WorldWideScience

Sample records for network media access

  1. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever-ch...

  2. IPTV based on IP network and streaming media service station

    Science.gov (United States)

    Sun, Jifeng; Gao, Songbo

    2007-11-01

    IPTV can be a new service performed on the Internet in that network transmission and streaming media technologies are getting mature. In this paper, IPTV system infrastructure of UTStarcom, key technologies deployed, and applications will be discussed and evaluated. The key technologies to achieve IPTV services include 1) codec and compression; 2) streaming media; and 3) broadband networks and access to such networks. The implementation of Media Switch IPTV system in Harbin CNC city network is also discussed.

  3. SAM: Secure Access of Media Independent Information Service with User Anonymity

    Directory of Open Access Journals (Sweden)

    Li Guangsong

    2010-01-01

    Full Text Available Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS and present a new access authentication scheme with user anonymity for MIIS. The protocol can be used to establish a secure channel between the mobile node and the information server. Security and performance of the protocol are also analyzed in this paper.

  4. THE IMAGE OF BALI TOURISM IN SOCIAL NETWORKING MEDIA

    Directory of Open Access Journals (Sweden)

    Ni Gusti Ayu Dewi Paramita Arisandi

    2016-03-01

    Full Text Available Tourism is growing very rapidly with the development of technology, especially information technology .Through information technology people can easily get access to information about various destinations and tourist attractions as well as hotel by online media communication. Therefore, this study was trying to use social media such as facebook and twitter, where both social media were widely used by companies engaged in tourism in the world as well as in Bali. Internet consists of several websites, but the most effective one to conduct the research on tourism such as webseries 2.0 or commonly called as social networking media. Social medias - Facebook and Twitter - both were wildly used by the companies running in the sector of tourism in Bali, such as Hotels, Villas, Restaurants, Spas, Travel Agents, Airlines, and Tourist Attraction Managements, to advertised their products and services in their respective field. Through those social media, tourists will be able to access the comments or reviews about the companies. The problem raised in this research is how Bali’s tourism data in social networking media were used and considered, and how was the image of Bali’s tourism in their point of viewbased on the research. The method used here was descriptive qualitative method which describes this phenomenon descriptively by analyzing the obtained comments on social networking media such as facebook and twitter, and then classified in the form of comments positive, negative, and unidentified comment. Afterwards comments were re-analyzed through 4A Approach which consist of Attraction, amenities, Ancillary, and Accessibility. Data which has been obtained re-analyzed via the data obtained from the homepage of (TripAdvisor and Agoda.com. In addition, to strengthen the research data obtained from the homepage of TripAdvisor and Agoda.com , then it has been elaborated on the point rating system which indicatedthat the company were registered in both of

  5. One Health in social networks and social media.

    Science.gov (United States)

    Mekaru, S R; Brownstein, J S

    2014-08-01

    In the rapidly evolving world of social media, social networks, mobile applications and citizen science, online communities can develop organically and separately from larger or more established organisations. The One Health online community is experiencing expansion from both the bottom up and the top down. In this paper, the authors review social media's strengths and weaknesses, earlier work examining Internet resources for One Health, the current state of One Health in social media (e.g. Facebook, Twitter, YouTube) and online social networking sites (e.g. LinkedIn and ResearchGate), as well as social media in One Health-related citizen science projects. While One Health has a fairly strong presence on websites, its social media presence is more limited and has an uneven geographic distribution. In work following the Stone Mountain Meeting,the One Health Global Network Task Force Report recommended the creation of an online community of practice. Professional social networks as well as the strategic use of social media should be employed in this effort. Finally, One Health-related research projects using volunteers (citizen science) often use social media to enhance their recruitment. Including these researchers in a community of practitioners would take full advantage of their existing social media presence. In conclusion, the interactive nature of social media, combined with increasing global Internet access, provides the One Health community with opportunities to meaningfully expand their community and promote their message.

  6. [Exploration of the design of media access control layer of wireless body area network for medical healthcare].

    Science.gov (United States)

    Liu, Xuemei; Ge, Baofeng

    2012-04-01

    This paper proposes a media access control (MAC) layer design for wireless body area network (WBAN) systems. WBAN is a technology that targets for wireless networking of wearable and implantable body sensors which monitor vital body signs, such as heart-rate, body temperature, blood pressure, etc. It has been receiving attentions from international organizations, e. g. the Institute of Electrical and Electronics Engineers (IEEE), due to its capability of providing efficient healthcare services and clinical management. This paper reviews the standardization procedure of WBAN and summarizes the challenge of the MAC layer design. It also discusses the methods of improving power consumption performance, which is one of the major issues of WBAN systems.

  7. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  8. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  9. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 Background With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks

  10. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  11. Integration of Education: Using Social Media Networks to Engage Students

    Directory of Open Access Journals (Sweden)

    Risa Blair

    2014-10-01

    Full Text Available Any educator today will tell you that the strategies used in the classroom have evolved and changed with the access everyone has to technology. In a world with constant changes and shifts because of immediate access to information, the way course content is delivered must evolve and adjust to the new ways students learn. Engagement of students in course content and reaching learning objectives are the key elements educators strive for in every course. Enter social media networks and the ability to leverage the user activity with these applications in education. Now, educators can provide content which engages students and meets learning objectives the way students want to learn. By reviewing social media networks: Facebook, Pinterest, Instagram, Blogs, Twitter, and Evernote, educators can position themselves to be as technology-savvy as today's students.

  12. Determining Open Education Related Social Media Usage Trends in Turkey Using a Holistic Social Network Analysis

    Science.gov (United States)

    Firat, Mehmet; Altinpulluk, Hakan; Kilinç, Hakan; Büyük, Köksal

    2017-01-01

    The aim of this study is to reveal Open Education related social media usage in Turkey through social network analyses. To this end, the most widely used social media network in Turkey, Facebook, was chosen. All the pages and groups created on Facebook related to Open Education were found. A total of 207 groups and 521 pages were accessed and…

  13. Secure Media Independent Handover Message Transport in Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Cho Choong-Ho

    2009-01-01

    Full Text Available The IEEE 802.21 framework for Media Independent Handover (MIH provides seamless vertical handover support for multimode mobile terminals. MIH messages are exchanged over various wireless media between mobile terminals and access networks to facilitate seamless handover. This calls for the need to secure MIH messages against network security threats in the wireless medium. In this paper, we first analyze IPSec/IKEv2 and DTLS security solution for secure MIH message transport. We show that handover latency can be an impediment to the use of IPSec and DTLS solutions. To overcome the handover overhead and hence minimize authentication time, a new secure MIH message transport solution, referred as MIHSec in this paper, is proposed. Experimental results are obtained for MIH between WLAN and Ethernet networks and the impacts of MIH message security on the handover latency are evaluated for IPSec, DTLS, and MIHSec security solutions. The effectiveness of MIHSec is demonstrated.

  14. Network interventions - How citizens’ social media networks influence their political participation

    DEFF Research Database (Denmark)

    Ohme, Jakob; de Vreese, Claes Holger; Albæk, Erik

    Social media platforms are special places of information exposure because they are structured around a user’s social network and not around content, like other news media. Studies could show that news exposure on social media can affect citizens’ political participation due to the personalized......, targeted, & inadvertent exposure. However, previous research did not strongly focus on how the characteristics of a citizens’ social media network might alter this relationship. We tests how political information exposure via three different media channels affects political participation among Danish...... citizens and examine possible moderation effects of users network size, network diversity and the newly introduced parameter of perceived network activity. To this end, a two-wave online survey (n=858) among the Danish population was conducted, applying a smartphone-based media diary study. We find strong...

  15. The Impact of Social Network Media on Brand Equity in SMEs

    OpenAIRE

    Mohammad Reza Nemat Gorgani

    2016-01-01

    Given the virtual world’s controlling role in everyday life, no one can ignore its crucial impacts on the physical world. In this term social network media play a considerable role in peoples’ daily lives and business by information sharing and the impressions of friends’ comments on own view. Dealing with change, continuing to develop in the dynamic marketplace furthermore, access to information on a level never experienced before are possible benefits to companies;Social media influences co...

  16. The impacts of post-media networks on the traditional media

    Directory of Open Access Journals (Sweden)

    Dr. Francisco Campos Freire

    2008-01-01

    Full Text Available The fast and successful penetration in society of the so-called social networks in the past two or three years has alarmed the traditional media. The new phenomenon reaches a wider audience, enhances advertising, achieves customization, and breaches some of the barriers of traditional media. The new communication channel is used already by millions of Internet users as their main source of information and entertainment. This research paper analyses the structure of eleven global social networks, which feature contents in Spanish and other languages, in relation to the electronic version (e-version of the main Spanish newspapers. The aim is to prove if the so-called social networks are a new type of media, a new platform for social relationships and post-media contents, which look more like the audiovisual media than the traditional newspapers.

  17. Network value and optimum analysis on the mode of networked marketing in TV media

    Directory of Open Access Journals (Sweden)

    Xiao Dongpo

    2012-12-01

    Full Text Available Purpose: With the development of the networked marketing in TV media, it is important to do the research on network value and optimum analysis in this field.Design/methodology/approach: According to the research on the mode of networked marketing in TV media and Correlation theory, the essence of media marketing is creating, spreading and transferring values. The Participants of marketing value activities are in network, and value activities proceed in networked form. Network capability is important to TV media marketing activities.Findings: This article raises the direction of research of analysis and optimization about network based on the mode of networked marketing in TV media by studying TV media marketing Development Mechanism , network analysis and network value structure.

  18. Unscrewing social media networks, twice

    DEFF Research Database (Denmark)

    Birkbak, Andreas

    2017-01-01

    Social media are often claimed to be an important new force in politics. One way to investigate such a claim is to follow an early call made in actor-network theory (ANT) to “unscrew” those entities that are assumed to be important and show how they are made up of heterogeneous networks of many...... different actors (Callon and Latour 1981). In this article I take steps towards unscrewing seven Facebook pages that were used to mobilize citizens for and against road pricing in Copenhagen in 2011-2012. But I encounter the difficulty that social media are already explicitly understood in Internet Studies...... that it can be combined with liberal notions of a singular public sphere (Somers 1995b; 1995a). In order to unscrew social media as a political force, I suggest that we need to work through both the assembling of social media networks and attend to corresponding reconstructions of liberal political narratives...

  19. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  20. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  1. Next Generation Access Network Deployment in Croatia: Optical Access Networks and Current IoT/5G Status

    Science.gov (United States)

    Breskovic, Damir; Sikirica, Mladen; Begusic, Dinko

    2018-05-01

    This paper gives an overview and background of optical access network deployment in Croatia. Optical access network development in Croatia has been put into a global as well as in the European Union context. All the challenges and the driving factors for optical access networks deployment are considered. Optical access network architectures that have been deployed by most of the investors in Croatian telecommunication market are presented, as well as the architectures that are in early phase of deployment. Finally, an overview on current status of mobile networks of the fifth generation and Internet of Things is given.

  2. The entire network topology display system of terminal communication access network

    OpenAIRE

    An Yi

    2016-01-01

    Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...

  3. Self-optimized admission control for multi-tenant radio access networks

    OpenAIRE

    Pérez Romero, Jordi; Sallent Roig, José Oriol; Ferrús Ferré, Ramón Antonio; Agustí Comes, Ramon

    2018-01-01

    © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes,creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Multi-tenant Radio Access Networks (RANs) are envisaged to play a key role in highly dense scenarios for fulfil...

  4. Wireless Multi Hop Access Networks and Protocols

    OpenAIRE

    Nilsson Plymoth, Anders

    2007-01-01

    As more and more applications and services in our society now depend on the Internet, it is important that dynamically deployed wireless multi hop networks are able to gain access to the Internet and other infrastructure networks and services. This thesis proposes and evaluates solutions for providing multi hop Internet Access. It investigates how ad hoc networks can be combined with wireless and mesh networks in order to create wireless multi hop access networks. When several access points t...

  5. Evaluation of Advertising Campaigns on Social Media Networks

    Directory of Open Access Journals (Sweden)

    Jurgita Raudeliūnienė

    2018-03-01

    Full Text Available As the virtual environment is constantly changing, not only users’ informational and knowledge needs but also the means and channels of communication with customers applied by organizations change. There is a noticeable trend to move more and more advertising campaigns to social media networks because of the opportunities they provide to organizations and users, which results in the ever-increasing popularity of social media networks and a number of their users. Such a transition is explained by one of the main objectives organizations have: to inform their customers in an appropriate way and receive feedback on social media networks, which is difficult when traditional advertising channels and means are applied. Since advertising campaigns on social media networks are evolving rapidly, their assessment factors and methods, which receive controversial opinions in both scientific literature and practice, change too. Researchers assess and interpret the factors that influence the effectiveness of advertising campaigns on social media networks differently. Thus, a problem arises: how should we evaluate which approach is more capable of accurately and fully reflecting and conveying reality? In this research, this problem is studied by connecting approaches of different researchers. These approaches are linked to the effectiveness assessment of advertising campaigns on social media network aspects. To achieve the objective of this study, such research methods as analysis of scientific literature, multiple criteria and expert assessment (a structured survey and an interview were applied. During the study, out of 39 primary assessment factors, eight primary factors that influence the effectiveness of advertising campaigns on social media networks were identified: sales, content reach, traffic to website, impressions, frequency, relevance score, leads and audience growth.

  6. Networks in the news media

    DEFF Research Database (Denmark)

    Bro, Peter

    more formal types of social networks, but also complement or even substitute social networking elsewhere, and as such this particular type of social network offers people both inside and outside the news room new potentials - and problems. This article describe the basic vision of networks in the news......When news reporters connect people in a single news story or in a series of coherent news stories they essentially construct networks in the news media. Networks through which social actors are aligned symbolically in written, visible or audible form. These socio-symbolic networks not only copy...

  7. Wi-Fi Networks Security and Accessing Control

    OpenAIRE

    Tarek S. Sobh

    2013-01-01

    As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP) problem has raised more attention and resulted in obtaining wireless access without subscriber permission.This work assumes Wi-Fi...

  8. Remote Network Access (RNA)

    National Research Council Canada - National Science Library

    2002-01-01

    .... Remote Network Access (RNA) includes or is associated with all communication devices/software, firewalls, intrusion detection systems and virus protection applications to ensure security of the OIG, DoD, Network from remote...

  9. Think tanks in Denmark - Media Visibility and Network Relations

    DEFF Research Database (Denmark)

    Ørsten, Mark; Nørgaard Kristensen, Nete

    and the social democratic think thank the Economic Council of the Labor Movement (ECLM), and their influence on two of the three arenas: the media arena and the administrative arena. Theoretically, we draw on theories of neo-corporatism (Rommetvedt et al., 2012) and mediatization (Hjarvard, 2013; Strömbäck...... & Esser, 2014), and argue that media visibility and attention have become increasingly important for political actors seeking to influence decision makers (Rich & Weaver, 2000), but that corporatist networks and access to the administrative sphere are also still important arenas of influence (Binderkrantz...... have necessitated that actors seeking to influence political decisions mak-ing, such as interest groups, have had to find new ways of influencing policy making (Rom-metvedt et al., 2012). Studies of special interest groups in Denmark have pointed towards three important arenas of influence...

  10. Public service in the age of social network media

    DEFF Research Database (Denmark)

    Hjarvard, Stig

    2018-01-01

    This chapter addresses how, and to what extent, public service obligations and institutions may be redefined and extended to facilitate information flows and public deliberation using social network media as a remedy for democratic deficiencies of both older mass media and newer forms of network...... media. I make a case for three public service functions that have particular importance in social network media: curation, moderation, and monitoring. Building on a critique of the individualistic perspective underlying both cyber-optimist and -pessimist accounts of the potentials of social network...... media, an alternative and institutional perspective based on mediatization theory is introduced. I focus on the ongoing restructuring of societal spheres through which strategic and sociable forms of communication are challenging deliberative forms of communication. Based on recent studies on public...

  11. Content, Accessibility, and Dissemination of Disaster Information via Social Media During the 2016 Louisiana Floods.

    Science.gov (United States)

    Scott, Katherine K; Errett, Nicole A

    2017-12-27

    Social media is becoming increasingly integrated into disaster response communication strategies of public health and emergency response agencies. We sought to assess the content, accessibility, and dissemination of social media communications made by government agencies during a disaster response. A cross-sectional analysis of social media posts made by federal, state, and local government, public health and emergency management agencies before, during, and after the 2016 Louisiana floods was conducted to determine their content, accessibility, and dissemination by level of government and time relative to disaster onset. Facebook and/or Twitter posts made by public agencies involved in the response to the 2016 Louisiana Flooding events (FEMA Disaster Declaration [DR-4277]) published between August 4 and September 16, 2016, publicly available online between February 21 and March 31, 2017, were included in the analysis. Content: The text of each post was assessed to determine whether it contained information on provision of situational awareness; addressing misconception, actionable requests; mental, behavioral, and emotional support; and/or recovery and rebuilding resources. Accessibility: A Flesh-Kincaid grade level of each post was calculated, and information on post language, originality, hyperlinks, visuals, videos, or hash tag was recorded. Dissemination: The average number of reacts/likes, shares/retweets, and comments per post was calculated. Most posts contained information related to situational awareness and recovery resources. There was an increase in messages during the first week of the disaster at all levels. Few posts were made in languages other than English. Compared with state and federal posts, local Facebook posts averaged fewer reacts, comments, and shares throughout the analysis period. Government agencies may maximize the use of social media platforms for disaster communications by establishing their social media network in advance of a

  12. Joint control algorithm in access network

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To deal with long probing delay and inaccurate probing results in the endpoint admission control method,a joint local and end-to-end admission control algorithm is proposed,which introduces local probing of access network besides end-to-end probing.Through local probing,the algorithm accurately estimated the resource status of the access network.Simulation shows that this algorithm can improve admission control performance and reduce users' average waiting time when the access network is heavily loaded.

  13. Social Media Use and Access to Digital Technology in US Young Adults in 2016

    Science.gov (United States)

    Johnson, Amanda L; Ilakkuvan, Vinu; Jacobs, Megan A; Graham, Amanda L; Rath, Jessica M

    2017-01-01

    Background In 2015, 90% of US young adults with Internet access used social media. Digital and social media are highly prevalent modalities through which young adults explore identity formation, and by extension, learn and transmit norms about health and risk behaviors during this developmental life stage. Objective The purpose of this study was to provide updated estimates of social media use from 2014 to 2016 and correlates of social media use and access to digital technology in data collected from a national sample of US young adults in 2016. Methods Young adult participants aged 18-24 years in Wave 7 (October 2014, N=1259) and Wave 9 (February 2016, N=989) of the Truth Initiative Young Adult Cohort Study were asked about use frequency for 11 social media sites and access to digital devices, in addition to sociodemographic characteristics. Regular use was defined as using a given social media site at least weekly. Weighted analyses estimated the prevalence of use of each social media site, overlap between regular use of specific sites, and correlates of using a greater number of social media sites regularly. Bivariate analyses identified sociodemographic correlates of access to specific digital devices. Results In 2014, 89.42% (weighted n, 1126/1298) of young adults reported regular use of at least one social media site. This increased to 97.5% (weighted n, 965/989) of young adults in 2016. Among regular users of social media sites in 2016, the top five sites were Tumblr (85.5%), Vine (84.7%), Snapchat (81.7%), Instagram (80.7%), and LinkedIn (78.9%). Respondents reported regularly using an average of 7.6 social media sites, with 85% using 6 or more sites regularly. Overall, 87% of young adults reported access or use of a smartphone with Internet access, 74% a desktop or laptop computer with Internet access, 41% a tablet with Internet access, 29% a smart TV or video game console with Internet access, 11% a cell phone without Internet access, and 3% none of these

  14. USE AND USE INTENSITY OF SOCIAL MEDIA NETWORKING SYSTEMS BY NIGERIAN AGRO-ENTREPRENEURS

    Directory of Open Access Journals (Sweden)

    Joseph Omotoso AJAYI

    2015-04-01

    Full Text Available Agro-entrepreneurs are key to the Nigerian economy as they constitute the majority of the work force, providing food and employment opportunities for more than 60% of the largest black nation on earth. Nigeria’s social media networking system which is the largest in Africa has got its usefulness in many conventional and contemporary applications in the recent times. Social media has become the fastest, cheapest and unrestricted communication and marketing tool of this jet age. This study therefore focused on the use and use intensity of social media networking systems by Nigerian agro-entrepreneurs. The study made use of mainly primary data. Primary data were collected with the aid of well-structured questionnaires assisted with interview schedules. Field data collection was conducted between June and September, 2014. Multi-stage sampling technique was used to select three hundred and sixty (360 respondents across the three (3 highly ICT compliant states (Lagos, Ondo and Oyo. Data collected were analysed using descriptive statistics and multiple regression model. The results of the regression model indicate that education, availability of power supply and customer base of the agro-entrepreneurs positively influenced use intensity of social media by the agro-entrepreneurs while age and cost of access data negatively influenced their use intensity of social media.

