Use of Social Media Tools

    Science.gov (United States)

    DiScala, Jeffrey; Weeks, Ann Carlson

    2013-01-01

    Public school districts often block access to online social media tools. While considered a preventive measure to ensure student safety and limit district liability, this policy strips school librarians and their collaborating teachers of opportunities to instruct students in using social media tools creatively and responsibly. Using one school…

  10. The Role of Social Media Tools: Accessible Tourism for Disabled Citizens

    Science.gov (United States)

    Altinay, Zehra; Saner, Tulen; Bahçelerli, Nesrin M.; Altinay, Fahriye

    2016-01-01

    Knowledge sharing becomes important to accomplish digital citizenship. Social media tools become popular to share and diffuse the knowledge in the digitalization. This social media learning and knowledge sharing platforms provides accessibility to the services within societies especially for disabled citizens. This research study aims to evaluate…

  11. Performance analysis of quantum access network using code division multiple access model

    International Nuclear Information System (INIS)

    Hu Linxi; Yang Can; He Guangqiang

    2017-01-01

    A quantum access network has been implemented by frequency division multiple access and time division multiple access, while code division multiple access is limited for its difficulty to realize the orthogonality of the code. Recently, the chaotic phase shifters were proposed to guarantee the orthogonality by different chaotic signals and spread the spectral content of the quantum states. In this letter, we propose to implement the code division multiple access quantum network by using chaotic phase shifters and synchronization. Due to the orthogonality of the different chaotic phase shifter, every pair of users can faithfully transmit quantum information through a common channel and have little crosstalk between different users. Meanwhile, the broadband spectra of chaotic signals efficiently help the quantum states to defend against channel loss and noise. (paper)

  12. Social Media Use and Access to Digital Technology in US Young Adults in 2016

    Science.gov (United States)

    Johnson, Amanda L; Ilakkuvan, Vinu; Jacobs, Megan A; Graham, Amanda L; Rath, Jessica M

    2017-01-01

    Background In 2015, 90% of US young adults with Internet access used social media. Digital and social media are highly prevalent modalities through which young adults explore identity formation, and by extension, learn and transmit norms about health and risk behaviors during this developmental life stage. Objective The purpose of this study was to provide updated estimates of social media use from 2014 to 2016 and correlates of social media use and access to digital technology in data collected from a national sample of US young adults in 2016. Methods Young adult participants aged 18-24 years in Wave 7 (October 2014, N=1259) and Wave 9 (February 2016, N=989) of the Truth Initiative Young Adult Cohort Study were asked about use frequency for 11 social media sites and access to digital devices, in addition to sociodemographic characteristics. Regular use was defined as using a given social media site at least weekly. Weighted analyses estimated the prevalence of use of each social media site, overlap between regular use of specific sites, and correlates of using a greater number of social media sites regularly. Bivariate analyses identified sociodemographic correlates of access to specific digital devices. Results In 2014, 89.42% (weighted n, 1126/1298) of young adults reported regular use of at least one social media site. This increased to 97.5% (weighted n, 965/989) of young adults in 2016. Among regular users of social media sites in 2016, the top five sites were Tumblr (85.5%), Vine (84.7%), Snapchat (81.7%), Instagram (80.7%), and LinkedIn (78.9%). Respondents reported regularly using an average of 7.6 social media sites, with 85% using 6 or more sites regularly. Overall, 87% of young adults reported access or use of a smartphone with Internet access, 74% a desktop or laptop computer with Internet access, 41% a tablet with Internet access, 29% a smart TV or video game console with Internet access, 11% a cell phone without Internet access, and 3% none of these

  13. Social Media Use and Access to Digital Technology in US Young Adults in 2016.

    Science.gov (United States)

    Villanti, Andrea C; Johnson, Amanda L; Ilakkuvan, Vinu; Jacobs, Megan A; Graham, Amanda L; Rath, Jessica M

    2017-06-07

    In 2015, 90% of US young adults with Internet access used social media. Digital and social media are highly prevalent modalities through which young adults explore identity formation, and by extension, learn and transmit norms about health and risk behaviors during this developmental life stage. The purpose of this study was to provide updated estimates of social media use from 2014 to 2016 and correlates of social media use and access to digital technology in data collected from a national sample of US young adults in 2016. Young adult participants aged 18-24 years in Wave 7 (October 2014, N=1259) and Wave 9 (February 2016, N=989) of the Truth Initiative Young Adult Cohort Study were asked about use frequency for 11 social media sites and access to digital devices, in addition to sociodemographic characteristics. Regular use was defined as using a given social media site at least weekly. Weighted analyses estimated the prevalence of use of each social media site, overlap between regular use of specific sites, and correlates of using a greater number of social media sites regularly. Bivariate analyses identified sociodemographic correlates of access to specific digital devices. In 2014, 89.42% (weighted n, 1126/1298) of young adults reported regular use of at least one social media site. This increased to 97.5% (weighted n, 965/989) of young adults in 2016. Among regular users of social media sites in 2016, the top five sites were Tumblr (85.5%), Vine (84.7%), Snapchat (81.7%), Instagram (80.7%), and LinkedIn (78.9%). Respondents reported regularly using an average of 7.6 social media sites, with 85% using 6 or more sites regularly. Overall, 87% of young adults reported access or use of a smartphone with Internet access, 74% a desktop or laptop computer with Internet access, 41% a tablet with Internet access, 29% a smart TV or video game console with Internet access, 11% a cell phone without Internet access, and 3% none of these. Access to all digital devices with

  14. Social network in patient safety: Social media visibility

    Directory of Open Access Journals (Sweden)

    Azucena Santillán García

    2011-11-01

    Full Text Available Internet social network (social media is a powerful communication tool, and its use is expanding significantly. This paper seeks to know the current state of visibility in online social networks of active citizen talking about patient safety. This is an observational cross-sectional study whose target population is the websites Facebook, Twitter and Tuenti in Spain. By three consecutive cuts social profiles were found using the searching terms “seguridad+paciente” and “safety+patient”. There were found 5 profiles on Facebook that met the search criteria, 6 on Twitter and none were found on Tuenti. It is concluded that although there is evidence of the rise of social networking, citizen network involved in patient safety appears not to be significantly represented within the social networks examined.

  15. Hyper Hospital on the satellite multi-media network.

    Science.gov (United States)

    Yamaguchi, T

    1997-01-01

    We have been developing the Hyper Hospital, a network based VR mediated medical care system. The Hyper Hospital is composed of two seamlessly integrated environments, that is, the virtual and the real worlds. Of them, its virtual environment expands the conventional medical care system using the virtual reality technology as a principal human interface and a collaboration tool, in the present study, an attempt to extend the Hyper Hospital system to various modalities of communication network is reported. A satellite communication based multi-media network using Internet protocols with the WWW interface is used. Data transmission rate and other performances were measured under various conditions and the satellite network was shown to be suitable to the Hyper Hospital network.

  16. A slotted access control protocol for metropolitan WDM ring networks

    Science.gov (United States)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  17. Social media as a means to access millennial wine consumers

    OpenAIRE

    Fuentes Fernández, R.; Vriesekoop, F.; Urbano, B.

    2017-01-01

    Purpose \\ud The purpose of this research is to gain insights of\\ud the use of social media (SM) in the wine industry. From the theoretical viewpoint to analyze wineries’ social media segmentation, targeting and positioning (STP) to help the wine industry to improve the effectiveness of SM communication. \\ud Design/methodology/approach \\ud An observational study of Spanish wineries’ SM presence and traffic was carried out during a three-month period in 2013 and repeated in 2016. During this pe...

  18. USE AND USE INTENSITY OF SOCIAL MEDIA NETWORKING SYSTEMS BY NIGERIAN AGRO-ENTREPRENEURS

    Directory of Open Access Journals (Sweden)

    Joseph Omotoso AJAYI

    2015-04-01

    Full Text Available Agro-entrepreneurs are key to the Nigerian economy as they constitute the majority of the work force, providing food and employment opportunities for more than 60% of the largest black nation on earth. Nigeria’s social media networking system which is the largest in Africa has got its usefulness in many conventional and contemporary applications in the recent times. Social media has become the fastest, cheapest and unrestricted communication and marketing tool of this jet age. This study therefore focused on the use and use intensity of social media networking systems by Nigerian agro-entrepreneurs. The study made use of mainly primary data. Primary data were collected with the aid of well-structured questionnaires assisted with interview schedules. Field data collection was conducted between June and September, 2014. Multi-stage sampling technique was used to select three hundred and sixty (360 respondents across the three (3 highly ICT compliant states (Lagos, Ondo and Oyo. Data collected were analysed using descriptive statistics and multiple regression model. The results of the regression model indicate that education, availability of power supply and customer base of the agro-entrepreneurs positively influenced use intensity of social media by the agro-entrepreneurs while age and cost of access data negatively influenced their use intensity of social media.

  19. Auditing Medical Records Accesses via Healthcare Interaction Networks

    Science.gov (United States)

    Chen, You; Nyemba, Steve; Malin, Bradley

    2012-01-01

    Healthcare organizations are deploying increasingly complex clinical information systems to support patient care. Traditional information security practices (e.g., role-based access control) are embedded in enterprise-level systems, but are insufficient to ensure patient privacy. This is due, in part, to the dynamic nature of healthcare, which makes it difficult to predict which care providers need access to what and when. In this paper, we show that modeling operations at a higher level of granularity (e.g., the departmental level) are stable in the context of a relational network, which may enable more effective auditing strategies. We study three months of access logs from a large academic medical center to illustrate that departmental interaction networks exhibit certain invariants, such as the number, strength, and reciprocity of relationships. We further show that the relations extracted from the network can be leveraged to assess the extent to which a patient’s care satisfies expected organizational behavior. PMID:23304277

  20. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani

    2013-01-01

    that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over...

  1. Hopping control channel MAC protocol for opportunistic spectrum access networks

    Institute of Scientific and Technical Information of China (English)

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  2. Optical fiber cabling technologies for flexible access network

    Science.gov (United States)

    Tanji, Hisashi

    2008-07-01

    Fiber-to-the-home (FTTH) outside plant infrastructure should be so designed and constructed as to flexibly deal with increasing subscribers and system evolution to be expected in the future, taking minimization of total cost (CAPEX and OPEX) into consideration. With this in mind, fiber access architectures are reviewed and key technologies on optical fiber and cable for supporting flexible access network are presented. Low loss over wide wavelength (low water peak) and bend-insensitive single mode fiber is a future proof solution. Enhanced separable ribbon facilitates mid-span access to individual fibers in a cable installed, improving fiber utilizing efficiency and flexibility of distribution design. It also contributes to an excellent low PMD characteristic which could be required for video RF overlay system or high capacity long reach metro-access convergence network in the future. Bend-insensitive fiber based cabling technique including field installable connector greatly improves fiber/cable handling in installation and maintenance work.

  3. Opinion dynamics on interacting networks: media competition and social influence.

    Science.gov (United States)

    Quattrociocchi, Walter; Caldarelli, Guido; Scala, Antonio

    2014-05-27

    The inner dynamics of the multiple actors of the informations systems - i.e, T.V., newspapers, blogs, social network platforms, - play a fundamental role on the evolution of the public opinion. Coherently with the recent history of the information system (from few main stream media to the massive diffusion of socio-technical system), in this work we investigate how main stream media signed interaction might shape the opinion space. In particular we focus on how different size (in the number of media) and interaction patterns of the information system may affect collective debates and thus the opinions' distribution. We introduce a sophisticated computational model of opinion dynamics which accounts for the coexistence of media and gossip as separated mechanisms and for their feedback loops. The model accounts also for the effect of the media communication patterns by considering both the simple case where each medium mimics the behavior of the most successful one (to maximize the audience) and the case where there is polarization and thus competition among media memes. We show that plurality and competition within information sources lead to stable configurations where several and distant cultures coexist.

  4. Opinion dynamics on interacting networks: media competition and social influence

    Science.gov (United States)

    Quattrociocchi, Walter; Caldarelli, Guido; Scala, Antonio

    2014-05-01

    The inner dynamics of the multiple actors of the informations systems - i.e, T.V., newspapers, blogs, social network platforms, - play a fundamental role on the evolution of the public opinion. Coherently with the recent history of the information system (from few main stream media to the massive diffusion of socio-technical system), in this work we investigate how main stream media signed interaction might shape the opinion space. In particular we focus on how different size (in the number of media) and interaction patterns of the information system may affect collective debates and thus the opinions' distribution. We introduce a sophisticated computational model of opinion dynamics which accounts for the coexistence of media and gossip as separated mechanisms and for their feedback loops. The model accounts also for the effect of the media communication patterns by considering both the simple case where each medium mimics the behavior of the most successful one (to maximize the audience) and the case where there is polarization and thus competition among media memes. We show that plurality and competition within information sources lead to stable configurations where several and distant cultures coexist.

  5. High Dimensional Modulation and MIMO Techniques for Access Networks

    DEFF Research Database (Denmark)

    Binti Othman, Maisara

    Exploration of advanced modulation formats and multiplexing techniques for next generation optical access networks are of interest as promising solutions for delivering multiple services to end-users. This thesis addresses this from two different angles: high dimensionality carrierless...... the capacity per wavelength of the femto-cell network. Bit rate up to 1.59 Gbps with fiber-wireless transmission over 1 m air distance is demonstrated. The results presented in this thesis demonstrate the feasibility of high dimensionality CAP in increasing the number of dimensions and their potentially......) optical access network. 2 X 2 MIMO RoF employing orthogonal frequency division multiplexing (OFDM) with 5.6 GHz RoF signaling over all-vertical cavity surface emitting lasers (VCSEL) WDM passive optical networks (PONs). We have employed polarization division multiplexing (PDM) to further increase...

  6. Understanding the tariff. Access to the public power transportation network

    International Nuclear Information System (INIS)

    2002-01-01

    Since the European directive of December 19, 1996 about the common rules of the European power market, the eligible companies can chose their power supplier anywhere in Europe. The manager of the French power transportation network (RTE) supplies a network access to these companies according to a tariff fixed by the decree no. 2002-1014 from July 19, 2002. The aim of this document is to explain this tariff: tariffing principles ('mail-stamp' principle, voltage domain, subscribed output power tariffs, input power tariffs), tariffing elements (access to the grid, elements of output tariffs (subscribed power, overload, emergency tariffs, modifications etc..)), invoicing modalities, output tariffs, definitions. (J.S.)

  7. Wireless ad hoc networks access for aeronautical communications

    OpenAIRE

    Besse , Frédéric; Garcia , Fabien; Pirovano , Alain; Radzik , José

    2010-01-01

    International audience; There is an increasing interest in the current aeronautical context to offer new services for civil aircraft passengers. For example, airlines want to offer their customers the opportunity to access the Internet, to manage their mails, to watch video on demand, to access corporate VPNs.... All these services represent a new type of air-ground communications called APC (Aeronautical Passenger Communications) in the ATN (Aeronautical Telecommunication Network) context. I...

  8. Dynamic Resource Allocation in Hybrid Access Femtocell Network

    Directory of Open Access Journals (Sweden)

    Afaz Uddin Ahmed

    2014-01-01

    Full Text Available Intercell interference is one of the most challenging issues in femtocell deployment under the coverage of existing macrocell. Allocation of resources between femtocell and macrocell is essential to counter the effects of interference in dense femtocell networks. Advances in resource management strategies have improved the control mechanism for interference reduction at lower node density, but most of them are ineffective at higher node density. In this paper, a dynamic resource allocation management algorithm (DRAMA for spectrum shared hybrid access OFDMA femtocell network is proposed. To reduce the macro-femto-tier interference and to improve the quality of service, the proposed algorithm features a dynamic resource allocation scheme by controlling them both centrally and locally. The proposed scheme focuses on Femtocell Access Point (FAP owners’ satisfaction and allows maximum utilization of available resources based on congestion in the network. A simulation environment is developed to study the quantitative performance of DRAMA in hybrid access-control femtocell network and compare it to closed and open access mechanisms. The performance analysis shows that higher number of random users gets connected to the FAP without compromising FAP owners’ satisfaction allowing the macrocell to offload a large number of users in a dense heterogeneous network.

  9. Social media networking in pediatric hydrocephalus: a point-prevalence analysis of utilization.

    Science.gov (United States)

    Elkarim, Ghassan Awad; Alotaibi, Naif M; Samuel, Nardin; Wang, Shelly; Ibrahim, George M; Fallah, Aria; Weil, Alexander G; Kulkarni, Abhaya V

    2017-08-01

    OBJECTIVE A recent survey has shown that caregivers of children with shunt-treated hydrocephalus frequently use social media networks for support and information gathering. The objective of this study is to describe and assess social media utilization among users interested in hydrocephalus. METHODS Publicly accessible accounts and videos dedicated to the topic of hydrocephalus were comprehensively searched across 3 social media platforms (Facebook, Twitter, and YouTube) throughout March 2016. Summary statistics were calculated on standard metrics of social media popularity. A categorization framework to describe the purpose of pages, groups, accounts, channels, and videos was developed following the screening of 100 titles. Categorized data were analyzed using nonparametric tests for statistical significance. RESULTS The authors' search identified 30 Facebook pages, 213 Facebook groups, 17 Twitter accounts, and 253 YouTube videos. These platforms were run by patients, caregivers, nonprofit foundations, and patient support groups. Most accounts were from the United States (n = 196), followed by the United Kingdom (n = 31), Canada (n = 17), India (n = 15), and Germany (n = 12). The earliest accounts were created in 2007, and a peak of 65 new accounts were created in 2011. The total number of users in Facebook pages exceeded those in Facebook groups (p social media use in the topic of hydrocephalus. Users interested in hydrocephalus seek privacy for support communications and are attracted to treatment procedure and surgical products videos. These findings provide insight into potential avenues of hydrocephalus outreach, support, or advocacy in social media.

  10. Dual-mode ultraflow access networks: a hybrid solution for the access bottleneck

    Science.gov (United States)

    Kazovsky, Leonid G.; Shen, Thomas Shunrong; Dhaini, Ahmad R.; Yin, Shuang; De Leenheer, Marc; Detwiler, Benjamin A.

    2013-12-01

    Optical Flow Switching (OFS) is a promising solution for large Internet data transfers. In this paper, we introduce UltraFlow Access, a novel optical access network architecture that offers dual-mode service to its end-users: IP and OFS. With UltraFlow Access, we design and implement a new dual-mode control plane and a new dual-mode network stack to ensure efficient connection setup and reliable and optimal data transmission. We study the impact of the UltraFlow system's design on the network throughput. Our experimental results show that with an optimized system design, near optimal (around 10 Gb/s) OFS data throughput can be attained when the line rate is 10Gb/s.

  11. Brain network: social media and the cognitive scientist.

    Science.gov (United States)

    Stafford, Tom; Bell, Vaughan

    2012-10-01

    Cognitive scientists are increasingly using online social media, such as blogging and Twitter, to gather information and disseminate opinion, while linking to primary articles and data. Because of this, internet tools are driving a change in the scientific process, where communication is characterised by rapid scientific discussion, wider access to specialist debates, and increased cross-disciplinary interaction. This article serves as an introduction to and overview of this transformation. Copyright © 2012 Elsevier Ltd. All rights reserved.

  12. A network society, social media, migration and mission

    Directory of Open Access Journals (Sweden)

    Niemandt, Cornelius J. P. (Nelus

    2013-05-01

    Full Text Available Human mobility and migration are closely associated with and reciprocally influenced by globalisation. Add the relentless connectivity facilitated by the proliferation of mobile communication and the emergence of social media to this mixture, and an emerging new glocal culture is evident. People are not only migrating to new localities and territories, but simultaneously into a new culture. We are witnessing the greatest mass migration in the history of humanity from the real to the virtual world. It is a shift from shared space to shared interest. The metaphor of a river in flood has been used to describe the fact that migrant communities are a point of convergence of some of the biggest challenges facing the church and society at large: globalisation, hyperdiversity, interconnectedness, a Google culture and postmodern tribalism. Culture flows like a river and the church functions as a bridge connecting humans striving to make sense of life and Scripture as well as the tradition transmitted over the centuries. Some of the missional challenges will be to incarnate the gospel in this emerging culture. This study was positioned at the convergence of two important processes the rise of the network society (especially social media and migration. It took up two of the challenges posed at Edinburgh 2010, namely to fruitfully integrate the role of media in modern society into overall missiological thinking, and to think about the call for a structural reform of the church to grapple with the challenges of migration. The network society represents a profound social transformation. New technologies deliver connectedness in the palms of our hands and social media serve as an expression of the passion for connection, community and knowing others and being known by others. This research is a theoretical and missiological reflection on the role and importance of social media such as Facebook in migrant communities. It investigated issues such as

  13. Fast Distributed Dynamics of Semantic Networks via Social Media

    Directory of Open Access Journals (Sweden)

    Facundo Carrillo

    2015-01-01

    Full Text Available We investigate the dynamics of semantic organization using social media, a collective expression of human thought. We propose a novel, time-dependent semantic similarity measure (TSS, based on the social network Twitter. We show that TSS is consistent with static measures of similarity but provides high temporal resolution for the identification of real-world events and induced changes in the distributed structure of semantic relationships across the entire lexicon. Using TSS, we measured the evolution of a concept and its movement along the semantic neighborhood, driven by specific news/events. Finally, we showed that particular events may trigger a temporary reorganization of elements in the semantic network.

  14. Network Layer Protocol Activation for Packet Data Access in UMTS WCDMA Laboratory Network

    OpenAIRE

    Lakkisto, Erkka

    2011-01-01

    The purpose of this Bachelor’s Thesis was to set up the UMTS WCDMA network in the laboratory environment of Helsinki Metropolia University of Applied Sciences and to study the network layer protocol activation for packet data access. The development of 3G technology has been very rapid and it can be considered as one of the main technologies in telecommunication. Implementing the laboratory network in Metropolia enables teaching and researching of the modern network technology. Labora...

  15. Spectrum access and management for cognitive radio networks

    CERN Document Server

    2017-01-01

    This book presents cutting-edge research contributions that address various aspects of network design, optimization, implementation, and application of cognitive radio technologies. It demonstrates how to make better utilization of the available spectrum, cognitive radios and spectrum access to achieve effective spectrum sharing between licensed and unlicensed users. The book provides academics and researchers essential information on current developments and future trends in cognitive radios for possible integration with the upcoming 5G networks. In addition, it includes a brief introduction to cognitive radio networks for newcomers to the field.

  16. Modified network simulation model with token method of bus access

    Directory of Open Access Journals (Sweden)

    L.V. Stribulevich

    2013-08-01

    Full Text Available Purpose. To study the characteristics of the local network with the marker method of access to the bus its modified simulation model was developed. Methodology. Defining characteristics of the network is carried out on the developed simulation model, which is based on the state diagram-layer network station with the mechanism of processing priorities, both in steady state and in the performance of control procedures: the initiation of a logical ring, the entrance and exit of the station network with a logical ring. Findings. A simulation model, on the basis of which can be obtained the dependencies of the application the maximum waiting time in the queue for different classes of access, and the reaction time usable bandwidth on the data rate, the number of network stations, the generation rate applications, the number of frames transmitted per token holding time, frame length was developed. Originality. The technique of network simulation reflecting its work in the steady condition and during the control procedures, the mechanism of priority ranking and handling was proposed. Practical value. Defining network characteristics in the real-time systems on railway transport based on the developed simulation model.

  17. Adaptive spectrum decision framework for heterogeneous dynamic spectrum access networks

    CSIR Research Space (South Africa)

    Masonta, M

    2015-09-01

    Full Text Available Spectrum decision is the ability of a cognitive radio (CR) system to select the best available spectrum band to satisfy dynamic spectrum access network (DSAN) users¿ quality of service (QoS) requirements without causing harmful interference...

  18. Access, fronthaul and backhaul networks for 5G and beyond

    CERN Document Server

    Imran, Muhammad Ali; Shakir, Muhammad Zeeshan

    2017-01-01

    This book provides an overview from both academic and industrial stakeholders of innovative backhaul/fronthaul solutions, covering a wide spectrum of underlying themes ranging from the recent thrust in edge caching for backhaul relaxation to mmWave based fronthauling for radio access networks.

  19. Resource Sharing in Heterogeneous and Cloud Radio Access Networks

    DEFF Research Database (Denmark)

    Zakrzewska, Anna; Iversen, Villy Bæk

    2012-01-01

    be improved. However, we identify the benefit of individual operators and show that it’s not equal but highly depends on the initial network dimensioning. Furthermore, we demonstrate that under specific conditions the blocking probability in an area is lower than for fully accessible system and therefore...

  20. Medium Access Control in Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon

    Focusing on Wireless Sensor Networks (WSN) that are powered by energy harvesting, this dissertation focuses on energy-efficient communication links between senders and receivers that are alternating between active and sleeping states of operation. In particular, the focus lies on Medium Access...

  1. Network Asymmetries and Access Pricing in Cellular Telecommunications

    NARCIS (Netherlands)

    V. Kocsis

    2005-01-01

    textabstractNetwork shares and retail prices are not symmetric in the telecommunications market with multiple bottlenecks which give rise to new questions of access fee regulation. In this paper we consider a model with two types of asymmetry arising from different entry timing, i.e. a larger

  2. Optically transparent multiple access networks employing incoherent spectral codes

    NARCIS (Netherlands)

    Huiszoon, B.

    2008-01-01

    This Ph.D. thesis is divided into 7 chapters to provide the reader an overview of the main results achieved in di®erent sub-topics of the study towards optically transparent multiple access networks employing incoherent spectral codes taking into account wireless transmission aspects. The work

  3. Knowledge Access in Rural Inter-connected Areas Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... and indigenous knowledge using information and communication technologies (ICTs) ... for research proposals on the aforementioned topics, action-research projects, ... Evaluating knowledge-sharing methods to improve land utilization and ...

  4. a Fractal Network Model for Fractured Porous Media

    Science.gov (United States)

    Xu, Peng; Li, Cuihong; Qiu, Shuxia; Sasmito, Agus Pulung

    2016-04-01

    The transport properties and mechanisms of fractured porous media are very important for oil and gas reservoir engineering, hydraulics, environmental science, chemical engineering, etc. In this paper, a fractal dual-porosity model is developed to estimate the equivalent hydraulic properties of fractured porous media, where a fractal tree-like network model is used to characterize the fracture system according to its fractal scaling laws and topological structures. The analytical expressions for the effective permeability of fracture system and fractured porous media, tortuosity, fracture density and fraction are derived. The proposed fractal model has been validated by comparisons with available experimental data and numerical simulation. It has been shown that fractal dimensions for fracture length and aperture have significant effect on the equivalent hydraulic properties of fractured porous media. The effective permeability of fracture system can be increased with the increase of fractal dimensions for fracture length and aperture, while it can be remarkably lowered by introducing tortuosity at large branching angle. Also, a scaling law between the fracture density and fractal dimension for fracture length has been found, where the scaling exponent depends on the fracture number. The present fractal dual-porosity model may shed light on the transport physics of fractured porous media and provide theoretical basis for oil and gas exploitation, underground water, nuclear waste disposal and geothermal energy extraction as well as chemical engineering, etc.

  5. Framing access to medicines in developing countries: an analysis of media coverage of Canada's Access to Medicines Regime.

    Science.gov (United States)

    Esmail, Laura C; Phillips, Kaye; Kuek, Victoria; Cosio, Andrea Perez; Kohler, Jillian Clare

    2010-01-04

    In September 2003, the Canadian government committed to developing legislation that would facilitate greater access to affordable medicines for developing countries. Over the course of eight months, the legislation, now known as Canada's Access to Medicines Regime (CAMR), went through a controversial policy development process and the newspaper media was one of the major venues in which the policy debates took place. The purpose of this study was to examine how the media framed CAMR to determine how policy goals were conceptualized, which stakeholder interests controlled the public debate and how these variables related to the public policy process. We conducted a qualitative content analysis of newspaper coverage of the CAMR policy and implementation process from 2003-2008. The primary theoretical framework for this study was framing theory. A total of 90 articles from 11 Canadian newspapers were selected for inclusion in our analysis. A team of four researchers coded the articles for themes relating to access to medicines and which stakeholders' voice figured more prominently on each issue. Stakeholders examined included: the research-based industry, the generic industry, civil society, the Canadian government, and developing country representatives. The most frequently mentioned themes across all documents were the issues of drug affordability, intellectual property, trade agreements and obligations, and development. Issues such as human rights, pharmaceutical innovation, and economic competitiveness got little media representation. Civil society dominated the media contents, followed far behind by the Canadian government, the research-based and generic pharmaceutical industries. Developing country representatives were hardly represented in the media. Media framing obscured the discussion of some of the underlying policy goals in this case and failed to highlight issues which are now significant barriers to the use of the legislation. Using the media to engage

  6. Energy challenges in optical access and aggregation networks.

    Science.gov (United States)

    Kilper, Daniel C; Rastegarfar, Houman

    2016-03-06

    Scalability is a critical issue for access and aggregation networks as they must support the growth in both the size of data capacity demands and the multiplicity of access points. The number of connected devices, the Internet of Things, is growing to the tens of billions. Prevailing communication paradigms are reaching physical limitations that make continued growth problematic. Challenges are emerging in electronic and optical systems and energy increasingly plays a central role. With the spectral efficiency of optical systems approaching the Shannon limit, increasing parallelism is required to support higher capacities. For electronic systems, as the density and speed increases, the total system energy, thermal density and energy per bit are moving into regimes that become impractical to support-for example requiring single-chip processor powers above the 100 W limit common today. We examine communication network scaling and energy use from the Internet core down to the computer processor core and consider implications for optical networks. Optical switching in data centres is identified as a potential model from which scalable access and aggregation networks for the future Internet, with the application of integrated photonic devices and intelligent hybrid networking, will emerge. © 2016 The Author(s).

  7. A news media analysis of economic sanction effects on access to medicine in Iran.

    Science.gov (United States)

    Kheirandish, Mehrnaz; Rashidian, Arash; Bigdeli, Maryam

    2015-01-01

    In the past decades economic sanctions have been used by different countries or international organizations in order to deprive target countries of some transactions. While the sanctions do not target health care systems or public health structures, they may, in fact, affect the availability of health care in target countries. In this study, we used media analysis to assess the impacts of recent sanctions imposed by the Central Bank of Iran in 2012 on access to medicines in Iran. We searched different sources of written news media including a database of nonspecialized weeklies and magazines, online news sources, web pages of daily newspapers and healthcare oriented weeklies from 2011 to 2013. We searched the sources using the general term "medicine" to reduce the chances of missing relevant items. The identified news media were read, and categorized under three groups of items announcing "shortage of medicines," "medicines related issues" and "no shortage." We conducted trend analyzes to see whether the news media related to access to medicines were affected by the economic sanctions. A total number of 371 relevant news media were collected. The number of news media related to medicines substantially increased in the study period: 30 (8%), 161 (43%) and 180 (49%) were published in 2011, 2012 and 2013, respectively. While 145 (39%) of media items referred to the shortage of medicines, 97 (26%) reported no shortage or alleviating of concerns. Media analysis suggests a clear increase in the number of news media reporting a shortage in Iran after the sanctions. In 2013, there were accompanying increases in the number of news media reporting alleviation of the shortages of medicines. Our analysis provides evidence of negative effects of the sanctions on access to medicines in Iran.

  8. A news media analysis of economic sanction effects on access to medicine in Iran

    Science.gov (United States)

    Kheirandish, Mehrnaz; Rashidian, Arash; Bigdeli, Maryam

    2015-01-01

    Objective: In the past decades economic sanctions have been used by different countries or international organizations in order to deprive target countries of some transactions. While the sanctions do not target health care systems or public health structures, they may, in fact, affect the availability of health care in target countries. In this study, we used media analysis to assess the impacts of recent sanctions imposed by the Central Bank of Iran in 2012 on access to medicines in Iran. Methods: We searched different sources of written news media including a database of nonspecialized weeklies and magazines, online news sources, web pages of daily newspapers and healthcare oriented weeklies from 2011 to 2013. We searched the sources using the general term “medicine” to reduce the chances of missing relevant items. The identified news media were read, and categorized under three groups of items announcing “shortage of medicines,” “medicines related issues” and “no shortage.” We conducted trend analyzes to see whether the news media related to access to medicines were affected by the economic sanctions. Findings: A total number of 371 relevant news media were collected. The number of news media related to medicines substantially increased in the study period: 30 (8%), 161 (43%) and 180 (49%) were published in 2011, 2012 and 2013, respectively. While 145 (39%) of media items referred to the shortage of medicines, 97 (26%) reported no shortage or alleviating of concerns. Conclusion: Media analysis suggests a clear increase in the number of news media reporting a shortage in Iran after the sanctions. In 2013, there were accompanying increases in the number of news media reporting alleviation of the shortages of medicines. Our analysis provides evidence of negative effects of the sanctions on access to medicines in Iran. PMID:26645026

  9. Computer network access to scientific information systems for minority universities

    Science.gov (United States)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  10. Academic e-learning experience in the enhancement of open access audiovisual and media education

    OpenAIRE

    Pacholak, Anna; Sidor, Dorota

    2015-01-01

    The paper presents how the academic e-learning experience and didactic methods of the Centre for Open and Multimedia Education (COME UW), University of Warsaw, enhance the open access to audiovisual and media education at various levels of education. The project is implemented within the Audiovisual and Media Education Programme (PEAM). It is funded by the Polish Film Institute (PISF). The aim of the project is to create a proposal of a comprehensive and open programme for the audiovisual (me...

  11. Greening radio access networks using distributed base station architectures

    DEFF Research Database (Denmark)

    Kardaras, Georgios; Soler, José; Dittmann, Lars

    2010-01-01

    Several actions for developing environmentally friendly technologies have been taken in most industrial fields. Significant resources have also been devoted in mobile communications industry. Moving towards eco-friendly alternatives is primarily a social responsibility for network operators....... However besides this, increasing energy efficiency represents a key factor for reducing operating expenses and deploying cost effective mobile networks. This paper presents how distributed base station architectures can contribute in greening radio access networks. More specifically, the advantages...... energy saving. Different subsystems have to be coordinated real-time and intelligent network nodes supporting complicated functionalities are necessary. Distributed base station architectures are ideal for this purpose mainly because of their high degree of configurability and self...

  12. Highball: A high speed, reserved-access, wide area network

    Science.gov (United States)

    Mills, David L.; Boncelet, Charles G.; Elias, John G.; Schragger, Paul A.; Jackson, Alden W.

    1990-01-01

    A network architecture called Highball and a preliminary design for a prototype, wide-area data network designed to operate at speeds of 1 Gbps and beyond are described. It is intended for applications requiring high speed burst transmissions where some latency between requesting a transmission and granting the request can be anticipated and tolerated. Examples include real-time video and disk-disk transfers, national filestore access, remote sensing, and similar applications. The network nodes include an intelligent crossbar switch, but have no buffering capabilities; thus, data must be queued at the end nodes. There are no restrictions on the network topology, link speeds, or end-end protocols. The end system, nodes, and links can operate at any speed up to the limits imposed by the physical facilities. An overview of an initial design approach is presented and is intended as a benchmark upon which a detailed design can be developed. It describes the network architecture and proposed access protocols, as well as functional descriptions of the hardware and software components that could be used in a prototype implementation. It concludes with a discussion of additional issues to be resolved in continuing stages of this project.

  13. Auction pricing of network access for North American railways

    DEFF Research Database (Denmark)

    Harrod, Steven

    2013-01-01

    The question of pricing train paths for "open access" railway networks in North America is discussed. An auction process is suggested as necessary to maintain transparency in the contracting process. Multiple random samples of auction pricing for a single track railway line demonstrate...... that the infrastructure entity will receive approximately 15.6% less than the true value of the contracted train paths. This loss of revenue threatens the objective of reducing government subsidy for the railway network. (C) 2012 Elsevier Ltd. All rights reserved....