  15. Media and youth: access, exposure, and privatization.

    Science.gov (United States)

    Roberts, D F

    2000-08-01

    To describe U.S. youth's access and exposure to the full array of media, as well as the social contexts in which media exposure occurs. A cross-sectional national random sample of 2065 adolescents aged 8 through 18 years, including oversamples of African-American and Hispanic youth, completed questionnaires about use of television, videotapes, movies, computers, video games, radio, compact discs, tape players, books, newspapers, and magazines. U.S. youngsters are immersed in media. Most households contain most media (computers and video game systems are the exception); the majority of youth have their own personal media. The average youth devotes 6 3/4 h to media; simultaneous use of multiple media increases exposure to 8 h of media messages daily. Overall, media exposure and exposure to individual media vary as a function of age, gender, race/ethnicity, and family socioeconomic level. Television remains the dominant medium. About one-half of the youth sampled uses a computer daily. A substantial proportion of children's and adolescents' media use occurs in the absence of parents. American youth devote more time to media than to any other waking activity, as much as one-third of each day. This demands increased parental attention and research into the effects of such extensive exposure.

  16. Editorial: Next Generation Access Networks

    Science.gov (United States)

    Ruffini, Marco; Cincotti, Gabriella; Pizzinat, Anna; Vetter, Peter

    2015-12-01

    Over the past decade we have seen an increasing number of operators deploying Fibre-to-the-home (FTTH) solutions in access networks, in order to provide home users with a much needed network access upgrade, to support higher peak rates, higher sustained rates and a better and more uniform broadband coverage of the territory.

  17. Social Media Use and Access to Digital Technology in US Young Adults in 2016.

    Science.gov (United States)

    Villanti, Andrea C; Johnson, Amanda L; Ilakkuvan, Vinu; Jacobs, Megan A; Graham, Amanda L; Rath, Jessica M

    2017-06-07

    In 2015, 90% of US young adults with Internet access used social media. Digital and social media are highly prevalent modalities through which young adults explore identity formation, and by extension, learn and transmit norms about health and risk behaviors during this developmental life stage. The purpose of this study was to provide updated estimates of social media use from 2014 to 2016 and correlates of social media use and access to digital technology in data collected from a national sample of US young adults in 2016. Young adult participants aged 18-24 years in Wave 7 (October 2014, N=1259) and Wave 9 (February 2016, N=989) of the Truth Initiative Young Adult Cohort Study were asked about use frequency for 11 social media sites and access to digital devices, in addition to sociodemographic characteristics. Regular use was defined as using a given social media site at least weekly. Weighted analyses estimated the prevalence of use of each social media site, overlap between regular use of specific sites, and correlates of using a greater number of social media sites regularly. Bivariate analyses identified sociodemographic correlates of access to specific digital devices. In 2014, 89.42% (weighted n, 1126/1298) of young adults reported regular use of at least one social media site. This increased to 97.5% (weighted n, 965/989) of young adults in 2016. Among regular users of social media sites in 2016, the top five sites were Tumblr (85.5%), Vine (84.7%), Snapchat (81.7%), Instagram (80.7%), and LinkedIn (78.9%). Respondents reported regularly using an average of 7.6 social media sites, with 85% using 6 or more sites regularly. Overall, 87% of young adults reported access or use of a smartphone with Internet access, 74% a desktop or laptop computer with Internet access, 41% a tablet with Internet access, 29% a smart TV or video game console with Internet access, 11% a cell phone without Internet access, and 3% none of these. Access to all digital devices with

  18. Build your own social network laboratory with Social Lab: a tool for research in social media.

    Science.gov (United States)

    Garaizar, Pablo; Reips, Ulf-Dietrich

    2014-06-01

    Social networking has surpassed e-mail and instant messaging as the dominant form of online communication (Meeker, Devitt, & Wu, 2010). Currently, all large social networks are proprietary, making it difficult to impossible for researchers to make changes to such networks for the purpose of study design and access to user-generated data from the networks. To address this issue, the authors have developed and present Social Lab, an Internet-based free and open-source social network software system available from http://www.sociallab.es . Having full availability of navigation and communication data in Social Lab allows researchers to investigate behavior in social media on an individual and group level. Automated artificial users ("bots") are available to the researcher to simulate and stimulate social networking situations. These bots respond dynamically to situations as they unfold. The bots can easily be configured with scripts and can be used to experimentally manipulate social networking situations in Social Lab. Examples for setting up, configuring, and using Social Lab as a tool for research in social media are provided.

  19. Optical Subsystems for Next Generation Access Networks

    DEFF Research Database (Denmark)

    Lazaro, J.A; Polo, V.; Schrenk, B.

    2011-01-01

    Recent optical technologies are providing higher flexibility to next generation access networks: on the one hand, providing progressive FTTx and specifically FTTH deployment, progressively shortening the copper access network; on the other hand, also opening fixed-mobile convergence solutions...... in next generation PON architectures. It is provided an overview of the optical subsystems developed for the implementation of the proposed NG-Access Networks....

  20. Social network media exposure and adolescent eating pathology in Fiji

    Science.gov (United States)

    Becker, Anne E.; Fay, Kristen E.; Agnew-Blais, Jessica; Khan, A. Nisha; Striegel-Moore, Ruth H.; Gilman, Stephen E.

    2011-01-01

    Background Mass media exposure has been associated with an increased risk of eating pathology. It is unknown whether indirect media exposure – such as the proliferation of media exposure in an individual’s social network – is also associated with eating disorders. Aims To test hypotheses that both individual (direct) and social network (indirect) mass media exposures were associated with eating pathology in Fiji. Method We assessed several kinds of mass media exposure, media influence, cultural orientation and eating pathology by self-report among adolescent female ethnic Fijians (n = 523). We fitted a series of multiple regression models of eating pathology, assessed by the Eating Disorder Examination Questionnaire (EDE–Q), in which mass media exposures, sociodemographic characteristics and body mass index were entered as predictors. Results Both direct and indirect mass media exposures were associated with eating pathology in unadjusted analyses, whereas in adjusted analyses only social network media exposure was associated with eating pathology. This result was similar when eating pathology was operationalised as either a continuous or a categorical dependent variable (e.g. odds ratio OR = 1.60, 95% CI 1.15–2.23 relating social network media exposure to upper-quartile EDE–Q scores). Subsequent analyses pointed to individual media influence as an important explanatory variable in this association. Conclusions Social network media exposure was associated with eating pathology in this Fijian study sample, independent of direct media exposure and other cultural exposures. Findings warrant further investigation of its health impact in other populations. PMID:21200076

  1. Signed Networks in Social Media

    OpenAIRE

    Leskovec, Jure; Huttenlocher, Daniel; Kleinberg, Jon

    2010-01-01

    Relations between users on social media sites often reflect a mixture of positive (friendly) and negative (antagonistic) interactions. In contrast to the bulk of research on social networks that has focused almost exclusively on positive interpretations of links between people, we study how the interplay between positive and negative relationships affects the structure of on-line social networks. We connect our analyses to theories of signed networks from social psychology. We find that the c...

  2. Enabling Broadband as Commodity within Access Networks: A QoS Recipe

    Science.gov (United States)

    Areizaga, Enrique; Foglar, Andreas; Elizondo, Antonio J.; Geilhardt, Frank

    This paper describes the QoS features that will transform the access networks landscape in order to bring “Broadband” as a commodity while setting up the pillars of the “Future Media Internet”. Quality of Experience is obviously key for emerging and future services. Broadcasting services will first need to equal the QoE of their counterparts in the Open-air market (for IP-TV examples would be artifact-free, no picture freezing, fast zapping times) and offer new features often using interactivity (Time-shifted TV, access to more content, 3DTV with feeling of presence). The huge variety of communications alternatives will lead to different requirements per customer, whose needs will also be dependent on parameters like where the connection is made, the time of the day/day of the week/period of the year or even his/her mood. Today’s networks, designed for providing just Broadband connectivity, will not be enough to satisfy customer’s needs and will necessarily support the introduction of new and innovative services. The Networks of the future should learn from the way the users are communicating, what services they are using, where, when, and how, and adapt accordingly.

  3. Accessible virtual reality therapy using portable media devices.

    Science.gov (United States)

    Bruck, Susan; Watters, Paul A

    2010-01-01

    Simulated immersive environments displayed on large screens are a valuable therapeutic asset in the treatment of a range of psychological disorders. Permanent environments are expensive to build and maintain, require specialized clinician training and technical support and often have limited accessibility for clients. Ideally, virtual reality exposure therapy (VRET) could be accessible to the broader community if we could use inexpensive hardware with specifically designed software. This study tested whether watching a handheld non-immersive media device causes nausea and other cybersickness responses. Using a repeated measure design we found that nausea, general discomfort, eyestrain, blurred vision and an increase in salivation significantly increased in response to handheld non-immersive media device exposure.

  4. Scalable Lunar Surface Networks and Adaptive Orbit Access

    Science.gov (United States)

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  5. IP access networks with QoS support

    Science.gov (United States)

    Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique

    2001-07-01

    The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.

  6. Social networks as ICT collaborative and supportive learning media ...

    African Journals Online (AJOL)

    ... ICT collaborative and supportive learning media utilisation within the Nigerian educational system. The concept of ICT was concisely explained vis-à-vis the social network concept, theory and collaborative and supportive learning media utilisation. Different types of social network are highlighted among which Facebook, ...

  7. Research of Ad Hoc Networks Access Algorithm

    Science.gov (United States)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  8. STAR-TYPE LOCAL AREA NETWORK ACCESS CONTROL

    Institute of Scientific and Technical Information of China (English)

    逯昭义; 齐藤忠夫

    1990-01-01

    The multiple access fashion is a new resolution for the star-type local area network (LAN) access control and star-type optical fibre LAN. Arguments about this network are discussed, and the results are introduced.

  9. THE DISTRIBUTION NETWORK DEVELOPEMENT IN PRINT MEDIA

    Directory of Open Access Journals (Sweden)

    Loredana Iordache

    2012-09-01

    Full Text Available In this article, we identify the characteristics of the distribution networks in print media and the features ofmarketing in mass media, emphasising the attempts initiated by the press in the context of the financial crisis. Theresearch was conducted through a case study on regional newspaper,, Gazeta de Sud'' The main problems analyzedwere decreasing newspaper circulation and advertising. The research taken into account trends and developmentsworldwide print media as well as print media particularities of Romania, with a focus on identifying factors thatcontributed to the closure of a significant number of newspapers, or their transition from printed version online format.The paper is mainly focused on some practical issues related to the way of organizing the print media sales networks,the authors elaborating proposals for the implementation of certain measures to increase the circulation, on the onehand, and on the hand, to increase the sale of ad space in the newspaper. Compared with other products, thenewspaper has unique characteristics caused by daily changing content, and therefore the product itself. Having ahighly perishable, the content of media products should always seen in relation to time, which requires more rapiddistribution and continuous production.

  10. Social media networking: Facebook and Twitter.

    Science.gov (United States)

    Schneider, Andrew; Jackson, Rem; Baum, Neil

    2010-01-01

    The new wave of marketing and practice promotion will include social media networking. This article will discuss Facebook and Twitter. After reading this article you, will have an understanding of these two important aspects of social media and how you might use Facebook and Twitter in your practice to enhance your communication with your existing patients and attract new patients.

  11. Predicting Social Networking Site Use and Online Communication Practices among Adolescents: The Role of Access and Device Ownership

    Directory of Open Access Journals (Sweden)

    Drew P. Cingel

    2014-01-01

    Full Text Available Given adolescents' heavy social media use, this study examined a number of predictors of adolescent social media use, as well as predictors of online communication practices. Using data collected from a national sample of 467 adolescents between the ages of 13 and 17, results indicate that demographics, technology access, and technology ownership are related to social media use and communication practices. Specifically, females log onto and use more constructive communication practices on Facebook compared to males. Additionally, adolescents who own smartphones engage in more constructive online communication practices than those who share regular cell phones or those who do not have access to a cell phone. Overall, results imply that ownership of mobile technologies, such as smartphones and iPads, may be more predictive of social networking site use and online communication practices than general ownership of technology.

  12. Predicting Social Networking Site Use and Online Communication Practices among Adolescents: The Role of Access and Device Ownership

    Directory of Open Access Journals (Sweden)

    Drew P. Cingel

    2014-06-01

    Full Text Available Given adolescents' heavy social media use, this study examined a number of predictors of adolescent social media use, as well as predictors of online communication practices. Using data collected from a national sample of 467 adolescents between the ages of 13 and 17, results indicate that demographics, technology access, and technology ownership are related to social media use and communication practices. Specifically, females log onto and use more constructive com-munication practices on Facebook compared to males. Additionally, adolescents who own smartphones engage in more constructive online communication practices than those who share regular cell phones or those who do not have access to a cell phone. Overall, results imply that ownership of mobile technologies, such as smartphones and iPads, may be more predictive of social networking site use and online communication practices than general ownership of technology.

  13. Networking, or What the Social Means in Social Media

    OpenAIRE

    Taina Bucher

    2015-01-01

    This article questions the meaning of the social in social media. It does this by revisiting boyd and Ellison’s seminal paper and definition of social network sites. The article argues that social media are not so much about articulating or making an existing network visible. Rather, being social in the context of social media simply means creating connections within the boundaries of adaptive algorithmic architectures. Every click, share, like, and post creates a connection, initiates a rela...

  14. Social Network Perspective: Model of Student Knowledge Sharing On Social Network Media

    OpenAIRE

    Bentar Priyopradono; Danny Manongga; Wiranto H. Utomo

    2012-01-01

    Recently, the role and development of information technology especially the internet, gives impact and influence in social relationship especially for social network site services users. The impact and influence the use of Internet which is related to exchange information and knowledge sharing still become one of the interesting topics to be researched. Now, the use of social media network by students are the best way to them to increase their knowledge as communication media such as, exchang...

  15. JavaScript Access to DICOM Network and Objects in Web Browser.

    Science.gov (United States)

    Drnasin, Ivan; Grgić, Mislav; Gogić, Goran

    2017-10-01

    Digital imaging and communications in medicine (DICOM) 3.0 standard provides the baseline for the picture archiving and communication systems (PACS). The development of Internet and various communication media initiated demand for non-DICOM access to PACS systems. Ever-increasing utilization of the web browsers, laptops and handheld devices, as opposed to desktop applications and static organizational computers, lead to development of different web technologies. The DICOM standard officials accepted those subsequently as tools of alternative access. This paper provides an overview of the current state of development of the web access technology to the DICOM repositories. It presents a different approach of using HTML5 features of the web browsers through the JavaScript language and the WebSocket protocol by enabling real-time communication with DICOM repositories. JavaScript DICOM network library, DICOM to WebSocket proxy and a proof-of-concept web application that qualifies as a DICOM 3.0 device were developed.

  16. Performance Evaluation of Peer-to-Peer Progressive Download in Broadband Access Networks

    Science.gov (United States)

    Shibuya, Megumi; Ogishi, Tomohiko; Yamamoto, Shu

    P2P (Peer-to-Peer) file sharing architectures have scalable and cost-effective features. Hence, the application of P2P architectures to media streaming is attractive and expected to be an alternative to the current video streaming using IP multicast or content delivery systems because the current systems require expensive network infrastructures and large scale centralized cache storage systems. In this paper, we investigate the P2P progressive download enabling Internet video streaming services. We demonstrated the capability of the P2P progressive download in both laboratory test network as well as in the Internet. Through the experiments, we clarified the contribution of the FTTH links to the P2P progressive download in the heterogeneous access networks consisting of FTTH and ADSL links. We analyzed the cause of some download performance degradation occurred in the experiment and discussed about the effective methods to provide the video streaming service using P2P progressive download in the current heterogeneous networks.

  17. Rural women and violence situation: access and accessibility limits to the healthcare network.

    Science.gov (United States)

    Costa, Marta Cocco da; Silva, Ethel Bastos da; Soares, Joannie Dos Santos Fachinelli; Borth, Luana Cristina; Honnef, Fernanda

    2017-07-13

    To analyze the access and accessibility to the healthcare network of women dwelling in rural contexts undergoing violence situation, as seen from the professionals' speeches. A qualitative, exploratory, descriptive study with professionals from the healthcare network services about coping with violence in four municipalities in the northern region of Rio Grande do Sul. The information derived from interviews, which have been analyzed by thematic modality. (Lack of) information of women, distance, restricted access to transportation, dependence on the partner and (lack of) attention by professionals to welcome women undergoing violence situation and (non)-articulation of the network are factors that limit the access and, as a consequence, they result in the lack of confrontation of this problem. To bring closer the services which integrate the confrontation network of violence against women and to qualify professionals to welcome these situations are factors that can facilitate the access and adhesion of rural women to the services.

  18. Effects of network node consolidation in optical access and aggregation networks on costs and power consumption

    Science.gov (United States)

    Lange, Christoph; Hülsermann, Ralf; Kosiankowski, Dirk; Geilhardt, Frank; Gladisch, Andreas

    2010-01-01

    The increasing demand for higher bit rates in access networks requires fiber deployment closer to the subscriber resulting in fiber-to-the-home (FTTH) access networks. Besides higher access bit rates optical access network infrastructure and related technologies enable the network operator to establish larger service areas resulting in a simplified network structure with a lower number of network nodes. By changing the network structure network operators want to benefit from a changed network cost structure by decreasing in short and mid term the upfront investments for network equipment due to concentration effects as well as by reducing the energy costs due to a higher energy efficiency of large network sites housing a high amount of network equipment. In long term also savings in operational expenditures (OpEx) due to the closing of central office (CO) sites are expected. In this paper different architectures for optical access networks basing on state-of-the-art technology are analyzed with respect to network installation costs and power consumption in the context of access node consolidation. Network planning and dimensioning results are calculated for a realistic network scenario of Germany. All node consolidation scenarios are compared against a gigabit capable passive optical network (GPON) based FTTH access network operated from the conventional CO sites. The results show that a moderate reduction of the number of access nodes may be beneficial since in that case the capital expenditures (CapEx) do not rise extraordinarily and savings in OpEx related to the access nodes are expected. The total power consumption does not change significantly with decreasing number of access nodes but clustering effects enable a more energyefficient network operation and optimized power purchase order quantities leading to benefits in energy costs.

  19. Research on optical access network remote management technology

    Science.gov (United States)

    Wang, Wayne; Zou, Chen; Luo, Wenyi

    2008-11-01

    This paper goal is to provide a framework for the remote configuration and management of services for PON (Passive Optical Network) access and fiber access. Also it defines how Auto-Configuration Servers (ACS) in the network can remotely configure, troubleshoot and manage a Passive Optical Network (PON) optical network termination (ONT) with layer 3 capabilities using the CPE WAN management protocol, TR-069.