  14. A Systematic Scheme for Multiple Access in Ethernet Passive Optical Access Networks

    Science.gov (United States)

    Ma, Maode; Zhu, Yongqing; Hiang Cheng, Tee

    2005-11-01

    While backbone networks have experienced substantial changes in the last decade, access networks have not changed much. Recently, passive optical networks (PONs) seem to be ready for commercial deployment as access networks, due to the maturity of a number of enabling technologies. Among the PON technologies, Ethernet PON (EPON) standardized by the IEEE 802.3ah Ethernet in the First Mile (EFM) Task Force is the most attractive one because of its high speed, low cost, familiarity, interoperability, and low overhead. In this paper, we consider the issue of upstream channel sharing in the EPONs. We propose a novel multiple-access control scheme to provide bandwidth-guaranteed service for high-demand customers, while providing best effort service to low-demand customers according to the service level agreement (SLA). The analytical and simulation results prove that the proposed scheme performs best in what it is designed to do compared to another well-known scheme that has not considered providing differentiated services. With business customers preferring premium services with guaranteed bandwidth and residential users preferring low-cost best effort services, our scheme could benefit both groups of subscribers, as well as the operators.

  15. On the Design of Energy Efficient Optical Networks with Software Defined Networking Control Across Core and Access Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Yan, Ying; Dittmann, Lars

    2013-01-01

    This paper presents a Software Defined Networking (SDN) control plane based on an overlay GMPLS control model. The SDN control platform manages optical core networks (WDM/DWDM networks) and the associated access networks (GPON networks), which makes it possible to gather global information...... and enable wider areas' energy efficiency networking. The energy related information of the networks and the types of the traffic flows are collected and utilized for the end-to-end QoS provision. Dynamic network simulation results show that by applying different routing algorithms according to the type...... of traffic in the core networks, the energy efficiency of the network is improved without compromising the quality of service....

  16. A Fuzzy Preprocessing Module for Optimizing the Access Network Selection in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Faisal Kaleem

    2013-01-01

    Full Text Available A heterogeneous wireless network is characterized by the presence of different wireless access technologies that coexist in an overlay fashion. These wireless access technologies usually differ in terms of their operating parameters. On the other hand, Mobile Stations (MSs in a heterogeneous wireless network are equipped with multiple interfaces to access different types of services from these wireless access technologies. The ultimate goal of these heterogeneous wireless networks is to provide global connectivity with efficient ubiquitous computing to these MSs based on the Always Best Connected (ABC principle. This is where the need for intelligent and efficient Vertical Handoffs (VHOs between wireless technologies in a heterogeneous environment becomes apparent. This paper presents the design and implementation of a fuzzy multicriteria based Vertical Handoff Necessity Estimation (VHONE scheme that determines the proper time for VHO, while considering the continuity and quality of the currently utilized service, and the end-users' satisfaction.

  17. Quantitative analysis of access strategies to remoteinformation in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    of analytic models to compute different performance metrics for these approaches, with special focus on the so-called mismatch probability. The results of the analytic models allow for design decisions on which strategy to implement for specific input parameters (change rate of the information element......Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach...... initiated by the requesting entity, and two versions of proactive approaches in which the entity that contains the information element actively propagates its changes to potential requesters, either (2) periodically or triggered by changes of the information element (3). This paper first develops a set...

  18. On Planning of FTTH Access Networks with and without Redundancy

    DEFF Research Database (Denmark)

    Riaz, M. Tahir; Haraldsson, Gustav; Gutierrez Lopez, Jose Manuel

    2010-01-01

    This paper presents a planning analysis of FTTH access network with and without redundancy. Traditionally, access networks are planned only without redundancy, which is mainly due to lowering the cost of deployment. As fiber optics provide a huge amount of capacity, more and more services are being...... offered on a single fiber connection. As a single point of failure in fiber connection can cause multiple service deprivation therefore redundancy is very crucial. In this work, an automated planning model was used to test different scenarios of implementation. A cost estimation is presented in terms...... of digging and amount of fiber used. Three topologies, including the traditional one “tree topology”, were test with combination of various passive optical technologies....

  19. Online Activities, Digital Media Literacy, and Networked Individualism of Korean Youth

    Science.gov (United States)

    Park, Sora; Kim, Eun-mee; Na, Eun-Yeong

    2015-01-01

    Networked individualism enables Internet users to connect and socialize via their loose and transient multiple networks, whereas digital media literacy is a precondition of effective Internet use. In this study, an attempt has been made to find the link between networked individualism, digital media literacy, and young people's perception of their…

  20. Network Performance and Quality of Experience of Remote Access Laboratories

    Directory of Open Access Journals (Sweden)

    Alexander A. Kist

    2012-11-01

    Full Text Available Remote Access Laboratories (RAL have become important learning and teaching tools. This paper presents a performance study that targets a specific remote access architecture implemented within a universities operational environment. This particular RAL system provides globally authenticated and arbitrated remote access to virtualized computers as well as computer controlled hardware experiments. This paper presents system performance results that have been obtained utilizing both a set of automated and human subject tests. Principle objectives of the study were: To gain a better understanding of the nature of network traffic caused by experimental activity usage; to obtain an indication of user expectations of activity performance; and to develop a measure to predict Quality of Experience, based on easily measurable Quality of Service parameters. The study emulates network layer variation of access-bandwidth and round-trip-time of typical usage scenarios and contrasts against user perception results that allow classifying expected user performance. It demonstrates that failure rate is excellent measure of usability, and that round-trip-time predominantly affects user experience. Thin-client and remote desktop architectures are popular to separate the location of users and the actual data processing and use similar structures, hence results of this study to be applied in these application areas as well.

  1. Monday 9 January 2006: RESTRICTED ACCESS to the Technical Network

    CERN Multimedia

    CNIC Users Exchange and IT/CS

    2005-01-01

    As of Monday 9 January 2006, Ethernet access from the general CERN network to the Technical Network (TN) will be restricted in order to improve security on the TN. As a result, all Ethernet communication between the General Purpose Network (GPN) and the TN will be filtered. Only communication lines to the general IT services such as DNS, TP, NICE, DFS, AFS, Antivirus, Linux installation servers, License servers, OracleDB, TSM backup servers and dedicated AB and TS servers on the GPN will remain open. Please make sure that all your devices are registered properly in the network database (LANDB): http://network.cern.ch/. You are encouraged to make proper use of the 'Tag' and 'Description' fields in order to identify your system later on. If your system depends on special services on the GPN or is split between the GPN and the TN, e.g. consists of devices (PCs, PLCs, VME crates, webcams, etc.) connected to both the TN and the GPN, please contact the Technical-Network.Administrator@cern.ch . They will include...

  2. Scalable and Media Aware Adaptive Video Streaming over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Béatrice Pesquet-Popescu

    2008-07-01

    Full Text Available This paper proposes an advanced video streaming system based on scalable video coding in order to optimize resource utilization in wireless networks with retransmission mechanisms at radio protocol level. The key component of this system is a packet scheduling algorithm which operates on the different substreams of a main scalable video stream and which is implemented in a so-called media aware network element. The concerned type of transport channel is a dedicated channel subject to parameters (bitrate, loss rate variations on the long run. Moreover, we propose a combined scalability approach in which common temporal and SNR scalability features can be used jointly with a partitioning of the image into regions of interest. Simulation results show that our approach provides substantial quality gain compared to classical packet transmission methods and they demonstrate how ROI coding combined with SNR scalability allows to improve again the visual quality.

  3. Detection of strong attractors in social media networks.

    Science.gov (United States)

    Qasem, Ziyaad; Jansen, Marc; Hecking, Tobias; Hoppe, H Ulrich

    2016-01-01

    Detection of influential actors in social media such as Twitter or Facebook plays an important role for improving the quality and efficiency of work and services in many fields such as education and marketing. The work described here aims to introduce a new approach that characterizes the influence of actors by the strength of attracting new active members into a networked community. We present a model of influence of an actor that is based on the attractiveness of the actor in terms of the number of other new actors with which he or she has established relations over time. We have used this concept and measure of influence to determine optimal seeds in a simulation of influence maximization using two empirically collected social networks for the underlying graphs. Our empirical results on the datasets demonstrate that our measure stands out as a useful measure to define the attractors comparing to the other influence measures.

  4. Distributed cloud association in downlink multicloud radio access networks

    KAUST Repository

    Dahrouj, Hayssam

    2015-03-01

    This paper considers a multicloud radio access network (M-CRAN), wherein each cloud serves a cluster of base-stations (BS\\'s) which are connected to the clouds through high capacity digital links. The network comprises several remote users, where each user can be connected to one (and only one) cloud. This paper studies the user-to-cloud-assignment problem by maximizing a network-wide utility subject to practical cloud connectivity constraints. The paper solves the problem by using an auction-based iterative algorithm, which can be implemented in a distributed fashion through a reasonable exchange of information between the clouds. The paper further proposes a centralized heuristic algorithm, with low computational complexity. Simulations results show that the proposed algorithms provide appreciable performance improvements as compared to the conventional cloud-less assignment solutions. © 2015 IEEE.

  5. Preference for and access to media resources as predictors of in ...

    African Journals Online (AJOL)

    The study investigated the extent to which preference for and access to media resources predicts knowledge of in-school adolescents to sexual and reproductive health issues in Lagos Mainland Local Government Area of Lagos State, Nigeria. A population of 526 in-school adolescents participates in the study while ...

  6. Print Media and ICT Access and Use among Female Academics in ...

    African Journals Online (AJOL)

    Literacy for women in the academics requires constant access and use of current and quality information from the media and their associated technologies. This paper discusses the challenges to functional literacy for women academics in the University of Jos and explains how their academic literacy can be enhanced to ...

  7. Multi-Media Access and Presentation in the Twente Virtual Theatre Environment

    NARCIS (Netherlands)

    Correia, N.; Nijholt, Antinus; Cambell, T.; Davenport, G.

    2000-01-01

    This paper discusses a virtual world for presenting multi-media information and for natural interactions with the environment to get access to this information. Apart from mouse and keyboard input, interactions take place using speech and language. It is shown how this virtual environment can be

  8. Distributed Robust Power Minimization for the Downlink of Multi-Cloud Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    Conventional cloud radio access networks assume single cloud processing and treat inter-cloud interference as background noise. This paper considers the downlink of a multi-cloud radio access network (CRAN) where each cloud is connected to several

  9. Predicting Social Networking Site Use and Online Communication Practices among Adolescents: The Role of Access and Device Ownership

    Directory of Open Access Journals (Sweden)

    Drew P. Cingel

    2014-01-01

    Full Text Available Given adolescents' heavy social media use, this study examined a number of predictors of adolescent social media use, as well as predictors of online communication practices. Using data collected from a national sample of 467 adolescents between the ages of 13 and 17, results indicate that demographics, technology access, and technology ownership are related to social media use and communication practices. Specifically, females log onto and use more constructive communication practices on Facebook compared to males. Additionally, adolescents who own smartphones engage in more constructive online communication practices than those who share regular cell phones or those who do not have access to a cell phone. Overall, results imply that ownership of mobile technologies, such as smartphones and iPads, may be more predictive of social networking site use and online communication practices than general ownership of technology.

  10. Predicting Social Networking Site Use and Online Communication Practices among Adolescents: The Role of Access and Device Ownership

    Directory of Open Access Journals (Sweden)

    Drew P. Cingel

    2014-06-01

    Full Text Available Given adolescents' heavy social media use, this study examined a number of predictors of adolescent social media use, as well as predictors of online communication practices. Using data collected from a national sample of 467 adolescents between the ages of 13 and 17, results indicate that demographics, technology access, and technology ownership are related to social media use and communication practices. Specifically, females log onto and use more constructive com-munication practices on Facebook compared to males. Additionally, adolescents who own smartphones engage in more constructive online communication practices than those who share regular cell phones or those who do not have access to a cell phone. Overall, results imply that ownership of mobile technologies, such as smartphones and iPads, may be more predictive of social networking site use and online communication practices than general ownership of technology.

  11. Joint Hybrid Backhaul and Access Links Design in Cloud-Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb

    2015-09-06

    The cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio systems. In this paper, we consider the downlink of a CRAN formed of one central processor (the cloud) and several base station (BS), where each BS is connected to the cloud via either a wireless or capacity-limited wireline backhaul link. The paper addresses the joint design of the hybrid backhaul links (i.e., designing the wireline and wireless backhaul connections from the cloud to the BSs) and the access links (i.e., determining the sparse beamforming solution from the BSs to the users). The paper formulates the hybrid backhaul and access link design problem by minimizing the total network power consumption. The paper solves the problem using a two-stage heuristic algorithm. At one stage, the sparse beamforming solution is found using a weighted mixed 11/12 norm minimization approach; the correlation matrix of the quantization noise of the wireline backhaul links is computed using the classical rate-distortion theory. At the second stage, the transmit powers of the wireless backhaul links are found by solving a power minimization problem subject to quality-of-service constraints, based on the principle of conservation of rate by utilizing the rates found in the first stage. Simulation results suggest that the performance of the proposed algorithm approaches the global optimum solution, especially at high signal-to-interference-plus-noise ratio (SINR).

  12. Empathic Cyberactivism: The Potential of Hyperconnected Social Media Networks and Empathic Virtual Reality for Feminism

    Directory of Open Access Journals (Sweden)

    Penelope Kemekenidou

    2016-10-01

    Full Text Available The rise of misogyny on social networks feels both devastating and endless. Whether one believes that misogyny has risen to a new level, or that it has simply become more visible through the internet, one thing is clear: with the ubiquity and accessibility of ‘immortal’ online information, harassment and discrimination, shared via hyperconnected social media networks, can be taken to a new, much more visible level. Hyperconnectivity enables sexism to multiply on the web – but it can also be the solution to fight it. In the context of activism, hyperconnectivity can be a major force to combat inequality—given that this hyperconnectivity is linked to empathy and not aggression. If this is the case, I argue, new technologies, for example virtual reality, open up new spaces of empathetic interaction.

  13. Predicting ethnicity with first names in online social media networks

    Directory of Open Access Journals (Sweden)

    Bas Hofstra

    2018-03-01

    Full Text Available Social scientists increasingly use (big social media data to illuminate long-standing substantive questions in social science research. However, a key challenge of analyzing such data is their lower level of individual detail compared to highly detailed survey data. This limits the scope of substantive questions that can be addressed with these data. In this study, we provide a method to upgrade individual detail in terms of ethnicity in data gathered from social media via the use of register data. Our research aim is twofold: first, we predict the most likely value of ethnicity, given one's first name, and second, we show how one can test hypotheses with the predicted values for ethnicity as an independent variable while simultaneously accounting for the uncertainty in these predictions. We apply our method to social network data collected from Facebook. We illustrate our approach and provide an example of hypothesis testing using our procedure, i.e., estimating the relation between predicted network ethnic homogeneity on Facebook and trust in institutions. In a comparison of our method with two other methods, we find that our method provides the most conservative tests of hypotheses. We discuss the promise of our approach and pinpoint future research directions.

  14. Extending AAA operational model for profile-based access control in ethernet-based Neutral Access Networks

    NARCIS (Netherlands)

    Matias, J.; Jacob, E.; Demchenko, Y.; de Laat, C.; Gommans, L.; Macías López, E.M.; Bogliolo, A.; Perry, M.; Ran, M

    2010-01-01

    Neutral Access Networks (NAN) have appeared as a new model to overcome some restrictions and lack of flexibility that are present currently in broadband access networks. NAN brings new business opportunities by opening this market to new stakeholders. Although the NAN model is accepted, there are

  15. Accessing Wireless Sensor Networks Via Dynamically Reconfigurable Interaction Models

    Directory of Open Access Journals (Sweden)

    Maria Cecília Gomes

    2012-12-01

    Full Text Available The Wireless Sensor Networks (WSNs technology is already perceived as fundamental for science across many domains, since it provides a low cost solution for environment monitoring. WSNs representation via the service concept and its inclusion in Web environments, e.g. through Web services, supports particularly their open/standard access and integration. Although such Web enabled WSNs simplify data access, network parameterization and aggregation, the existing interaction models and run-time adaptation mechanisms available to clients are still scarce. Nevertheless, applications increasingly demand richer and more flexible accesses besides the traditional client/server. For instance, applications may require a streaming model in order to avoid sequential data requests, or the asynchronous notification of subscribed data through the publish/subscriber. Moreover, the possibility to automatically switch between such models at runtime allows applications to define flexible context-based data acquisition. To this extent, this paper discusses the relevance of the session and pattern abstractions on the design of a middleware prototype providing richer and dynamically reconfigurable interaction models to Web enabled WSNs.

  16. Downlink Non-Orthogonal Multiple Access (NOMA) in Poisson Networks

    KAUST Repository

    Ali, Konpal S.

    2018-03-21

    A network model is considered where Poisson distributed base stations transmit to $N$ power-domain non-orthogonal multiple access (NOMA) users (UEs) each that employ successive interference cancellation (SIC) for decoding. We propose three models for the clustering of NOMA UEs and consider two different ordering techniques for the NOMA UEs: mean signal power-based and instantaneous signal-to-intercell-interference-and-noise-ratio-based. For each technique, we present a signal-to-interference-and-noise ratio analysis for the coverage of the typical UE. We plot the rate region for the two-user case and show that neither ordering technique is consistently superior to the other. We propose two efficient algorithms for finding a feasible resource allocation that maximize the cell sum rate $\\\\mathcal{R}_{\\ m tot}$, for general $N$, constrained to: 1) a minimum rate $\\\\mathcal{T}$ for each UE, 2) identical rates for all UEs. We show the existence of: 1) an optimum $N$ that maximizes the constrained $\\\\mathcal{R}_{\\ m tot}$ given a set of network parameters, 2) a critical SIC level necessary for NOMA to outperform orthogonal multiple access. The results highlight the importance in choosing the network parameters $N$, the constraints, and the ordering technique to balance the $\\\\mathcal{R}_{\\ m tot}$ and fairness requirements. We also show that interference-aware UE clustering can significantly improve performance.

  17. Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks.

    Science.gov (United States)

    Anwar, Asim; Seet, Boon-Chong; Ding, Zhiguo

    2018-02-08

    Ubiquitous wireless sensor networks (UWSNs) have become a critical technology for enabling smart cities and other ubiquitous monitoring applications. Their deployment, however, can be seriously hampered by the spectrum available to the sheer number of sensors for communication. To support the communication needs of UWSNs without requiring more spectrum resources, the power-domain non-orthogonal multiple access (NOMA) technique originally proposed for 5th Generation (5G) cellular networks is investigated for UWSNs for the first time in this paper. However, unlike 5G networks that operate in the licensed spectrum, UWSNs mostly operate in unlicensed spectrum where sensors also experience cross-technology interferences from other devices sharing the same spectrum. In this paper, we model the interferences from various sources at the sensors using stochastic geometry framework. To evaluate the performance, we derive a theorem and present new closed form expression for the outage probability of the sensors in a downlink scenario under interference limited environment. In addition, diversity analysis for the ordered NOMA users is performed. Based on the derived outage probability, we evaluate the average link throughput and energy consumption efficiency of NOMA against conventional orthogonal multiple access (OMA) technique in UWSNs. Further, the required computational complexity for the NOMA users is presented.

  18. Downlink Non-Orthogonal Multiple Access (NOMA) in Poisson Networks

    KAUST Repository

    Ali, Konpal S.; Haenggi, Martin; Elsawy, Hesham; Chaaban, Anas; Alouini, Mohamed-Slim

    2018-01-01

    A network model is considered where Poisson distributed base stations transmit to $N$ power-domain non-orthogonal multiple access (NOMA) users (UEs) each that employ successive interference cancellation (SIC) for decoding. We propose three models for the clustering of NOMA UEs and consider two different ordering techniques for the NOMA UEs: mean signal power-based and instantaneous signal-to-intercell-interference-and-noise-ratio-based. For each technique, we present a signal-to-interference-and-noise ratio analysis for the coverage of the typical UE. We plot the rate region for the two-user case and show that neither ordering technique is consistently superior to the other. We propose two efficient algorithms for finding a feasible resource allocation that maximize the cell sum rate $\\mathcal{R}_{\\rm tot}$, for general $N$, constrained to: 1) a minimum rate $\\mathcal{T}$ for each UE, 2) identical rates for all UEs. We show the existence of: 1) an optimum $N$ that maximizes the constrained $\\mathcal{R}_{\\rm tot}$ given a set of network parameters, 2) a critical SIC level necessary for NOMA to outperform orthogonal multiple access. The results highlight the importance in choosing the network parameters $N$, the constraints, and the ordering technique to balance the $\\mathcal{R}_{\\rm tot}$ and fairness requirements. We also show that interference-aware UE clustering can significantly improve performance.

  19. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  20. INOVASI MEDIA PEMBELAJARAN KEARSIPAN ELECTRONIK ARSIP (E-ARSIP BERBASIS MICROSOFT OFFICE ACCESS

    Directory of Open Access Journals (Sweden)

    Ahmad Saeroji

    2014-12-01

    Full Text Available Microsoft Office Access (Ms Access is a database management system which is a Relational Database Management System. The database in Microsoft Access is a set of objects consisting of tables, queries, forms, reports. Archival system is basically to store useful various files for organizations with the specific rules so the files can be found quickly and easily. Therefore; Microsoft Office Access is an appropriate breakthrough to build archival application systems based on Microsoft Office Access. It is not only easy to be operated but also available a package of Microsoft Office program. One of the most important benefits of the database is to facilitate the access to the data. The ease of accessing the data is the implication of the order data since it is the prerequisite of a good database. The database of archiving system is an application or system design which allows the archives storage digitally. The objective of the e-archives application program using Microsoft Access is to facilitate the delivery of material practices of electronic filing (e-archives. The purposes of the scientific study are: (1 to determine the basic concept and scope of Electronic archives (e-archives, (2 To know how to use the media of electronic archives (E-archives aided Microsoft Office Access in the learning activities for Vocational students of Office Administration program.

  1. INOVASI MEDIA PEMBELAJARAN KEARSIPAN ELECTRONIK ARSIP (E-ARSIP BERBASIS MICROSOFT OFFICE ACCESS

    Directory of Open Access Journals (Sweden)

    Ahmad Saeroji

    2016-01-01

    Full Text Available Microsoft Office Access (Ms Access is a database management system which is a Relational Database Management System. The database in Microsoft Access is a set of objects consisting of tables, queries, forms, reports. Archival system is basically to store useful various files for organizations with the specific rules so the files can be found quickly and easily. Therefore; Microsoft Office Access is an appropriate breakthrough to build archival application systems based on Microsoft Office Access. It is not only easy to be operated but also available a package of Microsoft Office program. One of the most important benefits of the database is to facilitate the access to the data. The ease of accessing the data is the implication of the order data since it is the prerequisite of a good database. The database of archiving system is an application or system design which allows the archives storage digitally. The objective of the e-archives application program using Microsoft Access is to facilitate the delivery of material practices of electronic filing (e-archives. The purposes of the scientific study are: (1 to determine the basic concept and scope of Electronic archives (e-archives, (2 To know how to use the media of electronic archives (E-archives aided Microsoft Office Access in the learning activities for Vocational students of Office Administration program.

  2. Energy efficiency for cloud-radio access networks with imperfect channel state information

    KAUST Repository

    Al-Oquibi, Bayan; Amin, Osama; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2016-01-01

    metric in next generation wireless systems (5G). Cloud radio access network (C-RAN), a promising 5G network architecture, provides an efficient framework for improving the EE performance, by means of coordinating the transmission across the network

  3. Social Network Facebook in News: Comparisiion of Space Dedicated to Social Network Facebook ads its Content in Czech Media in the Years 2009 and 2011

    OpenAIRE

    Bezdíčková, Andrea

    2012-01-01

    Diploma thesis "Social Network Facebook in News: Comparison of Space Dedicated to Social Network Facebook and its Content in Czech Media in the Years 2009 and 2011", is dedicated to the way of use and citation of social network Facebook in the selected news media. The paper summarizes the establishment and strengthening of online media, particularly the phenomenon of social networks on the example of social network Facebook, and their influence on the transformation of the media sector, news ...

  4. Convergence of broadband optical and wireless access networks

    Science.gov (United States)

    Chang, Gee-Kung; Jia, Zhensheng; Chien, Hung-Chang; Chowdhury, Arshad; Hsueh, Yu-Ting; Yu, Jianjun

    2009-01-01

    This paper describes convergence of optical and wireless access networks for delivering high-bandwidth integrated services over optical fiber and air links. Several key system technologies are proposed and experimentally demonstrated. We report here, for the first ever, a campus-wide field trial demonstration of radio-over-fiber (RoF) system transmitting uncompressed standard-definition (SD) high-definition (HD) real-time video contents, carried by 2.4-GHz radio and 60- GHz millimeter-wave signals, respectively, over 2.5-km standard single mode fiber (SMF-28) through the campus fiber network at Georgia Institute of Technology (GT). In addition, subsystem technologies of Base Station and wireless tranceivers operated at 60 GHz for real-time video distribution have been developed and tested.

  5. Symmetric reconfigurable capacity assignment in a bidirectional DWDM access network.

    Science.gov (United States)

    Ortega, Beatriz; Mora, José; Puerto, Gustavo; Capmany, José

    2007-12-10

    This paper presents a novel architecture for DWDM bidirectional access networks providing symmetric dynamic capacity allocation for both downlink and uplink signals. A foldback arrayed waveguide grating incorporating an optical switch enables the experimental demonstration of flexible assignment of multiservice capacity. Different analog and digital services, such as CATV, 10 GHz-tone, 155Mb/s PRBS and UMTS signals have been transmitted in order to successfully test the system performance under different scenarios of total capacity distribution from the Central Station to different Base Stations with two reconfigurable extra channels for each down and upstream direction.

  6. Enabling Broadband as Commodity within Access Networks: A QoS Recipe

    Science.gov (United States)

    Areizaga, Enrique; Foglar, Andreas; Elizondo, Antonio J.; Geilhardt, Frank

    This paper describes the QoS features that will transform the access networks landscape in order to bring “Broadband” as a commodity while setting up the pillars of the “Future Media Internet”. Quality of Experience is obviously key for emerging and future services. Broadcasting services will first need to equal the QoE of their counterparts in the Open-air market (for IP-TV examples would be artifact-free, no picture freezing, fast zapping times) and offer new features often using interactivity (Time-shifted TV, access to more content, 3DTV with feeling of presence). The huge variety of communications alternatives will lead to different requirements per customer, whose needs will also be dependent on parameters like where the connection is made, the time of the day/day of the week/period of the year or even his/her mood. Today’s networks, designed for providing just Broadband connectivity, will not be enough to satisfy customer’s needs and will necessarily support the introduction of new and innovative services. The Networks of the future should learn from the way the users are communicating, what services they are using, where, when, and how, and adapt accordingly.

  7. A Spontaneous Ad Hoc Network to Share WWW Access

    Directory of Open Access Journals (Sweden)

    Lloret Jaime

    2010-01-01

    Full Text Available In this paper, we propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction, to grant a quick, easy, and secure access to the users to surf the Web. The paper shows the description of our proposal, the procedure of the nodes involved in the system, the security algorithms implemented, and the designed messages. We have taken into account the security and its performance. Although some people have defined and described the main features of spontaneous ad-hoc networks, nobody has published any design and simulation until today. Spontaneous networking will enable a more natural form of wireless computing when people physically meet in the real world. We also validate the success of our proposal through several simulations and comparisons with a regular architecture, taking into account the optimization of the resources of the devices. Finally, we compare our proposal with other caching techniques published in the related literature. The proposal has been developed with the main objective of improving the communication and integration between different study centers of low-resource communities. That is, it lets communicate spontaneous networks, which are working collaboratively and which have been created on different physical places.

  8. Optical code-division multiple-access networks

    Science.gov (United States)

    Andonovic, Ivan; Huang, Wei

    1999-04-01

    This review details the approaches adopted to implement classical code division multiple access (CDMA) principles directly in the optical domain, resulting in all optical derivatives of electronic systems. There are a number of ways of realizing all-optical CDMA systems, classified as incoherent and coherent based on spreading in the time and frequency dimensions. The review covers the basic principles of optical CDMA (OCDMA), the nature of the codes used in these approaches and the resultant limitations on system performance with respect to the number of stations (code cardinality), the number of simultaneous users (correlation characteristics of the families of codes), concluding with consideration of network implementation issues. The latest developments will be presented with respect to the integration of conventional time spread codes, used in the bulk of the demonstrations of these networks to date, with wavelength division concepts, commonplace in optical networking. Similarly, implementations based on coherent correlation with the aid of a local oscillator will be detailed and comparisons between approaches will be drawn. Conclusions regarding the viability of these approaches allowing the goal of a large, asynchronous high capacity optical network to be realized will be made.

  9. Strategies of Legitimacy Through Social Media: The Networked Strategy

    DEFF Research Database (Denmark)

    Castelló, Itziar; Etter, Michael; Nielsen, Finn Årup

    2016-01-01

    the concept of a networked legitimacy strategy. With this strategy, legitimacy is gained through participation in non-hierarchical open platforms and the co-construction of agendas. We explore the organizational transition needed to yield this new legitimacy approach. We argue that, in this context......How can corporations develop legitimacy when coping with stakeholders who have multiple, often conflicting sustainable development (SD) agendas? We address this question by conducting an in-depth longitudinal case study of a corporation's stakeholder engagement in social media and propose......, legitimacy gains may increase when firms are able to reduce the control over the engagements and relate non-hierarchically with their publics. We contribute to the extant literature on political corporate social responsibility and legitimacy by providing an understanding of a new context for engagement...

  10. Professional Online Presence and Learning Networks: Educating for Ethical Use of Social Media

    Science.gov (United States)

    Forbes, Dianne

    2017-01-01

    In a teacher education context, this study considers the use of social media for building a professional online presence and learning network. This article provides an overview of uses of social media in teacher education, presents a case study of key processes in relation to professional online presence and learning networks, and highlights…

  11. Navigating Social Networking and Social Media in School Psychology: Ethical and Professional Considerations in Training Programs

    Science.gov (United States)

    Pham, Andy V.

    2014-01-01

    Social networking and social media have undoubtedly proliferated within the past decade, allowing widespread communication and dissemination of user-generated content and information. Some psychology graduate programs, including school psychology, have started to embrace social networking and media for instructional and training purposes; however,…

  12. A Research on the Use of Social Media Networks by Teacher Candidates

    Science.gov (United States)

    Bolat, Yaviz

    2018-01-01

    Social media networks are the most important product of the development of computer and communication technologies that affect social life. Social media networks have become a driving force in social and cultural development, while providing social contact for people. This force has improved its sphere of influence over societies in many fields…

  13. How Many "Friends" Do You Need? Teaching Students How to Network Using Social Media

    Science.gov (United States)

    Sacks, Michael Alan; Graves, Nikki

    2012-01-01

    Student reliance on social media is undeniable. However, while we largely regard social media as a new phenomena, the concepts underlying it come directly from social network theory in sociology and organizational behavior. In this article, the authors examine how the social network concepts of size, quality, complexity, diffusion, and distance…

  14. Enhancing Sensing and Channel Access in Cognitive Radio Networks

    KAUST Repository

    Hamza, Doha R.

    2014-06-18

    Cognitive radio technology is a promising technology to solve the wireless spectrum scarcity problem by intelligently allowing secondary, or unlicensed, users access to the primary, licensed, users\\' frequency bands. Cognitive technology involves two main tasks: 1) sensing the wireless medium to assess the presence of the primary users and 2) designing secondary spectrum access techniques that maximize the secondary users\\' benefits while maintaining the primary users\\' privileged status. On the spectrum sensing side, we make two contributions. First, we maximize a utility function representing the secondary throughput while constraining the collision probability with the primary below a certain value. We optimize therein the channel sensing time, the sensing decision threshold, the channel probing time, together with the channel sensing order for wideband primary channels. Second, we design a cooperative spectrum sensing technique termed sensing with equal gain combining whereby cognitive radios simultaneously transmit their sensing results to the fusion center over multipath fading reporting channels. The proposed scheme is shown to outperform orthogonal reporting systems in terms of achievable secondary throughput and to be robust against phase and synchronization errors. On the spectrum access side, we make four contributions. First, we design a secondary scheduling scheme with the goal of minimizing the secondary queueing delay under constraints on the average secondary transmit power and the maximum tolerable primary outage probability. Second, we design another secondary scheduling scheme based on the spectrum sensing results and the primary automatic repeat request feedback. The optimal medium access probabilities are obtained via maximizing the secondary throughput subject to constraints that guarantee quality of service parameters for the primary. Third, we propose a three-message superposition coding scheme to maximize the secondary throughput without

  15. Performance Evaluation of Peer-to-Peer Progressive Download in Broadband Access Networks

    Science.gov (United States)

    Shibuya, Megumi; Ogishi, Tomohiko; Yamamoto, Shu

    P2P (Peer-to-Peer) file sharing architectures have scalable and cost-effective features. Hence, the application of P2P architectures to media streaming is attractive and expected to be an alternative to the current video streaming using IP multicast or content delivery systems because the current systems require expensive network infrastructures and large scale centralized cache storage systems. In this paper, we investigate the P2P progressive download enabling Internet video streaming services. We demonstrated the capability of the P2P progressive download in both laboratory test network as well as in the Internet. Through the experiments, we clarified the contribution of the FTTH links to the P2P progressive download in the heterogeneous access networks consisting of FTTH and ADSL links. We analyzed the cause of some download performance degradation occurred in the experiment and discussed about the effective methods to provide the video streaming service using P2P progressive download in the current heterogeneous networks.

  16. Examining the use of evidence-based and social media supported tools in freely accessible physical activity intervention websites.

    Science.gov (United States)

    Vandelanotte, Corneel; Kirwan, Morwenna; Rebar, Amanda; Alley, Stephanie; Short, Camille; Fallon, Luke; Buzza, Gavin; Schoeppe, Stephanie; Maher, Carol; Duncan, Mitch J

    2014-08-17

    It has been shown that physical activity is more likely to increase if web-based interventions apply evidence-based components (e.g. self-monitoring) and incorporate interactive social media applications (e.g. social networking), but it is unclear to what extent these are being utilized in the publicly available web-based physical activity interventions. The purpose of this study was to evaluate whether freely accessible websites delivering physical activity interventions use evidence-based behavior change techniques and provide social media applications. In 2013, a systematic search strategy examined 750 websites. Data was extracted on a wide range of variables (e.g. self-monitoring, goal setting, and social media applications). To evaluate website quality a new tool, comprising three sub-scores (Behavioral Components, Interactivity and User Generated Content), was developed to assess implementation of behavior change techniques and social media applications. An overall website quality scored was obtained by summing the three sub-scores. Forty-six publicly available websites were included in the study. The use of self-monitoring (54.3%), goal setting (41.3%) and provision of feedback (46%) was relatively low given the amount of evidence supporting these features. Whereas the presence of features allowing users to generate content (73.9%), and social media components (Facebook (65.2%), Twitter (47.8%), YouTube (48.7%), smartphone applications (34.8%)) was relatively high considering their innovative and untested nature. Nearly all websites applied some behavioral and social media applications. The average Behavioral Components score was 3.45 (±2.53) out of 10. The average Interactivity score was 3.57 (±2.16) out of 10. The average User Generated Content Score was 4.02 (±2.77) out of 10. The average overall website quality score was 11.04 (±6.92) out of 30. Four websites (8.7%) were classified as high quality, 12 websites (26.1%) were classified as moderate

  17. Unstable dynamics, nonequilibrium phases, and criticality in networked excitable media

    International Nuclear Information System (INIS)

    Franciscis, S. de; Torres, J. J.; Marro, J.