  20. Location-aware network operation for cloud radio access network

    KAUST Repository

    Wang, Fanggang; Ruan, Liangzhong; Win, Moe Z.

    2017-01-01

    One of the major challenges in effectively operating a cloud radio access network (C-RAN) is the excessive overhead signaling and computation load that scale rapidly with the size of the network. In this paper, the exploitation of location

  1. Dual-mode ultraflow access networks: a hybrid solution for the access bottleneck

    Science.gov (United States)

    Kazovsky, Leonid G.; Shen, Thomas Shunrong; Dhaini, Ahmad R.; Yin, Shuang; De Leenheer, Marc; Detwiler, Benjamin A.

    2013-12-01

    Optical Flow Switching (OFS) is a promising solution for large Internet data transfers. In this paper, we introduce UltraFlow Access, a novel optical access network architecture that offers dual-mode service to its end-users: IP and OFS. With UltraFlow Access, we design and implement a new dual-mode control plane and a new dual-mode network stack to ensure efficient connection setup and reliable and optimal data transmission. We study the impact of the UltraFlow system's design on the network throughput. Our experimental results show that with an optimized system design, near optimal (around 10 Gb/s) OFS data throughput can be attained when the line rate is 10Gb/s.

  2. Online Activities, Digital Media Literacy, and Networked Individualism of Korean Youth

    Science.gov (United States)

    Park, Sora; Kim, Eun-mee; Na, Eun-Yeong

    2015-01-01

    Networked individualism enables Internet users to connect and socialize via their loose and transient multiple networks, whereas digital media literacy is a precondition of effective Internet use. In this study, an attempt has been made to find the link between networked individualism, digital media literacy, and young people's perception of their…

  3. The utilization of social networking as promotion media (Case study: Handicraft business in Palembang)

    OpenAIRE

    Rahadi, Dedi Rianto; Abdillah, Leon Andretti

    2013-01-01

    Nowadays social media (Twitter, Facebook, etc.), not only simply as communication media, but also for promotion. Social networking media offers many business benefits for companies and organizations. Research purposes is to determine the model of social network media utilization as a promotional media for handicraft business in Palembang city. Qualitative and quantitative research design are used to know how handicraft business in Palembang city utilizing social media networking as a promotio...

  4. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... control. Highlights of my research include my proposal and experimental proof of principle of an optical coherent detection based optical access network architecture providing support for a large number of users over a single distribution fiber; a spectral amplitude encoded label detection technique...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...

  5. Radio Access Sharing Strategies for Multiple Operators in Cellular Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Iversen, Villy Bæk

    2015-01-01

    deployments (required for coverage enhancement), increased base station utilization, and reduced overall power consumption. Today, network sharing in the radio access part is passive and limited to cell sites. With the introduction of Cloud Radio Access Network and Software Defined Networking adoption...... to the radio access network, the possibility for sharing baseband processing and radio spectrum becomes an important aspect of network sharing. This paper investigates strategies for active sharing of radio access among multiple operators, and analyses the individual benefits depending on the sharing degree...

  6. Planning Multitechnology Access Networks with Performance Constraints

    Science.gov (United States)

    Chamberland, Steven

    Considering the number of access network technologies and the investment needed for the “last mile” of a solution, in today’s highly competitive markets, planning tools are crucial for the service providers to optimize the network costs and accelerate the planning process. In this paper, we propose to tackle the problem of planning access networks composed of four technologies/architectures: the digital subscriber line (xDSL) technologies deployed directly from the central office (CO), the fiber-to-the-node (FTTN), the fiber-to-the-micro-node (FTTn) and the fiber-to-the-premises (FTTP). A mathematical programming model is proposed for this planning problem that is solved using a commercial implementation of the branch-and-bound algorithm. Next, a detailed access network planning example is presented followed by a systematic set of experiments designed to assess the performance of the proposed approach.

  7. Fiber Access Networks: Reliability Analysis and Swedish Broadband Market

    Science.gov (United States)

    Wosinska, Lena; Chen, Jiajia; Larsen, Claus Popp

    Fiber access network architectures such as active optical networks (AONs) and passive optical networks (PONs) have been developed to support the growing bandwidth demand. Whereas particularly Swedish operators prefer AON, this may not be the case for operators in other countries. The choice depends on a combination of technical requirements, practical constraints, business models, and cost. Due to the increasing importance of reliable access to the network services, connection availability is becoming one of the most crucial issues for access networks, which should be reflected in the network owner's architecture decision. In many cases protection against failures is realized by adding backup resources. However, there is a trade off between the cost of protection and the level of service reliability since improving reliability performance by duplication of network resources (and capital expenditures CAPEX) may be too expensive. In this paper we present the evolution of fiber access networks and compare reliability performance in relation to investment and management cost for some representative cases. We consider both standard and novel architectures for deployment in both sparsely and densely populated areas. While some recent works focused on PON protection schemes with reduced CAPEX the current and future effort should be put on minimizing the operational expenditures (OPEX) during the access network lifetime.

  8. Local-area communication networks - An overview

    International Nuclear Information System (INIS)

    Kuemmerle, K.

    1982-01-01

    Local-area communication networks represent a new field of activity. In this paper we first describe three scenarios for the use of these networks, and then discuss various technical approaches. Particular emphasis is put on bus and ring systems with various media access control mechanisms. Specifically, we compare the delay-throughput characteristic of two access methods, carrier-sense multiple access with collision detection and token passing, and discuss some significant differences of bus and ring systems concerning wiring, media, transmission, and reliability. (orig.)

  9. Multiple-Access Quantum-Classical Networks

    Science.gov (United States)

    Razavi, Mohsen

    2011-10-01

    A multi-user network that supports both classical and quantum communication is proposed. By relying on optical code-division multiple access techniques, this system offers simultaneous key exchange between multiple pairs of network users. A lower bound on the secure key generation rate will be derived for decoy-state quantum key distribution protocols.

  10. Social Media Tools for Teaching and Learning

    Science.gov (United States)

    Wagner, Ronald

    2011-01-01

    According to Wikipedia, "social media is the media designed to be disseminated through social interaction, created using highly accessible scalable techniques. Social media is the use of web-based and mobile technologies to turn communication into interactive dialogue." Social networks, such as Facebook and Twitter, contain millions of members who…

  11. MPTCP Tunnel: An Architecture for Aggregating Bandwidth of Heterogeneous Access Networks

    Directory of Open Access Journals (Sweden)

    Xiaolan Liu

    2018-01-01

    Full Text Available Fixed and cellular networks are two typical access networks provided by operators. Fixed access network is widely employed; nevertheless, its bandwidth is sometimes not sufficient enough to meet user bandwidth requirements. Meanwhile, cellular access network owns unique advantages of wider coverage, faster increasing link speed, more flexible deployment, and so forth. Therefore, it is attractive for operators to mitigate the bandwidth shortage by bundling these two. Actually, there have been existing schemes proposed to aggregate the bandwidth of two access networks, whereas they all have their own problems, like packet reordering or extra latency overhead. To address this problem, we design new architecture, MPTCP Tunnel, to aggregate the bandwidth of multiple heterogeneous access networks from the perspective of operators. MPTCP Tunnel uses MPTCP, which solves the reordering problem essentially, to bundle multiple access networks. Besides, MPTCP Tunnel sets up only one MPTCP connection at play which adapts itself to multiple traffic types and TCP flows. Furthermore, MPTCP Tunnel forwards intact IP packets through access networks, maintaining the end-to-end TCP semantics. Experimental results manifest that MPTCP Tunnel can efficiently aggregate the bandwidth of multiple access networks and is more adaptable to the increasing heterogeneity of access networks than existing mechanisms.

  12. The Role of Social Media Tools: Accessible Tourism for Disabled Citizens

    Science.gov (United States)

    Altinay, Zehra; Saner, Tulen; Bahçelerli, Nesrin M.; Altinay, Fahriye

    2016-01-01

    Knowledge sharing becomes important to accomplish digital citizenship. Social media tools become popular to share and diffuse the knowledge in the digitalization. This social media learning and knowledge sharing platforms provides accessibility to the services within societies especially for disabled citizens. This research study aims to evaluate…

  13. LTER network data access policy revision: report and recommendations.

    Science.gov (United States)

    James Brunt; Peter McCartney; Stuart Gage; Don. Henshaw

    2004-01-01

    This document is a report on work carried out to update the LTER Network Data Access Policy. The current LTER Network Data Access Policy, approved by the coordinating committee in 1997, has been in use since 1990. An analysis of the current policies related to the release, access, and use of LTER data has been undertaken by a sub-committee of the LTER Network...

  14. Neural networks in continuous optical media

    International Nuclear Information System (INIS)

    Anderson, D.Z.

    1987-01-01

    The authors' interest is to see to what extent neural models can be implemented using continuous optical elements. Thus these optical networks represent a continuous distribution of neuronlike processors rather than a discrete collection. Most neural models have three characteristic features: interconnections; adaptivity; and nonlinearity. In their optical representation the interconnections are implemented with linear one- and two-port optical elements such as lenses and holograms. Real-time holographic media allow these interconnections to become adaptive. The nonlinearity is achieved with gain, for example, from two-beam coupling in photorefractive media or a pumped dye medium. Using these basic optical elements one can in principle construct continuous representations of a number of neural network models. The authors demonstrated two devices based on continuous optical elements: an associative memory which recalls an entire object when addressed with a partial object and a tracking novelty filter which identifies time-dependent features in an optical scene. These devices demonstrate the potential of distributed optical elements to implement more formal models of neural networks

  15. Social Media and Social Networking Applications for Teaching and Learning

    Science.gov (United States)

    Yeo, Michelle Mei Ling

    2014-01-01

    This paper aims to better understand the experiences of the youth and the educators with the tapping of social media like YouTube videos and the social networking application of Facebook for teaching and learning. This paper is interested in appropriating the benefits of leveraging of social media and networking applications like YouTube and…

  16. Mass media influence spreading in social networks with community structure

    Science.gov (United States)

    Candia, Julián; Mazzitello, Karina I.

    2008-07-01

    We study an extension of Axelrod's model for social influence, in which cultural drift is represented as random perturbations, while mass media are introduced by means of an external field. In this scenario, we investigate how the modular structure of social networks affects the propagation of mass media messages across a society. The community structure of social networks is represented by coupled random networks, in which two random graphs are connected by intercommunity links. Considering inhomogeneous mass media fields, we study the conditions for successful message spreading and find a novel phase diagram in the multidimensional parameter space. These findings show that social modularity effects are of paramount importance for designing successful, cost-effective advertising campaigns.

  17. Performance analysis of quantum access network using code division multiple access model

    International Nuclear Information System (INIS)

    Hu Linxi; Yang Can; He Guangqiang

    2017-01-01

    A quantum access network has been implemented by frequency division multiple access and time division multiple access, while code division multiple access is limited for its difficulty to realize the orthogonality of the code. Recently, the chaotic phase shifters were proposed to guarantee the orthogonality by different chaotic signals and spread the spectral content of the quantum states. In this letter, we propose to implement the code division multiple access quantum network by using chaotic phase shifters and synchronization. Due to the orthogonality of the different chaotic phase shifter, every pair of users can faithfully transmit quantum information through a common channel and have little crosstalk between different users. Meanwhile, the broadband spectra of chaotic signals efficiently help the quantum states to defend against channel loss and noise. (paper)

  18. [Pathology in social media networks. Recruitment campaign].

    Science.gov (United States)

    Alcaraz Mateos, Eduardo; Guerra Pastrián, Laura; Pijuan Andújar, Lara; López Solache, Laura; Zucchiatti, Adriana; García Ángel, Rubén; Prieto Cuadra, Juan Daniel; Labiano Miravalles, Tania; Carvalho, Rita; Gardner, Jerad M; Terrádez, Cristina; de Álava, Enrique

    Pathology is a speciality that is often poorly understood, not only by the general public, but also by clinicians. However, the recent widespread use of social media provides an opportunity to increase the visibility and comprehension of our profession. A working group was formed to carry out this task. The members of the Spanish Society of Pathology were contacted through its Communication and Social Projection Subcommittee to engage in the campaign #IWantYouForSEAP, to form a network on Twitter. The recruitment period was one month (August, 2016). The resulting project, developed during the XXVIII Congress of the SEAP-IAP, was registered using the analytical tools Symplur and Tweet Binder. 32 applications (29 pathologists, 2 histotechnicians, 1 administrative personnel) were received from all over Spain, including participants from 14 of the 17 Autonomous Regions, from 22 cities and 25 medical centres. The activity in relation to the hashtag #SEAP2017V used in the congress included 685 participants with 6704 tweets and 8,837,435 impressions. 28 of the 32 recruited by the #IWantYouForSEAP campaign participated, contributing with 2410 tweets, and generating 2,090,423 impressions (36% and 24% of the total, respectively). It is possible to promote and motivate teamwork within our discipline through social media networks. This preliminary experience of the use of social media networks in our scientific community has had encouraging results which have raised high expectations among participants. An appropriate use of social media networks could help to narrow the gap between pathologists and society. Copyright © 2017 Sociedad Española de Anatomía Patológica. Publicado por Elsevier España, S.L.U. All rights reserved.

  19. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  20. Media access and reliability for forest conservation support ...

    African Journals Online (AJOL)

    However majority (63.3%) of the respondents could not compare extension agents and mass media messages because they do not have access to extension agents. The study also observed a significant difference in the effectiveness of the different modes of receiving information in the three senatorial districts and a strong ...

  1. Social Media for Networking, Professional Development, and Patient Engagement.

    Science.gov (United States)

    Markham, Merry Jennifer; Gentile, Danielle; Graham, David L

    2017-01-01

    Social media has become an established method of communication, and many physicians are finding these interactive tools and platforms to be useful for both personal and professional use. Risks of social media, or barriers to its use, include perceived lack of time, privacy concerns, and the risk of damage to one's reputation by unprofessional behavior. Of the social media platforms, Twitter has become favored by physicians and other health care professionals. Although one of the most obvious uses of social media is for rapid dissemination and receipt of information, oncologists are finding that social media is important for networking through blogs, Facebook, and Twitter. These platforms also have potential for providing opportunities for professional development, such as finding collaborators through networking, participation in Twitter journal clubs, and participating in online case-based tumor boards. Social media can also be used for patient engagement, such as through participation in tweet chats. There is emerging data that patient engagement through these platforms may lead to improvement in some health-related outcomes; however, data are sparse for oncology-specific outcomes. Efforts are underway to determine how to assess how social media engagement impacts health outcomes in oncology patients.

  2. Social media networking in pediatric hydrocephalus: a point-prevalence analysis of utilization.

    Science.gov (United States)

    Elkarim, Ghassan Awad; Alotaibi, Naif M; Samuel, Nardin; Wang, Shelly; Ibrahim, George M; Fallah, Aria; Weil, Alexander G; Kulkarni, Abhaya V

    2017-08-01

    OBJECTIVE A recent survey has shown that caregivers of children with shunt-treated hydrocephalus frequently use social media networks for support and information gathering. The objective of this study is to describe and assess social media utilization among users interested in hydrocephalus. METHODS Publicly accessible accounts and videos dedicated to the topic of hydrocephalus were comprehensively searched across 3 social media platforms (Facebook, Twitter, and YouTube) throughout March 2016. Summary statistics were calculated on standard metrics of social media popularity. A categorization framework to describe the purpose of pages, groups, accounts, channels, and videos was developed following the screening of 100 titles. Categorized data were analyzed using nonparametric tests for statistical significance. RESULTS The authors' search identified 30 Facebook pages, 213 Facebook groups, 17 Twitter accounts, and 253 YouTube videos. These platforms were run by patients, caregivers, nonprofit foundations, and patient support groups. Most accounts were from the United States (n = 196), followed by the United Kingdom (n = 31), Canada (n = 17), India (n = 15), and Germany (n = 12). The earliest accounts were created in 2007, and a peak of 65 new accounts were created in 2011. The total number of users in Facebook pages exceeded those in Facebook groups (p social media use in the topic of hydrocephalus. Users interested in hydrocephalus seek privacy for support communications and are attracted to treatment procedure and surgical products videos. These findings provide insight into potential avenues of hydrocephalus outreach, support, or advocacy in social media.

  3. QoE-Driven D2D Media Services Distribution Scheme in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Mingkai Chen

    2017-01-01

    Full Text Available Device-to-device (D2D communication has been widely studied to improve network performance and considered as a potential technological component for the next generation communication. Considering the diverse users’ demand, Quality of Experience (QoE is recognized as a new degree of user’s satisfaction for media service transmissions in the wireless communication. Furthermore, we aim at promoting user’s Mean of Score (MOS value to quantify and analyze user’s QoE in the dynamic cellular networks. In this paper, we explore the heterogeneous media service distribution in D2D communications underlaying cellular networks to improve the total users’ QoE. We propose a novel media service scheme based on different QoE models that jointly solve the massive media content dissemination issue for cellular networks. Moreover, we also investigate the so-called Media Service Adaptive Update Scheme (MSAUS framework to maximize users’ QoE satisfaction and we derive the popularity and priority function of different media service QoE expression. Then, we further design Media Service Resource Allocation (MSRA algorithm to schedule limited cellular networks resource, which is based on the popularity function to optimize the total users’ QoE satisfaction and avoid D2D interference. In addition, numerical simulation results indicate that the proposed scheme is more effective in cellular network content delivery, which makes it suitable for various media service propagation.

  4. Framing access to medicines in developing countries: an analysis of media coverage of Canada's Access to Medicines Regime.

    Science.gov (United States)

    Esmail, Laura C; Phillips, Kaye; Kuek, Victoria; Cosio, Andrea Perez; Kohler, Jillian Clare

    2010-01-04

    In September 2003, the Canadian government committed to developing legislation that would facilitate greater access to affordable medicines for developing countries. Over the course of eight months, the legislation, now known as Canada's Access to Medicines Regime (CAMR), went through a controversial policy development process and the newspaper media was one of the major venues in which the policy debates took place. The purpose of this study was to examine how the media framed CAMR to determine how policy goals were conceptualized, which stakeholder interests controlled the public debate and how these variables related to the public policy process. We conducted a qualitative content analysis of newspaper coverage of the CAMR policy and implementation process from 2003-2008. The primary theoretical framework for this study was framing theory. A total of 90 articles from 11 Canadian newspapers were selected for inclusion in our analysis. A team of four researchers coded the articles for themes relating to access to medicines and which stakeholders' voice figured more prominently on each issue. Stakeholders examined included: the research-based industry, the generic industry, civil society, the Canadian government, and developing country representatives. The most frequently mentioned themes across all documents were the issues of drug affordability, intellectual property, trade agreements and obligations, and development. Issues such as human rights, pharmaceutical innovation, and economic competitiveness got little media representation. Civil society dominated the media contents, followed far behind by the Canadian government, the research-based and generic pharmaceutical industries. Developing country representatives were hardly represented in the media. Media framing obscured the discussion of some of the underlying policy goals in this case and failed to highlight issues which are now significant barriers to the use of the legislation. Using the media to engage

  5. Dynamic Resource Allocation in Hybrid Access Femtocell Network

    Directory of Open Access Journals (Sweden)

    Afaz Uddin Ahmed

    2014-01-01

    Full Text Available Intercell interference is one of the most challenging issues in femtocell deployment under the coverage of existing macrocell. Allocation of resources between femtocell and macrocell is essential to counter the effects of interference in dense femtocell networks. Advances in resource management strategies have improved the control mechanism for interference reduction at lower node density, but most of them are ineffective at higher node density. In this paper, a dynamic resource allocation management algorithm (DRAMA for spectrum shared hybrid access OFDMA femtocell network is proposed. To reduce the macro-femto-tier interference and to improve the quality of service, the proposed algorithm features a dynamic resource allocation scheme by controlling them both centrally and locally. The proposed scheme focuses on Femtocell Access Point (FAP owners’ satisfaction and allows maximum utilization of available resources based on congestion in the network. A simulation environment is developed to study the quantitative performance of DRAMA in hybrid access-control femtocell network and compare it to closed and open access mechanisms. The performance analysis shows that higher number of random users gets connected to the FAP without compromising FAP owners’ satisfaction allowing the macrocell to offload a large number of users in a dense heterogeneous network.