    2010-01-01

    Excitable systems are of great theoretical and practical interest in mathematics, physics, chemistry, and biology. Here, we numerically study models of excitable media, namely, networks whose nodes may occasionally be dormant and the connection weights are allowed to vary with the system activity on a short-time scale, which is a convenient and realistic representation. The resulting global activity is quite sensitive to stimuli and eventually becomes unstable also in the absence of any stimuli. Outstanding consequences of such unstable dynamics are the spontaneous occurrence of various nonequilibrium phases--including associative-memory phases and one in which the global activity wanders irregularly, e.g., chaotically among all or part of the dynamic attractors--and 1/f noise as the system is driven into the phase region corresponding to the most irregular behavior. A net result is resilience which results in an efficient search in the model attractor space that can explain the origin of some observed behavior in neural, genetic, and ill-condensed matter systems. By extensive computer simulation we also address a previously conjectured relation between observed power-law distributions and the possible occurrence of a ''critical state'' during functionality of, e.g., cortical networks, and describe the precise nature of such criticality in the model which may serve to guide future experiments.

  18. Using attractiveness model for actors ranking in social media networks.

    Science.gov (United States)

    Qasem, Ziyaad; Jansen, Marc; Hecking, Tobias; Hoppe, H Ulrich

    2017-01-01

    Influential actors detection in social media such as Twitter or Facebook can play a major role in gathering opinions on particular topics, improving the marketing efficiency, predicting the trends, etc. This work aims to extend our formally defined T measure to present a new measure aiming to recognize the actor's influence by the strength of attracting new important actors into a networked community. Therefore, we propose a model of the actor's influence based on the attractiveness of the actor in relation to the number of other attractors with whom he/she has established connections over time. Using an empirically collected social network for the underlying graph, we have applied the above-mentioned measure of influence in order to determine optimal seeds in a simulation of influence maximization. We study our extended measure in the context of information diffusion because this measure is based on a model of actors who attract others to be active members in a community. This corresponds to the idea of the IC simulation model which is used to identify the most important spreaders in a set of actors.

  19. SON for LTE-WLAN access network selection : design and performance

    NARCIS (Netherlands)

    Willemen, P.; Laselva, D.; Wang, Y.; Kovács, I.; Djapic, R.; Moerman, I.

    2016-01-01

    Mobile network operators (MNOs) are deploying carrier-grade Wireless Local Area Network (WLAN) as an important complementary system to cellular networks. Access network selection (ANS) between cellular and WLAN is an essential component to improve network performance and user quality-of-service

  20. Performance of WLAN RSS-based SON for LTE/WLAN access network selection

    NARCIS (Netherlands)

    Wang, Y.; Djapic, R.; Bergström, A.; Kovács, I.Z.; Laselva, D.; Spaey, K.; Sas, B.

    2014-01-01

    Mobile Network Operators (MNOs) are integrating carrier-grade Wireless Local Area Network (WLAN) to cellular networks to improve network performance and user experience. Access network selection (ANS) between cellular and WLAN plays a key role in the integration. Given the complexity of

  1. Random access procedures and radio access network (RAN) overload control in standard and advanced long-term evolution (LTE and LTE-A) networks

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Popovski, Petar

    2015-01-01

    In this chapter, we describe and discuss the current LTE random access procedure and the Radio Access Network Load Control solution within LTE/LTE-A. We provide an overview of the several considered load control solutions and give a detailed description of the standardized Extended Access Class B...

  2. Journalists' Perceptions of Nomenklatura Networks and Media Ownership in Post-communist Bulgaria

    Directory of Open Access Journals (Sweden)

    Lada Trifonova Price

    2015-06-01

    Full Text Available This article discusses the role of the former communist party elite (the nomenklatura in the Bulgarian post-communist media landscape in relation to media ownership and the origin of media outlets’ capital. The spotlight is on Bulgarian journalists’ perceptions explored in semi-structured interviews with media professionals from the capital city, Sofia. The findings indicate that Bulgarian journalists are strongly interested in, and concerned with, the influence of members of the former nomenklatura and their informal networks on the Bulgarian media landscape and particularly on the way Bulgarian media in Bulgaria have been owned and financed since 1989.

  3. Software Defined Networking for Next Generation Converged Metro-Access Networks

    Science.gov (United States)

    Ruffini, M.; Slyne, F.; Bluemm, C.; Kitsuwan, N.; McGettrick, S.

    2015-12-01

    While the concept of Software Defined Networking (SDN) has seen a rapid deployment within the data center community, its adoption in telecommunications network has progressed slowly, although the concept has been swiftly adopted by all major telecoms vendors. This paper presents a control plane architecture for SDN-driven converged metro-access networks, developed through the DISCUS European FP7 project. The SDN-based controller architecture was developed in a testbed implementation targeting two main scenarios: fast feeder fiber protection over dual-homed Passive Optical Networks (PONs) and dynamic service provisioning over a multi-wavelength PON. Implementation details and results of the experiment carried out over the second scenario are reported in the paper, showing the potential of SDN in providing assured on-demand services to end-users.

  4. Multirate IP traffic transmission in flexible access networks based on optical FFH-CDMA

    DEFF Research Database (Denmark)

    Raddo, Thiago R.; Sanches, Anderson L.; Tafur Monroy, Idelfonso

    2016-01-01

    In this paper, we propose a new IP transmission architecture over optical fast frequency hopping code-division multiple-access (OFFH-CDMA) network capable of supporting multirate transmissions for applications in flexible optical access networks. The proposed network architecture is independent...

  5. Optimizing Cooperative Cognitive Radio Networks with Opportunistic Access

    KAUST Repository

    Zafar, Ammar; Alouini, Mohamed-Slim; Chen, Yunfei; Radaydeh, Redha M.

    2012-01-01

    Optimal resource allocation for cooperative cognitive radio networks with opportunistic access to the licensed spectrum is studied. Resource allocation is based on minimizing the symbol error rate at the receiver. Both the cases of all-participate relaying and selective relaying are considered. The objective function is derived and the constraints are detailed for both scenarios. It is then shown that the objective functions and the constraints are nonlinear and nonconvex functions of the parameters of interest, that is, source and relay powers, symbol time, and sensing time. Therefore, it is difficult to obtain closed-form solutions for the optimal resource allocation. The optimization problem is then solved using numerical techniques. Numerical results show that the all-participate system provides better performance than its selection counterpart, at the cost of greater resources. © 2012 Ammar Zafar et al.

  6. Optimizing Cooperative Cognitive Radio Networks with Opportunistic Access

    KAUST Repository

    Zafar, Ammar

    2012-09-16

    Optimal resource allocation for cooperative cognitive radio networks with opportunistic access to the licensed spectrum is studied. Resource allocation is based on minimizing the symbol error rate at the receiver. Both the cases of all-participate relaying and selective relaying are considered. The objective function is derived and the constraints are detailed for both scenarios. It is then shown that the objective functions and the constraints are nonlinear and nonconvex functions of the parameters of interest, that is, source and relay powers, symbol time, and sensing time. Therefore, it is difficult to obtain closed-form solutions for the optimal resource allocation. The optimization problem is then solved using numerical techniques. Numerical results show that the all-participate system provides better performance than its selection counterpart, at the cost of greater resources. © 2012 Ammar Zafar et al.

  7. Social Media as Seismic Networks for the Earthquake Damage Assessment

    Science.gov (United States)

    Meletti, C.; Cresci, S.; La Polla, M. N.; Marchetti, A.; Tesconi, M.

    2014-12-01

    The growing popularity of online platforms, based on user-generated content, is gradually creating a digital world that mirrors the physical world. In the paradigm of crowdsensing, the crowd becomes a distributed network of sensors that allows us to understand real life events at a quasi-real-time rate. The SoS-Social Sensing project [http://socialsensing.it/] exploits the opportunistic crowdsensing, involving users in the sensing process in a minimal way, for social media emergency management purposes in order to obtain a very fast, but still reliable, detection of emergency dimension to face. First of all we designed and implemented a decision support system for the detection and the damage assessment of earthquakes. Our system exploits the messages shared in real-time on Twitter. In the detection phase, data mining and natural language processing techniques are firstly adopted to select meaningful and comprehensive sets of tweets. Then we applied a burst detection algorithm in order to promptly identify outbreaking seismic events. Using georeferenced tweets and reported locality names, a rough epicentral determination is also possible. The results, compared to Italian INGV official reports, show that the system is able to detect, within seconds, events of a magnitude in the region of 3.5 with a precision of 75% and a recall of 81,82%. We then focused our attention on damage assessment phase. We investigated the possibility to exploit social media data to estimate earthquake intensity. We designed a set of predictive linear models and evaluated their ability to map the intensity of worldwide earthquakes. The models build on a dataset of almost 5 million tweets exploited to compute our earthquake features, and more than 7,000 globally distributed earthquakes data, acquired in a semi-automatic way from USGS, serving as ground truth. We extracted 45 distinct features falling into four categories: profile, tweet, time and linguistic. We run diagnostic tests and

  8. QoE-Driven D2D Media Services Distribution Scheme in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Mingkai Chen

    2017-01-01

    Full Text Available Device-to-device (D2D communication has been widely studied to improve network performance and considered as a potential technological component for the next generation communication. Considering the diverse users’ demand, Quality of Experience (QoE is recognized as a new degree of user’s satisfaction for media service transmissions in the wireless communication. Furthermore, we aim at promoting user’s Mean of Score (MOS value to quantify and analyze user’s QoE in the dynamic cellular networks. In this paper, we explore the heterogeneous media service distribution in D2D communications underlaying cellular networks to improve the total users’ QoE. We propose a novel media service scheme based on different QoE models that jointly solve the massive media content dissemination issue for cellular networks. Moreover, we also investigate the so-called Media Service Adaptive Update Scheme (MSAUS framework to maximize users’ QoE satisfaction and we derive the popularity and priority function of different media service QoE expression. Then, we further design Media Service Resource Allocation (MSRA algorithm to schedule limited cellular networks resource, which is based on the popularity function to optimize the total users’ QoE satisfaction and avoid D2D interference. In addition, numerical simulation results indicate that the proposed scheme is more effective in cellular network content delivery, which makes it suitable for various media service propagation.

  9. MPTCP Tunnel: An Architecture for Aggregating Bandwidth of Heterogeneous Access Networks

    Directory of Open Access Journals (Sweden)

    Xiaolan Liu

    2018-01-01

    Full Text Available Fixed and cellular networks are two typical access networks provided by operators. Fixed access network is widely employed; nevertheless, its bandwidth is sometimes not sufficient enough to meet user bandwidth requirements. Meanwhile, cellular access network owns unique advantages of wider coverage, faster increasing link speed, more flexible deployment, and so forth. Therefore, it is attractive for operators to mitigate the bandwidth shortage by bundling these two. Actually, there have been existing schemes proposed to aggregate the bandwidth of two access networks, whereas they all have their own problems, like packet reordering or extra latency overhead. To address this problem, we design new architecture, MPTCP Tunnel, to aggregate the bandwidth of multiple heterogeneous access networks from the perspective of operators. MPTCP Tunnel uses MPTCP, which solves the reordering problem essentially, to bundle multiple access networks. Besides, MPTCP Tunnel sets up only one MPTCP connection at play which adapts itself to multiple traffic types and TCP flows. Furthermore, MPTCP Tunnel forwards intact IP packets through access networks, maintaining the end-to-end TCP semantics. Experimental results manifest that MPTCP Tunnel can efficiently aggregate the bandwidth of multiple access networks and is more adaptable to the increasing heterogeneity of access networks than existing mechanisms.

  10. Internet and Social Media Access Among Youth Experiencing Homelessness: Mixed-Methods Study.

    Science.gov (United States)

    VonHoltz, Lauren A Houdek; Frasso, Rosemary; Golinkoff, Jesse M; Lozano, Alicia J; Hanlon, Alexandra; Dowshen, Nadia

    2018-05-22

    Youth experiencing homelessness are at a risk for a variety of adverse outcomes. Given the widespread use of the internet and social media, these new technologies may be used to address their needs and for outreach purposes. However, little is known about how this group uses these resources. This study investigated how homeless adolescents use these technologies for general and health-related purposes, whether the scope of their use changes with housing status, and their interest in a website dedicated to youth experiencing homelessness. A convenience sample of youth aged 18 to 21 years was recruited from a youth-specific homeless shelter. All participants completed a 47-item survey, with 10 individuals completing a semistructured interview. Descriptive statistics, exact testing, logistic regression, and generalized estimating equation modeling was performed for quantitative data analysis. Interviews were transcribed verbatim, and NVivo 10 (QSR International) was employed to facilitate double coding and thematic analysis. A total of 87 participants completed the survey with a mean age of 19.4 (SD 1.1) years. While experiencing homelessness, 56% (49/87) accessed the internet at least once a day, with 86% (75/87) accessing once a week. Access to a smartphone was associated with a 3.03 greater odds of accessing the internet and was the most frequently used device (66% of participants, 57/87). While experiencing homelessness, subjects reported a 68% decreased odds in internet access frequency (odds ratio [OR] 0.32, Psocial media use (OR 0.13, P=.01). Ten participants completed the semistructured interview. Several themes were identified, including (1) changes in internet behaviors while experiencing homelessness, (2) health status as a major concern and reason for Internet use, and (3) interest in a website dedicated to youth experiencing homelessness. While experiencing homelessness, participants indicated their behaviors were more goal-oriented and less focused on

  11. JavaScript Access to DICOM Network and Objects in Web Browser.

    Science.gov (United States)

    Drnasin, Ivan; Grgić, Mislav; Gogić, Goran

    2017-10-01

    Digital imaging and communications in medicine (DICOM) 3.0 standard provides the baseline for the picture archiving and communication systems (PACS). The development of Internet and various communication media initiated demand for non-DICOM access to PACS systems. Ever-increasing utilization of the web browsers, laptops and handheld devices, as opposed to desktop applications and static organizational computers, lead to development of different web technologies. The DICOM standard officials accepted those subsequently as tools of alternative access. This paper provides an overview of the current state of development of the web access technology to the DICOM repositories. It presents a different approach of using HTML5 features of the web browsers through the JavaScript language and the WebSocket protocol by enabling real-time communication with DICOM repositories. JavaScript DICOM network library, DICOM to WebSocket proxy and a proof-of-concept web application that qualifies as a DICOM 3.0 device were developed.

  12. Opportunistic Nonorthogonal Packet Scheduling in Fixed Broadband Wireless Access Networks

    Directory of Open Access Journals (Sweden)

    Ahmed Mohamed H

    2006-01-01

    Full Text Available In order to mitigate high cochannel interference resulting from dense channel reuse, the interference management issues are often considered as essential part of scheduling schemes in fixed broadband wireless access (FBWA networks. To that end, a series of literature has been published recently, in which a group of base stations forms an interferer group (downlink transmissions from each base station become dominant interference for the users in other in-group base stations, and the scheduling scheme deployed in the group allows only one base station to transmit at a time. As a result of time orthogonality in transmissions, the dominant cochannel interferers are prevented, and hence the packet error rate can be improved. However, prohibiting concurrent transmissions in these orthogonal schemes introduces throughput penalty as well as higher end-to-end packet delay which might not be desirable for real-time services. In this paper, we utilize opportunistic nonorthogonality among the in-group transmissions whenever possible and propose a novel transmission scheduling scheme for FBWA networks. The proposed scheme, in contrast to the proactive interference avoidance techniques, strives for the improvements in delay and throughput efficiency. To facilitate opportunistic nonorthogonal transmissions in the interferer group, estimation of signal-to-interference-plus-noise ratio (SINR is required at the scheduler. We have observed from simulations that the proposed scheme outperforms the reference orthogonal scheme in terms of spectral efficiency, mean packet delay, and packet dropping rate.

  13. Optical CDMA and WDMA in the access network

    Science.gov (United States)

    Sargent, Edward H.; Stok, Andrew

    2003-08-01

    Optical CDMA provides one avenue to sharing the vast bandwidth of optical fiber among a number of active users in a network. In this work we address two questions central to considering the areas of applicability of CDMA in optics: (1) How do we compare fairly optical CDMA codes of different families, and what do we conclude? (2) How do we compare optical CDMA performance with that of conventional optical WDMA? To answer the first question, we present a method of comparing optical CDMA codes of different families, sizes and weights. We outline why the traditional performance metric of bit-error rate versus number of simultaneous users is lacking and propose a different performance measure -- the peak throughput normalized with respect to the size of the code. This metric is used to show that optical-orthogonal codes (OOCs) with a weight of 4 perform best at low offered loads while OOCs with weight 5 should be used at higher offered loads. By applying the technique across different families of codes, we demonstrate that multi-wavelength OOCs (MWOOCs) perform better than both OOCs (by a factor of approximately 1.25) and asymmetric prime-hop codes (by a factor of approximately 3.5), over a wide range of offered loads. In answer to the second question, we present a comparison of the performance of optical code-division multiple-access (CDMA) systems with that of a wavelength-division multiple-access (WDMA) system. The multiple-access techniques are applied in a time-slotted broadcast local-area network. The utilization, defined as the throughput per unit of time-domain bandwidth expansion, and packet delay are used as metrics of performance. When more than seven wavelengths are available, optical CDMA systems using asymmetric prime-hop codes and all-optical signal processing are shown to have higher peak utilization and lower corresponding delay than a WDMA system with the same number of wavelengths. When the encoders/decoders operate at the chip rate, the utilization

  14. Advanced Networks in Dental Rich Online MEDiA (ANDROMEDA)

    Science.gov (United States)

    Elson, Bruce; Reynolds, Patricia; Amini, Ardavan; Burke, Ezra; Chapman, Craig

    There is growing demand for dental education and training not only in terms of knowledge but also skills. This demand is driven by continuing professional development requirements in the more developed economies, personnel shortages and skills differences across the European Union (EU) accession states and more generally in the developing world. There is an excellent opportunity for the EU to meet this demand by developing an innovative online flexible learning platform (FLP). Current clinical online systems are restricted to the delivery of general, knowledge-based training with no easy method of personalization or delivery of skill-based training. The PHANTOM project, headed by Kings College London is developing haptic-based virtual reality training systems for clinical dental training. ANDROMEDA seeks to build on this and establish a Flexible Learning Platform that can integrate the haptic and sensor based training with rich media knowledge transfer, whilst using sophisticated technologies such as including service-orientated architecture (SOA), Semantic Web technologies, knowledge-based engineering, business intelligence (BI) and virtual worlds for personalization.

  15. Social Networking Media: An Approach for the Teaching of International Business

    Science.gov (United States)

    Barczyk, Casimir C.; Duncan, Doris G.

    2012-01-01

    Internet technology and Web 2.0 applications have enabled social networking media to expand in ways that link people globally. By fostering communication, social networks hold immense potential for the enhancement of teaching, especially in the business arena. This article defines social networking and provides a framework for understanding the…

  16. The Effect of Information Access Strategy on Power Consumption and Reliability in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    This paper examines the effect of different information access strategies on power consumption and information reliability, considering the wireless sensor network as the source of information. Basically, the paper explores three different access strategies, namely; reactive, periodic and hybrid...

  17. Switched-based interference reduction scheme for open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh; Alouini, Mohamed-Slim

    2012-01-01

    coordination between access points is infeasible. This paper targets interference management in such overlaid networks. It is assumed that the femtocells employ the open-access strategy to reduce cross-tier interference, and can share resources concurrently

  18. Failure Analysis of Network Based Accessible Pedestrian Signals in Closed-Loop Operation

    Science.gov (United States)

    2011-03-01

    The potential failure modes of a network based accessible pedestrian system were analyzed to determine the limitations and benefits of closed-loop operation. The vulnerabilities of the system are accessed using the industry standard process known as ...

  19. Social Media for Professional Development and Networking Opportunities in Academia

    Science.gov (United States)

    Donelan, Helen

    2016-01-01

    The research reported on in this article explores the use of social media for work-related or professional purposes. In particular, it focuses on the perceptions and use of social media by academics in the UK. The purpose of the research was to explore the potential social media has to facilitate the changing landscape of higher education and…

  20. Coordinated scheduling for the downlink of cloud radio-access networks

    KAUST Repository

    Douik, Ahmed S.; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    This paper addresses the coordinated scheduling problem in cloud-enabled networks. Consider the downlink of a cloud-radio access network (CRAN), where the cloud is only responsible for the scheduling policy and the synchronization of the transmit

  1. Voice over LTE via Generic access (Volga) as a possible solution of mobile networks transformation

    OpenAIRE

    Stepaniuk, Oleg

    2010-01-01

    This paper is focused on Voice over LTE via Generic Access Network, which concept is to connect the already existing Mobile Switching Centers to the LTE network via a gateway supporting 2G or 3G voice environment.

  2. Integration of QoS provisioning in home and access networks

    DEFF Research Database (Denmark)

    Popov, Mikhail; Gavler, A.; Sköldström, P.

    2010-01-01

    Approaches for QoS provisioning using UPnP for home networks and GMPLS for access networks are described. A solution for interworking the UPnP and the GMPLS at the residential gateway is proposed.......Approaches for QoS provisioning using UPnP for home networks and GMPLS for access networks are described. A solution for interworking the UPnP and the GMPLS at the residential gateway is proposed....

  3. The New Digital Media Value Network: Proposing an Interactive Model of Digital Media Value Activities

    Directory of Open Access Journals (Sweden)

    Sylvia Chan-Olmsted

    2016-07-01

    Full Text Available This study models the dynamic nature of today’s media markets using the framework of value-adding activities in the provision and consumption of media products. The proposed user-centric approach introduces the notion that the actions of external users, social media, and interfaces affect the internal value activities of media firms via a feedback loop, and therefore should themselves be considered value activities. The model also suggests a more comprehensive list of indicators for value assessment.

  4. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  5. Analyzing Social Media and Learning through Content and Social Network Analysis: A Faceted Methodological Approach

    Science.gov (United States)

    Gruzd, Anatoliy; Paulin, Drew; Haythornthwaite, Caroline

    2016-01-01

    In just a short period, social media have altered many aspects of our daily lives, from how we form and maintain social relationships to how we discover, access, and share information online. Now social media are also affecting how we teach and learn. In this paper, we discuss methods that can help researchers and educators evaluate and understand…

  6. Access pricing for transmission networks: Hypotheses and empirical evidence

    Energy Technology Data Exchange (ETDEWEB)

    Martoccia, Maria [Decision Technology Centre, London (United Kingdom)

    1999-08-01

    The sectors characterised by the use of transmission or transport networks as inputs of production (electricity, gas, telecommunications) have long been considered as natural monopolies. Thanks to the technological innovations which have modified the economics of production (as in electricity generation) or that have driven the development of high value added services (as in telecommunications), the boundaries of the old natural monopolies have been eroded by the presence of operators potentially able to compete in national and international markets. The objective is to delineate, by analysing the more significant theoretical contributions and some of the restructuring experiences of the sector in question, the possible regulatory solutions which, in the perspective of a `European market` for electricity, makes the management and the expansion of the transmission networks adequate for the `open access` of national electricity sectors. The analysis of some mature experiences, such as in Chile, Argentina, the UK and Norway, in the second section, will offer a useful support to this evaluation. The regulatory solution here adopted will be analysed, in particular, with reference to the two main problems outlined above: on the one hand, the problem of providing through prices the necessary information about the opportunities of using the transmission assets; and on the other hand, the problem of defining an efficient incentive mechanism for the behaviour of the monopolist (the owner of the transmission assets). Finally, by considering the limits found in the solutions explored in these models, we will try, in the third section, to delineate the evolution that the regulation of the analysed sectors could follow, in an attempt to make the optimal solution defined in the first section consistent with the imperfections of the real scenarios. (EHS)

  7. The influence of repressive legislation on the structure of a social media network

    OpenAIRE

    Marcoux, Marianne; Lusseau, David

    2013-01-01

    Social media have been widely used to organize citizen movements. In 2012, 75% university and college students in Quebec, Canada, participated in mass protests against an increase in tuition fees, mainly organized using social media. To reduce public disruption, the government introduced special legislation designed to impede protest organization. Here, we show that the legislation changed the behaviour of social media users but not the overall structure of their social network on Twitter. Th...

  8. Effects Of Social Networking Sites (SNSs) On Hyper Media Computer Mediated Environments (HCMEs)

    OpenAIRE

    Yoon C. Cho

    2011-01-01

    Social Networking Sites (SNSs) are known as tools to interact and build relationships between users/customers in Hyper Media Computer Mediated Environments (HCMEs). This study explored how social networking sites play a significant role in communication between users. While numerous researchers examined the effectiveness of social networking websites, few studies investigated which factors affected customers attitudes and behavior toward social networking sites. In this paper, the authors inv...

  9. Brand interactions and social media: enhancing user loyalty through social networking sites

    OpenAIRE

    Nisar, T.M.; Whitehead, C.

    2016-01-01

    This paper aims to investigate how user loyalty can be achieved and maintained through social networking sites. More specifically, we intend to test the relationships between brands, user loyalty and social media. The research thus provides insights into user-brand relationships through social media and argues how loyal customers can be through social networking websites. Although there are considerable numbers of studies about loyalty; there exists very limited work studying user loyalty thr...

  10. Breaking news dissemination in the media via propagation behavior based on complex network theory

    Science.gov (United States)

    Liu, Nairong; An, Haizhong; Gao, Xiangyun; Li, Huajiao; Hao, Xiaoqing

    2016-07-01

    The diffusion of breaking news largely relies on propagation behaviors in the media. The tremendous and intricate propagation relationships in the media form a complex network. An improved understanding of breaking news diffusion characteristics can be obtained through the complex network research. Drawing on the news data of Bohai Gulf oil spill event from June 2011 to May 2014, we constructed a weighted and directed complex network in which media are set as nodes, the propagation relationships as edges and the propagation times as the weight of the edges. The primary results show (1) the propagation network presents small world feature, which means relations among media are close and breaking news originating from any node can spread rapidly; (2) traditional media and official websites are the typical sources for news propagation, while business portals are news collectors and spreaders; (3) the propagation network is assortative and the group of core media facilities the spread of breaking news faster; (4) for online media, news originality factor become less important to propagation behaviors. This study offers a new insight to explore information dissemination from the perspective of statistical physics and is beneficial for utilizing the public opinion in a positive way.

  11. Enhancing Access to Land Remote Sensing Data through Mainstream Social Media Channels

    Science.gov (United States)

    Sohre, T.; Maiersperger, T.

    2011-12-01

    Social media tools are changing the way that people discover information, communicate, and collaborate. Government agencies supporting the Land Remote Sensing user community have begun taking advantage of standard social media tools and capabilities. National Aeronautics and Space Administration (NASA) Earth Observing System (EOS) data centers have started providing outreach utilizing services including Facebook, Twitter, and YouTube videos. Really Simple Syndication (RSS) Feeds have become more standard means of sharing information, and a DataCasting tool was created as a NASA Technology Infusion effort to make RSS-based technology for accessing Earth Science information available. The United States Geological Survey (USGS) has also started using social media to allow the community access to news feeds and real-time earthquake alerts; listen to podcasts; get updates on new USGS publications, videos, and photographs; and more. Twitter feeds have been implemented in 2011 for the USGS Land Cover and Landsat user communities. In early 2011, the NASA Land Processes Distributed Active Archive Center (LP DAAC) user working group suggested the investigation of concepts for creating and distributing "bundles" of data, which would aggregate theme-based data sets from multiple sources. The LP DAAC is planning to explore the use of standard social bookmarking tools to support community developed bundles through the use of tools such as Delicious, Digg, or StumbleUpon. This concept would allow science users to organize and discover common links to data resources based on community developed tags, or a folksonomy. There are challenges that will need to be addressed such as maintaining the quality of tags but a social bookmarking system may have advantages over traditional search engines or formal ontologies for identifying and labeling various data sets relevant to a theme. As classification is done by the community of scientists who understand the data, the tagged data sets

  12. Design of Active Queue Management for Robust Control on Access Router for Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Åhlund Christer

    2011-01-01

    Full Text Available The Internet architecture is a packet switching technology that allows dynamic sharing of bandwidth among different flows with in an IP network. Packets are stored and forwarded from one node to the next until reaching their destination. Major issues in this integration are congestion control and how to meet different quality of service requirements associated with various services. In other words streaming media quality degrades with increased packet delay and jitter caused by network congestion. To mitigate the impact of network congestion, various techniques have been used to improve multimedia quality and one of those techniques is Active Queue Management (AQM. Access routers require a buffer to hold packets during times of congestion. A large buffer can absorb the bursty arrivals, and this tends to increase the link utilizations but results in higher queuing delays. Traffic burstiness has a considerable negative impact on network performance. AQM is now considered an effective congestion control mechanism for enhancing transport protocol performance over wireless links. In order to have good link utilization, it is necessary for queues to adapt to varying traffic loads. This paper considers a particular scheme which is called Adaptive AQM (AAQM and studies its performance in the presence of feedback delays and its ability to maintain a small queue length as well as its robustness in the presence of traffic burstiness. The paper also presents a method based on the well-known Markov Modulated Poisson Process (MPP to capture traffic burstiness and buffer occupancy. To demonstrate the generality of the presented method, an analytic model is described and verified by extensive simulations of different adaptive AQM algorithms. The analysis and simulations show that AAQM outperforms the other AQMs with respect to responsiveness and robustness.

  13. Quantitative analysis of access strategies to remote information in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach in...

  14. Energy Efficiency in TDMA-Based Next-Generation Passive Optical Access Networks

    KAUST Repository

    Dhaini, Ahmad R.; Ho, Pin-Han; Shen, Gangxiang; Shihada, Basem

    2014-01-01

    Next-generation passive optical network (PON) has been considered in the past few years as a cost-effective broadband access technology. With the ever-increasing power saving concern, energy efficiency has been an important issue in its operations. In this paper, we propose a novel sleep-time sizing and scheduling framework for the implementation of green bandwidth allocation (GBA) in TDMA-PONs. The proposed framework leverages the batch-mode transmission feature of GBA to minimize the overhead due to frequent ONU on-off transitions. The optimal sleeping time sequence of each ONU is determined in every cycle without violating the maximum delay requirement. With multiple ONUs possibly accessing the shared media simultaneously, a collision may occur. To address this problem, we propose a new sleep-time sizing mechanism, namely Sort-And-Shift (SAS), in which the ONUs are sorted according to their expected transmission start times, and their sleep times are shifted to resolve any possible collision while ensuring maximum energy saving. Results show the effectiveness of the proposed framework and highlight the merits of our solutions.

  15. Energy Efficiency in TDMA-Based Next-Generation Passive Optical Access Networks

    KAUST Repository

    Dhaini, Ahmad R.

    2014-06-01

    Next-generation passive optical network (PON) has been considered in the past few years as a cost-effective broadband access technology. With the ever-increasing power saving concern, energy efficiency has been an important issue in its operations. In this paper, we propose a novel sleep-time sizing and scheduling framework for the implementation of green bandwidth allocation (GBA) in TDMA-PONs. The proposed framework leverages the batch-mode transmission feature of GBA to minimize the overhead due to frequent ONU on-off transitions. The optimal sleeping time sequence of each ONU is determined in every cycle without violating the maximum delay requirement. With multiple ONUs possibly accessing the shared media simultaneously, a collision may occur. To address this problem, we propose a new sleep-time sizing mechanism, namely Sort-And-Shift (SAS), in which the ONUs are sorted according to their expected transmission start times, and their sleep times are shifted to resolve any possible collision while ensuring maximum energy saving. Results show the effectiveness of the proposed framework and highlight the merits of our solutions.

  16. Hierarchical micro-mobility management in high-speed multihop access networks

    Institute of Scientific and Technical Information of China (English)

    TANG Bi-hua; MA Xiao-lei; LIU Yuan-an; GAO Jin-chun

    2006-01-01

    This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access routers. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access router (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility management scheme can achieve high packet delivery fraction and improve the lifetime of network.

  17. Tensions between Individual Use and Network Adoption of Social Media Platforms

    DEFF Research Database (Denmark)

    Srinivasan, Nikhil; Damsgaard, Jan

    2013-01-01

    Social media have diffused into the everyday lives of many but still pose challenges to individuals regarding use of these platforms. This paper explores the multiple manners in which social media platforms gets employed by individuals based on an examination of 4 vignettes generated...... by interviewing individuals within a university context. An analysis of the vignettes and individual use behaviors highlights the tension between network-based adoption of social media platforms and the constraints that the network places on individual use of the platform....

  18. Access regulation in the next generation access network environment: A comparative study of Hong Kong and Singapore from the transaction cost economics perspectives

    OpenAIRE

    Ho, Au Man

    2012-01-01

    Hong Kong and Singapore have adopted two different models in the regulation of the next generation access (NGA) networks. In Hong Kong, the government has decided that access regulation will not be applied to fibre-based access networks and its strategy will be to rely on facilities-based competition to promote investment in the NGA networks. Singapore, on the other hand, has promoted access/services-based competition over a next generation broadband infrastructure subsidised by public fundin...

  19. Cell Deployment Optimization for Cloud Radio Access Networks using Teletraffic Theory

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Christiansen, Henrik Lehrmann; Iversen, Villy Bæk

    2015-01-01

    Cloud Radio Access Network (C-RAN) is a new mobile radio access network design based on centralized and pooled processing. It offers potential cost savings by utilizing the so-called tidal effect due to user mobility in cellular networks. This paper provides a quantitative analysis...... to dynamically re-assign cells to a pool of baseband units. The re-assignment is based on the cell load and traffic characteristics such that effective utilization of the baseband resources is assured....

  20. Formal Specification and Validation of Secure Connection Establishment in a Generic Access Network Scenario

    DEFF Research Database (Denmark)

    Fleischer, Paul; Kristensen, Lars Michael

    2008-01-01

    The Generic Access Network (GAN) architecture is defined by the 3rd Generation Partnership Project (3GPP), and allows telephone services, such as SMS and voice-calls, to be accessed via generic IP networks. The main usage of this is to allow mobile phones to use WiFi in addition to the usual GSM...... network. The GAN specification relies on the Internet Protocol Security layer (IPSec) and the Internet Key Exchange protocol (IKEv2) to provide encryption across IP networks, and thus avoid compromising the security of the telephone networks. The detailed usage of these two Internet protocols (IPSec...

  1. Labeling Actors and Uncovering Causal Accounts of Their States in Social Networks and Social Media

    Science.gov (United States)

    Bui, Ngot P.

    2016-01-01

    The emergence of social networks and social media has resulted in exponential increase in the amount of data that link diverse types of richly structured digital objects e.g., individuals, articles, images, videos, music, etc. Such data are naturally represented as heterogeneous networks with multiple types of objects e.g., actors, video,…

  2. Stochastic geometry model for multi-channel fog radio access networks

    KAUST Repository

    Emara, Mostafa; Elsawy, Hesham; Sorour, Sameh; Al-Ghadhban, Samir; Alouini, Mohamed-Slim; Al-Naffouri, Tareq Y.

    2017-01-01

    Cache-enabled base station (BS) densification, denoted as a fog radio access network (F-RAN), is foreseen as a key component of 5G cellular networks. F-RAN enables storing popular files at the network edge (i.e., BS caches), which empowers local

  3. Design Aspects of An Energy-Efficient, Lightweight Medium Access Control Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2006-01-01

    This document gives an overview of the most relevant design aspects of the lightweight medium access control (LMAC) protocol [16] for wireless sensor networks (WSNs). These aspects include selfconfiguring and localized operation of the protocol, time synchronization in multi-hop networks, network

  4. Models for QoS-Aware Capacity Management in Cable Access Networks

    NARCIS (Netherlands)

    Attema, T.; van den Berg, Hans Leo; Kempker, P.C.; Worm, D.; van der Vliet-Hameeteman, C.

    In this article, mathematical models are presented that “map‿ measured or predicted network utilisations to user throughputs for given network configurations (segment capacity, subscription speeds etc.). They provide valuable insights into the user experience in cable access networks. The models,

  5. Self-management for unified heterogeneous radio access networks

    NARCIS (Netherlands)

    Litjens, R.; Gunnarsson, F.; Sayrac, B.; Spaey, K.; Willcock, C.; Eisenblätter, A.; Rodríguez, B.G.; Kürner, T.

    2013-01-01

    The development of self-management solutions for (multi-technology, multi-layer) mobile communication networks is driven by their increasing operational complexity. Initial stand-alone SON (Self-Organizing Networks) solutions are already available, but are not sufficient to handle the networks of

  6. An investigation into possibilities for implementation of a virtual community of practice delivered via a mobile social network for rural community media in the Eastern Cape, South Africa

    Directory of Open Access Journals (Sweden)

    Oliva Muwanga-Zake

    2017-03-01

    Full Text Available Background: The purpose of this article is to provide an overview of how a virtual community of practice can be delivered via a mobile social networking framework to support rural community media in the Eastern Cape Province of South Africa. Objectives: The article presents the results of a study conducted to ascertain the possibilities of utilising mobile social networking as a means to provide access to required information and knowledge to rural community media through creation of a virtual community of practice. Improving the operational effectiveness of rural community media as a component of the rural community communication process would serve to improve the entire rural community communication process as well, making them more effective tools for availing relevant news and information to rural communities and reflecting the realities of rural communities to their broader environment. Method: The study was conducted on rural community media small micro and medium enterprises (SMMEs in the Eastern Cape Province of South Africa. The study applied an interpretive research philosophy, qualitative research design and multiple–case study approach. Primary data were collected through semi-structured interviews supported by a questionnaire, with secondary data collected via literature review, observation and documentation analysis. Results: Findings were that rural community media do make use of social media and mobile devices in operating their business, require access to generic and domain specific support services and actively engage their peers and stakeholders in this respect, although no formalised structure existed. The authors’ recommendation is to create a formalised virtual community of practice through the establishment of a mobile social network. Conclusion: Because of the fact that rural community SMMEs already utilise mobile devices and social media to operate their businesses, development of a solution based on a mobile social

  7. How Researchers Use Social Media to Promote their Research and Network with Industry

    Directory of Open Access Journals (Sweden)

    Päivi Jaring

    2017-08-01

    Full Text Available Social media is now an essential information and interaction channel. Companies advertise and sell their products and services through social media, but this channel has not been so commonly applied to the task of selling knowledge and research work. This article studies the use of social media by researchers to promote their research and network with product developers in industry, and it presents a model of the use of social media by researchers. The data for this research was obtained by interviewing individual researchers of a research organization and surveying product developers from industry. The findings show that social media is seen as a good source of new information and contacts, and it is suitable for promoting awareness of research services and results. The results show that the speed and intensity of social media present challenges for researchers, but by being active in posting content and participating in discussions, researchers can derive benefits and enhance their personal reputations.

  8. Allocation of spectral and spatial modes in multidimensional metro-access optical networks

    Science.gov (United States)

    Gao, Wenbo; Cvijetic, Milorad

    2018-04-01

    Introduction of spatial division multiplexing (SDM) has added a new dimension in an effort to increase optical fiber channel capacity. At the same time, it can also be explored as an advanced optical networking tool. In this paper, we have investigated the resource allocation to end-users in multidimensional networking structure with plurality of spectral and spatial modes actively deployed in different networking segments. This presents a more comprehensive method as compared to the common practice where the segments of optical network are analyzed independently since the interaction between network hierarchies is included into consideration. We explored the possible transparency from the metro/core network to the optical access network, analyzed the potential bottlenecks from the network architecture perspective, and identified an optimized network structure. In our considerations, the viability of optical grooming through the entire hierarchical all-optical network is investigated by evaluating the effective utilization and spectral efficiency of the network architecture.

  9. Hierarchy Bayesian model based services awareness of high-speed optical access networks

    Science.gov (United States)

    Bai, Hui-feng

    2018-03-01

    As the speed of optical access networks soars with ever increasing multiple services, the service-supporting ability of optical access networks suffers greatly from the shortage of service awareness. Aiming to solve this problem, a hierarchy Bayesian model based services awareness mechanism is proposed for high-speed optical access networks. This approach builds a so-called hierarchy Bayesian model, according to the structure of typical optical access networks. Moreover, the proposed scheme is able to conduct simple services awareness operation in each optical network unit (ONU) and to perform complex services awareness from the whole view of system in optical line terminal (OLT). Simulation results show that the proposed scheme is able to achieve better quality of services (QoS), in terms of packet loss rate and time delay.

  10. Forecasting influenza-like illness dynamics for military populations using neural networks and social media.

    Directory of Open Access Journals (Sweden)

    Svitlana Volkova

    Full Text Available This work is the first to take advantage of recurrent neural networks to predict influenza-like illness (ILI dynamics from various linguistic signals extracted from social media data. Unlike other approaches that rely on timeseries analysis of historical ILI data and the state-of-the-art machine learning models, we build and evaluate the predictive power of neural network architectures based on Long Short Term Memory (LSTMs units capable of nowcasting (predicting in "real-time" and forecasting (predicting the future ILI dynamics in the 2011 - 2014 influenza seasons. To build our models we integrate information people post in social media e.g., topics, embeddings, word ngrams, stylistic patterns, and communication behavior using hashtags and mentions. We then quantitatively evaluate the predictive power of different social media signals and contrast the performance of the-state-of-the-art regression models with neural networks using a diverse set of evaluation metrics. Finally, we combine ILI and social media signals to build a joint neural network model for ILI dynamics prediction. Unlike the majority of the existing work, we specifically focus on developing models for local rather than national ILI surveillance, specifically for military rather than general populations in 26 U.S. and six international locations., and analyze how model performance depends on the amount of social media data available per location. Our approach demonstrates several advantages: (a Neural network architectures that rely on LSTM units trained on social media data yield the best performance compared to previously used regression models. (b Previously under-explored language and communication behavior features are more predictive of ILI dynamics than stylistic and topic signals expressed in social media. (c Neural network models learned exclusively from social media signals yield comparable or better performance to the models learned from ILI historical data, thus

  11. Forecasting influenza-like illness dynamics for military populations using neural networks and social media.

    Science.gov (United States)

    Volkova, Svitlana; Ayton, Ellyn; Porterfield, Katherine; Corley, Courtney D

    2017-01-01

    This work is the first to take advantage of recurrent neural networks to predict influenza-like illness (ILI) dynamics from various linguistic signals extracted from social media data. Unlike other approaches that rely on timeseries analysis of historical ILI data and the state-of-the-art machine learning models, we build and evaluate the predictive power of neural network architectures based on Long Short Term Memory (LSTMs) units capable of nowcasting (predicting in "real-time") and forecasting (predicting the future) ILI dynamics in the 2011 - 2014 influenza seasons. To build our models we integrate information people post in social media e.g., topics, embeddings, word ngrams, stylistic patterns, and communication behavior using hashtags and mentions. We then quantitatively evaluate the predictive power of different social media signals and contrast the performance of the-state-of-the-art regression models with neural networks using a diverse set of evaluation metrics. Finally, we combine ILI and social media signals to build a joint neural network model for ILI dynamics prediction. Unlike the majority of the existing work, we specifically focus on developing models for local rather than national ILI surveillance, specifically for military rather than general populations in 26 U.S. and six international locations., and analyze how model performance depends on the amount of social media data available per location. Our approach demonstrates several advantages: (a) Neural network architectures that rely on LSTM units trained on social media data yield the best performance compared to previously used regression models. (b) Previously under-explored language and communication behavior features are more predictive of ILI dynamics than stylistic and topic signals expressed in social media. (c) Neural network models learned exclusively from social media signals yield comparable or better performance to the models learned from ILI historical data, thus, signals from

  12. Small media, big network: alternative media and social movements on the internet

    OpenAIRE

    O'Donnell, Susan

    2000-01-01

    This thesis explores alternative media on the Internet by drawing on a range of theoretical literatures - particularly in the areas of the public sphere, social movements and globalisation. Parallel to this theoretical exploration, a significant body of published research is reviewed on Internet use by social movements and groups in global, national, and local contexts. From this review and analysis, an original conceptual framework for analysing alternative media on the Internet is developed...

  13. Algorithmic PON/P2P FTTH Access Network Design for CAPEX Minimization

    DEFF Research Database (Denmark)

    Papaefthimiou, Kostantinos; Tefera, Yonas; Mihylov, Dimitar

    2013-01-01

    one. It provides an obvious advantage for the end users in terms of high achievable data rates. On the other hand, the high initial deployment cost required exists as the heaviest impediment. The main goal of this paper is to study different approaches when designing a fiber access network. More......Due to the emergence of high bandwidth-requiring services, telecommunication operators (telcos) are called to upgrade their fixed access network. In order to keep up with the competition, they must consider different optical access network solutions with Fiber To The Home (FTTH) as the prevailing...

  14. Status of Utilizing Social Media Networks in the Teaching-Learning Process at Public Jordanian Universities

    Directory of Open Access Journals (Sweden)

    Muneera Abdalkareem Alshdefait

    2018-03-01

    Full Text Available This study aimed at finding out the status of utilizing social media networks in the teaching-learning process at public Jordanian Universities. To achieve the goal of the study, the descriptive developmental method was used and a questionnaire was developed, consisting of (35 statements. The questionnaire was checked for its validity and reliability. Then it was distributed to a sample of (382 male and female students from the undergraduate and graduate levels. The study results showed that the participants gave a low score to the status of utilizing social media networks in the teaching-learning process at public Jordanian universities. The results also showed that there were statistically significant differences between the participants of the study according to the academic rank attributed to the graduate students, and according to gender attributed to male students at the instrument macro level and on all dimensions of the two variables. In light of these results, the study recommended that public universities should utilize modern technology in the educational process, urge and encourage the teaching staff members to use the social media networks in the teaching-learning process and raise the students' awareness about the benefits of using social media networks. Keywords: Social media networks, Teaching-learning process, Public Jordanian Universities

  15. Design mobile satellite system architecture as an integral part of the cellular access digital network

    Science.gov (United States)

    Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.

    1988-01-01

    The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.

  16. User recommendation in healthcare social media by assessing user similarity in heterogeneous network.

    Science.gov (United States)

    Jiang, Ling; Yang, Christopher C

    2017-09-01

    The rapid growth of online health social websites has captured a vast amount of healthcare information and made the information easy to access for health consumers. E-patients often use these social websites for informational and emotional support. However, health consumers could be easily overwhelmed by the overloaded information. Healthcare information searching can be very difficult for consumers, not to mention most of them are not skilled information searcher. In this work, we investigate the approaches for measuring user similarity in online health social websites. By recommending similar users to consumers, we can help them to seek informational and emotional support in a more efficient way. We propose to represent the healthcare social media data as a heterogeneous healthcare information network and introduce the local and global structural approaches for measuring user similarity in a heterogeneous network. We compare the proposed structural approaches with the content-based approach. Experiments were conducted on a dataset collected from a popular online health social website, and the results showed that content-based approach performed better for inactive users, while structural approaches performed better for active users. Moreover, global structural approach outperformed local structural approach for all user groups. In addition, we conducted experiments on local and global structural approaches using different weight schemas for the edges in the network. Leverage performed the best for both local and global approaches. Finally, we integrated different approaches and demonstrated that hybrid method yielded better performance than the individual approach. The results indicate that content-based methods can effectively capture the similarity of inactive users who usually have focused interests, while structural methods can achieve better performance when rich structural information is available. Local structural approach only considers direct connections

  17. The Design of Passive Optical Networking+Ethernet over Coaxial Cable Access Networking and Video-on-Demand Services Carrying

    Science.gov (United States)

    Ji, Wei

    2013-07-01

    Video on demand is a very attractive service used for entertainment, education, and other purposes. The design of passive optical networking+Ethernet over coaxial cable accessing and a home gateway system is proposed. The network integrates the passive optical networking and Ethernet over coaxial cable to provide high dedicated bandwidth for the metropolitan video-on-demand services. Using digital video broadcasting, IP television protocol, unicasting, and broadcasting mechanisms maximizes the system throughput. The home gateway finishes radio frequency signal receiving and provides three kinds of interfaces for high-definition video, voice, and data, which achieves triple-play and wire/wireless access synchronously.

  18. Caching and Network Coding for Smart Radio Access

    NARCIS (Netherlands)

    Serbetci, Berksan

    2018-01-01

    The current generation has undoubtedly been witnessing a revolution of wireless network technologies in recent decades. First of all, there has been an enormous growth of wireless user equipments and network infrastructures in terms of both number and variety. Moreover, data traffic over wireless

  19. Enhancing Sensing and Channel Access in Cognitive Radio Networks

    KAUST Repository

    Hamza, Doha R.

    2014-01-01

    relaying is employed as an incentive for the primary network. The scheme is shown to outperform a number of reference schemes such as best relay selection. Finally, we consider a network of multiple primary and secondary users. We propose a three

  20. Social media in the mentorship and networking of physicians: Important role for women in surgical specialties.

    Science.gov (United States)

    Luc, Jessica G Y; Stamp, Nikki L; Antonoff, Mara B

    2018-04-01

    Social media may be a useful supplement to physician and trainee interactions; however, its role in enhancing mentorship has not been described. A 35-item survey investigating trainee and physician social media use was distributed. Responses were analyzed using descriptive statistics. 282 respondents completed the survey, among whom 136 (48.2%) reported careers in surgical specialties. Women in surgical specialties were more likely to describe the specialty as being dominated by the opposite sex (p media to build a network of same-sex mentorship (p = 0.031). Social media serves as a valuable tool to enhance the networking and mentorship of surgeons, particularly for women in surgical specialties who may lack exposure to same-sex mentors at their own institution. Copyright © 2018 Elsevier Inc. All rights reserved.

  1. A Context-Aware Adaptive Streaming Media Distribution System in a Heterogeneous Network with Multiple Terminals

    Directory of Open Access Journals (Sweden)

    Yepeng Ni

    2016-01-01

    Full Text Available We consider the problem of streaming media transmission in a heterogeneous network from a multisource server to home multiple terminals. In wired network, the transmission performance is limited by network state (e.g., the bandwidth variation, jitter, and packet loss. In wireless network, the multiple user terminals can cause bandwidth competition. Thus, the streaming media distribution in a heterogeneous network becomes a severe challenge which is critical for QoS guarantee. In this paper, we propose a context-aware adaptive streaming media distribution system (CAASS, which implements the context-aware module to perceive the environment parameters and use the strategy analysis (SA module to deduce the most suitable service level. This approach is able to improve the video quality for guarantying streaming QoS. We formulate the optimization problem of QoS relationship with the environment parameters based on the QoS testing algorithm for IPTV in ITU-T G.1070. We evaluate the performance of the proposed CAASS through 12 types of experimental environments using a prototype system. Experimental results show that CAASS can dynamically adjust the service level according to the environment variation (e.g., network state and terminal performances and outperforms the existing streaming approaches in adaptive streaming media distribution according to peak signal-to-noise ratio (PSNR.

  2. Power, surveillance and digital network media in organizations

    DEFF Research Database (Denmark)

    Tække, Jesper

    With the focus on organizations, this article describes power in relation to mediated surveillance using Luhmann’s systems theory, poststructuralist theory and theory of media sociography. It aims to sketch out the main issues in contemporary surveillance discourse and illustrate the current...

  3. Access Denied: Ending the Exclusion of Disabled Students from Media Production Courses in Higher Education

    Science.gov (United States)

    Cubbage, Jayne

    2017-01-01

    As the acceptance of media literacy increases among educators, media producers and consumers, one group is often missing from the dialogue--persons with disabilities. This absence is witnessed in the marginalized media depictions of the disabled. To gain entry into the media professions, some form of higher education is required. Using muted group…

  4. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    Science.gov (United States)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  5. A Comparative Analysis of Social Media Marketing by Transportation Network Companies in the Sharing Economy

    OpenAIRE

    Heymans, Alice

    2017-01-01

    The sharing economy is a new business model rapidly expanding. In transportation, many people use innovative services proposed by ride-hailing mobile applications. These technological platforms, operated by networking companies, rely extensively on social media to promote their services, and reach new customers (riders) and providers (drivers). This dissertation focuses on e-marketing communication. It makes a comparative analysis of the information published on several social media (Facebook...

  6. Identifying the new Influencers in the Internet Era: Social Media and Social Network Analysis

    Directory of Open Access Journals (Sweden)

    MIGUEL DEL FRESNO GARCÍA

    2016-01-01

    Full Text Available Social media influencers (SMIs can be defined as a new type of independent actor who are able to shape audience attitudes through the use of social media channels in competition and coexistence with professional media. Being able to accurately identify SMIs is critical no matter what is being transmitted in a social system. Social Network Analysis (SNA has been recognized as a powerful tool for representing social network structures and information dissemination. SMIs can be identifi ed by their high-ranking position in a network as the most important or central nodes. The results reveal the existence of three different typologies of SMIs: disseminator, engager and leader. This methodology permits the optimization of resources to create effective online communication strategies.

  7. New mothers and media use: associations between blogging, social networking, and maternal well-being.

    Science.gov (United States)

    McDaniel, Brandon T; Coyne, Sarah M; Holmes, Erin K

    2012-10-01

    Drawing on Bronfenbrenner's ecological theory and prior empirical research, the current study examines the way that blogging and social networking may impact feelings of connection and social support, which in turn could impact maternal well-being (e.g., marital functioning, parenting stress, and depression). One hundred and fifty-seven new mothers reported on their media use and various well-being variables. On average, mothers were 27 years old (SD = 5.15) and infants were 7.90 months old (SD = 5.21). All mothers had access to the Internet in their home. New mothers spent approximately 3 hours on the computer each day, with most of this time spent on the Internet. Findings suggested that frequency of blogging predicted feelings of connection to extended family and friends which then predicted perceptions of social support. This in turn predicted maternal well-being, as measured by marital satisfaction, couple conflict, parenting stress, and depression. In sum, blogging may improve new mothers' well-being, as they feel more connected to the world outside their home through the Internet.

  8. Simulation and measurement of optical access network with different types of optical-fiber amplifiers

    Science.gov (United States)

    Latal, Jan; Vogl, Jan; Koudelka, Petr; Vitasek, Jan; Siska, Petr; Liner, Andrej; Papes, Martin; Vasinek, Vladimir

    2012-01-01

    The optical access networks are nowadays swiftly developing in the telecommunications field. These networks can provide higher data transfer rates, and have great potential to the future in terms of transmission possibilities. Many local internet providers responded to these facts and began gradually installing optical access networks into their originally built networks, mostly based on wireless communication. This allowed enlargement of possibilities for end-users in terms of high data rates and also new services such as Triple play, IPTV (Internet Protocol television) etc. However, with this expansion and building-up is also related the potential of reach in case of these networks. Big cities, such as Prague, Brno, Ostrava or Olomouc cannot be simply covered, because of their sizes and also because of their internal regulations given by various organizations in each city. Standard logical and also physical reach of EPON (IEEE 802.3ah - Ethernet Passive Optical Network) optical access network is about 20 km. However, for networks based on Wavelength Division Multiplex the reach can be up to 80 km, if the optical-fiber amplifier is inserted into the network. This article deals with simulation of different types of amplifiers for WDM-PON (Wavelength Division Multiplexing-Passive Optical Network) network in software application Optiwave OptiSystem and than are the values from the application and from real measurement compared.

  9. African Copyright and Access to Knowledge Network (ACA2K ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... copyright climate could limit access to knowledge goods and thereby hinder ... Congratulations to the first cohort of Women in Climate Change Science Fellows! ... International Water Resources Association, in close collaboration with IDRC, ...

  10. On the Impact of Closed Access and Users Identities in Spectrum-Shared Overlaid Wireless Networks

    KAUST Repository

    Radaydeh, Redha M.; Gaaloul, Fakhreddine; Alouini, Mohamed-Slim

    2016-01-01

    © 2015 IEEE. This paper develops analytical models to investigate the impact of various operation terms and parameters on the downlink performance of spectrum-shared overlaid networks under closed-access small cells deployment. It is considered

  11. Impact of Users Identities and Access Conditions on Downlink Performance in Closed Small-Cell Networks

    KAUST Repository

    Radaydeh, Redha; Gaaloul, Fakhreddine; Alouini, Mohamed-Slim

    2015-01-01

    This paper investigates the effect of various operation parameters on the downlink user performance in overlaid small-cell networks. The case study considers closed-access small cells (e.g., femtocells), wherein only active authorized user

  12. Low-Complexity Scheduling and Power Adaptation for Coordinated Cloud-Radio Access Networks

    KAUST Repository

    Douik, Ahmed; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    In practical wireless systems, the successful implementation of resource allocation techniques strongly depends on the algorithmic complexity. Consider a cloud-radio access network (CRAN), where the central cloud is responsible for scheduling

  13. Resource allocation in heterogeneous cloud radio access networks: advances and challenges

    KAUST Repository

    Dahrouj, Hayssam; Douik, Ahmed S.; Dhifallah, Oussama Najeeb; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    , becomes a necessity. By connecting all the base stations from different tiers to a central processor (referred to as the cloud) through wire/wireline backhaul links, the heterogeneous cloud radio access network, H-CRAN, provides an open, simple

  14. Impacts on the Voltage Profile of DC Distribution Network with DG Access

    Science.gov (United States)

    Tu, J. J.; Yin, Z. D.

    2017-07-01

    With the development of electronic, more and more distributed generations (DGs) access into grid and cause the research fever of direct current (DC) distribution network. Considering distributed generation (DG) location and capacity have great impacts on voltage profile, so use IEEE9 and IEEE33 typical circuit as examples, with DGs access in centralized and decentralized mode, to compare voltage profile in alternating and direct current (AC/DC) distribution network. Introducing the voltage change ratio as an evaluation index, so gets the general results on voltage profile of DC distributed network with DG access. Simulation shows that, in the premise of reasonable location and capacity, DC distribution network is more suitable for DG access.

  15. Analyzing big data in social media: Text and network analyses of an eating disorder forum.

    Science.gov (United States)

    Moessner, Markus; Feldhege, Johannes; Wolf, Markus; Bauer, Stephanie

    2018-05-10

    Social media plays an important role in everyday life of young people. Numerous studies claim negative effects of social media and media in general on eating disorder risk factors. Despite the availability of big data, only few studies have exploited the possibilities so far in the field of eating disorders. Methods for data extraction, computerized content analysis, and network analysis will be introduced. Strategies and methods will be exemplified for an ad-hoc dataset of 4,247 posts and 34,118 comments by 3,029 users of the proed forum on Reddit. Text analysis with latent Dirichlet allocation identified nine topics related to social support and eating disorder specific content. Social network analysis describes the overall communication patterns, and could identify community structures and most influential users. A linear network autocorrelation model was applied to estimate associations in language among network neighbors. The supplement contains R code for data extraction and analyses. This paper provides an introduction to investigating social media data, and will hopefully stimulate big data social media research in eating disorders. When applied in real-time, the methods presented in this manuscript could contribute to improving the safety of ED-related online communication. © 2018 Wiley Periodicals, Inc.

  16. Access to specific social resources across different social media : divergent consequences of the time spent with new contacts

    NARCIS (Netherlands)

    Matzat, U.; Sadowski, B.M.

    2015-01-01

    Despite a large number of studies on the social impact of the Internet, little is known about the specific social resources to which social media provide access. Most studies have either examined issues surrounding the question whether or not new online contacts have been established or they have

  17. Energy Saving Scheme Based On Traffic Forwarding For Optical Fiber Access Networks

    DEFF Research Database (Denmark)

    Lopez, G. Arturo Rodes; Estaran Tolosa, Jose Manuel; Vegas Olmos, Juan José

    2013-01-01

    We report on an energy saving block that regroups and powers off OLTs during low traffic periods, resulting in energy savings up to 87,5% in the central office of optical access networks.......We report on an energy saving block that regroups and powers off OLTs during low traffic periods, resulting in energy savings up to 87,5% in the central office of optical access networks....

  18. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed.......We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  19. Knowledge in Access in Rural Interconnected Areas Network Phase ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Researchers will explore network management issues by -examining KariaNet's ... Institution Country. Lebanon. Institution Website. http://www.aub.edu.lb ... IDRC “unpacks women's empowerment” at McGill University Conference. Findings ...

  20. Optical Multiple Access Network (OMAN) for advanced processing satellite applications

    Science.gov (United States)

    Mendez, Antonio J.; Gagliardi, Robert M.; Park, Eugene; Ivancic, William D.; Sherman, Bradley D.

    1991-01-01

    An OMAN breadboard for exploring advanced processing satellite circuit switch applications is introduced. Network architecture, hardware trade offs, and multiple user interference issues are presented. The breadboard test set up and experimental results are discussed.

  1. Youth access, creation, and content of smokeless tobacco ("dip") videos in social media.

    Science.gov (United States)

    Seidenberg, Andrew B; Rodgers, Elizabeth J; Rees, Vaughan W; Connolly, Gregory N

    2012-04-01

    Smokeless tobacco (SLT) use among white adolescent males has increased in recent years, and prevalence of SLT use among adolescent males exceeds that for smoking in several U.S. states. Recent reports have described the presence of cigarette-related content on social media Web sites popular among youth; however, little has been reported on SLT content. The YouTube video search engine was searched for the popular SLT brand Skoal, and the first 50 search results were downloaded. Video statistics data were collected for and content analysis was performed on all videos featuring smokeless use (82%). Access to SLT YouTube videos by youth was also determined by assessing whether YouTube permits youth viewing and creation of SLT videos. Mean number of views for videos analyzed was 15,422, and the most watched video had 124,276 views. Descriptions of SLT flavor/smell and social references/interactions were found in 48.8% and 63.4% of videos, respectively. By contrast, references to drug (nicotine) effects (12.2%) and public health messaging (9.8%) were less common. None of the SLT videos in the sample had restrictions that would block youth viewing. In addition, evidence of self-identified youth creating SLT videos was found for 13% of unique users in the sample. YouTube does not restrict youth from creating or viewing "dip videos." Proactive efforts are needed to ensure that YouTube and other online media do not become influential vehicles for tobacco promotion to youth. Copyright © 2012 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  2. Governance and Media Attention: A Research Agenda About How Media Affect (Network) Governance Processes

    NARCIS (Netherlands)

    Klijn, Erik Hans; Korthagen, Iris

    2017-01-01

    This article looks at the influence of media attention on governance processes and explores some new thoughts to incorporate in our theory building on governance. It systematically discusses recent theories about mediatization and connects them to what we know about governance in the field of Public

  3. Experimental demonstration of OpenFlow-enabled media ecosystem architecture for high-end applications over metro and core networks.

    Science.gov (United States)

    Ntofon, Okung-Dike; Channegowda, Mayur P; Efstathiou, Nikolaos; Rashidi Fard, Mehdi; Nejabati, Reza; Hunter, David K; Simeonidou, Dimitra

    2013-02-25

    In this paper, a novel Software-Defined Networking (SDN) architecture is proposed for high-end Ultra High Definition (UHD) media applications. UHD media applications require huge amounts of bandwidth that can only be met with high-capacity optical networks. In addition, there are requirements for control frameworks capable of delivering effective application performance with efficient network utilization. A novel SDN-based Controller that tightly integrates application-awareness with network control and management is proposed for such applications. An OpenFlow-enabled test-bed demonstrator is reported with performance evaluations of advanced online and offline media- and network-aware schedulers.

  4. Upgrade of hybrid fibre coax networks towards bi-directional access

    NARCIS (Netherlands)

    Khoe, G.D.; Wolters, R.P.C.; Boom, van den H.P.A.; Prati, G.

    1997-01-01

    In this paper we describe an upgrade scenario for Hybrid Fibre Coax (HFC) CATV Networks towards hi-directional access. The communication system described has been newly designed, and is based on the use of Direct Sequence- Code Division Multiple-Access (DS-CDMA). Due to its spread-spectrum

  5. Community access networks: how to connect the next billion to the ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Community access networks: how to connect the next billion to the Internet. Despite recent progress with mobile technology diffusion, more than four billion people worldwide are unconnected and have limited access to global communication infrastructure. The cost of implementing connectivity infrastructure in underserved ...

  6. A multi-scale network method for two-phase flow in porous media

    Energy Technology Data Exchange (ETDEWEB)

    Khayrat, Karim, E-mail: khayratk@ifd.mavt.ethz.ch; Jenny, Patrick

    2017-08-01

    Pore-network models of porous media are useful in the study of pore-scale flow in porous media. In order to extract macroscopic properties from flow simulations in pore-networks, it is crucial the networks are large enough to be considered representative elementary volumes. However, existing two-phase network flow solvers are limited to relatively small domains. For this purpose, a multi-scale pore-network (MSPN) method, which takes into account flow-rate effects and can simulate larger domains compared to existing methods, was developed. In our solution algorithm, a large pore network is partitioned into several smaller sub-networks. The algorithm to advance the fluid interfaces within each subnetwork consists of three steps. First, a global pressure problem on the network is solved approximately using the multiscale finite volume (MSFV) method. Next, the fluxes across the subnetworks are computed. Lastly, using fluxes as boundary conditions, a dynamic two-phase flow solver is used to advance the solution in time. Simulation results of drainage scenarios at different capillary numbers and unfavourable viscosity ratios are presented and used to validate the MSPN method against solutions obtained by an existing dynamic network flow solver.

  7. A multi-scale network method for two-phase flow in porous media

    International Nuclear Information System (INIS)

    Khayrat, Karim; Jenny, Patrick

    2017-01-01

    Pore-network models of porous media are useful in the study of pore-scale flow in porous media. In order to extract macroscopic properties from flow simulations in pore-networks, it is crucial the networks are large enough to be considered representative elementary volumes. However, existing two-phase network flow solvers are limited to relatively small domains. For this purpose, a multi-scale pore-network (MSPN) method, which takes into account flow-rate effects and can simulate larger domains compared to existing methods, was developed. In our solution algorithm, a large pore network is partitioned into several smaller sub-networks. The algorithm to advance the fluid interfaces within each subnetwork consists of three steps. First, a global pressure problem on the network is solved approximately using the multiscale finite volume (MSFV) method. Next, the fluxes across the subnetworks are computed. Lastly, using fluxes as boundary conditions, a dynamic two-phase flow solver is used to advance the solution in time. Simulation results of drainage scenarios at different capillary numbers and unfavourable viscosity ratios are presented and used to validate the MSPN method against solutions obtained by an existing dynamic network flow solver.

  8. Converged wireline and wireless signal distribution in optical fiber access networks

    DEFF Research Database (Denmark)

    Prince, Kamau

    This thesis presents results obtained during the course of my doctoral studies into the transport of fixed and wireless signaling over a converged otpical access infrastructure. In the formulation, development and assessment of a converged paradigma for multiple-services delivery via optical access...... networking infrastructure, I have demonstrated increased functionalities with existing optical technologies and commercially available optoelectronic devices. I have developed novel systems for extending the range of optical access systems, and have demonstrated the repurposing of standard digital devices...

  9. Connectivity, flow and transport in network models of fractured media

    International Nuclear Information System (INIS)

    Robinson, P.C.

    1984-10-01

    In order to evaluate the safety of radioactive waste disposal underground it is important to understand the way in which radioactive material is transported through the rock to the surface. If the rock is fractured the usual models may not be applicable. In this work we look at three aspects of fracture networks: connectivity, flow and transport. These are studied numerically by generating fracture networks in a computer and modelling the processes which occur. Connectivity relates to percolation theory, and critical densities for fracture systems are found in two and three dimensions. The permeability of two-dimensional networks is studied. The way that permeability depends on fracture density, network size and spread of fracture length can be predicted using a cut lattice model. Transport through the fracture network by convection through the fractures and mixing at the intersections is studied. The Fickian dispersion equation does not describe the resulting hydrodynamic dispersion. Extensions to the techniques to three dimensions and to include other processes are discussed. (author)

  10. Social Networks and Health: Understanding the Nuances of Healthcare Access between Urban and Rural Populations.

    Science.gov (United States)

    Amoah, Padmore Adusei; Edusei, Joseph; Amuzu, David

    2018-05-13

    Communities and individuals in many sub-Saharan African countries often face limited access to healthcare. Hence, many rely on social networks to enhance their chances for adequate health care. While this knowledge is well-established, little is known about the nuances of how different population groups activate these networks to improve access to healthcare. This paper examines how rural and urban dwellers in the Ashanti Region in Ghana distinctively and systematically activate their social networks to enhance access to healthcare. It uses a qualitative cross-sectional design, with in-depth interviews of 79 primary participants (28 urban and 51 rural residents) in addition to the views of eight community leaders and eight health personnel. It was discovered that both intimate and distanced social networks for healthcare are activated at different periods by rural and urban residents. Four main stages of social networks activation, comprising different individuals and groups were observed among rural and urban dwellers. Among both groups, physical proximity, privacy, trust and sense of fairness, socio-cultural meaning attached to health problems, and perceived knowledge and other resources (mainly money) held in specific networks inherently influenced social network activation. The paper posits that a critical analysis of social networks may help to tailor policy contents to individuals and groups with limited access to healthcare.

  11. DiffServ resource management in IP-based radio access networks

    NARCIS (Netherlands)

    Heijenk, Geert; Karagiannis, Georgios; Rexhepi, Vlora; Westberg, Lars; prof.dr. Prasad, R.; prof.dr. Bach Andersen, J.

    2001-01-01

    The increasing popularity of the Internet, the flexibility of IP, and the wide deployment of IP technologies, as well as the growth of mobile communications have driven the development of IP-based solutions for wireless networking. The introduction of IP-based transport in Radio Access Networks

  12. mCRAN: A radio access network architecture for 5G indoor ccommunications

    NARCIS (Netherlands)

    Chandra, Kishor; Cao, Zizheng; Bruintjes, Tom; Prasad, R.V.; Karagiannis, Georgios; Tangdiongga, E.; van den Boom, H.P.A.; Kokkeler, Andre B.J.

    2015-01-01

    Millimeter wave (mmWave) communication is being seen as a disruptive technology for 5G era. In particular, 60GHz frequency band has emerged as a promising candidate for multi-Gbps connectivity in indoor and hotspot areas. In terms of network architecture, cloud radio access network (CRAN) has

  13. mCRAN : a radio access network architecture for 5G indoor communications

    NARCIS (Netherlands)

    Chandra, Kishor; Cao, Zizheng; Bruintjes, T. M.; Prasad, R. Venkatesha; Karagiannis, G.; Tangdiongga, Eduward; van den Boom, H.P.A.; Kokkeler, A. B J

    2015-01-01

    Millimeter wave (mmWave) communication is being seen as a disruptive technology for 5G era. In particular, 60GHz frequency band has emerged as a promising candidate for multi-Gbps connectivity in indoor and hotspot areas. In terms of network architecture, cloud radio access network (CRAN) has

  14. The ENSDF radioactivity data base for IBM-PC and computer network access

    International Nuclear Information System (INIS)

    Ekstroem, P.; Spanier, L.

    1989-08-01

    A data base system for radioactivity gamma rays is described. A base with approximately 15000 gamma rays from 2777 decays is available for installation on the hard disk of a PC, and a complete system with approximately 73000 gamma rays is available for on-line access via the NORDic University computer NETwork (NORDUNET) and the Swedish University computer NETwork (SUNET)

  15. EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks

    Science.gov (United States)

    Zrelli, Saber; Okabe, Nobuo; Shinoda, Yoichi

    The wireless medium is a key technology for enabling ubiquitous and continuous network connectivity. It is becoming more and more important in our daily life especially with the increasing adoption of networking technologies in many fields such as medical care and transportation systems. Although most wireless technologies nowadays provide satisfying bandwidth and higher speeds, several of these technologies still lack improvements with regard to handoff performance. In this paper, we focus on wireless network technologies that rely on the Extensible Authentication Protocol for mutual authentication between the station and the access network. Such technologies include local area wireless networks (IEEE 802.11) as well as broadband wireless networks (IEEE 802.16). We present a new EAP authentication method based on a three party authentication scheme, namely Kerberos, that considerably shortens handoff delays. Compared to other methods, the proposed method has the advantage of not requiring any changes on the access points, making it readily deployable at reasonable costs.