  6. Protocol and networking design issues for local access WDM networks

    NARCIS (Netherlands)

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this

  7. A Systematic Scheme for Multiple Access in Ethernet Passive Optical Access Networks

    Science.gov (United States)

    Ma, Maode; Zhu, Yongqing; Hiang Cheng, Tee

    2005-11-01

    While backbone networks have experienced substantial changes in the last decade, access networks have not changed much. Recently, passive optical networks (PONs) seem to be ready for commercial deployment as access networks, due to the maturity of a number of enabling technologies. Among the PON technologies, Ethernet PON (EPON) standardized by the IEEE 802.3ah Ethernet in the First Mile (EFM) Task Force is the most attractive one because of its high speed, low cost, familiarity, interoperability, and low overhead. In this paper, we consider the issue of upstream channel sharing in the EPONs. We propose a novel multiple-access control scheme to provide bandwidth-guaranteed service for high-demand customers, while providing best effort service to low-demand customers according to the service level agreement (SLA). The analytical and simulation results prove that the proposed scheme performs best in what it is designed to do compared to another well-known scheme that has not considered providing differentiated services. With business customers preferring premium services with guaranteed bandwidth and residential users preferring low-cost best effort services, our scheme could benefit both groups of subscribers, as well as the operators.

  8. Knowledge Access in Rural Inter-connected Areas Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... the existing network to include two thematic networks on food security and rural ... Woman conquering male business in Yemen : Waleya's micro-enterprise.

  9. Multimedia Information Networks in Social Media

    Science.gov (United States)

    Cao, Liangliang; Qi, Guojun; Tsai, Shen-Fu; Tsai, Min-Hsuan; Pozo, Andrey Del; Huang, Thomas S.; Zhang, Xuemei; Lim, Suk Hwan

    The popularity of personal digital cameras and online photo/video sharing community has lead to an explosion of multimedia information. Unlike traditional multimedia data, many new multimedia datasets are organized in a structural way, incorporating rich information such as semantic ontology, social interaction, community media, geographical maps, in addition to the multimedia contents by themselves. Studies of such structured multimedia data have resulted in a new research area, which is referred to as Multimedia Information Networks. Multimedia information networks are closely related to social networks, but especially focus on understanding the topics and semantics of the multimedia files in the context of network structure. This chapter reviews different categories of recent systems related to multimedia information networks, summarizes the popular inference methods used in recent works, and discusses the applications related to multimedia information networks. We also discuss a wide range of topics including public datasets, related industrial systems, and potential future research directions in this field.

  10. Protocol and networking design issues for local access WDM networks

    OpenAIRE

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    1999-01-01

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this report. A brief introduction to optical networks and WDM as well as a brief description of Flamingo are also included in this report.

  11. Tensions between Individual Use and Network Adoption of Social Media Platforms

    DEFF Research Database (Denmark)

    Srinivasan, Nikhil; Damsgaard, Jan

    2013-01-01

    Social media have diffused into the everyday lives of many but still pose challenges to individuals regarding use of these platforms. This paper explores the multiple manners in which social media platforms gets employed by individuals based on an examination of 4 vignettes generated...... by interviewing individuals within a university context. An analysis of the vignettes and individual use behaviors highlights the tension between network-based adoption of social media platforms and the constraints that the network places on individual use of the platform....

  12. An investigation into possibilities for implementation of a virtual community of practice delivered via a mobile social network for rural community media in the Eastern Cape, South Africa

    Directory of Open Access Journals (Sweden)

    Oliva Muwanga-Zake

    2017-03-01

    Full Text Available Background: The purpose of this article is to provide an overview of how a virtual community of practice can be delivered via a mobile social networking framework to support rural community media in the Eastern Cape Province of South Africa. Objectives: The article presents the results of a study conducted to ascertain the possibilities of utilising mobile social networking as a means to provide access to required information and knowledge to rural community media through creation of a virtual community of practice. Improving the operational effectiveness of rural community media as a component of the rural community communication process would serve to improve the entire rural community communication process as well, making them more effective tools for availing relevant news and information to rural communities and reflecting the realities of rural communities to their broader environment. Method: The study was conducted on rural community media small micro and medium enterprises (SMMEs in the Eastern Cape Province of South Africa. The study applied an interpretive research philosophy, qualitative research design and multiple–case study approach. Primary data were collected through semi-structured interviews supported by a questionnaire, with secondary data collected via literature review, observation and documentation analysis. Results: Findings were that rural community media do make use of social media and mobile devices in operating their business, require access to generic and domain specific support services and actively engage their peers and stakeholders in this respect, although no formalised structure existed. The authors’ recommendation is to create a formalised virtual community of practice through the establishment of a mobile social network. Conclusion: Because of the fact that rural community SMMEs already utilise mobile devices and social media to operate their businesses, development of a solution based on a mobile social

  13. Extending AAA operational model for profile-based access control in ethernet-based Neutral Access Networks

    NARCIS (Netherlands)

    Matias, J.; Jacob, E.; Demchenko, Y.; de Laat, C.; Gommans, L.; Macías López, E.M.; Bogliolo, A.; Perry, M.; Ran, M

    2010-01-01

    Neutral Access Networks (NAN) have appeared as a new model to overcome some restrictions and lack of flexibility that are present currently in broadband access networks. NAN brings new business opportunities by opening this market to new stakeholders. Although the NAN model is accepted, there are

  14. Breaking news dissemination in the media via propagation behavior based on complex network theory

    Science.gov (United States)

    Liu, Nairong; An, Haizhong; Gao, Xiangyun; Li, Huajiao; Hao, Xiaoqing

    2016-07-01

    The diffusion of breaking news largely relies on propagation behaviors in the media. The tremendous and intricate propagation relationships in the media form a complex network. An improved understanding of breaking news diffusion characteristics can be obtained through the complex network research. Drawing on the news data of Bohai Gulf oil spill event from June 2011 to May 2014, we constructed a weighted and directed complex network in which media are set as nodes, the propagation relationships as edges and the propagation times as the weight of the edges. The primary results show (1) the propagation network presents small world feature, which means relations among media are close and breaking news originating from any node can spread rapidly; (2) traditional media and official websites are the typical sources for news propagation, while business portals are news collectors and spreaders; (3) the propagation network is assortative and the group of core media facilities the spread of breaking news faster; (4) for online media, news originality factor become less important to propagation behaviors. This study offers a new insight to explore information dissemination from the perspective of statistical physics and is beneficial for utilizing the public opinion in a positive way.

  15. Joint Hybrid Backhaul and Access Links Design in Cloud-Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    The cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio systems. In this paper, we consider the downlink of a CRAN formed of one central processor (the cloud) and several base station

  16. File access prediction using neural networks.

    Science.gov (United States)

    Patra, Prashanta Kumar; Sahu, Muktikanta; Mohapatra, Subasish; Samantray, Ronak Kumar

    2010-06-01

    One of the most vexing issues in design of a high-speed computer is the wide gap of access times between the memory and the disk. To solve this problem, static file access predictors have been used. In this paper, we propose dynamic file access predictors using neural networks to significantly improve upon the accuracy, success-per-reference, and effective-success-rate-per-reference by using neural-network-based file access predictor with proper tuning. In particular, we verified that the incorrect prediction has been reduced from 53.11% to 43.63% for the proposed neural network prediction method with a standard configuration than the recent popularity (RP) method. With manual tuning for each trace, we are able to improve upon the misprediction rate and effective-success-rate-per-reference using a standard configuration. Simulations on distributed file system (DFS) traces reveal that exact fit radial basis function (RBF) gives better prediction in high end system whereas multilayer perceptron (MLP) trained with Levenberg-Marquardt (LM) backpropagation outperforms in system having good computational capability. Probabilistic and competitive predictors are the most suitable for work stations having limited resources to deal with and the former predictor is more efficient than the latter for servers having maximum system calls. Finally, we conclude that MLP with LM backpropagation algorithm has better success rate of file prediction than those of simple perceptron, last successor, stable successor, and best k out of m predictors.

  17. A Method for Upper Bounding on Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Patel, A.; Pedersen, Jens Myrup

    2004-01-01

    This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management.......This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management....

  18. Hierarchical micro-mobility management in high-speed multihop access networks

    Institute of Scientific and Technical Information of China (English)

    TANG Bi-hua; MA Xiao-lei; LIU Yuan-an; GAO Jin-chun

    2006-01-01

    This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access routers. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access router (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility management scheme can achieve high packet delivery fraction and improve the lifetime of network.

  19. Achieving universal access to next generation networks

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders

    The paper examines investment dimensions of next generation networks in a universal service perspective in a European context. The question is how new network infrastructures for getting access to communication, information and entertainment services in the present and future information society...

  20. A news media analysis of economic sanction effects on access to medicine in Iran.

    Science.gov (United States)

    Kheirandish, Mehrnaz; Rashidian, Arash; Bigdeli, Maryam

    2015-01-01

    In the past decades economic sanctions have been used by different countries or international organizations in order to deprive target countries of some transactions. While the sanctions do not target health care systems or public health structures, they may, in fact, affect the availability of health care in target countries. In this study, we used media analysis to assess the impacts of recent sanctions imposed by the Central Bank of Iran in 2012 on access to medicines in Iran. We searched different sources of written news media including a database of nonspecialized weeklies and magazines, online news sources, web pages of daily newspapers and healthcare oriented weeklies from 2011 to 2013. We searched the sources using the general term "medicine" to reduce the chances of missing relevant items. The identified news media were read, and categorized under three groups of items announcing "shortage of medicines," "medicines related issues" and "no shortage." We conducted trend analyzes to see whether the news media related to access to medicines were affected by the economic sanctions. A total number of 371 relevant news media were collected. The number of news media related to medicines substantially increased in the study period: 30 (8%), 161 (43%) and 180 (49%) were published in 2011, 2012 and 2013, respectively. While 145 (39%) of media items referred to the shortage of medicines, 97 (26%) reported no shortage or alleviating of concerns. Media analysis suggests a clear increase in the number of news media reporting a shortage in Iran after the sanctions. In 2013, there were accompanying increases in the number of news media reporting alleviation of the shortages of medicines. Our analysis provides evidence of negative effects of the sanctions on access to medicines in Iran.

  1. A news media analysis of economic sanction effects on access to medicine in Iran

    Science.gov (United States)

    Kheirandish, Mehrnaz; Rashidian, Arash; Bigdeli, Maryam

    2015-01-01

    Objective: In the past decades economic sanctions have been used by different countries or international organizations in order to deprive target countries of some transactions. While the sanctions do not target health care systems or public health structures, they may, in fact, affect the availability of health care in target countries. In this study, we used media analysis to assess the impacts of recent sanctions imposed by the Central Bank of Iran in 2012 on access to medicines in Iran. Methods: We searched different sources of written news media including a database of nonspecialized weeklies and magazines, online news sources, web pages of daily newspapers and healthcare oriented weeklies from 2011 to 2013. We searched the sources using the general term “medicine” to reduce the chances of missing relevant items. The identified news media were read, and categorized under three groups of items announcing “shortage of medicines,” “medicines related issues” and “no shortage.” We conducted trend analyzes to see whether the news media related to access to medicines were affected by the economic sanctions. Findings: A total number of 371 relevant news media were collected. The number of news media related to medicines substantially increased in the study period: 30 (8%), 161 (43%) and 180 (49%) were published in 2011, 2012 and 2013, respectively. While 145 (39%) of media items referred to the shortage of medicines, 97 (26%) reported no shortage or alleviating of concerns. Conclusion: Media analysis suggests a clear increase in the number of news media reporting a shortage in Iran after the sanctions. In 2013, there were accompanying increases in the number of news media reporting alleviation of the shortages of medicines. Our analysis provides evidence of negative effects of the sanctions on access to medicines in Iran. PMID:26645026

  2. Social media use in the United States: implications for health communication.

    Science.gov (United States)

    Chou, Wen-ying Sylvia; Hunt, Yvonne M; Beckjord, Ellen Burke; Moser, Richard P; Hesse, Bradford W

    2009-11-27

    Given the rapid changes in the communication landscape brought about by participative Internet use and social media, it is important to develop a better understanding of these technologies and their impact on health communication. The first step in this effort is to identify the characteristics of current social media users. Up-to-date reporting of current social media use will help monitor the growth of social media and inform health promotion/communication efforts aiming to effectively utilize social media. The purpose of the study is to identify the sociodemographic and health-related factors associated with current adult social media users in the United States. Data came from the 2007 iteration of the Health Information National Trends Study (HINTS, N = 7674). HINTS is a nationally representative cross-sectional survey on health-related communication trends and practices. Survey respondents who reported having accessed the Internet (N = 5078) were asked whether, over the past year, they had (1) participated in an online support group, (2) written in a blog, (3) visited a social networking site. Bivariate and multivariate logistic regression analyses were conducted to identify predictors of each type of social media use. Approximately 69% of US adults reported having access to the Internet in 2007. Among Internet users, 5% participated in an online support group, 7% reported blogging, and 23% used a social networking site. Multivariate analysis found that younger age was the only significant predictor of blogging and social networking site participation; a statistically significant linear relationship was observed, with younger categories reporting more frequent use. Younger age, poorer subjective health, and a personal cancer experience predicted support group participation. In general, social media are penetrating the US population independent of education, race/ethnicity, or health care access. Recent growth of social media is not uniformly distributed across

  3. Using Social Media to Increase Accessibility to Online Teaching Resources.

    Science.gov (United States)

    O'Kelly, B; McHugh, S; McHugh, T; Fady, N; Boyle, E; Hill, A D K

    2015-09-01

    The key learning points of Surgical Grand Rounds (SGR) are often not accessible at times of exam revision for students. We sought to use Twitter as an online teaching repository. A SGR Twitter profile was created. 23 SGR presentations were made accessible on Twitter over a 3 month period. 93 students were invited to complete a questionnaire assessing usage of the repository. 84 (90%) in total responded, of these, 25 (80.6%) felt that the online provision of SGR through twitter was "useful". The majority (71%) felt that the online content was easily accessible. The novel use of social media is a useful adjunctive educational tool in accessing an online repository of SGR presentations.

  4. Social Media Influencing C2 in Underdeveloped and Degraded Operational Environments

    Science.gov (United States)

    2013-06-01

    soldiers standing guard at the Tomb of the Unknown Soldier, a picture of a giant wave slamming into 18 th ICCRTS Paper ID: 103 | Social Media...efforts. Network monitoring site BGPmon found that 88 percent of Egyptian networks had become unreachable, with many Egyptian internet service providers...upheaval [69]. The Egyptian society was able to participate in social media because of the reach of the relevant media. In Egypt, youngsters had access to

  5. Applications of social media and social network analysis

    CERN Document Server

    Kazienko, Przemyslaw

    2015-01-01

    This collection of contributed chapters demonstrates a wide range of applications within two overlapping research domains: social media analysis and social network analysis. Various methodologies were utilized in the twelve individual chapters including static, dynamic and real-time approaches to graph, textual and multimedia data analysis. The topics apply to reputation computation, emotion detection, topic evolution, rumor propagation, evaluation of textual opinions, friend ranking, analysis of public transportation networks, diffusion in dynamic networks, analysis of contributors to commun

  6. Social Network Facebook in News: Comparisiion of Space Dedicated to Social Network Facebook ads its Content in Czech Media in the Years 2009 and 2011

    OpenAIRE

    Bezdíčková, Andrea

    2012-01-01

    Diploma thesis "Social Network Facebook in News: Comparison of Space Dedicated to Social Network Facebook and its Content in Czech Media in the Years 2009 and 2011", is dedicated to the way of use and citation of social network Facebook in the selected news media. The paper summarizes the establishment and strengthening of online media, particularly the phenomenon of social networks on the example of social network Facebook, and their influence on the transformation of the media sector, news ...

  7. A network society, social media, migration and mission

    Directory of Open Access Journals (Sweden)

    Niemandt, Cornelius J. P. (Nelus

    2013-05-01

    Full Text Available Human mobility and migration are closely associated with and reciprocally influenced by globalisation. Add the relentless connectivity facilitated by the proliferation of mobile communication and the emergence of social media to this mixture, and an emerging new glocal culture is evident. People are not only migrating to new localities and territories, but simultaneously into a new culture. We are witnessing the greatest mass migration in the history of humanity from the real to the virtual world. It is a shift from shared space to shared interest. The metaphor of a river in flood has been used to describe the fact that migrant communities are a point of convergence of some of the biggest challenges facing the church and society at large: globalisation, hyperdiversity, interconnectedness, a Google culture and postmodern tribalism. Culture flows like a river and the church functions as a bridge connecting humans striving to make sense of life and Scripture as well as the tradition transmitted over the centuries. Some of the missional challenges will be to incarnate the gospel in this emerging culture. This study was positioned at the convergence of two important processes the rise of the network society (especially social media and migration. It took up two of the challenges posed at Edinburgh 2010, namely to fruitfully integrate the role of media in modern society into overall missiological thinking, and to think about the call for a structural reform of the church to grapple with the challenges of migration. The network society represents a profound social transformation. New technologies deliver connectedness in the palms of our hands and social media serve as an expression of the passion for connection, community and knowing others and being known by others. This research is a theoretical and missiological reflection on the role and importance of social media such as Facebook in migrant communities. It investigated issues such as

  8. Survey on Cloud Radio Access Network

    Directory of Open Access Journals (Sweden)

    Reeta Chhatani

    2016-01-01

    Full Text Available The existing wireless network will face the challenge of data tsunami in the near future. Densification of network will deal huge data traffic but will increase the interferences and network cost. At the same time, the existing wireless network is underutilized due to dynamic traffic. To deal with this adverse scenario, a change in the current network architecture is required. Based on virtualization, Cloud Radio Access Network (CRAN was proposed for wireless network. In CRAN the functionality of base station will be distributed into base band unit (BBU and remote radio heads (RRH which will achieve benefits of centralization. This paper presents a survey on CRAN centring on optimized resource allocation, energy efficiency and throughput maximization under fronthaul capacity. The existing solution and future opportunities in CRAN are also summarized.

  9. Integration of QoS provisioning in home and access networks

    DEFF Research Database (Denmark)

    Popov, Mikhail; Gavler, A.; Sköldström, P.

    2010-01-01

    Approaches for QoS provisioning using UPnP for home networks and GMPLS for access networks are described. A solution for interworking the UPnP and the GMPLS at the residential gateway is proposed.......Approaches for QoS provisioning using UPnP for home networks and GMPLS for access networks are described. A solution for interworking the UPnP and the GMPLS at the residential gateway is proposed....

  10. Energy challenges in optical access and aggregation networks.

    Science.gov (United States)

    Kilper, Daniel C; Rastegarfar, Houman

    2016-03-06

    Scalability is a critical issue for access and aggregation networks as they must support the growth in both the size of data capacity demands and the multiplicity of access points. The number of connected devices, the Internet of Things, is growing to the tens of billions. Prevailing communication paradigms are reaching physical limitations that make continued growth problematic. Challenges are emerging in electronic and optical systems and energy increasingly plays a central role. With the spectral efficiency of optical systems approaching the Shannon limit, increasing parallelism is required to support higher capacities. For electronic systems, as the density and speed increases, the total system energy, thermal density and energy per bit are moving into regimes that become impractical to support-for example requiring single-chip processor powers above the 100 W limit common today. We examine communication network scaling and energy use from the Internet core down to the computer processor core and consider implications for optical networks. Optical switching in data centres is identified as a potential model from which scalable access and aggregation networks for the future Internet, with the application of integrated photonic devices and intelligent hybrid networking, will emerge. © 2016 The Author(s).