  16. Detecting Rumors Through Modeling Information Propagation Networks in a Social Media Environment.

    Science.gov (United States)

    Liu, Yang; Xu, Songhua; Tourassi, Georgia

    2015-01-01

    In the midst of today's pervasive influence of social media content and activities, information credibility has increasingly become a major issue. Accordingly, identifying false information, e.g. rumors circulated in social media environments, attracts expanding research attention and growing interests. Many previous studies have exploited user-independent features for rumor detection. These prior investigations uniformly treat all users relevant to the propagation of a social media message as instances of a generic entity. Such a modeling approach usually adopts a homogeneous network to represent all users, the practice of which ignores the variety across an entire user population in a social media environment. Recognizing this limitation of modeling methodologies, this study explores user-specific features in a social media environment for rumor detection. The new approach hypothesizes that whether a user tends to spread a rumor is dependent upon specific attributes of the user in addition to content characteristics of the message itself. Under this hypothesis, information propagation patterns of rumors versus those of credible messages in a social media environment are systematically differentiable. To explore and exploit this hypothesis, we develop a new information propagation model based on a heterogeneous user representation for rumor recognition. The new approach is capable of differentiating rumors from credible messages through observing distinctions in their respective propagation patterns in social media. Experimental results show that the new information propagation model based on heterogeneous user representation can effectively distinguish rumors from credible social media content.

  17. Role of social media in retail network operations and marketing to enhance customer satisfaction

    OpenAIRE

    Ramanathan, U; Subramanian, N; Parrott, G

    2017-01-01

    Purpose: The technology evolution compels retail networks to introduce unique business models to retain customers and to gain a competitive advantage. Customer reviews available through social media need to be taken into account by retail networks to design a model with unique service operations and marketing approaches that will improve loyalty by adding value to customers. Furthermore, the relationship between customer satisfaction and customer spending behaviour is very weak and needs furt...

  18. Social networking and the Olympic Movement: social media analysis, opportunities and trends : final report

    OpenAIRE

    Fernández Peña, Emilio

    2011-01-01

    Table of contents : 1: Introduction. - 2 : Sociodemographic data of social networking sites. - 3 : The Vancouver 2010 Olympic Winter Games on Facebook, Twitter and Orkut. - 4 : Singapore 2010 Youth Olympic Games communication strategies on Facebook and Twitter. - 5 : Sport organizations social networking strategies : case study analysis. - 6 : Olympic athletes and social media use during a non olympic-period. - 7. The Olympic Games, NBA and FC Barcelona on Facebook : content and fan participa...

  19. Homeless Families' Education Networks: An Examination of Access and Mobilization

    Science.gov (United States)

    Miller, Peter M.

    2011-01-01

    Purpose: This study sought deeper understanding of how sheltered families accessed and mobilized educationally related relationships and resources during periods of homelessness. Such work is posited to be especially relevant considering that there is a growing crisis of family homelessness in the United States and school- and community-based…

  20. Ubiquitous access control and policy management in personal networks

    DEFF Research Database (Denmark)

    Kyriazanos, Dimitris M.; Stassinopoulos, George I.; Prasad, Neeli R.

    2006-01-01

    distributed master devices acting as access points- and also pure peer-to-peer interactions inside the PN. Taking benefit from the modularity and scalability of the design, this solution can be extended into supporting coalitions of different security domains, deriving from the creation of PNs federations....

  1. Mapping Russian Media Network: Media’s Role in Russian Foreign Policy and Decision-Making

    Science.gov (United States)

    2017-06-14

    political spheres in target countries. Thus media are ultimately only one instrument, albeit quite an important one, in a much larger toolkit ...2017. 22 Presidential Administration and presidential spokesman, are former career diplomats. First Deputy Chief of Staff Sergey...who serves as President Putin’s foreign policy advisor) is also a career diplomat and a past ambassador to the United States.56 CNA’s analysis

  2. Mapping Russian Media Network: Media’s Role in Russian Foreign Policy and Decision-making

    Science.gov (United States)

    2017-06-14

    Ministry of Culture, which operates in a media “gray zone” including films , television entertainment, and documentaries. The Ministry of Culture subsidizes...lesson; Russian television broadcast images of scores of hostages reportedly killed by a sleeping gas used in the effort to free them from the...evolved from off-the-record question-and-answer sessions with approximately 40-50 participants into major televised speeches . 80 For example, shortly

  3. The decision to access patient information from a social media site: what would you do?

    Science.gov (United States)

    Jent, Jason F; Eaton, Cyd K; Merrick, Melissa T; Englebert, Nicole E; Dandes, Susan K; Chapman, Ana V; Hershorin, Eugene R

    2011-10-01

    The current study examined the prevalence with which healthcare providers use a social media site (SMS) account (e.g., Facebook), the extent to which they use SMSs in clinical practice, and their decision-making process after accessing patient information from an SMS. Pediatric faculty and trainees from a medical school campus were provided a SMS history form and seven fictional SMS adolescent profile vignettes that depicted concerning information. Participants were instructed to rate their personal use and beliefs about SMSs and to report how they would respond if they obtained concerning information about an adolescent patient from their public SMS profile. Healthcare providers generally believed it not to be an invasion of privacy to conduct an Internet/SMS search of someone they know. A small percentage of trainees reported a personal history of conducting an Internet search (18%) or an SMS search (14%) for a patient. However, no faculty endorsed a history of conducting searches for patients. Faculty and trainees also differed in how they would respond to concerning SMS adolescent profile information. The findings that trainees are conducting Internet/SMS searches of patients and that faculty and trainees differ in how they would respond to concerning profile information suggest the need for specific guidelines regarding the role of SMSs in clinical practice. Practice, policy, and training implications are discussed. Copyright © 2011 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  4. Multiple access protocol for supporting multimedia services in wireless ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo

    1999-01-01

    The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications....... In this paper, we propose a multiple access protocol using centralized and distributed channel access control techniques to provide QoS guarantees for multimedia services by taking advantage of the characteristics of different kinds of ATM traffics. Multimedia traffic, including constant bit rate (CBR...

  5. Lattice Boltzmann simulation of CO2 reactive transport in network fractured media

    Science.gov (United States)

    Tian, Zhiwei; Wang, Junye

    2017-08-01

    Carbon dioxide (CO2) geological sequestration plays an important role in mitigating CO2 emissions for climate change. Understanding interactions of the injected CO2 with network fractures and hydrocarbons is key for optimizing and controlling CO2 geological sequestration and evaluating its risks to ground water. However, there is a well-known, difficult process in simulating the dynamic interaction of fracture-matrix, such as dynamic change of matrix porosity, unsaturated processes in rock matrix, and effect of rock mineral properties. In this paper, we develop an explicit model of the fracture-matrix interactions using multilayer bounce-back treatment as a first attempt to simulate CO2 reactive transport in network fractured media through coupling the Dardis's LBM porous model for a new interface treatment. Two kinds of typical fracture networks in porous media are simulated: straight cross network fractures and interleaving network fractures. The reaction rate and porosity distribution are illustrated and well-matched patterns are found. The species concentration distribution and evolution with time steps are also analyzed and compared with different transport properties. The results demonstrate the capability of this model to investigate the complex processes of CO2 geological injection and reactive transport in network fractured media, such as dynamic change of matrix porosity.

  6. Virus spreading in wireless sensor networks with a medium access control mechanism

    International Nuclear Information System (INIS)

    Wang Ya-Qi; Yang Xiao-Yuan

    2013-01-01

    In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. (general)

  7. Power Allocation and Outage Probability Analysis for SDN-based Radio Access Networks

    Science.gov (United States)

    Zhao, Yongxu; Chen, Yueyun; Mai, Zhiyuan

    2018-01-01

    In this paper, performance of Access network Architecture based SDN (Software Defined Network) is analyzed with respect to the power allocation issue. A power allocation scheme PSO-PA (Particle Swarm Optimization-power allocation) algorithm is proposed, the proposed scheme is subjected to constant total power with the objective of minimizing system outage probability. The entire access network resource configuration is controlled by the SDN controller, then it sends the optimized power distribution factor to the base station source node (SN) and the relay node (RN). Simulation results show that the proposed scheme reduces the system outage probability at a low complexity.

  8. Ego Defense and Media Access: Conflicting Rhetorical Needs of a Contemporary Social Movement.

    Science.gov (United States)

    Turner, Kathleen J.

    1980-01-01

    Describes the relationship among the social movements of the 1960s, particularly the feminist movement and the mass media. Analyzes the nature of the rhetoric of social activism in that period which is characterized by the ego-defensive responses to media-created reality and by ego-building responses to media's reality-creating potential. (JMF)

  9. Market opening and third party access in district heating networks

    International Nuclear Information System (INIS)

    Soederholm, Patrik; Warell, Linda

    2011-01-01

    The purpose of this paper is to analyse the possible effects of introducing TPA in district heating networks by identifying and scrutinizing a number of possible scenarios for increased competition. The analysis builds on a theoretical discussion of economic efficiency in district heating operations, and the possible impacts on consumer prices of a market opening. An important conclusion is that regulated TPA may have small positive effects on competition, and at the same time it can have a negative impact on the possibility to run the integrated district heating operations in a cost-effective manner. This conclusion stems in part from the observation that most district heating networks are local in scope. Moreover, district heating operations are highly interdependent in, for instance, that the level of the return temperature of the water will affect the efficiency of combined heat and power plants. For these reasons, the introduction of the so-called single-buyer model or, perhaps even more preferable, an extended and more transparent producer market could represent more efficient market designs. Moreover, in networks with clear natural monopoly characteristics an ex ante price regulation must be considered. - Research Highlights: →The paper analyses the possible effects of TPA in district heating networks. → Four possible scenarios for increased competition are identified and scrutinized. → A conclusion is that regulated TPA have only small positive effects on competition. → District heating operations are highly interdependent and separation can be costly.

  10. Adaptive Information Access on Multiple Applications Support Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2014-01-01

    information is challenged by dynamic nature of information elements. These challenges are more prominent in case of wireless sensor network (WSN) applications, as the information that the sensor node collects are mostly dynamic in nature (say, temperature). Therefore, it is likely that there can be a mismatch...

  11. Adaptive Information Access in Multiple Applications Support Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2012-01-01

    Nowadays, due to wide applicability of Wireless Sensor Network (WSN) added by the low cost sensor devices, its popularity among the researchers and industrialists are very much visible. A substantial amount of works can be seen in the literature on WSN which are mainly focused on application...

  12. Requirements and Algorithms for Cooperation of Heterogeneous Radio Access Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena D.; Tragos, Elias; Mino, Emilio

    2009-01-01

    systems.The RRM mechanisms are evaluated for the scenario of intra-RAN and inter-RAN user mobility. The RRM framework incorporates as novelty improved triggering mechanisms, a network-controlledmobility management scheme with policy enforcement on different levels in the RANarchitecture, and a distributed...

  13. Using social media for asynchronous collaboration within collaborative networks

    NARCIS (Netherlands)

    Sturkenboom, N.; Baha, S.E.; Lu, Y.; Tempesta, G.; Melkas, H.; Buur, J.

    2013-01-01

    Societal challenges of today (e.g. aging) are complex and often require systemic solutions to be addressed. To address these challenges, various expertise and knowledge are required; in this sense, collaborative network projects have a lot of potential in offering a systemic solution. Design

  14. The NASA Regional Planetary Image Facility (RPIF) Network: A Key Resource for Accessing and Using Planetary Spatial Data

    Science.gov (United States)

    Hagerty, J. J.

    2017-12-01

    The role of the NASA Regional Planetary Image Facility (RPIF) Network is evolving as new science-ready spatial data products continue to be created and as key historical planetary data sets are digitized. Specifically, the RPIF Network is poised to serve specialized knowledge and services in a user-friendly manner that removes most barriers to locating, accessing, and exploiting planetary spatial data, thus providing a critical data access role within a spatial data infrastructure. The goal of the Network is to provide support and training to a broad audience of planetary spatial data users. In an effort to meet the planetary science community's evolving needs, we are focusing on the following objectives: Maintain and improve the delivery of historical data accumulated over the past four decades so as not to lose critical, historical information. This is being achieved by systematically digitizing fragile materials, allowing increased access and preserving them at the same time. Help users locate, access, visualize, and exploit planetary science data. Many of the facilities have begun to establish Guest User Facilities that allow researchers to use and/or be trained on GIS equipment and other specialized tools like Socet Set/GXP photogrammetry workstations for generating digital elevation maps. Improve the connection between the Network nodes while also leveraging the unique resources of each node. To achieve this goal, each facility is developing and sharing searchable databases of their collections, including robust metadata in a standards compliant way. Communicate more effectively and regularly with the planetary science community in an effort to make potential users aware of resources and services provided by the Network, while also engaging community members in discussions about community needs. Provide a regional resource for the science community, colleges, universities, museums, media, and the public to access planetary data. Introduce new strategies for

  15. The Role of Individual-Media Relationship and Consumer Personal Factors on Spanish Teenagers' Mobile Social Networking Sites Usage

    OpenAIRE

    Carla Ruiz-Mafé; Silvia Sanz-Blas; José Martí-Parreño

    2014-01-01

    Social Networking Sites (SNS) are gaining momentum as powerful tools of marketing communications. Mobile phones are becoming one of the most popular devices for accessing Social Networking Sites. In Spain, 44% of Social Networking Sites users access these sites on a daily basis while 79% of them access these sites on a weekly basis. Furthermore, it is notable that over 70% of Social Networking Sites users talk about and recommend commercial brands. This justifies the interest of the study of ...

  16. Pore network modeling of drainage process in patterned porous media: a quasi-static study

    KAUST Repository

    Zhang, Tao; Salama, Amgad; Sun, Shuyu; El-Amin, Mohamed

    2015-01-01

    -saturation relationships, it is quite challenging to isolate its effects explicitly in real porous media applications. However, within the framework of pore network models, it is easy to highlight the effects of wettability conditions on the transport of two-phase systems

  17. Writing Programs as Distributed Networks: A Materialist Approach to University-Community Digital Media Literacy

    Science.gov (United States)

    Comstock, Michelle

    2006-01-01

    This article addresses how community-university digital media literacy projects are redefining literacy, literate practices, and institutions. Using Actor-Network Theory (ANT), which emphasizes the organizing process itself, I analyze the shifting definitions of literacy within one particular university-community collaboration. My analysis…

  18. A Review Paper On Exploring Text Link And Spacial-Temporal Information In Social Media Networks

    Directory of Open Access Journals (Sweden)

    Dr. Mamta Madan

    2015-03-01

    Full Text Available ABSTRACT The objective of this paper is to have a literature review on the various methods to mine the knowledge from the social media by taking advantage of embedded heterogeneous information. Specifically we are trying to review different types of mining framework which provides us useful information from these networks that have heterogeneous data types including text spacial-temporal and data association LINK information. Firstly we will discuss the link mining to study the link structure with respect to Social Media SM. Secondly we summarize the various text mining models thirdly we shall review spacial as well the temporal models to extract or detect the frequent related topics from SM. Fourthly we will try to figure out few improvised models that take advantage of the link textual temporal and spacial information which motivates to discover progressive principles and fresh methodologies for DM Data Mining in social media networks SMNs.

  19. Ethernet access network based on free-space optic deployment technology

    Science.gov (United States)

    Gebhart, Michael; Leitgeb, Erich; Birnbacher, Ulla; Schrotter, Peter

    2004-06-01

    The satisfaction of all communication needs from single households and business companies over a single access infrastructure is probably the most challenging topic in communications technology today. But even though the so-called "Last Mile Access Bottleneck" is well known since more than ten years and many distribution technologies have been tried out, the optimal solution has not yet been found and paying commercial access networks offering all service classes are still rare today. Conventional services like telephone, radio and TV, as well as new and emerging services like email, web browsing, online-gaming, video conferences, business data transfer or external data storage can all be transmitted over the well known and cost effective Ethernet networking protocol standard. Key requirements for the deployment technology driven by the different services are high data rates to the single customer, security, moderate deployment costs and good scalability to number and density of users, quick and flexible deployment without legal impediments and high availability, referring to the properties of optical and wireless communication. We demonstrate all elements of an Ethernet Access Network based on Free Space Optic distribution technology. Main physical parts are Central Office, Distribution Network and Customer Equipment. Transmission of different services, as well as configuration, service upgrades and remote control of the network are handled by networking features over one FSO connection. All parts of the network are proven, the latest commercially available technology. The set up is flexible and can be adapted to any more specific need if required.

  20. Social/Electronic Media Use of Children and Adolescents Who Attend the Pediatric Weight Management Programs of the COMPASS Network.

    Science.gov (United States)

    Siegel, Robert; Fals, Angela; Mirza, Nazrat; Datto, George; Stratbucker, William; Ievers-Landis, Carolyn E; Christison, Amy; Wang, Yu; Woolford, Susan J

    2015-10-01

    Obesity is a major healthcare problem in youth and their social/electronic media (SEM) use has been described as a risk factor. Though much is known about the newer technologies youth use to communicate, little is known about what is used by those in weight management programs. The aim of this study was to determine what types of SEM, including sedentary and active video games, youth in weight management programs use and which they prefer for communicating with healthcare providers. This was a multisite study using a 24-question online SurveyMonkey® questionnaire. Youth, 12-17 years old, attending pediatric weight management programs at seven participating centers in the Childhood Obesity Multi Program Analysis and Study System network were eligible. There were 292 responders with a mean age of 14.2 years. Fifty-four percent were female, 36% Caucasian, 35% African American, and 33% were Hispanic. Ninety-four percent had access to a computer, 71% had Internet access, and 63% had smartphones. Whereas 87% had at least one gaming system at home, 50% reported they never played sedentary video games (71% of females vs. 25% males; p social media (6%). Face-to-face communication with healthcare providers is the preferred method for youth in pediatric weight management programs. They self-reported video game use less than previously described.

  1. The ARAC client system: network-based access to ARAC

    International Nuclear Information System (INIS)

    Leach, M J; Sumikawa, D; Webster, C

    1999-01-01

    The ARAC Client System allows users (such as emergency managers and first responders) with commonly available desktop and laptop computers to utilize the central ARAC system over the Internet or any other communications link using Internet protocols. Providing cost-effective fast access to the central ARAC system greatly expands the availability of the ARAC capability. The ARAC Client system consists of (1) local client applications running on the remote user's computer, and (2) ''site servers'' that provide secure access to selected central ARAC system capabilities and run on a scalable number of dedicated workstations residing at the central facility. The remote client applications allow users to describe a real or potential them-bio event, electronically sends this information to the central ARAC system which performs model calculations, and quickly receive and visualize the resulting graphical products. The site servers will support simultaneous access to ARAC capabilities by multiple users. The ARAC Client system is based on object-oriented client/server and distributed computing technologies using CORBA and Java, and consists of a large number of interacting components

  2. Admission Control and Interference Management in Dynamic Spectrum Access Networks

    Directory of Open Access Journals (Sweden)

    Jorge Martinez-Bauset

    2010-01-01

    Full Text Available We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs. In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.

  3. CHOICE OF OPTION FOR IMPLEMENTATION OF THE MULTILEVEL SECURE ACCESS TO THE EXTERNAL NETWORK

    Directory of Open Access Journals (Sweden)

    V. S. Kolomoitcev

    2016-01-01

    Full Text Available We study the optimal way for design of access scheme called "Direct Connection. This scheme provides a secure access to external network resources, and consists of several groups of routers and two kinds of firewalls. The scheme is considered in view of the fact that the system has got common areas of removing threats in the channel for different means of protection. Parameters of average residence time of request in the system and its reliability were obtained for each variant of access scheme. Based on the results, comparison of the ways of design for access scheme was carried out between themselves and with the standard access scheme (with onefirewall. It was found out that design of access scheme with a single group of routers for the whole system has better performance and reliability than the other variants of "Direct Connection" access scheme.

  4. Building a multimodal network and determining individual accessibility by public transportation

    DEFF Research Database (Denmark)

    Djurhuus, Sune; Hansen, Henning Sten; Aadahl, Mette

    2016-01-01

    The increased availability of transit schedules from web sites or travel planners as well as more disaggregate data has led to a growing interest in creating individual public transportation accessibility measures. However, used extensively, standard GIS software does not have direct capabilities...... from a travel planner into a multimodal network model using simple SQL (structured query language) programming and standard GIS. The method presented here integrates all parts of travelling by public transportation from individual home addresses to all reachable transit stops within different travel....... The accessibility areas are created at morning rush hour for a study population of 29 447 individuals and a few examples of accessibility areas are presented. The results show a big difference in individual public transportation accessibility in the region. In addition, how the transit network is accessed, whether...

  5. Scheduling of network access for feedback-based embedded systems

    Science.gov (United States)

    Liberatore, Vincenzo

    2002-07-01

    nd communication capabilities. Examples range from smart dust embedded in building materials to networks of appliances in the home. Embedded devices will be deployed in unprecedented numbers, will enable pervasive distributed computing, and will radically change the way people interact with the surrounding environment [EGH00a]. The paper targets embedded systems and their real-time (RT) communication requirements. RT requirements arise from the

  6. Social Media Tools for Teaching and Learning

    Science.gov (United States)

    Wagner, Ronald

    2011-01-01

    According to Wikipedia, "social media is the media designed to be disseminated through social interaction, created using highly accessible scalable techniques. Social media is the use of web-based and mobile technologies to turn communication into interactive dialogue." Social networks, such as Facebook and Twitter, contain millions of members who…

  7. A Comparative Study of Multiplexing Schemes for Next Generation Optical Access Networks

    Science.gov (United States)

    Imtiaz, Waqas A.; Khan, Yousaf; Shah, Pir Mehar Ali; Zeeshan, M.

    2014-09-01

    Passive optical network (PON) is a high bandwidth, economical solution which can provide the necessary bandwidth to end-users. Wavelength division multiplexed passive optical networks (WDM PONs) and time division multiplexed passive optical networks (TDM PONs) are considered as an evolutionary step for next-generation optical access (NGOA) networks. However they fail to provide highest transmission capacity, efficient bandwidth access, and robust dispersion tolerance. Thus future PONs are considered on simpler, efficient and potentially scalable, optical code division multiplexed (OCDM) PONs. This paper compares the performance of existing PONs with OCDM PON to determine a suitable scheme for NGOA networks. Two system parameter are used in this paper: fiber length, and bit rate. Performance analysis using Optisystem shows that; for a sufficient system performance parameters i.e. bit error rate (BER) ≤ 10-9, and maximum quality factor (Q) ≥ 6, OCDMA PON efficiently performs upto 50 km with 10 Gbit/s per ONU.

  8. Navigating the massive world of reddit: using backbone networks to map user interests in social media

    Directory of Open Access Journals (Sweden)

    Randal S. Olson

    2015-05-01

    Full Text Available In the massive online worlds of social media, users frequently rely on organizing themselves around specific topics of interest to find and engage with like-minded people. However, navigating these massive worlds and finding topics of specific interest often proves difficult because the worlds are mostly organized haphazardly, leaving users to find relevant interests by word of mouth or using a basic search feature. Here, we report on a method using the backbone of a network to create a map of the primary topics of interest in any social network. To demonstrate the method, we build an interest map for the social news web site reddit and show how such a map could be used to navigate a social media world. Moreover, we analyze the network properties of the reddit social network and find that it has a scale-free, small-world, and modular community structure, much like other online social networks such as Facebook and Twitter. We suggest that the integration of interest maps into popular social media platforms will assist users in organizing themselves into more specific interest groups, which will help alleviate the overcrowding effect often observed in large online communities.

  9. Learning Automata Based Caching for Efficient Data Access in Delay Tolerant Networks

    Directory of Open Access Journals (Sweden)

    Zhenjie Ma

    2018-01-01

    Full Text Available Effective data access is one of the major challenges in Delay Tolerant Networks (DTNs that are characterized by intermittent network connectivity and unpredictable node mobility. Currently, different data caching schemes have been proposed to improve the performance of data access in DTNs. However, most existing data caching schemes perform poorly due to the lack of global network state information and the changing network topology in DTNs. In this paper, we propose a novel data caching scheme based on cooperative caching in DTNs, aiming at improving the successful rate of data access and reducing the data access delay. In the proposed scheme, learning automata are utilized to select a set of caching nodes as Caching Node Set (CNS in DTNs. Unlike the existing caching schemes failing to address the challenging characteristics of DTNs, our scheme is designed to automatically self-adjust to the changing network topology through the well-designed voting and updating processes. The proposed scheme improves the overall performance of data access in DTNs compared with the former caching schemes. The simulations verify the feasibility of our scheme and the improvements in performance.

  10. Accessibility in networks: A useful measure for understanding social insect nest architecture

    International Nuclear Information System (INIS)

    Viana, Matheus P.; Fourcassié, Vincent; Perna, Andrea; Costa, Luciano da F.; Jost, Christian

    2013-01-01

    Networks and the associated tools from graph theory have now become well-established approaches to study natural as well as human-made systems. While early studies focused on topology and connectivity, the recent literature has acknowledged the importance of the dynamical properties of these networks. Here we focus on such a dynamic measure: accessibility. It characterizes for any given movement dynamics (such as random walks) the average number of nodes that can be reached in exactly h steps (out-accessibility), or the average number of nodes from which a given node can be reached (in-accessibility). This focus on dynamics makes accessibility particularly appropriate to study movement on networks and to detect complementary properties with respect to topology-based measurements such as betweenness centrality. We apply this measure to six nests of Cubitermes termites. Their mushroom-like 3D architectures consist of chambers and connecting tunnels that can be associated to nodes and edges in a communication network. Accessibilities turn out to be particularly low in the bottom part of the nests that link them to their underground tunneling network. We interpret this result in the context of anti-predator (ants) behavior and/or as a side effect of the global nest shape.

  11. Deployment of a Testbed in a Brazilian Research Network using IPv6 and Optical Access Technologies

    Science.gov (United States)

    Martins, Luciano; Ferramola Pozzuto, João; Olimpio Tognolli, João; Chaves, Niudomar Siqueira De A.; Reggiani, Atilio Eduardo; Hortêncio, Claudio Antonio

    2012-04-01

    This article presents the implementation of a testbed and the experimental results obtained with it on the Brazilian Experimental Network of the government-sponsored "GIGA Project." The use of IPv6 integrated to current and emerging optical architectures and technologies, such as dense wavelength division multiplexing and 10-gigabit Ethernet on the core and gigabit capable passive optical network and optical distribution network on access, were tested. These protocols, architectures, and optical technologies are promising and part of a brand new worldwide technological scenario that has being fairly adopted in the networks of enterprises and providers of the world.

  12. Scheduling Data Access in Smart Grid Networks Utilizing Context Information

    DEFF Research Database (Denmark)

    Findrik, Mislav; Grønbæk, Jesper; Olsen, Rasmus Løvenstein

    2014-01-01

    Current electrical grid is facing increased penetration of intermittent energy resources, in particular wind and solar energy. Fast variability of the power supply due to renewable energy resources can be balanced out using different energy storage systems or shifting the loads. Efficiently...... managing this fast flexibility requires two-way data exchange between a controller and sensors/meters via communication networks. In this paper we investigated scheduling of data collection utilizing meta-data from sensors that are describing dynamics of information. We show the applicability...

  13. The Strategic Combination of Open-Access Peer-Review, Mainstream Media and Social Media to Improve Public Climate Literacy (Invited)

    Science.gov (United States)

    Cook, J.; Nuccitelli, D. A.; Jacobs, P.

    2013-12-01

    The Skeptical Science website began in 2007, with the goal of refuting climate misinformation with peer-reviewed science. It achieved this by embracing a diversity of message formats and delivery methods. Myth rebuttals are available at beginner, intermediate and advanced levels, spanning from long, technical treatments to tweetable one-liners. Content has been translated into 20 different languages and made available via the web, an iPhone app and books while adopted by third parties in textbooks, university and MOOC curricula, books, Senate testimonies and TV documentaries. While social media has been a fruitful medium, we experimented with a new model in 2013, employing the strategic combination of open-access peer-review, mainstream media outreach and social media marketing. This strategy was adopted with the release of a paper quantifying the level of scientific consensus in published climate papers, resulting in broad mainstream media attention as well as acknowledgement from key public figures such as Al Gore, the UK Minister for Energy Edward Davey and President Obama. Our approach was informed by psychological research into both the importance of scientific consensus and how to reduce the influence of misconceptions. While multiple methods of delivery are important, equally important is the construction of the messages themselves. I will examine the science of crafting compelling messages and how combination with diverse message delivery can lead to impactful outcomes.

  14. Network access charges, vertical integration, and property rights structure - experiences from the German electricity markets

    International Nuclear Information System (INIS)

    Growitsch, C.; Wein, T.

    2005-01-01

    After the deregulation of the German electricity markets in 1998, the German government opted for a regulatory regime called negotiated third party access, which would be subject to ex-post control by the federal cartel office. Network access charges for new competitors are based on contractual arrangements between energy producers and industrial consumers. As the electricity networks are incontestable natural monopolies, the local and regional network operators are able to set (monopolistic) charges at their own discretion, restricted only by the possible interference of the federal cartel office (Bundeskartellamt). In this paper we analyze if there is evidence for varying charging behaviour depending on the supplier's economic independence (structure of property rights) or its level of vertical integration. For this purpose, we hypothesise that incorporated and vertically integrated suppliers set different charges than independent utility companies. Multivariate estimations show a relation between network access charges and the network operator's economic independence as well as level of vertical integration: on the low voltage level for an estimated annual consumption of 1700 kW/h, vertically integrated firms set-in accordance with our hypothesis-significantly lower access charges than vertically separated suppliers, whereas incorporated network operators charge significantly higher charges compared to independent suppliers. These results could not have been confirmed for other consumptions or voltage levels. (author)

  15. Establishing a Social Media Presence and Network for the Pennsylvania Earth Science Teachers Association (PAESTA)

    Science.gov (United States)

    Guertin, L. A.; Merkel, C.

    2011-12-01

    as a way to build participation and membership in the online PAESTA community. Part of the approach guiding the developing of the virtual community was to provide a number of ways for teachers to access PAESTA content. We needed to find ways to establish a presence in venues where our users regularly go to find information rather than expecting them to visit our website. This includes experiments with a variety of social networking platforms including Facebook and Twitter. We also make use of sites that allow users to collect and share information such as bookmarks (Diigo), citations (Mendeley), and reading lists (Goodreads). Such sites allow us to reach new audiences with an affinity for the content that we are producing who may not otherwise find us. The tension in this approach is in maintaining information and a consistent presence across a variety of platforms. It is too early to tell which social media tools and strategies will be the most effective in creating a sense of community and interactivity among PAESTA members. Monitoring usage statistics and patterns across platforms should assist us in identifying which social media tool(s) will be most effective to continue with the mission of PAESTA.

  16. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Science.gov (United States)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  17. Unbundling in Current Broadband and Next-Generation Ultra-Broadband Access Networks

    Science.gov (United States)

    Gaudino, Roberto; Giuliano, Romeo; Mazzenga, Franco; Valcarenghi, Luca; Vatalaro, Francesco

    2014-05-01

    This article overviews the methods that are currently under investigation for implementing multi-operator open-access/shared-access techniques in next-generation access ultra-broadband architectures, starting from the traditional "unbundling-of-the-local-loop" techniques implemented in legacy twisted-pair digital subscriber line access networks. A straightforward replication of these copper-based unbundling-of-the-local-loop techniques is usually not feasible on next-generation access networks, including fiber-to-the-home point-to-multipoint passive optical networks. To investigate this issue, the article first gives a concise description of traditional copper-based unbundling-of-the-local-loop solutions, then focalizes on both next-generation access hybrid fiber-copper digital subscriber line fiber-to-the-cabinet scenarios and on fiber to the home by accounting for the mix of regulatory and technological reasons driving the next-generation access migration path, focusing mostly on the European situation.

  18. Repeated exposure to media violence is associated with diminished response in an inhibitory frontolimbic network.

    Directory of Open Access Journals (Sweden)

    Christopher R Kelly

    Full Text Available BACKGROUND: Media depictions of violence, although often claimed to induce viewer aggression, have not been shown to affect the cortical networks that regulate behavior. METHODOLOGY/PRINCIPAL FINDINGS: Using functional magnetic resonance imaging (fMRI, we found that repeated exposure to violent media, but not to other equally arousing media, led to both diminished response in right lateral orbitofrontal cortex (right ltOFC and a decrease in right ltOFC-amygdala interaction. Reduced function in this network has been previously associated with decreased control over a variety of behaviors, including reactive aggression. Indeed, we found reduced right ltOFC responses to be characteristic of those subjects that reported greater tendencies toward reactive aggression. Furthermore, the violence-induced reduction in right ltOFC response coincided with increased throughput to behavior planning regions. CONCLUSIONS: These novel findings establish that even short-term exposure to violent media can result in diminished responsiveness of a network associated with behaviors such as reactive aggression.

  19. Random access to mobile networks with advanced error correction

    Science.gov (United States)

    Dippold, Michael

    1990-01-01

    A random access scheme for unreliable data channels is investigated in conjunction with an adaptive Hybrid-II Automatic Repeat Request (ARQ) scheme using Rate Compatible Punctured Codes (RCPC) Forward Error Correction (FEC). A simple scheme with fixed frame length and equal slot sizes is chosen and reservation is implicit by the first packet transmitted randomly in a free slot, similar to Reservation Aloha. This allows the further transmission of redundancy if the last decoding attempt failed. Results show that a high channel utilization and superior throughput can be achieved with this scheme that shows a quite low implementation complexity. For the example of an interleaved Rayleigh channel and soft decision utilization and mean delay are calculated. A utilization of 40 percent may be achieved for a frame with the number of slots being equal to half the station number under high traffic load. The effects of feedback channel errors and some countermeasures are discussed.

  20. Calcium-decorated carbyne networks as hydrogen storage media.

    Science.gov (United States)

    Sorokin, Pavel B; Lee, Hoonkyung; Antipina, Lyubov Yu; Singh, Abhishek K; Yakobson, Boris I

    2011-07-13

    Among the carbon allotropes, carbyne chains appear outstandingly accessible for sorption and very light. Hydrogen adsorption on calcium-decorated carbyne chain was studied using ab initio density functional calculations. The estimation of surface area of carbyne gives the value four times larger than that of graphene, which makes carbyne attractive as a storage scaffold medium. Furthermore, calculations show that a Ca-decorated carbyne can adsorb up to 6 H(2) molecules per Ca atom with a binding energy of ∼0.2 eV, desirable for reversible storage, and the hydrogen storage capacity can exceed ∼8 wt %. Unlike recently reported transition metal-decorated carbon nanostructures, which suffer from the metal clustering diminishing the storage capacity, the clustering of Ca atoms on carbyne is energetically unfavorable. Thermodynamics of adsorption of H(2) molecules on the Ca atom was also investigated using equilibrium grand partition function.

  1. Passive Optical Access Networks: State of the Art and Future Evolution

    Directory of Open Access Journals (Sweden)

    Tommaso Muciaccia

    2014-10-01

    Full Text Available In the very last years, optical access networks are growing very rapidly, from both the network operators and the research interests points of view. Fiber To The Home (FTTH is already a reality in plenty of real contexts and there has been a further stimulus to the proposal of new solutions and the investigation of new possibilities, in order to optimize network performance and reduce capital and operational expenditure. A complete and systematic overview of passive optical access networks is presented in this paper, concerning both the hot research topics and the main operative issues about the design guidelines and the deployment of Passive Optical Networks (PON architectures, nowadays the most commonly implemented approach to realize optical fiber links in the access networks. A comparison of advantages and disadvantages of different multiplexing techniques is discussed, with specific reference to WDM-based networks, almost universally considered as the enabling technology for future proof bandwidth requirements. An exhaustive summary is also given about the-state-of-the-art of modulation and encoding techniques recently proposed by the scientific community, as well as the open challenges (such as colorless and coolerless ONUs for telecom companies and international standardization compliance.