  11. A Research on the Use of Social Media Networks by Teacher Candidates

    Science.gov (United States)

    Bolat, Yaviz

    2018-01-01

    Social media networks are the most important product of the development of computer and communication technologies that affect social life. Social media networks have become a driving force in social and cultural development, while providing social contact for people. This force has improved its sphere of influence over societies in many fields…

  12. A Fuzzy Preprocessing Module for Optimizing the Access Network Selection in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Faisal Kaleem

    2013-01-01

    Full Text Available A heterogeneous wireless network is characterized by the presence of different wireless access technologies that coexist in an overlay fashion. These wireless access technologies usually differ in terms of their operating parameters. On the other hand, Mobile Stations (MSs in a heterogeneous wireless network are equipped with multiple interfaces to access different types of services from these wireless access technologies. The ultimate goal of these heterogeneous wireless networks is to provide global connectivity with efficient ubiquitous computing to these MSs based on the Always Best Connected (ABC principle. This is where the need for intelligent and efficient Vertical Handoffs (VHOs between wireless technologies in a heterogeneous environment becomes apparent. This paper presents the design and implementation of a fuzzy multicriteria based Vertical Handoff Necessity Estimation (VHONE scheme that determines the proper time for VHO, while considering the continuity and quality of the currently utilized service, and the end-users' satisfaction.

  13. Energy Efficiency in TDMA-Based Next-Generation Passive Optical Access Networks

    KAUST Repository

    Dhaini, Ahmad R.; Ho, Pin-Han; Shen, Gangxiang; Shihada, Basem

    2014-01-01

    Next-generation passive optical network (PON) has been considered in the past few years as a cost-effective broadband access technology. With the ever-increasing power saving concern, energy efficiency has been an important issue in its operations. In this paper, we propose a novel sleep-time sizing and scheduling framework for the implementation of green bandwidth allocation (GBA) in TDMA-PONs. The proposed framework leverages the batch-mode transmission feature of GBA to minimize the overhead due to frequent ONU on-off transitions. The optimal sleeping time sequence of each ONU is determined in every cycle without violating the maximum delay requirement. With multiple ONUs possibly accessing the shared media simultaneously, a collision may occur. To address this problem, we propose a new sleep-time sizing mechanism, namely Sort-And-Shift (SAS), in which the ONUs are sorted according to their expected transmission start times, and their sleep times are shifted to resolve any possible collision while ensuring maximum energy saving. Results show the effectiveness of the proposed framework and highlight the merits of our solutions.

  14. Energy Efficiency in TDMA-Based Next-Generation Passive Optical Access Networks

    KAUST Repository

    Dhaini, Ahmad R.

    2014-06-01

    Next-generation passive optical network (PON) has been considered in the past few years as a cost-effective broadband access technology. With the ever-increasing power saving concern, energy efficiency has been an important issue in its operations. In this paper, we propose a novel sleep-time sizing and scheduling framework for the implementation of green bandwidth allocation (GBA) in TDMA-PONs. The proposed framework leverages the batch-mode transmission feature of GBA to minimize the overhead due to frequent ONU on-off transitions. The optimal sleeping time sequence of each ONU is determined in every cycle without violating the maximum delay requirement. With multiple ONUs possibly accessing the shared media simultaneously, a collision may occur. To address this problem, we propose a new sleep-time sizing mechanism, namely Sort-And-Shift (SAS), in which the ONUs are sorted according to their expected transmission start times, and their sleep times are shifted to resolve any possible collision while ensuring maximum energy saving. Results show the effectiveness of the proposed framework and highlight the merits of our solutions.

  15. Semantic network analysis of vaccine sentiment in online social media.

    Science.gov (United States)

    Kang, Gloria J; Ewing-Nelson, Sinclair R; Mackey, Lauren; Schlitt, James T; Marathe, Achla; Abbas, Kaja M; Swarup, Samarth

    2017-06-22

    To examine current vaccine sentiment on social media by constructing and analyzing semantic networks of vaccine information from highly shared websites of Twitter users in the United States; and to assist public health communication of vaccines. Vaccine hesitancy continues to contribute to suboptimal vaccination coverage in the United States, posing significant risk of disease outbreaks, yet remains poorly understood. We constructed semantic networks of vaccine information from internet articles shared by Twitter users in the United States. We analyzed resulting network topology, compared semantic differences, and identified the most salient concepts within networks expressing positive, negative, and neutral vaccine sentiment. The semantic network of positive vaccine sentiment demonstrated greater cohesiveness in discourse compared to the larger, less-connected network of negative vaccine sentiment. The positive sentiment network centered around parents and focused on communicating health risks and benefits, highlighting medical concepts such as measles, autism, HPV vaccine, vaccine-autism link, meningococcal disease, and MMR vaccine. In contrast, the negative network centered around children and focused on organizational bodies such as CDC, vaccine industry, doctors, mainstream media, pharmaceutical companies, and United States. The prevalence of negative vaccine sentiment was demonstrated through diverse messaging, framed around skepticism and distrust of government organizations that communicate scientific evidence supporting positive vaccine benefits. Semantic network analysis of vaccine sentiment in online social media can enhance understanding of the scope and variability of current attitudes and beliefs toward vaccines. Our study synthesizes quantitative and qualitative evidence from an interdisciplinary approach to better understand complex drivers of vaccine hesitancy for public health communication, to improve vaccine confidence and vaccination coverage

  16. Social Media Addition and Undergraduate Students' Self-Perception ...

    African Journals Online (AJOL)

    A questionnaire named “Social Media Utilisation, Addiction and Self-Perception Questionnaire” (r=0.77) was used for data collection. Seven research questions were answered in the study. Facebook (751 or 90.2%) and Twitter (646 or 77.6%) were the most commonly accessible social media networks while meeting with ...

  17. Optimizing the next generation optical access networks

    DEFF Research Database (Denmark)

    Amaya Fernández, Ferney Orlando; Soto, Ana Cardenas; Tafur Monroy, Idelfonso

    2009-01-01

    Several issues in the design and optimization of the next generation optical access network (NG-OAN) are presented. The noise, the distortion and the fiber optic nonlinearities are considered to optimize the video distribution link in a passive optical network (PON). A discussion of the effect...

  18. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  19. Social media for professional development and networking opportunities in academia

    OpenAIRE

    Donelan, Helen

    2016-01-01

    The research reported on in this article explores the use of social media for work-related or professional purposes. In particular, it focuses on the perceptions and use of social media by academics in the UK. The purpose of the research was to explore the potential social media has to facilitate the changing landscape of higher education and support the individual academic in their role. Of particular interest is how specific social media tools are being used to enhance networking opportunit...

  20. TCP Performance Enhancement for UMTS Access Network

    DEFF Research Database (Denmark)

    Hu, Liang

    2008-01-01

    is between UMTS access network and Internet. The split proxy divides the bandwidth delay product into two parts, resulting in two TCP connections with smaller bandwidth delay products. Simulation results show, the split TCP proxy can significantly improve the TCP performance under high bit rate DCH channel......We aim at optimize the TCP performance over UMTS access network challenged by the large delay bandwidth product that is mainly caused by the latency from the link layer ARQ retransmissions and diversity technique at physical layer. We propose to place a split TCP proxy at GGSN nodes which...

  1. New Frontiers in Networking with Emphasis on Defense Applications

    Science.gov (United States)

    2016-06-01

    SUBJECT TERMS Network Architecture Techniques, Broadband Fiber Networks, Framework for Enabling High Data Rate Transmissions, Channel Access in Dense...JSON - Java Script Object Notation LVM - Logical Volume Management MAC - Media Access Control MGEN - a packet generator MIMO - multiple-input

  2. Basics of Computer Networking

    CERN Document Server

    Robertazzi, Thomas

    2012-01-01

    Springer Brief Basics of Computer Networking provides a non-mathematical introduction to the world of networks. This book covers both technology for wired and wireless networks. Coverage includes transmission media, local area networks, wide area networks, and network security. Written in a very accessible style for the interested layman by the author of a widely used textbook with many years of experience explaining concepts to the beginner.

  3. Open Orchestration Cloud Radio Access Network (OOCRAN) Testbed

    OpenAIRE

    Floriach-Pigem, Marti; Xercavins-Torregrosa, Guillem; Marojevic, Vuk; Gelonch-Bosch, Antoni

    2017-01-01

    The Cloud radio access network (C-RAN) offers a revolutionary approach to cellular network deployment, management and evolution. Advances in software-defined radio (SDR) and networking technology, moreover, enable delivering software-defined everything through the Cloud. Resources will be pooled and dynamically allocated leveraging abstraction, virtualization, and consolidation techniques; processes will be automated using common application programming interfaces; and network functions and s...

  4. Army Social Media: Harnessing the Power of Networked Communications

    Science.gov (United States)

    2011-09-01

    Social Networking : – Facebook – MySpace – Friendster 9/1/2011 Content sharing: -You Tube -Flickr -Vimeo -Photobucket Collaborating/ knowledge...Americans use social media tools and Web sites monthly Social networking is now the #1 activity on the web • Twitter: 54 Million users • Facebook ...anyone you don’t know on Facebook or social networking platforms -Don’t post deployment information, when you’re going on vacation or when

  5. Empathic Cyberactivism: The Potential of Hyperconnected Social Media Networks and Empathic Virtual Reality for Feminism

    Directory of Open Access Journals (Sweden)

    Penelope Kemekenidou

    2016-10-01

    Full Text Available The rise of misogyny on social networks feels both devastating and endless. Whether one believes that misogyny has risen to a new level, or that it has simply become more visible through the internet, one thing is clear: with the ubiquity and accessibility of ‘immortal’ online information, harassment and discrimination, shared via hyperconnected social media networks, can be taken to a new, much more visible level. Hyperconnectivity enables sexism to multiply on the web – but it can also be the solution to fight it. In the context of activism, hyperconnectivity can be a major force to combat inequality—given that this hyperconnectivity is linked to empathy and not aggression. If this is the case, I argue, new technologies, for example virtual reality, open up new spaces of empathetic interaction.

  6. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  7. Knowledge Access in Rural Inter-connected Areas Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... poor by sharing innovations, best practices and indigenous knowledge using ... A third thematic network - on knowledge management strategies - will play an ...

  8. Hyper Hospital on the satellite multi-media network.

    Science.gov (United States)

    Yamaguchi, T

    1997-01-01

    We have been developing the Hyper Hospital, a network based VR mediated medical care system. The Hyper Hospital is composed of two seamlessly integrated environments, that is, the virtual and the real worlds. Of them, its virtual environment expands the conventional medical care system using the virtual reality technology as a principal human interface and a collaboration tool, in the present study, an attempt to extend the Hyper Hospital system to various modalities of communication network is reported. A satellite communication based multi-media network using Internet protocols with the WWW interface is used. Data transmission rate and other performances were measured under various conditions and the satellite network was shown to be suitable to the Hyper Hospital network.

  9. Sierra Stars Observatory Network: An Accessible Global Network

    Science.gov (United States)

    Williams, Richard; Beshore, Edward

    2011-03-01

    The Sierra Stars Observatory Network (SSON) is a unique partnership among professional observatories that provides its users with affordable high-quality calibrated image data. SSON comprises observatories in the Northern and Southern Hemisphere and is in the process of expanding to a truly global network capable of covering the entire sky 24 hours a day in the near future. The goal of SSON is to serve the needs of science-based projects and programs. Colleges, universities, institutions, and individuals use SSON for their education and research projects. The mission of SSON is to promote and expand the use of its facilities among the thousands of colleges and schools worldwide that do not have access to professional-quality automated observatory systems to use for astronomy education and research. With appropriate leadership and guidance educators can use SSON to help teach astronomy and do meaningful scientific projects. The relatively small cost of using SSON for this type of work makes it affordable and accessible for educators to start using immediately. Remote observatory services like SSON need to evolve to better support education and research initiatives of colleges, institutions and individual investigators. To meet these needs, SSON is developing a sophisticated interactive scheduling system to integrate among the nodes of the observatory network. This will enable more dynamic observations, including immediate priority interrupts, acquiring moving objects using ephemeris data, and more.

  10. Auditing Medical Records Accesses via Healthcare Interaction Networks

    Science.gov (United States)

    Chen, You; Nyemba, Steve; Malin, Bradley

    2012-01-01

    Healthcare organizations are deploying increasingly complex clinical information systems to support patient care. Traditional information security practices (e.g., role-based access control) are embedded in enterprise-level systems, but are insufficient to ensure patient privacy. This is due, in part, to the dynamic nature of healthcare, which makes it difficult to predict which care providers need access to what and when. In this paper, we show that modeling operations at a higher level of granularity (e.g., the departmental level) are stable in the context of a relational network, which may enable more effective auditing strategies. We study three months of access logs from a large academic medical center to illustrate that departmental interaction networks exhibit certain invariants, such as the number, strength, and reciprocity of relationships. We further show that the relations extracted from the network can be leveraged to assess the extent to which a patient’s care satisfies expected organizational behavior. PMID:23304277

  11. Designing Broadband Access Networks with Triple Redundancy

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Riaz, Muhammad Tahir; Knudsen, Thomas Phillip

    2005-01-01

    An architecture is proposed for designing broadband access networks, which offer triple redundancy to the end users, resulting in networks providing connectivity even in case of any two independent node or line failures. Two physically independent connections are offered by fiber, and the last...... provided by some wireless solution. Based on experience with planning Fiber To The Home, the architecture is designed to meet a number of demands, making it practicable and useful in realworld network planning. The proposed wired topology is planar, and suitable for being fitted onto the road network...

  12. Exposure Research Going Mobile: A Smartphone-Based Measurement of Media Exposure to Political Information in a Convergent Media Environment

    DEFF Research Database (Denmark)

    Ohme, J.; Albaek, E.; H. de Vreese, C.

    2016-01-01

    platform modes. The study furthermore confirms limitations of mere usage time measurements of social media platforms in effects research and explores a range of actual content types that citizens encounter in social networks. It recommends more frequent use of mobile exposure measurements and argues...... for a content-related assessment of social media use in effects research. © 2016 Taylor & Francis.......In today’s convergent media environment, media exposure becomes increasingly channel-independent and social media-bound, and media content is more frequently accessed on mobile devices. This calls for new approaches to measuring media exposure. This study applies an innovative approach to survey (n...

  13. Professional Online Presence and Learning Networks: Educating for Ethical Use of Social Media

    Science.gov (United States)

    Forbes, Dianne

    2017-01-01

    In a teacher education context, this study considers the use of social media for building a professional online presence and learning network. This article provides an overview of uses of social media in teacher education, presents a case study of key processes in relation to professional online presence and learning networks, and highlights…

  14. Reconstruction of three-dimensional porous media using generative adversarial neural networks

    Science.gov (United States)

    Mosser, Lukas; Dubrule, Olivier; Blunt, Martin J.

    2017-10-01

    To evaluate the variability of multiphase flow properties of porous media at the pore scale, it is necessary to acquire a number of representative samples of the void-solid structure. While modern x-ray computer tomography has made it possible to extract three-dimensional images of the pore space, assessment of the variability in the inherent material properties is often experimentally not feasible. We present a method to reconstruct the solid-void structure of porous media by applying a generative neural network that allows an implicit description of the probability distribution represented by three-dimensional image data sets. We show, by using an adversarial learning approach for neural networks, that this method of unsupervised learning is able to generate representative samples of porous media that honor their statistics. We successfully compare measures of pore morphology, such as the Euler characteristic, two-point statistics, and directional single-phase permeability of synthetic realizations with the calculated properties of a bead pack, Berea sandstone, and Ketton limestone. Results show that generative adversarial networks can be used to reconstruct high-resolution three-dimensional images of porous media at different scales that are representative of the morphology of the images used to train the neural network. The fully convolutional nature of the trained neural network allows the generation of large samples while maintaining computational efficiency. Compared to classical stochastic methods of image reconstruction, the implicit representation of the learned data distribution can be stored and reused to generate multiple realizations of the pore structure very rapidly.

  15. Unbundling in Current Broadband and Next-Generation Ultra-Broadband Access Networks

    Science.gov (United States)

    Gaudino, Roberto; Giuliano, Romeo; Mazzenga, Franco; Valcarenghi, Luca; Vatalaro, Francesco

    2014-05-01

    This article overviews the methods that are currently under investigation for implementing multi-operator open-access/shared-access techniques in next-generation access ultra-broadband architectures, starting from the traditional "unbundling-of-the-local-loop" techniques implemented in legacy twisted-pair digital subscriber line access networks. A straightforward replication of these copper-based unbundling-of-the-local-loop techniques is usually not feasible on next-generation access networks, including fiber-to-the-home point-to-multipoint passive optical networks. To investigate this issue, the article first gives a concise description of traditional copper-based unbundling-of-the-local-loop solutions, then focalizes on both next-generation access hybrid fiber-copper digital subscriber line fiber-to-the-cabinet scenarios and on fiber to the home by accounting for the mix of regulatory and technological reasons driving the next-generation access migration path, focusing mostly on the European situation.

  16. Scalable Lunar Surface Networks and Adaptive Orbit Access, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Innovative network architecture, protocols, and algorithms are proposed for both lunar surface networks and orbit access networks. Firstly, an overlaying...

  17. Accessing ANSA Objects from OSI Network Management

    OpenAIRE

    Berrah, Karrim; Gay, David; Genilloud, Guy

    1994-01-01

    OSI network management provides a general framework for the management of OSI systems, and by extension of any distributed system. However, it is not yet possible to tell to what extent the tools developed for network management will be applicable to distributed systems management. This paper assumes that network managers will want to have some control of the distributed infrastructure and applications. It examines how access to some of the ANSA management interfaces can be given to OSI netwo...

  18. Random access procedures and radio access network (RAN) overload control in standard and advanced long-term evolution (LTE and LTE-A) networks

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Popovski, Petar

    2015-01-01

    In this chapter, we describe and discuss the current LTE random access procedure and the Radio Access Network Load Control solution within LTE/LTE-A. We provide an overview of the several considered load control solutions and give a detailed description of the standardized Extended Access Class B...

  19. SON for LTE-WLAN access network selection : design and performance

    NARCIS (Netherlands)

    Willemen, P.; Laselva, D.; Wang, Y.; Kovács, I.; Djapic, R.; Moerman, I.

    2016-01-01

    Mobile network operators (MNOs) are deploying carrier-grade Wireless Local Area Network (WLAN) as an important complementary system to cellular networks. Access network selection (ANS) between cellular and WLAN is an essential component to improve network performance and user quality-of-service

  20. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  1. Assessing Sentiment In Conflict Zones Through Social Media

    Science.gov (United States)

    2016-12-01

    polling and social media data, utilizing over 1.4 million geo-referenced messages sent through the Twitter network from Yemen over the period from...a difficult test country. Compared to Western countries, Yemen has low levels of Internet access and social media users. The country is also beset...consisted of over 1.4 million tweets, observed in Yemen over the period October 2013 to January 2014. From our research we conclude that social media

  2. Wavelength-converted long-reach reconfigurable optical access network

    NARCIS (Netherlands)

    Tran, N.C.; Tangdiongga, E.; Koonen, A.M.J.

    2012-01-01

    Next generation optical access networks should not only increase the capacity but also be able to redistribute the capacity on the fly in order to manage more fluctuated traffic patterns. Wavelength reconfigurability is the instrument to enable such capability of network-wide bandwidth

  3. Social Networking Media: An Approach for the Teaching of International Business

    Science.gov (United States)

    Barczyk, Casimir C.; Duncan, Doris G.

    2012-01-01

    Internet technology and Web 2.0 applications have enabled social networking media to expand in ways that link people globally. By fostering communication, social networks hold immense potential for the enhancement of teaching, especially in the business arena. This article defines social networking and provides a framework for understanding the…

  4. Adapting Behavioral Interventions for Social Media Delivery

    Science.gov (United States)

    Waring, Molly E; May, Christine N; Ding, Eric Y; Kunz, Werner H; Hayes, Rashelle; Oleski, Jessica L

    2016-01-01

    Patients are increasingly using online social networks (ie, social media) to connect with other patients and health care professionals—a trend called peer-to-peer health care. Because online social networks provide a means for health care professionals to communicate with patients, and for patients to communicate with each other, an opportunity exists to use social media as a modality to deliver behavioral interventions. Social media-delivered behavioral interventions have the potential to reduce the expense of behavioral interventions by eliminating visits, as well as increase our access to patients by becoming embedded in their social media feeds. Trials of online social network-delivered behavioral interventions have shown promise, but much is unknown about intervention development and methodology. In this paper, we discuss the process by which investigators can translate behavioral interventions for social media delivery. We present a model that describes the steps and decision points in this process, including the necessary training and reporting requirements. We also discuss issues pertinent to social media-delivered interventions, including cost, scalability, and privacy. Finally, we identify areas of research that are needed to optimize this emerging behavioral intervention modality. PMID:26825969

  5. Adapting Behavioral Interventions for Social Media Delivery.

    Science.gov (United States)

    Pagoto, Sherry; Waring, Molly E; May, Christine N; Ding, Eric Y; Kunz, Werner H; Hayes, Rashelle; Oleski, Jessica L

    2016-01-29

    Patients are increasingly using online social networks (ie, social media) to connect with other patients and health care professionals--a trend called peer-to-peer health care. Because online social networks provide a means for health care professionals to communicate with patients, and for patients to communicate with each other, an opportunity exists to use social media as a modality to deliver behavioral interventions. Social media-delivered behavioral interventions have the potential to reduce the expense of behavioral interventions by eliminating visits, as well as increase our access to patients by becoming embedded in their social media feeds. Trials of online social network-delivered behavioral interventions have shown promise, but much is unknown about intervention development and methodology. In this paper, we discuss the process by which investigators can translate behavioral interventions for social media delivery. We present a model that describes the steps and decision points in this process, including the necessary training and reporting requirements. We also discuss issues pertinent to social media-delivered interventions, including cost, scalability, and privacy. Finally, we identify areas of research that are needed to optimize this emerging behavioral intervention modality.

  6. The NASA Regional Planetary Image Facility (RPIF) Network: A Key Resource for Accessing and Using Planetary Spatial Data

    Science.gov (United States)

    Hagerty, J. J.

    2017-12-01

    The role of the NASA Regional Planetary Image Facility (RPIF) Network is evolving as new science-ready spatial data products continue to be created and as key historical planetary data sets are digitized. Specifically, the RPIF Network is poised to serve specialized knowledge and services in a user-friendly manner that removes most barriers to locating, accessing, and exploiting planetary spatial data, thus providing a critical data access role within a spatial data infrastructure. The goal of the Network is to provide support and training to a broad audience of planetary spatial data users. In an effort to meet the planetary science community's evolving needs, we are focusing on the following objectives: Maintain and improve the delivery of historical data accumulated over the past four decades so as not to lose critical, historical information. This is being achieved by systematically digitizing fragile materials, allowing increased access and preserving them at the same time. Help users locate, access, visualize, and exploit planetary science data. Many of the facilities have begun to establish Guest User Facilities that allow researchers to use and/or be trained on GIS equipment and other specialized tools like Socet Set/GXP photogrammetry workstations for generating digital elevation maps. Improve the connection between the Network nodes while also leveraging the unique resources of each node. To achieve this goal, each facility is developing and sharing searchable databases of their collections, including robust metadata in a standards compliant way. Communicate more effectively and regularly with the planetary science community in an effort to make potential users aware of resources and services provided by the Network, while also engaging community members in discussions about community needs. Provide a regional resource for the science community, colleges, universities, museums, media, and the public to access planetary data. Introduce new strategies for

  7. Hierarchy Bayesian model based services awareness of high-speed optical access networks

    Science.gov (United States)

    Bai, Hui-feng

    2018-03-01

    As the speed of optical access networks soars with ever increasing multiple services, the service-supporting ability of optical access networks suffers greatly from the shortage of service awareness. Aiming to solve this problem, a hierarchy Bayesian model based services awareness mechanism is proposed for high-speed optical access networks. This approach builds a so-called hierarchy Bayesian model, according to the structure of typical optical access networks. Moreover, the proposed scheme is able to conduct simple services awareness operation in each optical network unit (ONU) and to perform complex services awareness from the whole view of system in optical line terminal (OLT). Simulation results show that the proposed scheme is able to achieve better quality of services (QoS), in terms of packet loss rate and time delay.

  8. Location-aware network operation for cloud radio access network

    KAUST Repository

    Wang, Fanggang

    2017-06-20

    One of the major challenges in effectively operating a cloud radio access network (C-RAN) is the excessive overhead signaling and computation load that scale rapidly with the size of the network. In this paper, the exploitation of location information of the mobile devices is proposed to address this challenge. We consider an approach in which location-assisted channel state information (CSI) acquisition methods are introduced to complement conventional pilot-based CSI acquisition methods and avoid excessive overhead signaling. A low-complexity algorithm is designed to maximize the sum rate. An adaptive algorithm is also proposed to address the uncertainty issue in CSI acquisition. Both theoretical and numerical analyses show that location information provides a new dimension to improve throughput for next-generation massive cooperative networks.

  9. Lattice Boltzmann simulation of CO2 reactive transport in network fractured media

    Science.gov (United States)

    Tian, Zhiwei; Wang, Junye

    2017-08-01

    Carbon dioxide (CO2) geological sequestration plays an important role in mitigating CO2 emissions for climate change. Understanding interactions of the injected CO2 with network fractures and hydrocarbons is key for optimizing and controlling CO2 geological sequestration and evaluating its risks to ground water. However, there is a well-known, difficult process in simulating the dynamic interaction of fracture-matrix, such as dynamic change of matrix porosity, unsaturated processes in rock matrix, and effect of rock mineral properties. In this paper, we develop an explicit model of the fracture-matrix interactions using multilayer bounce-back treatment as a first attempt to simulate CO2 reactive transport in network fractured media through coupling the Dardis's LBM porous model for a new interface treatment. Two kinds of typical fracture networks in porous media are simulated: straight cross network fractures and interleaving network fractures. The reaction rate and porosity distribution are illustrated and well-matched patterns are found. The species concentration distribution and evolution with time steps are also analyzed and compared with different transport properties. The results demonstrate the capability of this model to investigate the complex processes of CO2 geological injection and reactive transport in network fractured media, such as dynamic change of matrix porosity.

  10. Software Defined Networking for Next Generation Converged Metro-Access Networks

    Science.gov (United States)

    Ruffini, M.; Slyne, F.; Bluemm, C.; Kitsuwan, N.; McGettrick, S.

    2015-12-01

    While the concept of Software Defined Networking (SDN) has seen a rapid deployment within the data center community, its adoption in telecommunications network has progressed slowly, although the concept has been swiftly adopted by all major telecoms vendors. This paper presents a control plane architecture for SDN-driven converged metro-access networks, developed through the DISCUS European FP7 project. The SDN-based controller architecture was developed in a testbed implementation targeting two main scenarios: fast feeder fiber protection over dual-homed Passive Optical Networks (PONs) and dynamic service provisioning over a multi-wavelength PON. Implementation details and results of the experiment carried out over the second scenario are reported in the paper, showing the potential of SDN in providing assured on-demand services to end-users.

  11. Forecasting influenza-like illness dynamics for military populations using neural networks and social media.

    Directory of Open Access Journals (Sweden)

    Svitlana Volkova

    Full Text Available This work is the first to take advantage of recurrent neural networks to predict influenza-like illness (ILI dynamics from various linguistic signals extracted from social media data. Unlike other approaches that rely on timeseries analysis of historical ILI data and the state-of-the-art machine learning models, we build and evaluate the predictive power of neural network architectures based on Long Short Term Memory (LSTMs units capable of nowcasting (predicting in "real-time" and forecasting (predicting the future ILI dynamics in the 2011 - 2014 influenza seasons. To build our models we integrate information people post in social media e.g., topics, embeddings, word ngrams, stylistic patterns, and communication behavior using hashtags and mentions. We then quantitatively evaluate the predictive power of different social media signals and contrast the performance of the-state-of-the-art regression models with neural networks using a diverse set of evaluation metrics. Finally, we combine ILI and social media signals to build a joint neural network model for ILI dynamics prediction. Unlike the majority of the existing work, we specifically focus on developing models for local rather than national ILI surveillance, specifically for military rather than general populations in 26 U.S. and six international locations., and analyze how model performance depends on the amount of social media data available per location. Our approach demonstrates several advantages: (a Neural network architectures that rely on LSTM units trained on social media data yield the best performance compared to previously used regression models. (b Previously under-explored language and communication behavior features are more predictive of ILI dynamics than stylistic and topic signals expressed in social media. (c Neural network models learned exclusively from social media signals yield comparable or better performance to the models learned from ILI historical data, thus

  12. Forecasting influenza-like illness dynamics for military populations using neural networks and social media.

    Science.gov (United States)

    Volkova, Svitlana; Ayton, Ellyn; Porterfield, Katherine; Corley, Courtney D

    2017-01-01

    This work is the first to take advantage of recurrent neural networks to predict influenza-like illness (ILI) dynamics from various linguistic signals extracted from social media data. Unlike other approaches that rely on timeseries analysis of historical ILI data and the state-of-the-art machine learning models, we build and evaluate the predictive power of neural network architectures based on Long Short Term Memory (LSTMs) units capable of nowcasting (predicting in "real-time") and forecasting (predicting the future) ILI dynamics in the 2011 - 2014 influenza seasons. To build our models we integrate information people post in social media e.g., topics, embeddings, word ngrams, stylistic patterns, and communication behavior using hashtags and mentions. We then quantitatively evaluate the predictive power of different social media signals and contrast the performance of the-state-of-the-art regression models with neural networks using a diverse set of evaluation metrics. Finally, we combine ILI and social media signals to build a joint neural network model for ILI dynamics prediction. Unlike the majority of the existing work, we specifically focus on developing models for local rather than national ILI surveillance, specifically for military rather than general populations in 26 U.S. and six international locations., and analyze how model performance depends on the amount of social media data available per location. Our approach demonstrates several advantages: (a) Neural network architectures that rely on LSTM units trained on social media data yield the best performance compared to previously used regression models. (b) Previously under-explored language and communication behavior features are more predictive of ILI dynamics than stylistic and topic signals expressed in social media. (c) Neural network models learned exclusively from social media signals yield comparable or better performance to the models learned from ILI historical data, thus, signals from

  13. Social network in patient safety: Social media visibility

    Directory of Open Access Journals (Sweden)

    Azucena Santillán García

    2011-11-01

    Full Text Available Internet social network (social media is a powerful communication tool, and its use is expanding significantly. This paper seeks to know the current state of visibility in online social networks of active citizen talking about patient safety. This is an observational cross-sectional study whose target population is the websites Facebook, Twitter and Tuenti in Spain. By three consecutive cuts social profiles were found using the searching terms “seguridad+paciente” and “safety+patient”. There were found 5 profiles on Facebook that met the search criteria, 6 on Twitter and none were found on Tuenti. It is concluded that although there is evidence of the rise of social networking, citizen network involved in patient safety appears not to be significantly represented within the social networks examined.

  14. New Media : Challenging the Establishment

    OpenAIRE

    Sigal, Ivan

    2011-01-01

    Individual citizens can effect social change through mediated action. There has been a paradigmatic shift in how social networks coalesce online for collective action. The Internet, and especially the creation of open and accessible social media networks, has facilitated and significantly accelerated the generation and mass awareness of social categories, such as people with grievances about government corruption. It has also provided the means to create and share an abundance of content—imag...

  15. Impacts on the Voltage Profile of DC Distribution Network with DG Access

    Science.gov (United States)

    Tu, J. J.; Yin, Z. D.

    2017-07-01

    With the development of electronic, more and more distributed generations (DGs) access into grid and cause the research fever of direct current (DC) distribution network. Considering distributed generation (DG) location and capacity have great impacts on voltage profile, so use IEEE9 and IEEE33 typical circuit as examples, with DGs access in centralized and decentralized mode, to compare voltage profile in alternating and direct current (AC/DC) distribution network. Introducing the voltage change ratio as an evaluation index, so gets the general results on voltage profile of DC distributed network with DG access. Simulation shows that, in the premise of reasonable location and capacity, DC distribution network is more suitable for DG access.

  16. Brand interactions and social media: enhancing user loyalty through social networking sites

    OpenAIRE

    Nisar, T.M.; Whitehead, C.

    2016-01-01

    This paper aims to investigate how user loyalty can be achieved and maintained through social networking sites. More specifically, we intend to test the relationships between brands, user loyalty and social media. The research thus provides insights into user-brand relationships through social media and argues how loyal customers can be through social networking websites. Although there are considerable numbers of studies about loyalty; there exists very limited work studying user loyalty thr...

  17. Let the Revolution Begin, 140 Characters at a Time: Social Media and Unconventional Warfare

    Science.gov (United States)

    2015-06-01

    controllable P2P construct. Although the Egyptian government was able to block client-server network architectures , such as Facebook and Twitter...interpersonal applications are extremely accessible, they tend to operate on a peer-to-peer (P2P) networking architecture , which is also less secure than its...client-server counterpart. The differences in social media networking architectures boil down to relative levels of centralization, access, and

  18. Quantitative analysis of access strategies to remote information in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach in...

  19. Optical fiber cabling technologies for flexible access network

    Science.gov (United States)

    Tanji, Hisashi

    2008-07-01

    Fiber-to-the-home (FTTH) outside plant infrastructure should be so designed and constructed as to flexibly deal with increasing subscribers and system evolution to be expected in the future, taking minimization of total cost (CAPEX and OPEX) into consideration. With this in mind, fiber access architectures are reviewed and key technologies on optical fiber and cable for supporting flexible access network are presented. Low loss over wide wavelength (low water peak) and bend-insensitive single mode fiber is a future proof solution. Enhanced separable ribbon facilitates mid-span access to individual fibers in a cable installed, improving fiber utilizing efficiency and flexibility of distribution design. It also contributes to an excellent low PMD characteristic which could be required for video RF overlay system or high capacity long reach metro-access convergence network in the future. Bend-insensitive fiber based cabling technique including field installable connector greatly improves fiber/cable handling in installation and maintenance work.

  20. Wi-Fi Network Communication Technology Design | Onibere ...

    African Journals Online (AJOL)

    Transmission media (like Satellite, VSAT), access method used to transmit both voice and data on the networks and underlying software and hardware requirements. Also the various standards and protocol for proper wireless networks management, the various authentication and encryption techniques of Wi -Fi network ...

  1. Multi-Media Access and Presentation in the Twente Virtual Theatre Environment

    NARCIS (Netherlands)

    Correia, N.; Nijholt, Antinus; Cambell, T.; Davenport, G.

    2000-01-01

    This paper discusses a virtual world for presenting multi-media information and for natural interactions with the environment to get access to this information. Apart from mouse and keyboard input, interactions take place using speech and language. It is shown how this virtual environment can be

  2. A Unified Access Model for Interconnecting Heterogeneous Wireless Networks

    Science.gov (United States)

    2015-05-01

    validation of the proposed network design for unified network access, and it lays the foundation for implementing a Software - Defined Networking ( SDN ...York (NY): Springer; 2014. Chapter 2, Software - defined networking ; p. 19–32. 5. Sharma S, Staessens D, Colle D, Pickavet M, Demeester P. A...demonstration of fast failure recovery in software defined networking . In: Korakis T, Zink M, Ott, M, editors. Testbeds and research infrastructure

  3. How Many "Friends" Do You Need? Teaching Students How to Network Using Social Media

    Science.gov (United States)

    Sacks, Michael Alan; Graves, Nikki

    2012-01-01

    Student reliance on social media is undeniable. However, while we largely regard social media as a new phenomena, the concepts underlying it come directly from social network theory in sociology and organizational behavior. In this article, the authors examine how the social network concepts of size, quality, complexity, diffusion, and distance…

  4. Ethernet access network based on free-space optic deployment technology

    Science.gov (United States)

    Gebhart, Michael; Leitgeb, Erich; Birnbacher, Ulla; Schrotter, Peter

    2004-06-01

    The satisfaction of all communication needs from single households and business companies over a single access infrastructure is probably the most challenging topic in communications technology today. But even though the so-called "Last Mile Access Bottleneck" is well known since more than ten years and many distribution technologies have been tried out, the optimal solution has not yet been found and paying commercial access networks offering all service classes are still rare today. Conventional services like telephone, radio and TV, as well as new and emerging services like email, web browsing, online-gaming, video conferences, business data transfer or external data storage can all be transmitted over the well known and cost effective Ethernet networking protocol standard. Key requirements for the deployment technology driven by the different services are high data rates to the single customer, security, moderate deployment costs and good scalability to number and density of users, quick and flexible deployment without legal impediments and high availability, referring to the properties of optical and wireless communication. We demonstrate all elements of an Ethernet Access Network based on Free Space Optic distribution technology. Main physical parts are Central Office, Distribution Network and Customer Equipment. Transmission of different services, as well as configuration, service upgrades and remote control of the network are handled by networking features over one FSO connection. All parts of the network are proven, the latest commercially available technology. The set up is flexible and can be adapted to any more specific need if required.

  5. High Dimensional Modulation and MIMO Techniques for Access Networks

    DEFF Research Database (Denmark)

    Binti Othman, Maisara

    Exploration of advanced modulation formats and multiplexing techniques for next generation optical access networks are of interest as promising solutions for delivering multiple services to end-users. This thesis addresses this from two different angles: high dimensionality carrierless...... the capacity per wavelength of the femto-cell network. Bit rate up to 1.59 Gbps with fiber-wireless transmission over 1 m air distance is demonstrated. The results presented in this thesis demonstrate the feasibility of high dimensionality CAP in increasing the number of dimensions and their potentially......) optical access network. 2 X 2 MIMO RoF employing orthogonal frequency division multiplexing (OFDM) with 5.6 GHz RoF signaling over all-vertical cavity surface emitting lasers (VCSEL) WDM passive optical networks (PONs). We have employed polarization division multiplexing (PDM) to further increase...

  6. Cloud Radio Access Network architecture. Towards 5G mobile networks

    DEFF Research Database (Denmark)

    Checko, Aleksandra

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges that mobile operators face while trying to support ever-growing end-users’ needs towards 5th generation of mobile networks (5G). The main idea behind C-RAN is to split the base...... stations into radio and baseband parts, and pool the Baseband Units (BBUs) from multiple base stations into a centralized and virtualized BBU Pool. This gives a number of benefits in terms of cost and capacity. However, the challenge is then to find an optimal functionality splitting point as well...... as to design the socalled fronthaul network, interconnecting those parts. This thesis focuses on quantifying those benefits and proposing a flexible and capacity-optimized fronthaul network. It is shown that a C-RAN with a functional split resulting in a variable bit rate on the fronthaul links brings cost...