  2. 3. Informationsveranstaltung des Open Access Network Austria (OANA (Wien, 1. Juni 2016

    Directory of Open Access Journals (Sweden)

    Katharina Rieck

    2016-09-01

    Full Text Available Dieser Beitrag fasst die Ergebnisse der 3. OANA-Veranstaltung, die am 01.06.2016 im Palais Harrach in Wien stattfand, zusammen. Das „Open Access Network Austria“ (OANA ist eine „joint activity“ unter dem organisatorischen Dach des Fonds zur Förderung der wissenschaftlichen Forschung (FWF und der Österreichischen Universitätenkonferenz (UNIKO mit dem Ziel Open Access Aktivitäten in der österreichischen Forschungslandschaft zu koordinieren. Die fünf Arbeitsgruppen, die im Jänner 2015 gebildet wurden, präsentierten bei der Informationsveranstaltung die Ergebnisse und Fortschritte aus eineinhalb Jahren Arbeit. Ab Herbst 2016 werden sich vier neue Arbeitsgruppen mit den Themenschwerpunkten „Strategische Positionierung & Administration der Open-Access-Transition“, „Open Access & die Zukunft von Scholarly Communication“, „Open Access & Open Research Data“ und „Open Access & Open Educational Resources“ beschäftigen.

  3. A novel root-index based prioritized random access scheme for 5G cellular networks

    Directory of Open Access Journals (Sweden)

    Taehoon Kim

    2015-12-01

    Full Text Available Cellular networks will play an important role in realizing the newly emerging Internet-of-Everything (IoE. One of the challenging issues is to support the quality of service (QoS during the access phase, while accommodating a massive number of machine nodes. In this paper, we show a new paradigm of multiple access priorities in random access (RA procedure and propose a novel root-index based prioritized random access (RIPRA scheme that implicitly embeds the access priority in the root index of the RA preambles. The performance evaluation shows that the proposed RIPRA scheme can successfully support differentiated performance for different access priority levels, even though there exist a massive number of machine nodes.

  4. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  5. High-Capacity Hybrid Optical Fiber-Wireless Communications Links in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan

    of broadband services access. To realize the seamless convergence between the two network segments, the lower capacity of wireless systems need to be increased to match the continuously increasing bandwidth of fiber-optic systems. The research works included in this thesis are devoted to experimental...... investigations of photonic-wireless links with record high capacities to fulfill the requirements of next generation hybrid optical fiber-wireless access networks. The main contributions of this thesis have expanded the state-of-the-art in two main areas: high speed millimeter-wave (mm-wave) communication links......Integration between fiber-optic and wireless communications systems in the "last mile" access networks is currently considered as a promising solution for both service providers and users, in terms of minimizing deployment cost, shortening upgrading period and increasing mobility and flexibility...

  6. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  7. Exploiting Social Media Sensor Networks through Novel Data Fusion Techniques

    Energy Technology Data Exchange (ETDEWEB)

    Kouri, Tina [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Unprecedented amounts of data are continuously being generated by sensors (“hard” data) and by humans (“soft” data), and this data needs to be exploited to its full potential. The first step in exploiting this data is determine how the hard and soft data are related to each other. In this project we fuse hard and soft data, using the attributes of each (e.g., time and space), to gain more information about interesting events. Next, we attempt to use social networking textual data to predict the present (i.e., predict that an interesting event is occurring and details about the event) using data mining, machine learning, natural language processing, and text analysis techniques.

  8. Improving Feature Representation Based on a Neural Network for Author Profiling in Social Media Texts.

    Science.gov (United States)

    Gómez-Adorno, Helena; Markov, Ilia; Sidorov, Grigori; Posadas-Durán, Juan-Pablo; Sanchez-Perez, Miguel A; Chanona-Hernandez, Liliana

    2016-01-01

    We introduce a lexical resource for preprocessing social media data. We show that a neural network-based feature representation is enhanced by using this resource. We conducted experiments on the PAN 2015 and PAN 2016 author profiling corpora and obtained better results when performing the data preprocessing using the developed lexical resource. The resource includes dictionaries of slang words, contractions, abbreviations, and emoticons commonly used in social media. Each of the dictionaries was built for the English, Spanish, Dutch, and Italian languages. The resource is freely available.

  9. Virtual Community, social network and media environment of Canary Isands regional digital newspapers

    Directory of Open Access Journals (Sweden)

    Dr. Francisco Manuel Mateos Rodríguez

    2008-01-01

    Full Text Available The impact of the new communication and information technologies has favoured the creation of multiple local newspaper websites in the Canary Islands, thus making the regional press emerge as an alternative on the rise. This tendency affects significantly both traditional and new editions of the different regional and local newspapers from the Canaries and motivates a different distribution, positioning and development within the local media environment in which these media share a novel dimension of communication with a specific virtual community and social network within the World Wide Web.

  10. Social Sensor Analytics: Making Sense of Network Models in Social Media

    Energy Technology Data Exchange (ETDEWEB)

    Dowling, Chase P.; Harrison, Joshua J.; Sathanur, Arun V.; Sego, Landon H.; Corley, Courtney D.

    2015-07-27

    Social networks can be thought of as noisy sensor networks mapping real world information to the web. Owing to the extensive body of literature in sensor network analysis, this work sought to apply several novel and traditional methods in sensor network analysis for the purposes of efficiently interrogating social media data streams from raw data. We carefully revisit our definition of a social media signal from previous work both in terms of time-varying features within the data and the networked nature of the medium. Further, we detail our analysis of global patterns in Twitter over the months of November 2013 and June 2014, detect and categorize events, and illustrate how these analyses can be used to inform graph-based models of Twitter, namely using a recent network influence model called PhySense: similar to PageRank but tuned to behavioral analysis by leveraging a sociologically inspired probabilistic model. We ultimately identify forms of information dissemination via analysis of time series and dynamic graph spectra and corroborate these findings through manual investigation of the data as a requisite step in modeling the diffusion process with PhySense. We hope to sufficiently characterize global behavior in a medium such as Twitter as a means of learning global model parameters one may use to predict or simulate behavior on a large scale. We have made our time series and dynamic graph analytical code available via a GitHub repository https://github.com/cpatdowling/salsa and our data are available upon request.

  11. Cross-layer design for radio resource allocation based on priority scheduling in OFDMA wireless access network

    Directory of Open Access Journals (Sweden)

    Chen Yen-Wen

    2011-01-01

    Full Text Available Abstract The orthogonal frequency-division multiple access (OFDMA system has the advantages of flexible subcarrier allocation and adaptive modulation with respect to channel conditions. However, transmission overhead is required in each frame to broadcast the arrangement of radio resources to all mobile stations within the coverage of the same base station. This overhead greatly affects the utilization of valuable radio resources. In this paper, a cross layer scheme is proposed to reduce the number of traffic bursts at the downlink of an OFDMA wireless access network so that the overhead of the media access protocol (MAP field can be minimized. The proposed scheme considers the priorities and the channel conditions of quality of service (QoS traffic streams to arrange for them to be sent with minimum bursts in a heuristic manner. In addition, the trade-off between the degradation of the modulation level and the reduction of traffic bursts is investigated. Simulation results show that the proposed scheme can effectively reduce the traffic bursts and, therefore, increase resource utilization.

  12. Responses to a self-presented suicide attempt in social media: a social network analysis.

    Science.gov (United States)

    Fu, King-Wa; Cheng, Qijin; Wong, Paul W C; Yip, Paul S F

    2013-01-01

    The self-presentation of suicidal acts in social media has become a public health concern. This article centers on a Chinese microblogger who posted a wrist-cutting picture that was widely circulated in Chinese social media in 2011. This exploratory study examines written reactions of a group of Chinese microbloggers exposed to the post containing a self-harming message and photo. In addition, we investigate the pattern of information diffusion via a social network. We systematically collected and analyzed 5,971 generated microblogs and the network of information diffusion. We found that a significant portion of written responses (36.6%) could help vulnerable netizens by providing peer-support and calls for help. These responses were reposted and diffused via an online social network with markedly more clusters of users--and at a faster pace-- than a set of randomly generated networks. We conclude that social media can be a double-edged sword: While it may contagiously affect others by spreading suicidal thoughts and acts, it may also play a positive role by assisting people at risk for suicide, providing rescue or support. More research is needed to learn how suicidally vulnerable people interact with online suicide information, and how we can effectively intervene.

  13. Social Network, Surgeon, and Media Influence on the Decision to Undergo Contralateral Prophylactic Mastectomy.

    Science.gov (United States)

    Venetis, Maria K; MacGeorge, Erina L; Baptiste, Dadrie F; Mouton, Ashton; Friley, Lorin B; Pastor, Rebekah; Hatten, Kristen; Lagoo, Janaka; Bowling, Monet W; Clare, Susan E

    2018-06-01

    The rate of contralateral prophylactic mastectomy (CPM) has risen sharply in the past decade. The current study was designed to examine social network, surgeon, and media influence on patients' CPM decision-making, examining not only who influenced the decision, and to what extent, but also the type of influence exerted. Patients (N=113) who underwent CPM at 4 Indiana University-affiliated hospitals between 2008 and 2012 completed structured telephone interviews in 2013. Questions addressed the involvement and influence of the social network (family, friends, and nonsurgeon health professionals), surgeon, and media on the CPM decision. Spouses, children, family, friends, and health professionals were reported as exerting a meaningful degree of influence on patients' decisions, largely in ways that were positive or neutral toward CPM. Most surgeons were regarded as providing options rather than encouraging or discouraging CPM. Media influence was present, but limited. Patients who choose CPM do so with influence and support from members of their social networks. Reversing the increasing choice of CPM will require educating these influential others, which can be accomplished by encouraging patients to include them in clinical consultations, and by providing patients with educational materials that can be shared with their social networks. Surgeons need to be perceived as having an opinion, specifically that CPM should be reserved for those patients for whom it is medically indicated.

  14. Inside the Digital Wild West: How School Leaders Both Access and Avoid Social Media

    Science.gov (United States)

    Corrigan, Laurie; Robertson, Lorayne

    2015-01-01

    This study examines the roles of Canadian school leaders in response to the rising phenomenon of student use of social media which impacts school climate and safety. The use of social media has resulted in more online text and image-based communication to multiple users and less face-to-face communication with single users. Adolescent…

  15. Reconstruction of three-dimensional porous media using generative adversarial neural networks

    Science.gov (United States)

    Mosser, Lukas; Dubrule, Olivier; Blunt, Martin J.

    2017-10-01

    To evaluate the variability of multiphase flow properties of porous media at the pore scale, it is necessary to acquire a number of representative samples of the void-solid structure. While modern x-ray computer tomography has made it possible to extract three-dimensional images of the pore space, assessment of the variability in the inherent material properties is often experimentally not feasible. We present a method to reconstruct the solid-void structure of porous media by applying a generative neural network that allows an implicit description of the probability distribution represented by three-dimensional image data sets. We show, by using an adversarial learning approach for neural networks, that this method of unsupervised learning is able to generate representative samples of porous media that honor their statistics. We successfully compare measures of pore morphology, such as the Euler characteristic, two-point statistics, and directional single-phase permeability of synthetic realizations with the calculated properties of a bead pack, Berea sandstone, and Ketton limestone. Results show that generative adversarial networks can be used to reconstruct high-resolution three-dimensional images of porous media at different scales that are representative of the morphology of the images used to train the neural network. The fully convolutional nature of the trained neural network allows the generation of large samples while maintaining computational efficiency. Compared to classical stochastic methods of image reconstruction, the implicit representation of the learned data distribution can be stored and reused to generate multiple realizations of the pore structure very rapidly.

  16. A Method for Upper Bounding Long Term Growth of Network Access Speed

    Directory of Open Access Journals (Sweden)

    Thomas Phillip Knudsen

    2006-06-01

    Full Text Available The development in home Internet access speed has shown an exponential development with growth rates averaging 25% per year. For resource management in network provisioning it becomes an urgent question how long such growth can continue. This paper presents a method for calculating an upper bound to visual content driven growth, proceeding from datarate requirements for a full virtual environment. Scenarios and approaches for reducing datarate requirements are considered and discussed. The presented figures for an upper bound on network access speed are discussed and perspectives on further research presented.

  17. A Method for Upper Bounding Long Term Growth of Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Pedersen, Jens Myrup; Madsen, Ole Brun

    2004-01-01

    The development in home Internet access speed has shown an exponential development with growth rates averaging 25% per year. For resource management in network provisioning it becomes an urgent question how long such growth can continue. This paper presents a method for calculating an upper bound...... to visual content driven growth, proceeding from datarate requirements for a full virtual environment. Scenarios and approaches for reducing datarate requirements are considered and discussed. The presented figures for an upper bound on network access speed are discussed and perspectives on further research...

  18. Modeling the video distribution link in the Next Generation Optical Access Networks

    DEFF Research Database (Denmark)

    Amaya, F.; Cárdenas, A.; Tafur Monroy, Idelfonso

    2011-01-01

    In this work we present a model for the design and optimization of the video distribution link in the next generation optical access network. We analyze the video distribution performance in a SCM-WDM link, including the noise, the distortion and the fiber optic nonlinearities. Additionally, we...... consider in the model the effect of distributed Raman amplification, used to extent the capacity and the reach of the optical link. In the model, we use the nonlinear Schrödinger equation with the purpose to obtain capacity limitations and design constrains of the next generation optical access networks....

  19. Modeling the video distribution link in the Next Generation Optical Access Networks

    International Nuclear Information System (INIS)

    Amaya, F; Cardenas, A; Tafur, I

    2011-01-01

    In this work we present a model for the design and optimization of the video distribution link in the next generation optical access network. We analyze the video distribution performance in a SCM-WDM link, including the noise, the distortion and the fiber optic nonlinearities. Additionally, we consider in the model the effect of distributed Raman amplification, used to extent the capacity and the reach of the optical link. In the model, we use the nonlinear Schroedinger equation with the purpose to obtain capacity limitations and design constrains of the next generation optical access networks.

  20. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  1. Acoustic Metadata Management and Transparent Access to Networked Oceanographic Data Sets

    Science.gov (United States)

    2015-09-30

    Transparent Access to Networked Oceanographic Data Sets Marie A. Roch Dept. of Computer Science San Diego State University 5500 Campanile Drive San...specific technologies for processing Excel spreadsheets and Access databases. The architecture (Figure 4) is based on a client-server model...Keesey, M. S., Lieske, J. H., Ostro, S. J., Standish, E. M., and Wimberly, R. N. (1996). "JPL’s On-Line Solar System Data Service," B. Am. Astron

  2. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yun Lin

    2016-10-01

    Full Text Available Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel.

  3. A Prescription for Internet Access: Appealing to Middle-Aged and Older Racial and Ethnic Minorities Through Social Network Sites to Combat Colorectal Cancer.

    Science.gov (United States)

    Lumpkins, Crystal Y; Mabachi, Natabhona; Lee, Jaehoon; Pacheco, Christina; Greiner, K Allen; Geana, Mugur

    2017-07-01

    The popularity and usage of social media networks or SNS (social networking sites) among American Internet users age 50 and over doubled between 2009 and 2010 and has steadily climbed. Part of this increased access may be the result of older adults who are living with a chronic disease and are reaching out for online support. Colorectal cancer (CRC) risk is among those concerns, particularly among middle-age and older minority populations where disparities exist. This exploratory study investigates information seeking behavior related to cancer factors (e.g. testing for colon cancer, cancer fatalism) and current social media usage among racial and ethnic minority groups (African American and Latinos) and Whites age 50 and older. The secondary data from the 2012 Health Information National Trends Survey (HINTS) was analyzed to compare these populations. Results show that African Americans and Latinos were only slightly more likely to use social network sites to seek out cancer information compared to Whites. However, Whites were more likely to use the Internet to seek health information compared to African Americans and Latinos. In this sample, Whites were also more likely to be informed by a physician about CRC testing (p social media networks, Internet sites) have increased among older Americans and can serve as critical channels for cancer information and education.

  4. Channel Access and Power Control for Mobile Crowdsourcing in Device-to-Device Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yue Ma

    2018-01-01

    Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.

  5. Research and Design of Dynamic Migration Access Control Technology Based on Heterogeneous Network

    Directory of Open Access Journals (Sweden)

    Wang Feng

    2017-01-01

    Full Text Available With the continuous development of wireless networks, the amount of privacy services in heterogeneous mobile networks is increasing, such as information storage, user access, and so on. Access control security issues for heterogeneous mobile radio network, this paper proposes a dynamic migration access control technology based on heterogeneous network. Through the system architecture of the mutual trust system, we can understand the real-time mobile node failure or abnormal state. To make the service can be terminated for the node. And adopt the 802.1X authentication way to improve the security of the system. Finally, it by combining the actual running test data, the trust update algorithm of the system is optimized to reduce the actual security threats in the environment. Experiments show that the system’s anti-attack, the success rate of access, bit error rate is in line with the expected results. This system can effectively reduce the system authentication information is illegally obtained after the network security protection mechanism failure and reduce the risk of user data leakage.

  6. Open Access to the Belgian Nuclear higher Education Network

    International Nuclear Information System (INIS)

    Simons, S.

    2005-01-01

    Under the name of the Belgian Nuclear higher Education Network, five Belgian universities, Universite Catholique de Louvain, Universiteit Gent, Universite de Liege, Vrije Universiteit Brussel have established in 2002, in collaboration with the Belgian Nuclear Research Centre SCK-CEN, a common Belgian Interuniversity Programme of the third cycle leading to the academic degree of Master of Science in Nuclear Engineering. Under the lead of the SCK-CEN a project to use and share the acquired experience of the Consortium BNEN - in order to support the realization of a common European Education Programme in Nuclear Engineering - has been accepted by the European Commission for funding under the EU's Sixth Research Framework Programme.The project wants to contribute actively to the development of a more harmonised approach for education in nuclear sciences and engineering in Europe. It brings the European higher Education Area closer to realization and helps to safeguard the necessary competence and expertise for the continued safe use of nuclear energy and other uses of radiation in industry and medicine in Europe. The project foresees input and participation from stakeholders from different countries of the enlarged European Union (EU-25) and will therefore contribute to the integration of the new member states into the European Research Area and thus to the enlargement of Europe. The set-up of the project foresees an active role for female experts with the intention to reinforce the place and role of women in science

  7. ONU power saving modes in next generation optical access networks: progress, efficiency and challenges.

    Science.gov (United States)

    Dixit, Abhishek; Lannoo, Bart; Colle, Didier; Pickavet, Mario; Demeester, Piet

    2012-12-10

    The optical network unit (ONU), installed at a customer's premises, accounts for about 60% of power in current fiber-to-the-home (FTTH) networks. We propose a power consumption model for the ONU and evaluate the ONU power consumption in various next generation optical access (NGOA) architectures. Further, we study the impact of the power savings of the ONU in various low power modes such as power shedding, doze and sleep.

  8. Nonadditivity of quantum capacities of quantum multiple-access channels and the butterfly network

    International Nuclear Information System (INIS)

    Huang Peng; He Guangqiang; Zhu Jun; Zeng Guihua

    2011-01-01

    Multipartite quantum information transmission without additional classical resources is investigated. We show purely quantum superadditivity of quantum capacity regions of quantum memoryless multiple-access (MA) channels, which are not entanglement breaking. Also, we find that the superadditivity holds when the MA channel extends to the quantum butterfly network, which can achieve quantum network coding. The present widespread effects for the channels which enable entanglement distribution have not been revealed for multipartite scenarios.

  9. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    OpenAIRE

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols,...

  10. Using LinkedIn in the Marketing Classroom: Exploratory Insights and Recommendations for Teaching Social Media/Networking

    Science.gov (United States)

    McCorkle, Denny E.; McCorkle, Yuhua Li

    2012-01-01

    With the rapid growth of social networking and media comes their consideration for use in the marketing classroom. Social networking skills are becoming essential for personal branding (e.g., networking, self-marketing) and corporate/product branding (e.g., marketing communication). This paper addresses the use of LinkedIn (i.e., an online…

  11. On the development of online cities and neighborhoods: an exploration of cumulative and segmentive network effects in social media

    NARCIS (Netherlands)

    Maris, I.; Huizinga, A; Bouman, W.; Tuunainen, V.K.; Rossi, M.; Nandhakumar, J.

    2011-01-01

    This paper outlines a research in progress set to study network effects in social media. The focus is on outlining the theoretical framework in which this study is embedded. The concepts of cumulative network effects and segmentive network effects are introduced to explain the processes by which

  12. Efficient traffic grooming with dynamic ONU grouping for multiple-OLT-based access network

    Science.gov (United States)

    Zhang, Shizong; Gu, Rentao; Ji, Yuefeng; Wang, Hongxiang

    2015-12-01

    Fast bandwidth growth urges large-scale high-density access scenarios, where the multiple Passive Optical Networking (PON) system clustered deployment can be adopted as an appropriate solution to fulfill the huge bandwidth demands, especially for a future 5G mobile network. However, the lack of interaction between different optical line terminals (OLTs) results in part of the bandwidth resources waste. To increase the bandwidth efficiency, as well as reduce bandwidth pressure at the edge of a network, we propose a centralized flexible PON architecture based on Time- and Wavelength-Division Multiplexing PON (TWDM PON). It can provide flexible affiliation for optical network units (ONUs) and different OLTs to support access network traffic localization. Specifically, a dynamic ONU grouping algorithm (DGA) is provided to obtain the minimal OLT outbound traffic. Simulation results show that DGA obtains an average 25.23% traffic gain increment under different OLT numbers within a small ONU number situation, and the traffic gain will increase dramatically with the increment of the ONU number. As the DGA can be deployed easily as an application running above the centralized control plane, the proposed architecture can be helpful to improve the network efficiency for future traffic-intensive access scenarios.

  13. Future Scenarios for Software-Defined Metro and Access Networks and Software-Defined Photonics

    Directory of Open Access Journals (Sweden)

    Tommaso Muciaccia

    2017-01-01

    Full Text Available In recent years, architectures, devices, and components in telecommunication networks have been challenged by evolutionary and revolutionary factors which are drastically changing the traffic features. Most of these changes imply the need for major re-configurability and programmability not only in data-centers and core networks, but also in the metro-access segment. In a wide variety of contexts, this necessity has been addressed by the proposed introduction of the innovative paradigm of software-defined networks (SDNs. Several solutions inspired by the SDN model have been recently proposed also for metro and access networks, where the adoption of a new generation of software-defined reconfigurable integrated photonic devices is highly desirable. In this paper, we review the possible future application scenarios for software-defined metro and access networks and software-defined photonics (SDP, on the base of analytics, statistics, and surveys. This work describes the reasons underpinning the presented radical change of paradigm and summarizes the most significant solutions proposed in literature, with a specific emphasis to physical-layer reconfigurable networks and a focus on both architectures and devices.

  14. Service Class Resource Management For Green Wireless-Optical Broadband Access NetworksWOBAN

    Directory of Open Access Journals (Sweden)

    SRUTHY.S

    2015-08-01

    Full Text Available Abstract-Broadband access networks have become an essential part of worldwide communication systems because of the exponential growth of broadband services such as video on demand high definition TV internet protocol TV and video conferencing. Exponential growth in the volume of wireless data boosted by the growing popularity of mobile devices such as smartphone and tablets has forced the telecommunication industries to rethink the way networks are currently designed and to focus on the development of high-capacity mobile broadband networks. In response to this challenge researchers have been working toward the development of an integrated wireless optical broadband access network. Two major candidate technologies which are currently known for their high capacity as well as quality of service QoS for multimedia traffic are passive optical networks PON and fourth generation 4G wireless networks. PON is a wired access technology well known for its cost efficiency and high capacity whereas 4G is a wireless broadband access technology which has achieved broad market acceptance because of its ease of deployment ability to offer mobility and its cost efficiency. Integration of PON and 4G technologies in the form of wireless-optical broadband access networks offers advantages such as extension of networks in rural areas support for mobile broadband services and quick deployment of broadband networks. These two technologies however have different design architectures for handling broadband services that require quality of service. For example 4G networks use traffic classification for supporting different QoS demands whereas the PON architecture has no such mechanism to differentiate between types of traffic. These two technologies also differ in their power saving mechanisms. Propose a service class mapping for the integrated PON-4G network which is based on the MG1 queuing model and class-based power saving mechanism which significantly improves the

  15. Do online social media cut through the constraints that limit the size of offline social networks?

    Science.gov (United States)

    Dunbar, R I M

    2016-01-01

    The social brain hypothesis has suggested that natural social network sizes may have a characteristic size in humans. This is determined in part by cognitive constraints and in part by the time costs of servicing relationships. Online social networking offers the potential to break through the glass ceiling imposed by at least the second of these, potentially enabling us to maintain much larger social networks. This is tested using two separate UK surveys, each randomly stratified by age, gender and regional population size. The data show that the size and range of online egocentric social networks, indexed as the number of Facebook friends, is similar to that of offline face-to-face networks. For one sample, respondents also specified the number of individuals in the inner layers of their network (formally identified as support clique and sympathy group), and these were also similar in size to those observed in offline networks. This suggests that, as originally proposed by the social brain hypothesis, there is a cognitive constraint on the size of social networks that even the communication advantages of online media are unable to overcome. In practical terms, it may reflect the fact that real (as opposed to casual) relationships require at least occasional face-to-face interaction to maintain them.

  16. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  17. Analyzing Social Media Networks with NodeXL Insights from a Connected World

    CERN Document Server

    Hansen, Derek; Smith, Marc A

    2010-01-01

    Businesses, entrepreneurs, individuals, and government agencies alike are looking to social network analysis (SNA) tools for insight into trends, connections, and fluctuations in social media. Microsoft's NodeXL is a free, open-source SNA plug-in for use with Excel. It provides instant graphical representation of relationships of complex networked data. But it goes further than other SNA tools -- NodeXL was developed by a multidisciplinary team of experts that bring together information studies, computer science, sociology, human-computer interaction, and over 20 years of visual analytic theor

  18. Telemetry Standards, RCC Standard 106-17, Chapter 27, RF Network Access Layer

    Science.gov (United States)

    2017-07-01

    to the physical media (i.e., the wireless RF network). On the transmission side, it is responsible for framing IP packets for physical transmission ...resolution bandwidth of 30 kHz. It was measured during the steady power condition during a burst transmission . Telemetry Standards, RCC Standard... power levels available for modulated burst transmission . Table 27-1. Transceiver Phase Noise Mask dBc/Hz Frequency Offset −30 dBc/Hz 10 Hz −60 dBc

  19. Cost-effective DWDM ROADM design for flexible sustainable optical metro–access networks

    OpenAIRE

    Sarmiento Hernández, Samael; Altabas, Jose Antonio; Izquierdo, David; Garces, Ignacio; Spadaro, Salvatore; Lázaro Villa, José Antonio

    2017-01-01

    © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes,creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works Architectural changes are required for the underlying networks to support the expected Internet data traffic vol...

  20. Transformation of Traditional Marketing Communications in to Paradigms of Social Media Networking

    OpenAIRE

    Nair, T. R. Gopalakrishnan; Subramaniam, Kumarashvari

    2012-01-01

    Effective Communication for marketing is a vital field in business organizations, which is used to convey the details about their products and services to the market segments and subsequently to build long lasting customer relationships. This paper focuses on an emerging component of the integrated marketing communication, ie. social media networking, as it is increasingly becoming the trend. In 21st century, the marketing communication platforms show a tendency to shift towards innovative te...

  1. New Generation Marketing On Social Media And A Research On Usage Of Social Networks In

    OpenAIRE

    Tolga Kara

    2012-01-01

    In today’s world where technological progresses are quickly changing our lives, firms have to reshape themselves according to this new understanding. Classical business models that focus on producer are replaced by consumer centric new business ideas. Firms which are far away from needs and expectations of consumer will lose their market position and disappear over time. This view shows itself in new communication channels and social media networks offer incredible possibilities for firms. In...

  2. Status of Utilizing Social Media Networks in the Teaching-Learning Process at Public Jordanian Universities

    OpenAIRE

    Muneera Abdalkareem Alshdefait; Mohammad . S. Alzboon

    2018-01-01

    This study aimed at finding out the status of utilizing social media networks in the teaching-learning process at public Jordanian Universities. To achieve the goal of the study, the descriptive developmental method was used and a questionnaire was developed, consisting of (35) statements. The questionnaire was checked for its validity and reliability. Then it was distributed to a sample of (382) male and female students from the undergraduate and graduate levels. The study results showed tha...

  3. Locating the scala media in the fixed human temporal bone for therapeutic access: a preliminary study.

    Science.gov (United States)

    Pau, H; Fagan, P; Oleskevich, S

    2006-11-01

    To investigate the location of the scala media in relation to the round window niche in human temporal bones. Ten human temporal bones were investigated by radical mastoidectomy and promontory drill-out. Temporal bone laboratory. The distance from the scala media to the anterior edge of the round window niche, measured by Fisch's stapedectomy measuring cylinders. The scala media was identified at the transection point of a vertical line 1.6 to 2.2 mm (mean=1.8 mm; standard deviation=0.2) anterior to the anterior edge of the round window niche and a horizontal line 0.2 mm inferior to the lower border of the oval window. This report demonstrates the point of entry into the scala media via the promontory in fixed temporal bone models, which may provide a site of entry for stem cells and gene therapy insertion.

  4. Advance reservation access control using software-defined networking and tokens

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar; Rao, Nageswara S. V.; Foster, Ian T.; Clark, Russ; Owen, Henry

    2018-02-01

    Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present here a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization. We use SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. We conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network. (C) 2017 Elsevier B.V. All rights reserved.

  5. Raging Against the Machine: Network Gatekeeping and Collective Action on Social Media Platforms

    Directory of Open Access Journals (Sweden)

    Sarah Myers West

    2017-09-01

    Full Text Available Social media platforms act as networked gatekeepers—by ranking, channeling, promoting, censoring, and deleting content they hold power to facilitate or hinder information flows. One of the mechanisms they use is content moderation, or the enforcement of which content is allowed or disallowed on the platform. Though content moderation relies on users’ labor to identify content to delete, users have little capacity to influence content policies or enforcement. Despite this, some social media users are turning to collective action campaigns, redirecting information flows by subverting the activities of moderators, raising the visibility of otherwise hidden moderation practices, and organizing constituencies in opposition to content policies. Drawing on the example of the campaign to change Facebook’s nudity policy, this paper examines the strategies and tactics of users turning to collective action, considering which factors are most influential in determining the success or failure of a campaign. It finds that network gatekeeping salience is a good model for assessing which collective action efforts are most likely to be effective in achieving individual user goals. This indicates that the users who are already most able to harness the attention economy of social media platforms are more likely to successfully navigate the content moderation process. The analysis concludes by attending to what users might learn from the dynamics of network gatekeeping as they seek to resist the asymmetrical power relations of platforms.

  6. Medical Concept Normalization in Social Media Posts with Recurrent Neural Networks.

    Science.gov (United States)

    Tutubalina, Elena; Miftahutdinov, Zulfat; Nikolenko, Sergey; Malykh, Valentin

    2018-06-12

    Text mining of scientific libraries and social media has already proven itself as a reliable tool for drug repurposing and hypothesis generation. The task of mapping a disease mention to a concept in a controlled vocabulary, typically to the standard thesaurus in the Unified Medical Language System (UMLS), is known as medical concept normalization. This task is challenging due to the differences in the use of medical terminology between health care professionals and social media texts coming from the lay public. To bridge this gap, we use sequence learning with recurrent neural networks and semantic representation of one- or multi-word expressions: we develop end-to-end architectures directly tailored to the task, including bidirectional Long Short-Term Memory, Gated Recurrent Units with an attention mechanism, and additional semantic similarity features based on UMLS. Our evaluation against a standard benchmark shows that recurrent neural networks improve results over an effective baseline for classification based on convolutional neural networks. A qualitative examination of mentions discovered in a dataset of user reviews collected from popular online health information platforms as well as a quantitative evaluation both show improvements in the semantic representation of health-related expressions in social media. Copyright © 2018. Published by Elsevier Inc.

  7. QoS Provisioning Techniques for Future Fiber-Wireless (FiWi Access Networks

    Directory of Open Access Journals (Sweden)

    Martin Maier

    2010-04-01

    Full Text Available A plethora of enabling optical and wireless access-metro network technologies have been emerging that can be used to build future-proof bimodal fiber-wireless (FiWi networks. Hybrid FiWi networks aim at providing wired and wireless quad-play services over the same infrastructure simultaneously and hold great promise to mitigate the digital divide and change the way we live and work by replacing commuting with teleworking. After overviewing enabling optical and wireless network technologies and their QoS provisioning techniques, we elaborate on enabling radio-over-fiber (RoF and radio-and-fiber (R&F technologies. We describe and investigate new QoS provisioning techniques for future FiWi networks, ranging from traffic class mapping, scheduling, and resource management to advanced aggregation techniques, congestion control, and layer-2 path selection algorithms.

  8. On-demand virtual optical network access using 100 Gb/s Ethernet.

    Science.gov (United States)

    Ishida, Osamu; Takamichi, Toru; Arai, Sachine; Kawate, Ryusuke; Toyoda, Hidehiro; Morita, Itsuro; Araki, Soichiro; Ichikawa, Toshiyuki; Hoshida, Takeshi; Murai, Hitoshi

    2011-12-12

    Our Terabit LAN initiatives attempt to enhance the scalability and utilization of lambda resources. This paper describes bandwidth-on-demand virtualized 100GE access to WDM networks on a field fiber test-bed using multi-domain optical-path provisioning. © 2011 Optical Society of America

  9. A three-stage heuristic for harvest scheduling with access road network development

    Science.gov (United States)

    Mark M. Clark; Russell D. Meller; Timothy P. McDonald

    2000-01-01

    In this article we present a new model for the scheduling of forest harvesting with spatial and temporal constraints. Our approach is unique in that we incorporate access road network development into the harvest scheduling selection process. Due to the difficulty of solving the problem optimally, we develop a heuristic that consists of a solution construction stage...

  10. Receiver-initiated medium access control protocols for wireless sensor networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.

    2015-01-01

    One of the fundamental building blocks of a Wireless Sensor Network (WSN) is the Medium Access Control (MAC) protocol, that part of the system governing when and how two independent neighboring nodes activate their respective transceivers to directly interact. Historically, data exchange has always...

  11. A hybrid medium access control for convergence of broadband wireless and wireline ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    2000-01-01

    In this paper, we propose a hybrid medium access control protocol for supporting broadband integrated services in the wireless ATM networks. The integrated services include CBR, VBR and ABR traffic varying from low bit-rate to very high bit-rate. The proposed protocol is an excellent compromise...

  12. Dynamic optical fiber delivery of Ka-band packet transmissions for wireless access networks

    DEFF Research Database (Denmark)

    Rodríguez Páez, Juan Sebastián; Madsen, Peter; Tafur Monroy, Idelfonso

    2017-01-01

    A Reconfigurable Radio Access Unit is presented and experimentally demonstrated. In the unit, an optical switching system is set to dynamically deliver different packets to different points in the network. The packets are transmitted wirelesslty on the Ka-band (26–40 GHz), achieving BER values...

  13. Community access networks: how to connect the next billion to the ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Community access networks: how to connect the next billion to the Internet ... services is a prerequisite to sustainable socio-economic development. ... It will provide case studies and formulate recommendations with respect to ... An IDRC delegation will join international delegates and city representatives at the ICLEI World ...

  14. Assessing Individual Social Capital Capacity: The Development and Validation of a Network Accessibility Scale

    Science.gov (United States)

    Hatala, John-Paul

    2009-01-01

    Any organization that is able to promote the importance of increased levels of social capital and individuals who can leverage and use the resources that exist within the network may experience higher levels of performance. This study sought to add to our knowledge about individuals' accessing social resources for the purpose of accomplishing…

  15. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  16. Analysis of the Decoupled Access for Downlink and Uplink in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Smiljkovikj, K.; Popovski, Petar; Gavrilovska, L.