  7. Network Layer Protocol Activation for Packet Data Access in UMTS WCDMA Laboratory Network

    OpenAIRE

    Lakkisto, Erkka

    2011-01-01

    The purpose of this Bachelor’s Thesis was to set up the UMTS WCDMA network in the laboratory environment of Helsinki Metropolia University of Applied Sciences and to study the network layer protocol activation for packet data access. The development of 3G technology has been very rapid and it can be considered as one of the main technologies in telecommunication. Implementing the laboratory network in Metropolia enables teaching and researching of the modern network technology. Labora...

  8. Preference for and access to media resources as predictors of in ...

    African Journals Online (AJOL)

    The study investigated the extent to which preference for and access to media resources predicts knowledge of in-school adolescents to sexual and reproductive health issues in Lagos Mainland Local Government Area of Lagos State, Nigeria. A population of 526 in-school adolescents participates in the study while ...

  9. C-DAM: CONTENTION BASED DISTRIBUTED RESERVATION PROTOCOL ALLOCATION ALGORITHM FOR WIMEDIA MEDIUM ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    UMADEVI K. S.

    2017-07-01

    Full Text Available WiMedia Medium Access Control (MAC provides high rate data transfer for wireless networking thereby enables construction of high speed home networks. It facilitates data communication between the nodes through two modes namely: i Distributed Reservation Protocol (DRP for isochronous traffic and ii Prioritized Contention Access (PCA for asynchronous traffic. PCA mode enables medium access using CSMA/CA similar to IEEE 802.11e. In the presence of DRP, the throughput of PCA saturates when there is an increase in the number of devices accessing PCA channel. Researchers suggest that the better utilization of medium resolves many issues in an effective way. To demonstrate the effective utilization of the medium, Contention Based Distributed Reservation Protocol Allocation Algorithm for WiMedia Medium Access Control is proposed for reserving Medium Access Slots under DRP in the presence of PCA. The proposed algorithm provides a better medium access, reduces energy consumption and enhances the throughput when compared to the existing methodologies.

  10. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  11. Approximate Networking for Universal Internet Access

    Directory of Open Access Journals (Sweden)

    Junaid Qadir

    2017-12-01

    Full Text Available Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost-efficient ways of provisioning high-performance, global Internet. In this paper, we argue that instead of an exclusive focus on a utopian goal of universally accessible “ideal networking” (in which we have a high throughput and quality of service as well as low latency and congestion, we should consider providing “approximate networking” through the adoption of context-appropriate trade-offs. In this regard, we propose to leverage the advances in the emerging trend of “approximate computing” that rely on relaxing the bounds of precise/exact computing to provide new opportunities for improving the area, power, and performance efficiency of systems by orders of magnitude by embracing output errors in resilient applications. Furthermore, we propose to extend the dimensions of approximate computing towards various knobs available at network layers. Approximate networking can be used to provision “Global Access to the Internet for All” (GAIA in a pragmatically tiered fashion, in which different users around the world are provided a different context-appropriate (but still contextually functional Internet experience.

  12. A Prescription for Internet Access: Appealing to Middle-Aged and Older Racial and Ethnic Minorities Through Social Network Sites to Combat Colorectal Cancer.

    Science.gov (United States)

    Lumpkins, Crystal Y; Mabachi, Natabhona; Lee, Jaehoon; Pacheco, Christina; Greiner, K Allen; Geana, Mugur

    2017-07-01

    The popularity and usage of social media networks or SNS (social networking sites) among American Internet users age 50 and over doubled between 2009 and 2010 and has steadily climbed. Part of this increased access may be the result of older adults who are living with a chronic disease and are reaching out for online support. Colorectal cancer (CRC) risk is among those concerns, particularly among middle-age and older minority populations where disparities exist. This exploratory study investigates information seeking behavior related to cancer factors (e.g. testing for colon cancer, cancer fatalism) and current social media usage among racial and ethnic minority groups (African American and Latinos) and Whites age 50 and older. The secondary data from the 2012 Health Information National Trends Survey (HINTS) was analyzed to compare these populations. Results show that African Americans and Latinos were only slightly more likely to use social network sites to seek out cancer information compared to Whites. However, Whites were more likely to use the Internet to seek health information compared to African Americans and Latinos. In this sample, Whites were also more likely to be informed by a physician about CRC testing (p social media networks, Internet sites) have increased among older Americans and can serve as critical channels for cancer information and education.

  13. Journalists' Perceptions of Nomenklatura Networks and Media Ownership in Post-communist Bulgaria

    Directory of Open Access Journals (Sweden)

    Lada Trifonova Price

    2015-06-01

    Full Text Available This article discusses the role of the former communist party elite (the nomenklatura in the Bulgarian post-communist media landscape in relation to media ownership and the origin of media outlets’ capital. The spotlight is on Bulgarian journalists’ perceptions explored in semi-structured interviews with media professionals from the capital city, Sofia. The findings indicate that Bulgarian journalists are strongly interested in, and concerned with, the influence of members of the former nomenklatura and their informal networks on the Bulgarian media landscape and particularly on the way Bulgarian media in Bulgaria have been owned and financed since 1989.

  14. Security risks:threats & rewards in social media

    OpenAIRE

    Punjabi, V. (Vikesh)

    2015-01-01

    Abstract In the last decade, without any doubt, social media i.e. social network platforms that are mainly created in order to interact with each other such as Facebook, Twitter, LinkedIn, Google +, Tumblr, Instagram, Flickr, Myspace, Blogs, YouTube, or any user generated content websites gained huge access in public daily life including individuals and organizations. These social network platforms, especially Facebook, Twi...

  15. Print Media and ICT Access and Use among Female Academics in ...

    African Journals Online (AJOL)

    Literacy for women in the academics requires constant access and use of current and quality information from the media and their associated technologies. This paper discusses the challenges to functional literacy for women academics in the University of Jos and explains how their academic literacy can be enhanced to ...

  16. Distributed cloud association in downlink multicloud radio access networks

    KAUST Repository

    Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    This paper considers a multicloud radio access network (M-CRAN), wherein each cloud serves a cluster of base-stations (BS's) which are connected to the clouds through high capacity digital links. The network comprises several remote users, where

  17. Status of Utilizing Social Media Networks in the Teaching-Learning Process at Public Jordanian Universities

    Directory of Open Access Journals (Sweden)

    Muneera Abdalkareem Alshdefait

    2018-03-01

    Full Text Available This study aimed at finding out the status of utilizing social media networks in the teaching-learning process at public Jordanian Universities. To achieve the goal of the study, the descriptive developmental method was used and a questionnaire was developed, consisting of (35 statements. The questionnaire was checked for its validity and reliability. Then it was distributed to a sample of (382 male and female students from the undergraduate and graduate levels. The study results showed that the participants gave a low score to the status of utilizing social media networks in the teaching-learning process at public Jordanian universities. The results also showed that there were statistically significant differences between the participants of the study according to the academic rank attributed to the graduate students, and according to gender attributed to male students at the instrument macro level and on all dimensions of the two variables. In light of these results, the study recommended that public universities should utilize modern technology in the educational process, urge and encourage the teaching staff members to use the social media networks in the teaching-learning process and raise the students' awareness about the benefits of using social media networks. Keywords: Social media networks, Teaching-learning process, Public Jordanian Universities

  18. Multirate IP traffic transmission in flexible access networks based on optical FFH-CDMA

    DEFF Research Database (Denmark)

    Raddo, Thiago R.; Sanches, Anderson L.; Tafur Monroy, Idelfonso

    2016-01-01

    In this paper, we propose a new IP transmission architecture over optical fast frequency hopping code-division multiple-access (OFFH-CDMA) network capable of supporting multirate transmissions for applications in flexible optical access networks. The proposed network architecture is independent...

  19. A multi-scale network method for two-phase flow in porous media

    Energy Technology Data Exchange (ETDEWEB)

    Khayrat, Karim, E-mail: khayratk@ifd.mavt.ethz.ch; Jenny, Patrick

    2017-08-01

    Pore-network models of porous media are useful in the study of pore-scale flow in porous media. In order to extract macroscopic properties from flow simulations in pore-networks, it is crucial the networks are large enough to be considered representative elementary volumes. However, existing two-phase network flow solvers are limited to relatively small domains. For this purpose, a multi-scale pore-network (MSPN) method, which takes into account flow-rate effects and can simulate larger domains compared to existing methods, was developed. In our solution algorithm, a large pore network is partitioned into several smaller sub-networks. The algorithm to advance the fluid interfaces within each subnetwork consists of three steps. First, a global pressure problem on the network is solved approximately using the multiscale finite volume (MSFV) method. Next, the fluxes across the subnetworks are computed. Lastly, using fluxes as boundary conditions, a dynamic two-phase flow solver is used to advance the solution in time. Simulation results of drainage scenarios at different capillary numbers and unfavourable viscosity ratios are presented and used to validate the MSPN method against solutions obtained by an existing dynamic network flow solver.

  20. A multi-scale network method for two-phase flow in porous media

    International Nuclear Information System (INIS)

    Khayrat, Karim; Jenny, Patrick

    2017-01-01

    Pore-network models of porous media are useful in the study of pore-scale flow in porous media. In order to extract macroscopic properties from flow simulations in pore-networks, it is crucial the networks are large enough to be considered representative elementary volumes. However, existing two-phase network flow solvers are limited to relatively small domains. For this purpose, a multi-scale pore-network (MSPN) method, which takes into account flow-rate effects and can simulate larger domains compared to existing methods, was developed. In our solution algorithm, a large pore network is partitioned into several smaller sub-networks. The algorithm to advance the fluid interfaces within each subnetwork consists of three steps. First, a global pressure problem on the network is solved approximately using the multiscale finite volume (MSFV) method. Next, the fluxes across the subnetworks are computed. Lastly, using fluxes as boundary conditions, a dynamic two-phase flow solver is used to advance the solution in time. Simulation results of drainage scenarios at different capillary numbers and unfavourable viscosity ratios are presented and used to validate the MSPN method against solutions obtained by an existing dynamic network flow solver.

  1. Adaptation of AMO-FBMC-OQAM in optical access network for accommodating asynchronous multiple access in OFDM-based uplink transmission

    Science.gov (United States)

    Jung, Sun-Young; Jung, Sang-Min; Han, Sang-Kook

    2015-01-01

    Exponentially expanding various applications in company with proliferation of mobile devices make mobile traffic exploded annually. For future access network, bandwidth efficient and asynchronous signals converged transmission technique is required in optical network to meet a huge bandwidth demand, while integrating various services and satisfying multiple access in perceived network resource. Orthogonal frequency division multiplexing (OFDM) is highly bandwidth efficient parallel transmission technique based on orthogonal subcarriers. OFDM has been widely studied in wired-/wireless communication and became a Long term evolution (LTE) standard. Consequently, OFDM also has been actively researched in optical network. However, OFDM is vulnerable frequency and phase offset essentially because of its sinc-shaped side lobes, therefore tight synchronism is necessary to maintain orthogonality. Moreover, redundant cyclic prefix (CP) is required in dispersive channel. Additionally, side lobes act as interference among users in multiple access. Thus, it practically hinders from supporting integration of various services and multiple access based on OFDM optical transmission In this paper, adaptively modulated optical filter bank multicarrier system with offset QAM (AMO-FBMC-OQAM) is introduced and experimentally investigated in uplink optical transmission to relax multiple access interference (MAI), while improving bandwidth efficiency. Side lobes are effectively suppressed by using FBMC, therefore the system becomes robust to path difference and imbalance among optical network units (ONUs), which increase bandwidth efficiency by reducing redundancy. In comparison with OFDM, a signal performance and an efficiency of frequency utilization are improved in the same experimental condition. It enables optical network to effectively support heterogeneous services and multiple access.

  2. Joint Hybrid Backhaul and Access Links Design in Cloud-Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb

    2015-09-06

    The cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio systems. In this paper, we consider the downlink of a CRAN formed of one central processor (the cloud) and several base station (BS), where each BS is connected to the cloud via either a wireless or capacity-limited wireline backhaul link. The paper addresses the joint design of the hybrid backhaul links (i.e., designing the wireline and wireless backhaul connections from the cloud to the BSs) and the access links (i.e., determining the sparse beamforming solution from the BSs to the users). The paper formulates the hybrid backhaul and access link design problem by minimizing the total network power consumption. The paper solves the problem using a two-stage heuristic algorithm. At one stage, the sparse beamforming solution is found using a weighted mixed 11/12 norm minimization approach; the correlation matrix of the quantization noise of the wireline backhaul links is computed using the classical rate-distortion theory. At the second stage, the transmit powers of the wireless backhaul links are found by solving a power minimization problem subject to quality-of-service constraints, based on the principle of conservation of rate by utilizing the rates found in the first stage. Simulation results suggest that the performance of the proposed algorithm approaches the global optimum solution, especially at high signal-to-interference-plus-noise ratio (SINR).

  3. Local network assessment

    Science.gov (United States)

    Glen, D. V.

    1985-04-01

    Local networks, related standards activities of the Institute of Electrical and Electronics Engineers the American National Standards Institute and other elements are presented. These elements include: (1) technology choices such as topology, transmission media, and access protocols; (2) descriptions of standards for the 802 local area networks (LAN's); high speed local networks (HSLN's) and military specification local networks; and (3) intra- and internetworking using bridges and gateways with protocols Interconnection (OSI) reference model. The convergence of LAN/PBX technology is also described.

  4. Stochastic geometry model for multi-channel fog radio access networks

    KAUST Repository

    Emara, Mostafa; Elsawy, Hesham; Sorour, Sameh; Al-Ghadhban, Samir; Alouini, Mohamed-Slim; Al-Naffouri, Tareq Y.

    2017-01-01

    Cache-enabled base station (BS) densification, denoted as a fog radio access network (F-RAN), is foreseen as a key component of 5G cellular networks. F-RAN enables storing popular files at the network edge (i.e., BS caches), which empowers local

  5. Learning Automata Based Caching for Efficient Data Access in Delay Tolerant Networks

    Directory of Open Access Journals (Sweden)

    Zhenjie Ma

    2018-01-01

    Full Text Available Effective data access is one of the major challenges in Delay Tolerant Networks (DTNs that are characterized by intermittent network connectivity and unpredictable node mobility. Currently, different data caching schemes have been proposed to improve the performance of data access in DTNs. However, most existing data caching schemes perform poorly due to the lack of global network state information and the changing network topology in DTNs. In this paper, we propose a novel data caching scheme based on cooperative caching in DTNs, aiming at improving the successful rate of data access and reducing the data access delay. In the proposed scheme, learning automata are utilized to select a set of caching nodes as Caching Node Set (CNS in DTNs. Unlike the existing caching schemes failing to address the challenging characteristics of DTNs, our scheme is designed to automatically self-adjust to the changing network topology through the well-designed voting and updating processes. The proposed scheme improves the overall performance of data access in DTNs compared with the former caching schemes. The simulations verify the feasibility of our scheme and the improvements in performance.

  6. Internet and Social Media Access Among Youth Experiencing Homelessness: Mixed-Methods Study.

    Science.gov (United States)

    VonHoltz, Lauren A Houdek; Frasso, Rosemary; Golinkoff, Jesse M; Lozano, Alicia J; Hanlon, Alexandra; Dowshen, Nadia

    2018-05-22

    Youth experiencing homelessness are at a risk for a variety of adverse outcomes. Given the widespread use of the internet and social media, these new technologies may be used to address their needs and for outreach purposes. However, little is known about how this group uses these resources. This study investigated how homeless adolescents use these technologies for general and health-related purposes, whether the scope of their use changes with housing status, and their interest in a website dedicated to youth experiencing homelessness. A convenience sample of youth aged 18 to 21 years was recruited from a youth-specific homeless shelter. All participants completed a 47-item survey, with 10 individuals completing a semistructured interview. Descriptive statistics, exact testing, logistic regression, and generalized estimating equation modeling was performed for quantitative data analysis. Interviews were transcribed verbatim, and NVivo 10 (QSR International) was employed to facilitate double coding and thematic analysis. A total of 87 participants completed the survey with a mean age of 19.4 (SD 1.1) years. While experiencing homelessness, 56% (49/87) accessed the internet at least once a day, with 86% (75/87) accessing once a week. Access to a smartphone was associated with a 3.03 greater odds of accessing the internet and was the most frequently used device (66% of participants, 57/87). While experiencing homelessness, subjects reported a 68% decreased odds in internet access frequency (odds ratio [OR] 0.32, Psocial media use (OR 0.13, P=.01). Ten participants completed the semistructured interview. Several themes were identified, including (1) changes in internet behaviors while experiencing homelessness, (2) health status as a major concern and reason for Internet use, and (3) interest in a website dedicated to youth experiencing homelessness. While experiencing homelessness, participants indicated their behaviors were more goal-oriented and less focused on

  7. Cell Deployment Optimization for Cloud Radio Access Networks using Teletraffic Theory

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Christiansen, Henrik Lehrmann; Iversen, Villy Bæk

    2015-01-01

    Cloud Radio Access Network (C-RAN) is a new mobile radio access network design based on centralized and pooled processing. It offers potential cost savings by utilizing the so-called tidal effect due to user mobility in cellular networks. This paper provides a quantitative analysis...... to dynamically re-assign cells to a pool of baseband units. The re-assignment is based on the cell load and traffic characteristics such that effective utilization of the baseband resources is assured....

  8. Passive Optical Access Networks: State of the Art and Future Evolution

    Directory of Open Access Journals (Sweden)

    Tommaso Muciaccia

    2014-10-01

    Full Text Available In the very last years, optical access networks are growing very rapidly, from both the network operators and the research interests points of view. Fiber To The Home (FTTH is already a reality in plenty of real contexts and there has been a further stimulus to the proposal of new solutions and the investigation of new possibilities, in order to optimize network performance and reduce capital and operational expenditure. A complete and systematic overview of passive optical access networks is presented in this paper, concerning both the hot research topics and the main operative issues about the design guidelines and the deployment of Passive Optical Networks (PON architectures, nowadays the most commonly implemented approach to realize optical fiber links in the access networks. A comparison of advantages and disadvantages of different multiplexing techniques is discussed, with specific reference to WDM-based networks, almost universally considered as the enabling technology for future proof bandwidth requirements. An exhaustive summary is also given about the-state-of-the-art of modulation and encoding techniques recently proposed by the scientific community, as well as the open challenges (such as colorless and coolerless ONUs for telecom companies and international standardization compliance.

  9. Algorithmic PON/P2P FTTH Access Network Design for CAPEX Minimization

    DEFF Research Database (Denmark)

    Papaefthimiou, Kostantinos; Tefera, Yonas; Mihylov, Dimitar

    2013-01-01

    one. It provides an obvious advantage for the end users in terms of high achievable data rates. On the other hand, the high initial deployment cost required exists as the heaviest impediment. The main goal of this paper is to study different approaches when designing a fiber access network. More......Due to the emergence of high bandwidth-requiring services, telecommunication operators (telcos) are called to upgrade their fixed access network. In order to keep up with the competition, they must consider different optical access network solutions with Fiber To The Home (FTTH) as the prevailing...

  10. Identifying the new Influencers in the Internet Era: Social Media and Social Network Analysis

    Directory of Open Access Journals (Sweden)

    MIGUEL DEL FRESNO GARCÍA

    2016-01-01

    Full Text Available Social media influencers (SMIs can be defined as a new type of independent actor who are able to shape audience attitudes through the use of social media channels in competition and coexistence with professional media. Being able to accurately identify SMIs is critical no matter what is being transmitted in a social system. Social Network Analysis (SNA has been recognized as a powerful tool for representing social network structures and information dissemination. SMIs can be identifi ed by their high-ranking position in a network as the most important or central nodes. The results reveal the existence of three different typologies of SMIs: disseminator, engager and leader. This methodology permits the optimization of resources to create effective online communication strategies.