    2015-01-01

    Wireless cellular networks evolve towards a heterogeneous infrastructure, featuring multiple types of Base Stations (BSs), such as Femto BSs (FBSs) and Macro BSs (MBSs). A wireless device observes multiple points (BSs) through which it can access the infrastructure and it may choose to receive th...

  17. Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    Science.gov (United States)

    Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  18. Data Archiving and Networked Services (DANS) promotes sustained access to digital research data

    NARCIS (Netherlands)

    van Berchum, M.; Kraaikamp, Emilie

    2015-01-01

    Data Archiving and Networked Services (DANS) promotes sustained access to digital research data. For this purpose, DANS encourages researchers to archive and reuse data in a sustained form. In the online archiving system EASY research data is stored in a permanent and sustainable manner, according

  19. Modeling Accessibility of Screening and Treatment Facilities for Older Adults using Transportation Networks.

    Science.gov (United States)

    Zhang, Qiuyi; Northridge, Mary E; Jin, Zhu; Metcalf, Sara S

    2018-04-01

    Increased lifespans and population growth have resulted in an older U.S. society that must reckon with the complex oral health needs that arise as adults age. Understanding accessibility to screening and treatment facilities for older adults is necessary in order to provide them with preventive and restorative services. This study uses an agent-based model to examine the accessibility of screening and treatment facilities via transportation networks for older adults living in the neighborhoods of northern Manhattan, New York City. Older adults are simulated as socioeconomically distinct agents who move along a GIS-based transportation network using transportation modes that mediate their access to screening and treatment facilities. This simulation model includes four types of mobile agents as a simplifying assumption: walk, by car, by bus, or by van (i.e., a form of transportation assistance for older adults). These mobile agents follow particular routes: older adults who travel by car, bus, and van follow street roads, whereas pedestrians follow walkways. The model enables the user to focus on one neighborhood at a time for analysis. The spatial dimension of an older adult's accessibility to screening and treatment facilities is simulated through the travel costs (indicated by travel time or distance) incurred in the GIS-based model environment, where lower travel costs to screening and treatment facilities imply better access. This model provides a framework for representing health-seeking behavior that is contextualized by a transportation network in a GIS environment.

  20. Scalable Active Optical Access Network Using Variable High-Speed PLZT Optical Switch/Splitter

    Science.gov (United States)

    Ashizawa, Kunitaka; Sato, Takehiro; Tokuhashi, Kazumasa; Ishii, Daisuke; Okamoto, Satoru; Yamanaka, Naoaki; Oki, Eiji

    This paper proposes a scalable active optical access network using high-speed Plumbum Lanthanum Zirconate Titanate (PLZT) optical switch/splitter. The Active Optical Network, called ActiON, using PLZT switching technology has been presented to increase the number of subscribers and the maximum transmission distance, compared to the Passive Optical Network (PON). ActiON supports the multicast slot allocation realized by running the PLZT switch elements in the splitter mode, which forces the switch to behave as an optical splitter. However, the previous ActiON creates a tradeoff between the network scalability and the power loss experienced by the optical signal to each user. It does not use the optical power efficiently because the optical power is simply divided into 0.5 to 0.5 without considering transmission distance from OLT to each ONU. The proposed network adopts PLZT switch elements in the variable splitter mode, which controls the split ratio of the optical power considering the transmission distance from OLT to each ONU, in addition to PLZT switch elements in existing two modes, the switching mode and the splitter mode. The proposed network introduces the flexible multicast slot allocation according to the transmission distance from OLT to each user and the number of required users using three modes, while keeping the advantages of ActiON, which are to support scalable and secure access services. Numerical results show that the proposed network dramatically reduces the required number of slots and supports high bandwidth efficiency services and extends the coverage of access network, compared to the previous ActiON, and the required computation time for selecting multicast users is less than 30msec, which is acceptable for on-demand broadcast services.

  1. Partial Interference and Its Performance Impact on Wireless Multiple Access Networks

    Directory of Open Access Journals (Sweden)

    Lau WingCheong

    2010-01-01

    Full Text Available To determine the capacity of wireless multiple access networks, the interference among the wireless links must be accurately modeled. In this paper, we formalize the notion of the partial interference phenomenon observed in many recent wireless measurement studies and establish analytical models with tractable solutions for various types of wireless multiple access networks. In particular, we characterize the stability region of IEEE 802.11 networks under partial interference with two potentially unsaturated links numerically. We also provide a closed-form solution for the stability region of slotted ALOHA networks under partial interference with two potentially unsaturated links and obtain a partial characterization of the boundary of the stability region for the general M-link case. Finally, we derive a closed-form approximated solution for the stability region for general M-link slotted ALOHA system under partial interference effects. Based on our results, we demonstrate that it is important to model the partial interference effects while analyzing wireless multiple access networks. This is because such considerations can result in not only significant quantitative differences in the predicted system capacity but also fundamental qualitative changes in the shape of the stability region of the systems.

  2. Gain transient control for wavelength division multiplexed access networks using semiconductor optical amplifiers

    DEFF Research Database (Denmark)

    Gibbon, Timothy Braidwood; Osadchiy, Alexey Vladimirovich; Kjær, Rasmus

    2009-01-01

    Gain transients can severely hamper the upstream network performance in wavelength division multiplexed (WDM) access networks featuring erbium doped fiber amplifiers (EDFAs) or Raman amplification. We experimentally demonstrate for the first time using 10 Gb/s fiber transmission bit error rate...... measurements how a near-saturated semiconductor optical amplifier (SOA) can be used to control these gain transients. An SOA is shown to reduce the penalty of transients originating in an EDFA from 2.3 dB to 0.2 dB for 10 Gb/s transmission over standard single mode fiber using a 231-1 PRBS pattern. The results...... suggest that a single SOA integrated within a WDM receiver at the metro node could offer a convenient all-optical solution for upstream transient controlin WDM access networks....

  3. Bandwidth Impacts of Localizing Peer-to-Peer IP Video Traffic in Access and Aggregation Networks

    Directory of Open Access Journals (Sweden)

    Kerpez Kenneth

    2008-01-01

    Full Text Available Abstract This paper examines the burgeoning impact of peer-to-peer (P2P traffic IP video traffic. High-quality IPTV or Internet TV has high-bandwidth requirements, and P2P IP video could severely strain broadband networks. A model for the popularity of video titles is given, showing that some titles are very popular and will often be available locally; making localized P2P attractive for video titles. The bandwidth impacts of localizing P2P video to try and keep traffic within a broadband access network area or within a broadband access aggregation network area are examined. Results indicate that such highly localized P2P video can greatly lower core bandwidth usage.

  4. Bandwidth Impacts of Localizing Peer-to-Peer IP Video Traffic in Access and Aggregation Networks

    Directory of Open Access Journals (Sweden)

    Kenneth Kerpez

    2008-10-01

    Full Text Available This paper examines the burgeoning impact of peer-to-peer (P2P traffic IP video traffic. High-quality IPTV or Internet TV has high-bandwidth requirements, and P2P IP video could severely strain broadband networks. A model for the popularity of video titles is given, showing that some titles are very popular and will often be available locally; making localized P2P attractive for video titles. The bandwidth impacts of localizing P2P video to try and keep traffic within a broadband access network area or within a broadband access aggregation network area are examined. Results indicate that such highly localized P2P video can greatly lower core bandwidth usage.

  5. Experimental demonstration of large capacity WSDM optical access network with multicore fibers and advanced modulation formats.

    Science.gov (United States)

    Li, Borui; Feng, Zhenhua; Tang, Ming; Xu, Zhilin; Fu, Songnian; Wu, Qiong; Deng, Lei; Tong, Weijun; Liu, Shuang; Shum, Perry Ping

    2015-05-04

    Towards the next generation optical access network supporting large capacity data transmission to enormous number of users covering a wider area, we proposed a hybrid wavelength-space division multiplexing (WSDM) optical access network architecture utilizing multicore fibers with advanced modulation formats. As a proof of concept, we experimentally demonstrated a WSDM optical access network with duplex transmission using our developed and fabricated multicore (7-core) fibers with 58.7km distance. As a cost-effective modulation scheme for access network, the optical OFDM-QPSK signal has been intensity modulated on the downstream transmission in the optical line terminal (OLT) and it was directly detected in the optical network unit (ONU) after MCF transmission. 10 wavelengths with 25GHz channel spacing from an optical comb generator are employed and each wavelength is loaded with 5Gb/s OFDM-QPSK signal. After amplification, power splitting, and fan-in multiplexer, 10-wavelength downstream signal was injected into six outer layer cores simultaneously and the aggregation downstream capacity reaches 300 Gb/s. -16 dBm sensitivity has been achieved for 3.8 × 10-3 bit error ratio (BER) with 7% Forward Error Correction (FEC) limit for all wavelengths in every core. Upstream signal from ONU side has also been generated and the bidirectional transmission in the same core causes negligible performance degradation to the downstream signal. As a universal platform for wired/wireless data access, our proposed architecture provides additional dimension for high speed mobile signal transmission and we hence demonstrated an upstream delivery of 20Gb/s per wavelength with QPSK modulation formats using the inner core of MCF emulating a mobile backhaul service. The IQ modulated data was coherently detected in the OLT side. -19 dBm sensitivity has been achieved under the FEC limit and more than 18 dB power budget is guaranteed.

  6. ‪The Vulnerability of Social Networking Media and the Insider Threat: New Eyes for Bad Guys‬ [video

    OpenAIRE

    Lenkart, John; Center for Homeland Defense and Security Naval Postgraduate School

    2012-01-01

    Social networking media introduces a new set of vulnerabilities to protecting an organization's sensitive information. Adversaries are actively targeting U.S. industry to acquire trade secrets to undercut U.S. business in the marketplace. Of primary concern is an insider's betrayal of an organization by providing sensitive information to a hostile outsider. Social engineering, when coupled with the new and widespread use of social networking media, becomes more effective by exploiting the wea...

  7. Open-Access-Kooperationen in Österreich: Open Access Network Austria und E-Infrastructures Austria – aktuelle Entwicklungen seit 2012

    Directory of Open Access Journals (Sweden)

    Bauer, Bruno

    2014-12-01

    Full Text Available [english] The Berlin Declaration on Open Access to scientific knowledge was published in October 2003. All over the world initiatives and projects were started. However, in Austria Open Access got little attention over many years. This was confirmed by a study among Austrian universities on behalf of the Council of Austrian University Libraries. Finally at the turn of the year 2012/2013 the Open Access Network Austria and the university infrastructure project E-Infrastructure Austria were started to push Open Access in Austria on a national level. So 10 years after the Berlin Declaration Austria set up the preconditions to establish sustainable Open Access.

  8. Basics of Computer Networking

    CERN Document Server

    Robertazzi, Thomas

    2012-01-01

    Springer Brief Basics of Computer Networking provides a non-mathematical introduction to the world of networks. This book covers both technology for wired and wireless networks. Coverage includes transmission media, local area networks, wide area networks, and network security. Written in a very accessible style for the interested layman by the author of a widely used textbook with many years of experience explaining concepts to the beginner.

  9. Network flow model of force transmission in unbonded and bonded granular media.

    Science.gov (United States)

    Tordesillas, Antoinette; Tobin, Steven T; Cil, Mehmet; Alshibli, Khalid; Behringer, Robert P

    2015-06-01

    An established aspect of force transmission in quasistatic deformation of granular media is the existence of a dual network of strongly versus weakly loaded particles. Despite significant interest, the regulation of strong and weak forces through the contact network remains poorly understood. We examine this aspect of force transmission using data on microstructural fabric from: (I) three-dimensional discrete element models of grain agglomerates of bonded subspheres constructed from in situ synchrotron microtomography images of silica sand grains under unconfined compression and (II) two-dimensional assemblies of unbonded photoelastic circular disks submitted to biaxial compression under constant volume. We model force transmission as a network flow and solve the maximum flow-minimum cost (MFMC) problem, the solution to which yields a percolating subnetwork of contacts that transmits the "maximum flow" (i.e., the highest units of force) at "least cost" (i.e., the dissipated energy from such transmission). We find the MFMC describes a two-tier hierarchical architecture. At the local level, it encapsulates intraconnections between particles in individual force chains and in their conjoined 3-cycles, with the most common configuration having at least one force chain contact experiencing frustrated rotation. At the global level, the MFMC encapsulates interconnections between force chains. The MFMC can be used to predict most of the force chain particles without need for any information on contact forces, thereby suggesting the network flow framework may have potential broad utility in the modeling of force transmission in unbonded and bonded granular media.

  10. Optimal design of mixed-media packet-switching networks - Routing and capacity assignment

    Science.gov (United States)

    Huynh, D.; Kuo, F. F.; Kobayashi, H.

    1977-01-01

    This paper considers a mixed-media packet-switched computer communication network which consists of a low-delay terrestrial store-and-forward subnet combined with a low-cost high-bandwidth satellite subnet. We show how to route traffic via ground and/or satellite links by means of static, deterministic procedures and assign capacities to channels subject to a given linear cost such that the network average delay is minimized. Two operational schemes for this network model are investigated: one is a scheme in which the satellite channel is used as a slotted ALOHA channel; the other is a new multiaccess scheme we propose in which whenever a channel collision occurs, retransmission of the involved packets will route through ground links to their destinations. The performance of both schemes is evaluated and compared in terms of cost and average packet delay tradeoffs for some examples. The results offer guidelines for the design and optimal utilization of mixed-media networks.

  11. Highly Reliable PON Optical Splitters for Optical Access Networks in Outside Environments

    Science.gov (United States)

    Watanabe, Hiroshi; Araki, Noriyuki; Fujimoto, Hisashi

    Broadband optical access services are spreading throughout the world, and the number of fiber to the home (FTTH) subscribers is increasing rapidly. Telecom operators are constructing passive optical networks (PONs) to provide optical access services. Externally installed optical splitters for PONs are very important passive devices in optical access networks, and they must provide satisfactory performance as outdoor plant over long periods. Therefore, we calculate the failure rate of optical access networks and assign a failure rate to the optical splitters in optical access networks. The maximum cumulative failure rate of 1 × 8 optical splitters was calculated as 0.025 for an optical access fiber length of 2.1km and a 20-year operating lifetime. We examined planar lightwave circuit (PLC) type optical splitters for use as outside plant in terms of their optical characteristics and environmental reliability. We confirmed that PLC type optical splitters have sufficient optical performance for a PON splitter and sufficient reliability as outside plant in accordance with ITU-T standard values. We estimated the lifetimes of three kinds of PLC type optical splitters by using accelerated aging tests. The estimated failure rate of these splitters installed in optical access networks was below the target value for the cumulative failure rate, and we confirmed that they have sufficient reliability to maintain the quality of the network service. We developed 1 × 8 optical splitter modules with plug and socket type optical connectors and optical fiber cords for optical aerial closures designed for use as outside plant. These technologies make it easy to install optical splitters in an aerial optical closure. The optical splitter modules have sufficient optical performance levels for PONs because the insertion loss at the commercially used wavelengths of 1.31 and 1.55µm is less than the criterion established by ITU-T Recommendation G.671 for optical splitters. We performed a

  12. The Access Gap: Poverty and Characteristics of School Library Media Centers

    Science.gov (United States)

    Pribesh, Shana; Gavigan, Karen; Dickinson, Gail

    2011-01-01

    Stephen Krashen believes that schools can counter the effects of poverty in at least one area: access to books. However, little research has been done to determine whether students living in poverty have access to school library services comparable to those attending schools with low concentrations of students living in poverty. We examined the…

  13. ALPHA: Proposal of Mapping QoS Parameters between UPnP Home Network and GMPLS Access

    DEFF Research Database (Denmark)

    Brewka, Lukasz Jerzy; Sköldström, Pontus; Gavler, Anders

    2011-01-01

    This paper is treating the interdomain QoS signaling between the home and access domains with a focus on applying it for providing QoS between a UPnP-QoS based home network and GMPLS based access network. The work presented here is defining a possible approach for an interface between UPn...

  14. Access, engagement, networks, and norms: Dimensions of social capital at work in a first grade classroom

    Science.gov (United States)

    Wexler-Robock, Stephanie

    Social capital refers to access and use of resources available through one's networks to solve problems, and the norms that reflect inclusive or exclusive access to those networks and resources. Research has found positive relationships between social capital, academic achievement, and attainment. Studies, however, have generally examined social capital through factors that occur outside the classroom; students who have social capital, acquired through their family and community relationships, seem to be more successful academically. Limited research has explored what if any factors within the classroom might impact the production, and nature of social capital, or its workings in a classroom. The purpose of this study was to explore the workings and nature of classroom social capital, including its possible relationships to engagement and cognition among 5 student participants. Using methods of qualitative data collection, mixed methods were used to analyze information resources, participants' networking, student work, and classroom discourse. Eight interdependent networking factors and 3 overarching patterns of norms were discovered. The networking factors reflected the structure, content, processes, purposes, and acceptability of participants' networking. The norms, also working interdependently, appeared to promote or inhibit among other things, engagement in networking, help seeking, access, sharing, and intertextual use of diverse, often complex sources of information. Through interaction of the 8 factors and 3 overarching norms, ongoing outcomes of networking appeared to include the creation of bridging (inclusive) and bonding (exclusive) forms of social capital, and depth of scientific conceptual understanding, in this case, about birds. Bridging social capital appeared related to willingness to engage in strong and weak tie networking, help seeking, intertextuality, and possibly to mastery goal orientation for all participants, regardless of reading level

  15. Identifying Opinion Leaders to Promote Organ Donation on Social Media: Network Study

    Science.gov (United States)

    Salmon, Charles T

    2018-01-01

    Background In the recent years, social networking sites (SNSs, also called social media) have been adopted in organ donation campaigns, and recruiting opinion leaders for such campaigns has been found effective in promoting behavioral changes. Objective The aim of this paper was to focus on the dissemination of organ donation tweets on Weibo, the Chinese equivalent of Twitter, and to examine the opinion leadership in the retweet network of popular organ donation messages using social network analysis. It also aimed to investigate how personal and social attributes contribute to a user’s opinion leadership on the topic of organ donation. Methods All messages about organ donation posted on Weibo from January 1, 2015 to December 31, 2015 were extracted using Python Web crawler. A retweet network with 505,047 nodes and 545,312 edges of the popular messages (n=206) was constructed and analyzed. The local and global opinion leaderships were measured using network metrics, and the roles of personal attributes, professional knowledge, and social positions in obtaining the opinion leadership were examined using general linear model. Results The findings revealed that personal attributes, professional knowledge, and social positions predicted individual’s local opinion leadership in the retweet network of popular organ donation messages. Alternatively, personal attributes and social positions, but not professional knowledge, were significantly associated with global opinion leadership. Conclusions The findings of this study indicate that health campaign designers may recruit peer leaders in SNS organ donation promotions to facilitate information sharing among the target audience. Users who are unverified, active, well connected, and experienced with information and communications technology (ICT) will accelerate the sharing of organ donation messages in the global environment. Medical professionals such as organ transplant surgeons who can wield a great amount of

  16. Identifying Opinion Leaders to Promote Organ Donation on Social Media: Network Study.

    Science.gov (United States)

    Shi, Jingyuan; Salmon, Charles T

    2018-01-09

    In the recent years, social networking sites (SNSs, also called social media) have been adopted in organ donation campaigns, and recruiting opinion leaders for such campaigns has been found effective in promoting behavioral changes. The aim of this paper was to focus on the dissemination of organ donation tweets on Weibo, the Chinese equivalent of Twitter, and to examine the opinion leadership in the retweet network of popular organ donation messages using social network analysis. It also aimed to investigate how personal and social attributes contribute to a user's opinion leadership on the topic of organ donation. All messages about organ donation posted on Weibo from January 1, 2015 to December 31, 2015 were extracted using Python Web crawler. A retweet network with 505,047 nodes and 545,312 edges of the popular messages (n=206) was constructed and analyzed. The local and global opinion leaderships were measured using network metrics, and the roles of personal attributes, professional knowledge, and social positions in obtaining the opinion leadership were examined using general linear model. The findings revealed that personal attributes, professional knowledge, and social positions predicted individual's local opinion leadership in the retweet network of popular organ donation messages. Alternatively, personal attributes and social positions, but not professional knowledge, were significantly associated with global opinion leadership. The findings of this study indicate that health campaign designers may recruit peer leaders in SNS organ donation promotions to facilitate information sharing among the target audience. Users who are unverified, active, well connected, and experienced with information and communications technology (ICT) will accelerate the sharing of organ donation messages in the global environment. Medical professionals such as organ transplant surgeons who can wield a great amount of influence on their direct connections could also effectively

  17. Heterogeneous wireless/wireline optical access networks with the R-EAT as backend component

    Science.gov (United States)

    Hagedorn, Klaus; Gindera, Ralf; Stohr, Andreas; Jager, Dieter

    2004-09-01

    A heterogeneous wireless/wireline optical transmission link using a reflection type electroabsorption transceiver (R-EAT) is presented. Simultaneous transmission of full-duplex broadband wireless LAN (WLAN) channels and 1Gb/s base band data is experimentally demonstrated. The system link employs sub-carrier multiplexing (SCM) and two optical channels for full duplex transmission of various analog WLAN channels and downlink digital base band data. The developed link architecture is suitable for simultaneous transmission of broadband wireline and wireless signals, it enables the coexistence and interoperability between wireline and wireless access technologies. The developed R-EAT component employed in this wireline/wireless access system, features "single-chip-component" base stations in access networks with star type topology where only a single optical fiber is used for bidirectional optical transmission. The R-EAT can be used within the optical C-band (1530- 1560nm) and is suitable for (D)WDM networks. Bit error rate measurements demonstrate the capabilities of the R-EAT for 1Gb/s base band transmission. The analog performance for WLAN transmission is characterised by a spurious free dynamic range (SFDR) of more than 75dB and 90dB for uplink and downlink transmission, respectively. The link gain for uplink and downlink transmission is -42dB and -37dB, respectively. The demonstrates the analog performances of the R-EAT for being used in wireless access networks such as W-LAN.

  18. CREATION OF THE SHUGHNANI DISCOURSE OF PUBLIC SPHERE IN THE MEDIA AND SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    П Ш Абдулхамидова

    2017-12-01

    Full Text Available Shughnani, one of the Pamiri languages of Tajikistan, is a minority language, and has no written script. Socio-economic and political changes in the lives of language speakers have affected the functioning of this small language, which was previously devoid of social significance. In the late 1980s, ideas began to emerge about the expansion of its functions, and attempts were made to use it in print media, television and radio. Observation of the functional development of Shugnani in these media led to the hypothesis of the emergence of a public sphere discourse, where it is possible to raise problems of social importance, and discuss them to search for eventual solutions. The main purpose of the article is to study attempts to create a discourse of the public sphere for Shugnani, in media and on the Facebook social network. The theoretical and methodological approaches of the study are based on the concept of the pub-lic sphere of Habermas, using the Critical Discourse Analysis paradigm (Fairclough. The data for the study were taken from Shughnani print media, from speeches on television and radio, and from postings by members of Shughnani Facebook groups. The findings reveal that the Shughnani presence in the media is limited, and construction of public opinion is more successfully carried out via Shughnani groups on Facebook. Analysis of the discursive practices involved shows that, despite the slow development of a media presence, the establishment of public discourse occurs through the creation of verbal units which have a journalistic character. Shugnani-speaking groups on Facebook contribute to the strengthening of the posi-tion of the language, through the formulation and discussion of issues relevant to members of the language community and the creation of language units that enhance confidence in the use of non-written Shugnani in the public sphere.

  19. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    Science.gov (United States)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  20. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks.

    Science.gov (United States)

    Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Zhang, Xuekun

    2015-12-03

    Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT), Machine-to-Machine (M2M) communications, Vehicular-to-Vehicular (V2V) communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  1. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunyang Lei

    2015-12-01

    Full Text Available Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT, Machine-to-Machine (M2M communications, Vehicular-to-Vehicular (V2V communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  2. Optical interconnection network for parallel access to multi-rank memory in future computing systems.

    Science.gov (United States)

    Wang, Kang; Gu, Huaxi; Yang, Yintang; Wang, Kun

    2015-08-10

    With the number of cores increasing, there is an emerging need for a high-bandwidth low-latency interconnection network, serving core-to-memory communication. In this paper, aiming at the goal of simultaneous access to multi-rank memory, we propose an optical interconnection network for core-to-memory communication. In the proposed network, the wavelength usage is delicately arranged so that cores can communicate with different ranks at the same time and broadcast for flow control can be achieved. A distributed memory controller architecture that works in a pipeline mode is also designed for efficient optical communication and transaction address processes. The scaling method and wavelength assignment for the proposed network are investigated. Compared with traditional electronic bus-based core-to-memory communication, the simulation results based on the PARSEC benchmark show that the bandwidth enhancement and latency reduction are apparent.

  3. The relative importance of social media for accessing, finding, and engaging with news

    DEFF Research Database (Denmark)

    Nielsen, Rasmus Kleis; Schrøder, Kim Christian

    2014-01-01

    , but also important country-to-country differences, in particular in terms of how widespread the more active and participatory forms of media use are. Surprisingly, these differences do not correspond to differences in levels of internet use, suggesting that more than mere availability shapes the role...

  4. Brand community integration and customer satisfaction of social media network sites among students

    Directory of Open Access Journals (Sweden)

    Hayford Amegbe

    2017-11-01

    Full Text Available The aim of the study was to examine how consumers integrate into brand communities on social media network sites (SNSs and how it affects overall satisfaction of social media sites users among students. The study depends on the service-dominant logic (SDL to develop the constructs for hypotheses testing. The study used a cross-sectional survey research design. The data were col-lected using a web-based survey of university of Nairobi Students. In all, a total of 608 students participated in the survey. The data was analyzed using structural equation modeling with AMOS software. The results revealed that frequency of usage of SNSs and duration of usage positively affect the self –perceived relevance of SNSs. Also, the self-perceived relevance leads to building brand community which finally leads to customer satisfaction. The research was limited to only students of Nairobi and selecting students in itself, which is a limitation as well as limiting it to uni-versity of Nairobi. The younger or the millennial are not the only users of SNSs. We have older generations as well, who also use SNSs for various activities such as professional development among others. Understanding why consumers of social media network site would integrate brand community is seminal for both local and foreign firms doing business in a developing country. This would enable marketing practitioners to craft marketing strategies best for community brand build-ing.

  5. A user credit assessment model based on clustering ensemble for broadband network new media service supervision

    Science.gov (United States)

    Liu, Fang; Cao, San-xing; Lu, Rui

    2012-04-01

    This paper proposes a user credit assessment model based on clustering ensemble aiming to solve the problem that users illegally spread pirated and pornographic media contents within the user self-service oriented broadband network new media platforms. Its idea is to do the new media user credit assessment by establishing indices system based on user credit behaviors, and the illegal users could be found according to the credit assessment results, thus to curb the bad videos and audios transmitted on the network. The user credit assessment model based on clustering ensemble proposed by this paper which integrates the advantages that swarm intelligence clustering is suitable for user credit behavior analysis and K-means clustering could eliminate the scattered users existed in the result of swarm intelligence clustering, thus to realize all the users' credit classification automatically. The model's effective verification experiments are accomplished which are based on standard credit application dataset in UCI machine learning repository, and the statistical results of a comparative experiment with a single model of swarm intelligence clustering indicates this clustering ensemble model has a stronger creditworthiness distinguishing ability, especially in the aspect of predicting to find user clusters with the best credit and worst credit, which will facilitate the operators to take incentive measures or punitive measures accurately. Besides, compared with the experimental results of Logistic regression based model under the same conditions, this clustering ensemble model is robustness and has better prediction accuracy.

  6. Quantifying Network Dynamics and Information Flow Across Chinese Social Media During the African Ebola Outbreak.

    Science.gov (United States)

    Feng, Shihui; Hossain, Liaquat; Crawford, John W; Bossomaier, Terry

    2018-02-01

    Social media provides us with a new platform on which to explore how the public responds to disasters and, of particular importance, how they respond to the emergence of infectious diseases such as Ebola. Provided it is appropriately informed, social media offers a potentially powerful means of supporting both early detection and effective containment of communicable diseases, which is essential for improving disaster medicine and public health preparedness. The 2014 West African Ebola outbreak is a particularly relevant contemporary case study on account of the large number of annual arrivals from Africa, including Chinese employees engaged in projects in Africa. Weibo (Weibo Corp, Beijing, China) is China's most popular social media platform, with more than 2 billion users and over 300 million daily posts, and offers great opportunity to monitor early detection and promotion of public health awareness. We present a proof-of-concept study of a subset of Weibo posts during the outbreak demonstrating potential and identifying priorities for improving the efficacy and accuracy of information dissemination. We quantify the evolution of the social network topology within Weibo relating to the efficacy of information sharing. We show how relatively few nodes in the network can have a dominant influence over both the quality and quantity of the information shared. These findings make an important contribution to disaster medicine and public health preparedness from theoretical and methodological perspectives for dealing with epidemics. (Disaster Med Public Health Preparedness. 2018;12:26-37).

  7. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  8. Optimization of flow modeling in fractured media with discrete fracture network via percolation theory

    Science.gov (United States)

    Donado-Garzon, L. D.; Pardo, Y.

    2013-12-01

    Fractured media are very heterogeneous systems where occur complex physical and chemical processes to model. One of the possible approaches to conceptualize this type of massifs is the Discrete Fracture Network (DFN). Donado et al., modeled flow and transport in a granitic batholith based on this approach and found good fitting with hydraulic and tracer tests, but the computational cost was excessive due to a gigantic amount of elements to model. We present in this work a methodology based on percolation theory for reducing the number of elements and in consequence, to reduce the bandwidth of the conductance matrix and the execution time of each network. DFN poses as an excellent representation of all the set of fractures of the media, but not all the fractures of the media are part of the conductive network. Percolation theory is used to identify which nodes or fractures are not conductive, based on the occupation probability or percolation threshold. In a fractured system, connectivity determines the flow pattern in the fractured rock mass. This volume of fluid is driven through connection paths formed by the fractures, when the permeability of the rock is negligible compared to the fractures. In a population of distributed fractures, each of this that has no intersection with any connected fracture do not contribute to generate a flow field. This algorithm also permits us to erase these elements however they are water conducting and hence, refine even more the backbone of the network. We used 100 different generations of DFN that were optimized in this study using percolation theory. In each of the networks calibrate hydrodynamic parameters as hydraulic conductivity and specific storage coefficient, for each of the five families of fractures, yielding a total of 10 parameters to estimate, at each generation. Since the effects of the distribution of fault orientation changes the value of the percolation threshold, but not the universal laws of classical

  9. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad; Elsawy, Hesham; Bader, Ahmed; Alouini, Mohamed-Slim

    2017-01-01

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  10. Switched-based interference reduction scheme for open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh

    2012-06-01

    Femtocells have been proposed to enhance the spatial coverage and system capacity of existing cellular networks. However, this technology may result in significant performance loss due to the increase in co-channel interference, particularly when coordination between access points is infeasible. This paper targets interference management in such overlaid networks. It is assumed that the femtocells employ the open-access strategy to reduce cross-tier interference, and can share resources concurrently. It is also assumed that each end user (EU) can access one channel at a time, and transfer limited feedback. To reduce the effect of co-tier interference in the absence of the desired EU channel state information (CSI) at the serving access point as well as coordination between active access points, a switched scheme based on the interference levels associated with available channels is proposed. Through the analysis, the scheme modes of operation in under-loaded and over-loaded channels are studied, from which the statistics of the resulting interference power are quantified. The impact of the proposed scheme on the received desired power is thoroughly discussed. In addition, the effect of the switching threshold on the achieved performance of the desired EU is investigated. The results clarify that the proposed scheme can improve the performance while reducing the number of examined channels and feedback load. © 2012 IEEE.

  11. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad

    2017-02-07

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  12. Research on Czech firms’ marketing communication based on social media networks

    Directory of Open Access Journals (Sweden)

    Vít Chlebovský

    2012-01-01

    Full Text Available Objective of the research described in this article is to make an analysis of the usage of marketing communication using both traditional Internet communication channels as well as Social Media Networks by the Czech companies. Primary research was made through on-line questionnaire. Companies across the branches and size categories within the Czech economy were addressed. Companies were selected from the www.firmy.cz portal. Only companies with their own web domain were addressed. The typical respondents were mostly from middle management, especially managers from the marketing or commercial departments. The final number of questionnaire respondents covered in the research is 1009. The main research method was questioning. The questionnaire consisted of three sections with the scale answer questions mainly. Google Refine was used for data processing and Microsoft Excel for statistical processing and graphic outputs of the research. Evaluated results show significant gaps in usage of Internet communication tools in marketing of Czech companies and also deficiency between clear understanding of the respondents how Social Media should be used in marketing communication and real use in the companies. This deficiency was statistically tested and relation between respondents’ perception of the importance of Social Media use for bidirectional communication with stakeholders and non-use of Social Media for bidirectional communication with stakeholders by respondents’ company was confirmed.

  13. Enabling Access to Digital Media for the Profoundly Disabled, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The system proposed in this effort will allow the handicapped individual with hand/arm motor impairment to use the computer and access digital libraries on the...

  14. Print Media and ICT Access and Use among Female Academics in ...

    African Journals Online (AJOL)

    FIRST LADY

    groups, increasing social exclusion and isolation in the workplace. .... While discussing barriers to access and use of the new technologies to both men and women .... It is worth of note that even though female academics face lots of hurdles in.

  15. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    Directory of Open Access Journals (Sweden)

    Antonio F. Gomez Skarmeta

    2013-11-01

    Full Text Available Internet of Things (IoT networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA has been standardized by the Internet engineering task force (IETF to carry the Extensible Authentication Protocol (EAP, which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1 to demonstrate the feasibility of EAP/PANA in IoT devices; (2 to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS, called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  16. PANATIKI: a network access control implementation based on PANA for IoT devices.

    Science.gov (United States)

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  17. Topology-selective jamming of fully-connected, code-division random-access networks

    Science.gov (United States)

    Polydoros, Andreas; Cheng, Unjeng

    1990-01-01

    The purpose is to introduce certain models of topology selective stochastic jamming and examine its impact on a class of fully-connected, spread-spectrum, slotted ALOHA-type random access networks. The theory covers dedicated as well as half-duplex units. The dominant role of the spatial duty factor is established, and connections with the dual concept of time selective jamming are discussed. The optimal choices of coding rate and link access parameters (from the users' side) and the jamming spatial fraction are numerically established for DS and FH spreading.

  18. Performance Analysis of DPSK-OCDMA System for Optical Access Network

    Science.gov (United States)

    Islam, Monirul; Ahmed, N.; Aljunid, S. A.; Ali, Sharafat; Sayeed, S.; Sabri, Naseer

    2016-03-01

    In this research, the performance of optical code division multiple access (OCDMA) using differential phase shift keying (DPSK) has been compared with OCDMA On-Off Keying (OOK). This comparison took place in terms of bit error rate (BER) and receiver power where two bit rates (155 Mbps and 622 Mbps) have been used for this analysis. Using of OptiSystem 7.0 simulation, comparing eye diagram and optical spectrum alongside with BER and Rx power. It is found that OCDMA-DPSK performs better in comparison to OCDMA-OOK. The performance analysis also provides parameter for designing and development of an OCDMA system for optical access network using DPSK.

  19. An Adaptive Time-Spread Multiple-Access Policy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Konstantinos Oikonomou

    2007-05-01

    Full Text Available Sensor networks require a simple and efficient medium access control policy achieving high system throughput with no or limited control overhead in order to increase the network lifetime by minimizing the energy consumed during transmission attempts. Time-spread multiple-access (TSMA policies that have been proposed for ad hoc network environments, can also be employed in sensor networks, since no control overhead is introduced. However, they do not take advantage of any cross-layer information in order to exploit the idiosyncrasies of the particular sensor network environment such as the presence of typically static nodes and a common destination for the forwarded data. An adaptive probabilistic TSMA-based policy, that is proposed and analyzed in this paper, exploits these idiosyncrasies and achieves higher system throughput than the existing TSMA-based policies without any need for extra control overhead. As it is analytically shown in this paper, the proposed policy always outperforms the existing TSMA-based policies, if certain parameter values are properly set; the analysis also provides for these proper values. It is also shown that the proposed policy is characterized by a certain convergence period and that high system throughput is achieved for long convergence periods. The claims and expectations of the provided analysis are supported by simulation results presented in this paper.

  20. Accounting for Energy Cost When Designing Energy-Efficient Wireless Access Networks

    Directory of Open Access Journals (Sweden)

    Greta Vallero

    2018-03-01

    Full Text Available Because of the increase of the data traffic demand, wireless access networks, through which users access telecommunication services, have expanded, in terms of size and of capability and, consequently, in terms of power consumption. Therefore, costs to buy the necessary power for the supply of base stations of those networks is becoming very high, impacting the communication cost. In this study, strategies to reduce the amount of money spent for the purchase of the energy consumed by the base stations are proposed for a network powered by solar panels, energy batteries and the power grid. First, the variability of the energy prices is exploited. It provides a cost reduction of up to 30%, when energy is bought in advance. If a part of the base stations is deactivated when the energy price is higher than a given threshold, a compromise between the energy cost and the user coverage drop is needed. In the simulated scenario, the necessary energy cost can be reduced by more than 40%, preserving the user coverage by greater than 94%. Second, the network is introduced to the energy market: it buys and sells energy from/to the traditional power grid. Finally, costs are reduced by the reduction of power consumption of the network, achieved by using microcell base stations. In the considered scenario, up to a 31% cost reduction is obtained, without the deterioration of the quality of service, but a huge Capex expenditure is required.

  1. Comparison of a Ring On-Chip Network and a Code-Division Multiple-Access On-Chip Network

    Directory of Open Access Journals (Sweden)

    Xin Wang

    2007-01-01

    Full Text Available Two network-on-chip (NoC designs are examined and compared in this paper. One design applies a bidirectional ring connection scheme, while the other design applies a code-division multiple-access (CDMA connection scheme. Both of the designs apply globally asynchronous locally synchronous (GALS scheme in order to deal with the issue of transferring data in a multiple-clock-domain environment of an on-chip system. The two NoC designs are compared with each other by their network structures, data transfer principles, network node structures, and their asynchronous designs. Both the synchronous and the asynchronous designs of the two on-chip networks are realized using a hardware-description language (HDL in order to make the entire designs suit the commonly used synchronous design tools and flow. The performance estimation and comparison of the two NoC designs which are based on the HDL realizations are addressed. By comparing the two NoC designs, the advantages and disadvantages of applying direct connection and CDMA connection schemes in an on-chip communication network are discussed.

  2. Coherent detection passive optical access network enabling converged delivery of broadcast and dedicated broadband services

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich; Prince, Kamau; Guerrero Gonzalez, Neil

    2011-01-01

    We propose a passive optical network architecture based on coherent detection for converged delivery of broadcast services from a dedicated remote broadcast server and user-specific services from a local central office. We experimentally demonstrate this architecture with mixed traffic types....... The broadcast channels were transmitted over 78 km of single mode fiber to a central office where they were multiplexed with the unicast channels for further fiber transmission over 34-km to reach the access network. Successful detection of all channels is demonstrated....

  3. Improving collaboration between primary care research networks using Access Grid technology

    Directory of Open Access Journals (Sweden)

    Zsolt Nagykaldi

    2008-05-01

    Full Text Available Access Grid (AG is an Internet2-driven, high performance audio_visual conferencing technology used worldwide by academic and government organisations to enhance communication, human interaction and group collaboration. AG technology is particularly promising for improving academic multi-centre research collaborations. This manuscript describes how the AG technology was utilised by the electronic Primary Care Research Network (ePCRN that is part of the National Institutes of Health (NIH Roadmap initiative to improve primary care research and collaboration among practice- based research networks (PBRNs in the USA. It discusses the design, installation and use of AG implementations, potential future applications, barriers to adoption, and suggested solutions.

  4. New resource allocation scheme for cognitive relay networks with opportunistic access

    KAUST Repository

    Zafar, Ammar

    2012-06-01

    In this paper, a new resource allocation scheme to minimize Symbol Error rate (SER) for relay assisted cognitive radio networks is studied. A cognitive relay network with amplify-and-forward (AF) fixed gain relays and opportunistic access to the licensed spectrum is considered. The SER objective function and the optimization constraints are derived first. The resource allocation algorithm is then derived using the Langrangian multiplier method. Closed form expressions are derived for the source and relay powers and, symbol time. Analytical results show that the optimal power allocation follows an extended water-filling solution. © 2012 IEEE.

  5. The public space of social media connected cultures of the network society

    CERN Document Server

    Tierney, Therese

    2013-01-01

    Social media is restructuring urban practices-through ad-hoc experimentation, commercial software development, and communities of participation. This book is the first to consider how practices contained within social media are situated within a larger genealogy of public space, including theories of communal identity, civitas and democracy, the fete, and self-expression. Through empirical research, the actual social practices of participants of networked publics are described and analyzed. Documenting how online counterpublics use the Internet to transmit classified photos, mobilize activists, and challenge the status quo, Tierney argues that online activities do not stop in online conversations; they are physically grounded through mobile GPS coordinates which are then transformed into activities in physical space-the street, the plaza, the places where people have traditionally gathered to demonstrate and express their opinions publicly.

  6. Network-based modeling and intelligent data mining of social media for improving care.

    Science.gov (United States)

    Akay, Altug; Dragomir, Andrei; Erlandsson, Bjorn-Erik

    2015-01-01

    Intelligently extracting knowledge from social media has recently attracted great interest from the Biomedical and Health Informatics community to simultaneously improve healthcare outcomes and reduce costs using consumer-generated opinion. We propose a two-step analysis framework that focuses on positive and negative sentiment, as well as the side effects of treatment, in users' forum posts, and identifies user communities (modules) and influential users for the purpose of ascertaining user opinion of cancer treatment. We used a self-organizing map to analyze word frequency data derived from users' forum posts. We then introduced a novel network-based approach for modeling users' forum interactions and employed a network partitioning method based on optimizing a stability quality measure. This allowed us to determine consumer opinion and identify influential users within the retrieved modules using information derived from both word-frequency data and network-based properties. Our approach can expand research into intelligently mining social media data for consumer opinion of various treatments to provide rapid, up-to-date information for the pharmaceutical industry, hospitals, and medical staff, on the effectiveness (or ineffectiveness) of future treatments.

  7. Lattice Boltzmann simulation of immiscible fluid displacement in porous media: Homogeneous versus heterogeneous pore network

    International Nuclear Information System (INIS)

    Liu, Haihu; Zhang, Yonghao; Valocchi, Albert J.

    2015-01-01

    Injection of anthropogenic carbon dioxide (CO 2 ) into geological formations is a promising approach to reduce greenhouse gas emissions into the atmosphere. Predicting the amount of CO 2 that can be captured and its long-term storage stability in subsurface requires a fundamental understanding of multiphase displacement phenomena at the pore scale. In this paper, the lattice Boltzmann method is employed to simulate the immiscible displacement of a wetting fluid by a non-wetting one in two microfluidic flow cells, one with a homogeneous pore network and the other with a randomly heterogeneous pore network. We have identified three different displacement patterns, namely, stable displacement, capillary fingering, and viscous fingering, all of which are strongly dependent upon the capillary number (Ca), viscosity ratio (M), and the media heterogeneity. The non-wetting fluid saturation (S nw ) is found to increase nearly linearly with logCa for each constant M. Increasing M (viscosity ratio of non-wetting fluid to wetting fluid) or decreasing the media heterogeneity can enhance the stability of the displacement process, resulting in an increase in S nw . In either pore networks, the specific interfacial length is linearly proportional to S nw during drainage with equal proportionality constant for all cases excluding those revealing considerable viscous fingering. Our numerical results confirm the previous experimental finding that the steady state specific interfacial length exhibits a linear dependence on S nw for either favorable (M ≥ 1) or unfavorable (M < 1) displacement, and the slope is slightly higher for the unfavorable displacement

  8. Retrieving quantifiable social media data from human sensor networks for disaster modeling and crisis mapping

    Science.gov (United States)

    Aulov, Oleg

    This dissertation presents a novel approach that utilizes quantifiable social media data as a human aware, near real-time observing system, coupled with geophysical predictive models for improved response to disasters and extreme events. It shows that social media data has the potential to significantly improve disaster management beyond informing the public, and emphasizes the importance of different roles that social media can play in management, monitoring, modeling and mitigation of natural and human-caused extreme disasters. In the proposed approach Social Media users are viewed as "human sensors" that are "deployed" in the field, and their posts are considered to be "sensor observations", thus different social media outlets all together form a Human Sensor Network. We utilized the "human sensor" observations, as boundary value forcings, to show improved geophysical model forecasts of extreme disaster events when combined with other scientific data such as satellite observations and sensor measurements. Several recent extreme disasters are presented as use case scenarios. In the case of the Deepwater Horizon oil spill disaster of 2010 that devastated the Gulf of Mexico, the research demonstrates how social media data from Flickr can be used as a boundary forcing condition of GNOME oil spill plume forecast model, and results in an order of magnitude forecast improvement. In the case of Hurricane Sandy NY/NJ landfall impact of 2012, we demonstrate how the model forecasts, when combined with social media data in a single framework, can be used for near real-time forecast validation, damage assessment and disaster management. Owing to inherent uncertainties in the weather forecasts, the NOAA operational surge model only forecasts the worst-case scenario for flooding from any given hurricane. Geolocated and time-stamped Instagram photos and tweets allow near real-time assessment of the surge levels at different locations, which can validate model forecasts, give

  9. Medium access control and network layer design for 60 GHz wireless personal area networks

    NARCIS (Netherlands)

    An, X.

    2010-01-01

    The unlicensed frequency band around 60 GHz is a very promising spectrum due to its potential to provide multiple gigabits per second based data rates for short range wireless communication. Hence, 60 GHz radio is an attractive candidate to enable ultra high rate Wireless Personal Area Networks

  10. Convergent optical wired and wireless long-reach access network using high spectral-efficient modulation.

    Science.gov (United States)

    Chow, C W; Lin, Y H

    2012-04-09

    To provide broadband services in a single and low cost perform, the convergent optical wired and wireless access network is promising. Here, we propose and demonstrate a convergent optical wired and wireless long-reach access networks based on orthogonal wavelength division multiplexing (WDM). Both the baseband signal and the radio-over-fiber (ROF) signal are multiplexed and de-multiplexed in optical domain, hence it is simple and the operation speed is not limited by the electronic bottleneck caused by the digital signal processing (DSP). Error-free de-multiplexing and down-conversion can be achieved for all the signals after 60 km (long-reach) fiber transmission. The scalability of the system for higher bit-rate (60 GHz) is also simulated and discussed.

  11. Geo-Spatial Social Network Analysis of Social Media to Mitigate Disasters

    Science.gov (United States)

    Carley, K. M.

    2017-12-01

    Understanding the spatial layout of human activity can afford a better understanding many phenomena - such as local cultural, the spread of ideas, and the scope of a disaster. Today, social media is one of the key sensors for acquiring information on socio-cultural activity, some with cues as to the geo-location. We ask, What can be learned by putting such data on maps? For example, are people who chat on line more likely to be near each other? Can Twitter data support disaster planning or early warning? In this talk, such issues are examined using data collected via Twitter and analyzed using ORA. ORA is a network analysis and visualization system. It supports not just social networks (who is interacting with whom), but also high dimensional networks with many types of nodes (e.g. people, organizations, resources, activities …) and relations, geo-spatial network analysis, dynamic network analysis, & geo-temporal analysis. Using ORA lessons learned from five case studies are considered: Arab Spring, Tsunami warning in Padang Indonesia, Twitter around Fukushima in Japan, Typhoon Haiyan (Yolanda), & regional conflict. Using Padang Indonesia data, we characterize the strengths and limitations of social media data to support disaster planning & early warning, identify at risk areas & issues of concern, and estimate where people are and which areas are impacted. Using Fukushima Japanese data, social media is used to estimate geo-spatial regularities in movement and communication that can inform disaster response and risk estimation. Using Arab Spring data, we find that the spread of bots & extremists varies by country and time, to the extent that using twitter to understand who is important or what ideas are critical can be compromised. Bots and extremists can exploit disaster messaging to create havoc and facilitate criminal activity e.g. human trafficking. Event discovery mechanisms support isolating geo-epi-centers for key events become crucial. Spatial inference

  12. How Turkish radiology residents access information related to their profession in this social media and smartphone era.

    Science.gov (United States)

    Ozutemiz, Can; Dicle, Oguz; Koremezli, Nevin

    2015-01-01

    To evaluate the frequency of mobile technology and social media usage among radiology residents and their access to professional information. A questionnaire consisting of 24 questions prepared using Google Drive was sent via e-mail to 550 radiology residents throughout the country. Of the 176 participating residents, 74 completed the survey via the internet, and 102 completed it at three different national radiology meetings. Response rates and its relationship with responses given to different questions were assessed. Hundred two male and 74 female residents participated in the survey. 141 (81.3%) residents thought that they had appropriate internet access in their department. The number of residents using a smartphone was 153 (86.9%). The android operating system (70, 45.8%) was the preferred operating system of respondants. Only 24 (15.7%) of the smartphone users thought that there were enough radiology related applications. "Radiology assistant" (18.9%), "Radiopedia" (7.8%) and "Radiographics" (7.8%) were the most utilized applications. Of the smartphone users, 87(56.9%) stated that they used cell phones in order to find radiological information, and the most used web pages were Google (165, 93.8%), Radiopaedia.org (129, 73.3%), Radiologyassistant.nl (135, 76.7%), and Pubmed (114, 64.8%). Social media usages were as follows: None (10, 5.7%), Facebook (139, 79%), Twitter (55, 31.3%), Google + (51, 29%) and YouTube (44, 25%). While smartphone usage rates among the residents were high, the use of radiology specific applications was not common. Social media usage was very common among residents.

  13. How Turkish radiology residents access information related to their profession in this social media and smartphone era

    International Nuclear Information System (INIS)

    Ozutemiz, Can; Dicle, Oguz; Koremezli, Nevin

    2015-01-01

    To evaluate the frequency of mobile technology and social media usage among radiology residents and their access to professional information. A questionnaire consisting of 24 questions prepared using Google Drive was sent via e-mail to 550 radiology residents throughout the country. Of the 176 participating residents, 74 completed the survey via the internet, and 102 completed it at three different national radiology meetings. Response rates and its relationship with responses given to different questions were assessed. Hundred two male and 74 female residents participated in the survey. 141 (81.3%) residents thought that they had appropriate internet access in their department. The number of residents using a smartphone was 153 (86.9%). The android operating system (70, 45.8%) was the preferred operating system of respondants. Only 24 (15.7%) of the smartphone users thought that there were enough radiology related applications. “Radiology assistant” (18.9%), “Radiopedia” (7.8%) and “Radiographics” (7.8%) were the most utilized applications. Of the smartphone users, 87(56.9%) stated that they used cell phones in order to find radiological information, and the most used web pages were Google (165, 93.8%), Radiopaedia.org (129, 73.3%), Radiologyassistant.nl (135, 76.7%), and Pubmed (114, 64.8%). Social media usages were as follows: None (10, 5.7%), Facebook (139, 79%), Twitter (55, 31.3%), Google + (51, 29%) and YouTube (44, 25%). While smartphone usage rates among the residents were high, the use of radiology specific applications was not common. Social media usage was very common among residents

  14. Centralized light-source optical access network based on polarization multiplexing.

    Science.gov (United States)

    Grassi, Fulvio; Mora, José; Ortega, Beatriz; Capmany, José

    2010-03-01

    This paper presents and demonstrates a centralized light source optical access network based on optical polarization multiplexing technique. By using two optical sources emitting light orthogonally polarized in the Central Node for downstream and upstream operations, the Remote Node is kept source-free. EVM values below telecommunication standard requirements have been measured experimentally when bidirectional digital signals have been transmitted over 10 km of SMF employing subcarrier multiplexing technique in the electrical domain.

  15. An Examination of Not-For-Profit Stakeholder Networks for Relationship Management: A Small-Scale Analysis on Social Media

    Science.gov (United States)

    Carlson, Jamie; Kitchens, Brent; Kozary, Ben; Zaki, Mohamed

    2016-01-01

    Using a small-scale descriptive network analysis approach, this study highlights the importance of stakeholder networks for identifying valuable stakeholders and the management of existing stakeholders in the context of mental health not-for-profit services. We extract network data from the social media brand pages of three health service organizations from the U.S., U.K., and Australia, to visually map networks of 579 social media brand pages (represented by nodes), connected by 5,600 edges. This network data is analyzed using a collection of popular graph analysis techniques to assess the differences in the way each of the service organizations manage stakeholder networks. We also compare node meta-information against basic topology measures to emphasize the importance of effectively managing relationships with stakeholders who have large external audiences. Implications and future research directions are also discussed. PMID:27711236

  16. An Examination of Not-For-Profit Stakeholder Networks for Relationship Management: A Small-Scale Analysis on Social Media.

    Directory of Open Access Journals (Sweden)

    Jessica Wyllie

    Full Text Available Using a small-scale descriptive network analysis approach, this study highlights the importance of stakeholder networks for identifying valuable stakeholders and the management of existing stakeholders in the context of mental health not-for-profit services. We extract network data from the social media brand pages of three health service organizations from the U.S., U.K., and Australia, to visually map networks of 579 social media brand pages (represented by nodes, connected by 5,600 edges. This network data is analyzed using a collection of popular graph analysis techniques to assess the differences in the way each of the service organizations manage stakeholder networks. We also compare node meta-information against basic topology measures to emphasize the importance of effectively managing relationships with stakeholders who have large external audiences. Implications and future research directions are also discussed.

  17. Accessibility

    DEFF Research Database (Denmark)

    Brooks, Anthony Lewis

    2017-01-01

    This contribution is timely as it addresses accessibility in regards system hardware and software aligned with introduction of the Twenty-First Century Communications and Video Accessibility Act (CVAA) and adjoined game industry waiver that comes into force January 2017. This is an act created...... by the USA Federal Communications Commission (FCC) to increase the access of persons with disabilities to modern communications, and for other purposes. The act impacts advanced communications services and products including text messaging; e-mail; instant messaging; video communications; browsers; game...... platforms; and games software. However, the CVAA has no legal status in the EU. This text succinctly introduces and questions implications, impact, and wider adoption. By presenting the full CVAA and game industry waiver the text targets to motivate discussions and further publications on the subject...

  18. Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2015-01-01

    Full Text Available Within the challenging environment of intelligent transportation systems (ITS, networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However, cognitive radio (CR combines the capacity to sense the radio spectrum with the flexibility to adapt to transmission parameters in order to maximize system performance and has thus become an effective approach for the design of dynamic spectrum access (DSA mechanisms. This paper presents the enhanced noncooperative cognitive division multiple access (ENCCMA proposal combining time division multiple access (TDMA and frequency division multiple access (FDMA schemes with CR techniques to obtain a mechanism fulfilling the requirements of real-time communications. The analysis presented here considers the IEEE WAVE and 802.11p as reference standards; however, the proposed medium access control (MAC mechanism can be adapted to operate on the physical layer of different standards. The mechanism also offers the advantage of avoiding signaling, thus enhancing system autonomy as well as behavior in adverse scenarios.

  19. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Science.gov (United States)

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  20. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Directory of Open Access Journals (Sweden)

    Seungsoo Baek

    2014-01-01

    Full Text Available There has been an explosive increase in the population of the OSN (online social network in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  1. The role of social media networks in psychotic disorders: a case report.

    Science.gov (United States)

    Krishna, Nithin; Fischer, Bernard A; Miller, Moshe; Register-Brown, Kelly; Patchan, Kathleen; Hackman, Ann

    2013-01-01

    We report the case of a young man diagnosed with schizophrenia who presented with stalking behaviors that may have been caused by problematic use or participation in social media networks (SMN). We review the possible role of SMN in the formation of his romantic delusion and offer suggestions for clinicians around incorporation of SMN questions into assessments. It is imperative to identify populations at risk of SMN-related stalking behaviors to stratify mental health resources and interventions. Additional studies are needed to further clarify the role of SMN in psychotic disorders. Copyright © 2013 Elsevier Inc. All rights reserved.

  2. Social capital and the networked public sphere: Implications for political social media sites

    OpenAIRE

    Johannessen, Marius Rohde

    2012-01-01

    Submitted version of a paper from the 45th Hawaii International Conference on System Science (HICSS), 2012. Published version available from IEEE: http://dx.doi.org/10.1109/hicss.2012.535 This paper presents a theoretical lens for research on social media use in eParticipation, along with an example case study. The idea of the public sphere and how it can be applied to eParticipation research is presented. The public sphere is discussed in relation to Castell's notion of the network societ...

  3. QoE-Driven D2D Media Services Distribution Scheme in Cellular Networks

    OpenAIRE

    Chen, Mingkai; Wang, Lei; Chen, Jianxin; Wei, Xin

    2017-01-01

    Device-to-device (D2D) communication has been widely studied to improve network performance and considered as a potential technological component for the next generation communication. Considering the diverse users’ demand, Quality of Experience (QoE) is recognized as a new degree of user’s satisfaction for media service transmissions in the wireless communication. Furthermore, we aim at promoting user’s Mean of Score (MOS) value to quantify and analyze user’s QoE in the dynamic cellular netw...

  4. A Network-Aware Approach for Searching As-You-Type in Social Media (Extended Version)

    OpenAIRE

    Lagrée, Paul; Cautis, Bogdan; Vahabi, Hossein

    2015-01-01

    We present in this paper a novel approach for as-you-type top-$k$ keyword search over social media. We adopt a natural "network-aware" interpretation for information relevance, by which information produced by users who are closer to the seeker is considered more relevant. In practice, this query model poses new challenges for effectiveness and efficiency in online search, even when a complete query is given as input in one keystroke. This is mainly because it requires a joint exploration of ...

  5. A Network-Aware Approach for Searching As-You-Type in Social Media

    OpenAIRE

    Lagrée , Paul; Cautis , Bogdan; Vahabi , Hossein

    2015-01-01

    International audience; We present in this paper a novel approach for as-you-type top-k keyword search over social media. We adopt a natural "network-aware" interpretation for information relevance, by which information produced by users who are closer to the seeker is considered more relevant. In practice, this query model poses new challenges for effectiveness and efficiency in online search, even when a complete query is given as input in one keystroke. This is mainly because it requires a...

  6. Virtual shelves in a digital library: a framework for access to networked information sources.

    Science.gov (United States)

    Patrick, T B; Springer, G K; Mitchell, J A; Sievert, M E

    1995-01-01

    Develop a framework for collections-based access to networked information sources that addresses the problem of location-dependent access to information sources. This framework uses a metaphor of a virtual shelf. A virtual shelf is a general-purpose server that is dedicated to a particular information subject class. The identifier of one of these servers identifies its subject class. Location-independent call numbers are assigned to information sources. Call numbers are based on standard vocabulary codes. The call numbers are first mapped to the location-independent identifiers of virtual shelves. When access to an information resource is required, a location directory provides a second mapping of these location-independent server identifiers to actual network locations. The framework has been implemented in two different systems. One system is based on the Open System Foundation/Distributed Computing Environment and the other is based on the World Wide Web. This framework applies in new ways traditional methods of library classification and cataloging. It is compatible with two traditional styles of selecting information searching and browsing. Traditional methods may be combined with new paradigms of information searching that will be able to take advantage of the special properties of digital information. Cooperation between the library-informational science community and the informatics community can provide a means for a continuing application of the knowledge and techniques of library science to the new problems of networked information sources.

  7. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  8. Delay-aware adaptive sleep mechanism for green wireless-optical broadband access networks

    Science.gov (United States)

    Wang, Ruyan; Liang, Alei; Wu, Dapeng; Wu, Dalei

    2017-07-01

    Wireless-Optical Broadband Access Network (WOBAN) is capacity-high, reliable, flexible, and ubiquitous, as it takes full advantage of the merits from both optical communication and wireless communication technologies. Similar to other access networks, the high energy consumption poses a great challenge for building up WOBANs. To shot this problem, we can make some load-light Optical Network Units (ONUs) sleep to reduce the energy consumption. Such operation, however, causes the increased packet delay. Jointly considering the energy consumption and transmission delay, we propose a delay-aware adaptive sleep mechanism. Specifically, we develop a new analytical method to evaluate the transmission delay and queuing delay over the optical part, instead of adopting M/M/1 queuing model. Meanwhile, we also analyze the access delay and queuing delay of the wireless part. Based on such developed delay models, we mathematically derive ONU's optimal sleep time. In addition, we provide numerous simulation results to show the effectiveness of the proposed mechanism.

  9. The accessibility of Poland’s Space to the Trans-European Transport Network

    Directory of Open Access Journals (Sweden)

    Wiśniewski Szymon

    2017-09-01

    Full Text Available The aim of the article is to analyse the land transport accessibility of two trans-European corridors within the boundaries of Poland. The adjustment of the course of transport routes to the distribution of the population and the country’s land development (including economic potential and logistic infrastructure was outlined using measurements of cumulative accessibility. The results were presented in both cartographic form (isochrone approach and tabular form (cumulative approach. Research was conducted adopting different forms of transport used for relocation (including foot traffic, car, rail and multimodal transport and both the current and target layout of the transport network. This made it possible to determine the changes that will effectively run the process of investment in transport infrastructure on Polish territory. This allowed the identification of the areas of Poland which are particularly conveniently located in relation to domestic connections (in terms of the international network and those for which the European transport network remains difficult to access.

  10. The shipper as the architect of contractual relations in access to natural gas networks

    International Nuclear Information System (INIS)

    Codognet, Marc-Kevin

    2005-01-01

    Transportation and contractual arrangements are in the kernel of the natural gas reform in Europe. Since third party can access to pipelines, those who wish to ship gas between two locations of a gas network have to arrange transportation services. Natural gas transportation is a set of contractual arrangements and has become a complex contracting process. This paper aims at analyzing the typical economic functions of shippers in third-party access regimes in the natural gas industry in a transaction costs approach. Shippers provide and combine intermediation functions in transportation services markets: information management, matching, bundling and transactions guarantees. In this context, the shipper has appeared as a particular market intermediary specialized in transportation arrangements in the new regime of third party access in the natural gas industry. (Author)

  11. COMPETITIVENESS, MARKETING ACCESS, AND NETWORK CAPABILITY AND ITS IMPACTS ON MARKETING PERFORMANCE

    Directory of Open Access Journals (Sweden)

    Teguh Iman Sayekti

    2016-12-01

    Full Text Available This study is to determine what factors influencingthe performance of SMEs. The population in this study is SMEs in the Central Java. Sample collection was conducted with a purposive sampling method. Criteriaused to take into accountis the SMEs that are already running at leastfortwo years. The sample in this study is intended as the representative of total population,67 (sixty seven. The data were processed and analyzed by computer program of SPSS 20 for Windows. Based on the results of regression analysis, it can be concluded that competitiveness has positive and significant impact on marketing performance marketing access has positive and significant impact on marketing performance. It means that the higher competitiveness and marketing access, the higher its performance. Competitiveness and marketing access have influence on SMEs’ performance through network capability.   

  12. Image transmission in multicore-fiber code-division multiple access network

    Science.gov (United States)

    Yang, Guu-Chang; Kwong, Wing C.

    1997-01-01

    Recently, two-dimensional (2-D) signature patterns were proposed to encode binary digitized image pixels in optical code-division multiple-access (CDMA) networks with 'multicore' fiber. The new technology enables parallel transmission and simultaneous access of 2-D images in multiple-access environment, where these signature patterns are defined as optical orthogonal signature pattern codes (OOSPCs). However, previous work on OOSPCs assumed that the weight of each signature pattern was the same. In this paper, we construct a new family of OOSPCs with the removal of this assumption. Since varying the weight of a user's signature pattern affects that user's performance, this approach is useful for CDMA optical systems with multiple performance requirements.

  13. Protein Solvent-Accessibility Prediction by a Stacked Deep Bidirectional Recurrent Neural Network

    Directory of Open Access Journals (Sweden)

    Buzhong Zhang

    2018-05-01

    Full Text Available Residue solvent accessibility is closely related to the spatial arrangement and packing of residues. Predicting the solvent accessibility of a protein is an important step to understand its structure and function. In this work, we present a deep learning method to predict residue solvent accessibility, which is based on a stacked deep bidirectional recurrent neural network applied to sequence profiles. To capture more long-range sequence information, a merging operator was proposed when bidirectional information from hidden nodes was merged for outputs. Three types of merging operators were used in our improved model, with a long short-term memory network performing as a hidden computing node. The trained database was constructed from 7361 proteins extracted from the PISCES server using a cut-off of 25% sequence identity. Sequence-derived features including position-specific scoring matrix, physical properties, physicochemical characteristics, conservation score and protein coding were used to represent a residue. Using this method, predictive values of continuous relative solvent-accessible area were obtained, and then, these values were transformed into binary states with predefined thresholds. Our experimental results showed that our deep learning method improved prediction quality relative to current methods, with mean absolute error and Pearson’s correlation coefficient values of 8.8% and 74.8%, respectively, on the CB502 dataset and 8.2% and 78%, respectively, on the Manesh215 dataset.

  14. Protein Solvent-Accessibility Prediction by a Stacked Deep Bidirectional Recurrent Neural Network.

    Science.gov (United States)

    Zhang, Buzhong; Li, Linqing; Lü, Qiang

    2018-05-25

    Residue solvent accessibility is closely related to the spatial arrangement and packing of residues. Predicting the solvent accessibility of a protein is an important step to understand its structure and function. In this work, we present a deep learning method to predict residue solvent accessibility, which is based on a stacked deep bidirectional recurrent neural network applied to sequence profiles. To capture more long-range sequence information, a merging operator was proposed when bidirectional information from hidden nodes was merged for outputs. Three types of merging operators were used in our improved model, with a long short-term memory network performing as a hidden computing node. The trained database was constructed from 7361 proteins extracted from the PISCES server using a cut-off of 25% sequence identity. Sequence-derived features including position-specific scoring matrix, physical properties, physicochemical characteristics, conservation score and protein coding were used to represent a residue. Using this method, predictive values of continuous relative solvent-accessible area were obtained, and then, these values were transformed into binary states with predefined thresholds. Our experimental results showed that our deep learning method improved prediction quality relative to current methods, with mean absolute error and Pearson's correlation coefficient values of 8.8% and 74.8%, respectively, on the CB502 dataset and 8.2% and 78%, respectively, on the Manesh215 dataset.

  15. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    Science.gov (United States)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  16. Metro-access integrated network based on optical OFDMA with dynamic sub-carrier allocation and power distribution.

    Science.gov (United States)

    Zhang, Chongfu; Zhang, Qiongli; Chen, Chen; Jiang, Ning; Liu, Deming; Qiu, Kun; Liu, Shuang; Wu, Baojian

    2013-01-28

    We propose and demonstrate a novel optical orthogonal frequency-division multiple access (OFDMA)-based metro-access integrated network with dynamic resource allocation. It consists of a single fiber OFDMA ring and many single fiber OFDMA trees, which transparently integrates metropolitan area networks with optical access networks. The single fiber OFDMA ring connects the core network and the central nodes (CNs), the CNs are on demand reconfigurable and use multiple orthogonal sub-carriers to realize parallel data transmission and dynamic resource allocation, meanwhile, they can also implement flexible power distribution. The remote nodes (RNs) distributed in the user side are connected by the single fiber OFDMA trees with the corresponding CN. The obtained results indicate that our proposed metro-access integrated network is feasible and the power distribution is agile.

  17. Energy efficiency for cloud-radio access networks with imperfect channel state information

    KAUST Repository

    Al-Oquibi, Bayan

    2016-12-24

    The advent of smartphones and tablets over the past several years has resulted in a drastic increase of global carbon footprint, due to the explosive growth of data traffic. Improving energy efficiency (EE) becomes, therefore, a crucial design metric in next generation wireless systems (5G). Cloud radio access network (C-RAN), a promising 5G network architecture, provides an efficient framework for improving the EE performance, by means of coordinating the transmission across the network. This paper considers a C-RAN system formed by several clusters of remote radio heads (RRHs), each serving a predetermined set of mobile users (MUs), and assumes imperfect channel state information (CSI). The network performance becomes therefore a function of the intra-cluster and inter-cluster interference, as well as the channel estimation error. The paper optimizes the transmit power of each RRH in order to maximize the network global EE subject to MU service rate requirements and RRHs maximum power constraints. The paper proposes solving the optimization problem using a heuristic algorithm based on techniques from optimization theory via a two-stage iterative solution. Simulation results show that the proposed power allocation algorithm provides an appreciable performance improvement as compared to the conventional systems with maximum power transmission strategy. They further highlight the convergence of the proposed algorithm for different networks scenarios.

  18. The Effects of a Dynamic Spectrum Access Overlay in LTE-Advanced Networks

    Energy Technology Data Exchange (ETDEWEB)

    Juan D. Deaton; Ryan E. lrwin; Luiz A. DaSilva

    2011-05-01

    As early as 2014, wireless network operators spectral capacity will be overwhelmed by a data tsunami brought on by new devices and applications. To augment spectral capacity, operators could deploy a Dynamic Spectrum Access (DSA) overlay. In the light of the many planned Long Term Evolution (LTE) network deployments, the affects of a DSA overlay have not been fully considered into the existing LTE standards. Coalescing many different aspects of DSA, this paper develops the Spectrum Accountability (SA) framework. The SA framework defines specific network element functionality, protocol interfaces, and signaling flow diagrams for LTE to support service requests and enforce rights of responsibilities of primary and secondary users, respectively. We also include a network simulation to quantify the benefits of using DSA channels to augment capacity. Based on our simulation we show that, network operators can benefit up to %40 increase in operating capacity when sharing DSA bands to augment spectral capacity. With our framework, this paper could serve as an guide in developing future LTE network standards that include DSA.

  19. FttC-Based Fronthaul for 5G Dense/Ultra-Dense Access Network: Performance and Costs in Realistic Scenarios

    Directory of Open Access Journals (Sweden)

    Franco Mazzenga

    2017-10-01

    Full Text Available One distinctive feature of the next 5G systems is the presence of a dense/ultra-dense wireless access network with a large number of access points (or nodes at short distances from each other. Dense/ultra-dense access networks allow for providing very high transmission capacity to terminals. However, the deployment of dense/ultra-dense networks is slowed down by the cost of the fiber-based infrastructure required to connect radio nodes to the central processing units and then to the core network. In this paper, we investigate the possibility for existing FttC access networks to provide fronthaul capabilities for dense/ultra-dense 5G wireless networks. The analysis is realistic in that it is carried out considering an actual access network scenario, i.e., the Italian FttC deployment. It is assumed that access nodes are connected to the Cabinets and to the corresponding distributors by a number of copper pairs. Different types of cities grouped in terms of population have been considered. Results focus on fronthaul transport capacity provided by the FttC network and have been expressed in terms of the available fronthaul bit rate per node and of the achievable coverage.

  20. In situ bioremediation: A network model of diffusion and flow in granular porous media

    Energy Technology Data Exchange (ETDEWEB)

    Griffiths, S.K.; Nilson, R.H.; Bradshaw, R.W.

    1997-04-01

    In situ bioremediation is a potentially expedient, permanent and cost- effective means of waste site decontamination. However, permeability reductions due to the transport and deposition of native fines or due to excessive microorganism populations may severely inhibit the injection of supplemental oxygen in the contamination zone. To help understand this phenomenon, we have developed a micro-mechanical network model of flow, diffusion and particle transport in granular porous materials. The model differs from most similar models in that the network is defined by particle positions in a numerically-generated particle array. The model is thus widely applicable to computing effective transport properties for both ordered and realistic random porous media. A laboratory-scale apparatus to measure permeability reductions has also been designed, built and tested.