  11. Cross-layer design for radio resource allocation based on priority scheduling in OFDMA wireless access network

    Directory of Open Access Journals (Sweden)

    Chen Yen-Wen

    2011-01-01

    Full Text Available Abstract The orthogonal frequency-division multiple access (OFDMA system has the advantages of flexible subcarrier allocation and adaptive modulation with respect to channel conditions. However, transmission overhead is required in each frame to broadcast the arrangement of radio resources to all mobile stations within the coverage of the same base station. This overhead greatly affects the utilization of valuable radio resources. In this paper, a cross layer scheme is proposed to reduce the number of traffic bursts at the downlink of an OFDMA wireless access network so that the overhead of the media access protocol (MAP field can be minimized. The proposed scheme considers the priorities and the channel conditions of quality of service (QoS traffic streams to arrange for them to be sent with minimum bursts in a heuristic manner. In addition, the trade-off between the degradation of the modulation level and the reduction of traffic bursts is investigated. Simulation results show that the proposed scheme can effectively reduce the traffic bursts and, therefore, increase resource utilization.

  12. Social Media Data in the Academic Environment: Crimson Hexagon in the Library

    OpenAIRE

    Tulley, Stephanie; Dennis, Tim

    2016-01-01

    Social media data is a high-profile resource across academic disciplines, in areas as diverse as understanding voter behavior, tracking social communication networks, and identifying sources and effects of pollution on human health. While manual data collection and review from public social media sites can provide some insight into the content of these sources, bulk access to data is preferred for more complex and deeper analysis into the content. A certain amount of data can be accessed dire...

  13. On the Design of Energy Efficient Optical Networks with Software Defined Networking Control Across Core and Access Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Yan, Ying; Dittmann, Lars

    2013-01-01

    This paper presents a Software Defined Networking (SDN) control plane based on an overlay GMPLS control model. The SDN control platform manages optical core networks (WDM/DWDM networks) and the associated access networks (GPON networks), which makes it possible to gather global information...... and enable wider areas' energy efficiency networking. The energy related information of the networks and the types of the traffic flows are collected and utilized for the end-to-end QoS provision. Dynamic network simulation results show that by applying different routing algorithms according to the type...... of traffic in the core networks, the energy efficiency of the network is improved without compromising the quality of service....

  14. A Context-Aware Adaptive Streaming Media Distribution System in a Heterogeneous Network with Multiple Terminals

    Directory of Open Access Journals (Sweden)

    Yepeng Ni

    2016-01-01

    Full Text Available We consider the problem of streaming media transmission in a heterogeneous network from a multisource server to home multiple terminals. In wired network, the transmission performance is limited by network state (e.g., the bandwidth variation, jitter, and packet loss. In wireless network, the multiple user terminals can cause bandwidth competition. Thus, the streaming media distribution in a heterogeneous network becomes a severe challenge which is critical for QoS guarantee. In this paper, we propose a context-aware adaptive streaming media distribution system (CAASS, which implements the context-aware module to perceive the environment parameters and use the strategy analysis (SA module to deduce the most suitable service level. This approach is able to improve the video quality for guarantying streaming QoS. We formulate the optimization problem of QoS relationship with the environment parameters based on the QoS testing algorithm for IPTV in ITU-T G.1070. We evaluate the performance of the proposed CAASS through 12 types of experimental environments using a prototype system. Experimental results show that CAASS can dynamically adjust the service level according to the environment variation (e.g., network state and terminal performances and outperforms the existing streaming approaches in adaptive streaming media distribution according to peak signal-to-noise ratio (PSNR.

  15. Access to mass media messages, and use of family planning in Nigeria: a spatio-demographic analysis from the 2013 DHS.

    Science.gov (United States)

    Ajaero, Chukwuedozie K; Odimegwu, Clifford; Ajaero, Ijeoma D; Nwachukwu, Chidiebere A

    2016-05-24

    Nigeria has the highest population in sub-Saharan Africa with high birth and growth rates. There is therefore need for family planning to regulate and stabilize this population. This study examined the relationship between access to mass media messages on family planning and use of family planning in Nigeria. It also investigated the impacts of spatio-demographic variables on the relationship between access to mass media messages and use of family planning. Data from the 2013 demographic and health survey of Nigeria which was conducted in all the 36 states of Nigeria, and Abuja were used for the study. The sample was weighted to ensure representativeness. Univariate, bivariate and binary logistic regressions were conducted. The relationship between each of the access to mass media messages, and the family planning variables were determined with Pearson correlation analysis. The correlation results showed significant but weak direct relationships between the access to mass media messages and use of family planning at p mass media messages on family planning, and on the use of family planning. The results showed that access to mass media messages increases the likelihood of the use of family planning. Also people with higher socioeconomic status and those from the Southern part of the country make more use of family planning. There is need to improve the socioeconomic status of the populations. Also, the quality and regularity of mass media messages should be improved, while other communication avenues such as traditional institutions, blogs, and seminars for youths should be used to make family planning messages more acceptable.

  16. Spreadable media: Creating value and meaning in a networked culture

    Directory of Open Access Journals (Sweden)

    Moderated by Louisa Stein

    2014-09-01

    Full Text Available Online Roundtable on Spreadable Media, by Henry Jenkins, Sam Ford, and Joshua Green, with participants Paul Booth, Kristina Busse, Melissa Click, Sam Ford, Henry Jenkins, Xiaochang Li, and Sharon Ross. Section 1 first published as the article "Spreadable Media: Creating Value and Meaning in a Networked Culture", by Louisa Stein, from Cinema Journal Volume 53 Issue 3, pp152-177. Copyright 2014 by The University of Texas Press. All rights reserved.

  17. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  18. Multiple access protocol for supporting multimedia services in wireless ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo

    1999-01-01

    The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications....... In this paper, we propose a multiple access protocol using centralized and distributed channel access control techniques to provide QoS guarantees for multimedia services by taking advantage of the characteristics of different kinds of ATM traffics. Multimedia traffic, including constant bit rate (CBR...

  19. Experimental demonstration of OpenFlow-enabled media ecosystem architecture for high-end applications over metro and core networks.

    Science.gov (United States)

    Ntofon, Okung-Dike; Channegowda, Mayur P; Efstathiou, Nikolaos; Rashidi Fard, Mehdi; Nejabati, Reza; Hunter, David K; Simeonidou, Dimitra

    2013-02-25

    In this paper, a novel Software-Defined Networking (SDN) architecture is proposed for high-end Ultra High Definition (UHD) media applications. UHD media applications require huge amounts of bandwidth that can only be met with high-capacity optical networks. In addition, there are requirements for control frameworks capable of delivering effective application performance with efficient network utilization. A novel SDN-based Controller that tightly integrates application-awareness with network control and management is proposed for such applications. An OpenFlow-enabled test-bed demonstrator is reported with performance evaluations of advanced online and offline media- and network-aware schedulers.

  20. Accessibility in networks: A useful measure for understanding social insect nest architecture

    International Nuclear Information System (INIS)

    Viana, Matheus P.; Fourcassié, Vincent; Perna, Andrea; Costa, Luciano da F.; Jost, Christian

    2013-01-01

    Networks and the associated tools from graph theory have now become well-established approaches to study natural as well as human-made systems. While early studies focused on topology and connectivity, the recent literature has acknowledged the importance of the dynamical properties of these networks. Here we focus on such a dynamic measure: accessibility. It characterizes for any given movement dynamics (such as random walks) the average number of nodes that can be reached in exactly h steps (out-accessibility), or the average number of nodes from which a given node can be reached (in-accessibility). This focus on dynamics makes accessibility particularly appropriate to study movement on networks and to detect complementary properties with respect to topology-based measurements such as betweenness centrality. We apply this measure to six nests of Cubitermes termites. Their mushroom-like 3D architectures consist of chambers and connecting tunnels that can be associated to nodes and edges in a communication network. Accessibilities turn out to be particularly low in the bottom part of the nests that link them to their underground tunneling network. We interpret this result in the context of anti-predator (ants) behavior and/or as a side effect of the global nest shape.

  1. Advance reservation access control using software-defined networking and tokens

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar; Rao, Nageswara S. V.; Foster, Ian T.; Clark, Russ; Owen, Henry

    2018-02-01

    Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present here a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization. We use SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. We conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network. (C) 2017 Elsevier B.V. All rights reserved.

  2. A Method for Automated Planning of FTTH Access Network Infrastructures

    DEFF Research Database (Denmark)

    Riaz, Muhammad Tahir; Pedersen, Jens Myrup; Madsen, Ole Brun

    2005-01-01

    In this paper a method for automated planning of Fiber to the Home (FTTH) access networks is proposed. We introduced a systematic approach for planning access network infrastructure. The GIS data and a set of algorithms were employed to make the planning process more automatic. The method explains...... method. The method, however, does not fully automate the planning but make the planning process significantly fast. The results and discussion are presented and conclusion is given in the end....

  3. Access regulation in the next generation access network environment: A comparative study of Hong Kong and Singapore from the transaction cost economics perspectives

    OpenAIRE

    Ho, Au Man

    2012-01-01

    Hong Kong and Singapore have adopted two different models in the regulation of the next generation access (NGA) networks. In Hong Kong, the government has decided that access regulation will not be applied to fibre-based access networks and its strategy will be to rely on facilities-based competition to promote investment in the NGA networks. Singapore, on the other hand, has promoted access/services-based competition over a next generation broadband infrastructure subsidised by public fundin...

  4. Navigating Social Networking and Social Media in School Psychology: Ethical and Professional Considerations in Training Programs

    Science.gov (United States)

    Pham, Andy V.

    2014-01-01

    Social networking and social media have undoubtedly proliferated within the past decade, allowing widespread communication and dissemination of user-generated content and information. Some psychology graduate programs, including school psychology, have started to embrace social networking and media for instructional and training purposes; however,…

  5. Spectrum access games for cognitive radio networks

    CSIR Research Space (South Africa)

    Masonta, MT

    2010-09-01

    Full Text Available received a wide acceptance in next generation and intelligent wireless communication systems. In this paper the authors make use of game theory approach to model and analyze cognitive radio networks in order to allow dynamic spectrum access in broadband...

  6. Optical solutions for unbundled access network

    Science.gov (United States)

    Bacîş Vasile, Irina Bristena

    2015-02-01

    The unbundling technique requires finding solutions to guarantee the economic and technical performances imposed by the nature of the services that can be offered. One of the possible solutions is the optic one; choosing this solution is justified for the following reasons: it optimizes the use of the access network, which is the most expensive part of a network (about 50% of the total investment in telecommunications networks) while also being the least used (telephone traffic on the lines has a low cost); it increases the distance between the master station/central and the terminal of the subscriber; the development of the services offered to the subscribers is conditioned by the subscriber network. For broadband services there is a need for support for the introduction of high-speed transport. A proper identification of the factors that must be satisfied and a comprehensive financial evaluation of all resources involved, both the resources that are in the process of being bought as well as extensions are the main conditions that would lead to a correct choice. As there is no single optimal technology for all development scenarios, which can take into account all access systems, a successful implementation is always done by individual/particularized scenarios. The method used today for the selection of an optimal solution is based on statistics and analysis of the various, already implemented, solutions, and on the experience that was already gained; the main evaluation criterion and the most unbiased one is the ratio between the cost of the investment and the quality of service, while serving an as large as possible number of customers.

  7. Analyzing big data in social media: Text and network analyses of an eating disorder forum.

    Science.gov (United States)

    Moessner, Markus; Feldhege, Johannes; Wolf, Markus; Bauer, Stephanie

    2018-05-10

    Social media plays an important role in everyday life of young people. Numerous studies claim negative effects of social media and media in general on eating disorder risk factors. Despite the availability of big data, only few studies have exploited the possibilities so far in the field of eating disorders. Methods for data extraction, computerized content analysis, and network analysis will be introduced. Strategies and methods will be exemplified for an ad-hoc dataset of 4,247 posts and 34,118 comments by 3,029 users of the proed forum on Reddit. Text analysis with latent Dirichlet allocation identified nine topics related to social support and eating disorder specific content. Social network analysis describes the overall communication patterns, and could identify community structures and most influential users. A linear network autocorrelation model was applied to estimate associations in language among network neighbors. The supplement contains R code for data extraction and analyses. This paper provides an introduction to investigating social media data, and will hopefully stimulate big data social media research in eating disorders. When applied in real-time, the methods presented in this manuscript could contribute to improving the safety of ED-related online communication. © 2018 Wiley Periodicals, Inc.

  8. Traffic Scheduling in WDM Passive Optical Network with Delay Guarantee

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    WDM passive optical network becomes more favorable as the required bandwidth increases, but currently few media access control algorithms adapted to WDM access network. This paper presented a new scheduling algorithm for bandwidth sharing in WDM passive optical networks, which provides per-flow delay guarantee and supports variable-length packets scheduling. Through theoretical analysis and simulation, the end-to-end delay bound and throughput fairness of the algorithm was demonstrated.

  9. A slotted access control protocol for metropolitan WDM ring networks

    Science.gov (United States)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  10. Access Denied: School Librarians' Responses to School District Policies on the Use of Social Media Tools

    Science.gov (United States)

    DiScala, Jeffrey; Weeks, Ann Carlson

    2013-01-01

    Public school districts often block access to online social media tools. While considered a preventive measure to ensure student safety and limit district liability, this policy strips school librarians and their collaborating teachers of opportunities to instruct students in using social media tools creatively and responsibly. Using one school…

  11. Social Media Marketing to Increase Brand Awareness

    Directory of Open Access Journals (Sweden)

    Monica Bîja

    2014-12-01

    Full Text Available Social networks are becoming more and more widespread and they are literally conquering the World Wide Web. Facebook has managed to arrive even in poor and remote territories which apparently have nothing to do with our always on the move modern world. However, only on the African continent there are more than 100 million active Facebook users who represent 50% of the African population having access to Internet. Thus, it would be huge marketing mistake for businesses not to take into consideration this opportunity to get in touch with prospective customers (Neti, 2011. Social media is hot and has turned into a “must” for businesses looking for brand awareness. Therefore, the techniques used to attract customers by means of social networks have gained quite a high degree of sophistry (Neti, 2011. In an age in which the average internet user accesses his/her social network account at least fourteen times a day, companies cannot afford to be absent from this medium. The aim of the present paper is to present the concept and characteristics of social media and how it can be used in order to increase brand awareness.

  12. [Social networks and medicine].

    Science.gov (United States)

    Bastardot, F; Vollenweider, P; Marques-Vidal, P

    2015-11-04

    Social networks (social media or #SoMe) have entered medical practice within the last few years. These new media--like Twitter or Skype--enrich interactions among physicians (telemedicine), among physicians and patients (virtual consultations) and change the way of teaching medicine. They also entail new ethical, deontological and legal issues: the extension of the consultation area beyond the medical office and the access of information by third parties were recently debated. We develop here a review of some social networks with their characteristics, applications for medicine and limitations, and we offer some recommendations of good practice.

  13. Local area networking handbook

    OpenAIRE

    O'Hara, Patricia A.

    1990-01-01

    Approved for public release; distribution is unlimited. This thesis provides Navy shore based commands with sufficient information on local area networking to (1) decide if they need a LAN, (2) determine what their networking requirements are, and (3) select a LAN that satisfies their requirements. LAN topologies, transmission media, and medium access methods are described. In addition, the OSI reference model for computer networking and the IEEE 802 LAN standards are explained in detail. ...

  14. INSIGHTS INTO THE DYNAMICS OF BUSINESS MODELS IN THE MEDIA INDUSTRY

    OpenAIRE

    Westerlund, Mika; Rajala, Risto; Leminen, Seppo

    2011-01-01

    Media production and consumption are under a drastic change. The digitalization of content production, delivery and use as well as the increase of the broadband Internet access in both fi xed and mobile networks allow the use of media contents in a myriad of different terminals. Simultaneously, media consumption is becoming increasingly social, participatory, ubiquitous and multi-channeled by nature. The novel technologies that enable shared public and interpersonal communications are of sign...

  15. Spectrum access and management for cognitive radio networks

    CERN Document Server

    2017-01-01

    This book presents cutting-edge research contributions that address various aspects of network design, optimization, implementation, and application of cognitive radio technologies. It demonstrates how to make better utilization of the available spectrum, cognitive radios and spectrum access to achieve effective spectrum sharing between licensed and unlicensed users. The book provides academics and researchers essential information on current developments and future trends in cognitive radios for possible integration with the upcoming 5G networks. In addition, it includes a brief introduction to cognitive radio networks for newcomers to the field.

  16. Medical Concept Normalization in Social Media Posts with Recurrent Neural Networks.

    Science.gov (United States)

    Tutubalina, Elena; Miftahutdinov, Zulfat; Nikolenko, Sergey; Malykh, Valentin

    2018-06-12

    Text mining of scientific libraries and social media has already proven itself as a reliable tool for drug repurposing and hypothesis generation. The task of mapping a disease mention to a concept in a controlled vocabulary, typically to the standard thesaurus in the Unified Medical Language System (UMLS), is known as medical concept normalization. This task is challenging due to the differences in the use of medical terminology between health care professionals and social media texts coming from the lay public. To bridge this gap, we use sequence learning with recurrent neural networks and semantic representation of one- or multi-word expressions: we develop end-to-end architectures directly tailored to the task, including bidirectional Long Short-Term Memory, Gated Recurrent Units with an attention mechanism, and additional semantic similarity features based on UMLS. Our evaluation against a standard benchmark shows that recurrent neural networks improve results over an effective baseline for classification based on convolutional neural networks. A qualitative examination of mentions discovered in a dataset of user reviews collected from popular online health information platforms as well as a quantitative evaluation both show improvements in the semantic representation of health-related expressions in social media. Copyright © 2018. Published by Elsevier Inc.

  17. Coordinated scheduling for the downlink of cloud radio-access networks

    KAUST Repository

    Douik, Ahmed S.; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    This paper addresses the coordinated scheduling problem in cloud-enabled networks. Consider the downlink of a cloud-radio access network (CRAN), where the cloud is only responsible for the scheduling policy and the synchronization of the transmit

  18. Building a multimodal network and determining individual accessibility by public transportation

    DEFF Research Database (Denmark)

    Djurhuus, Sune; Hansen, Henning Sten; Aadahl, Mette

    2016-01-01

    The increased availability of transit schedules from web sites or travel planners as well as more disaggregate data has led to a growing interest in creating individual public transportation accessibility measures. However, used extensively, standard GIS software does not have direct capabilities...... from a travel planner into a multimodal network model using simple SQL (structured query language) programming and standard GIS. The method presented here integrates all parts of travelling by public transportation from individual home addresses to all reachable transit stops within different travel....... The accessibility areas are created at morning rush hour for a study population of 29 447 individuals and a few examples of accessibility areas are presented. The results show a big difference in individual public transportation accessibility in the region. In addition, how the transit network is accessed, whether...

  19. Wireless ad hoc networks access for aeronautical communications

    OpenAIRE

    Besse , Frédéric; Garcia , Fabien; Pirovano , Alain; Radzik , José

    2010-01-01

    International audience; There is an increasing interest in the current aeronautical context to offer new services for civil aircraft passengers. For example, airlines want to offer their customers the opportunity to access the Internet, to manage their mails, to watch video on demand, to access corporate VPNs.... All these services represent a new type of air-ground communications called APC (Aeronautical Passenger Communications) in the ATN (Aeronautical Telecommunication Network) context. I...

  20. Distributed Robust Power Minimization for the Downlink of Multi-Cloud Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    Conventional cloud radio access networks assume single cloud processing and treat inter-cloud interference as background noise. This paper considers the downlink of a multi-cloud radio access network (CRAN) where each cloud is connected to several

  1. High-Capacity Hybrid Optical Fiber-Wireless Communications Links in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan

    of broadband services access. To realize the seamless convergence between the two network segments, the lower capacity of wireless systems need to be increased to match the continuously increasing bandwidth of fiber-optic systems. The research works included in this thesis are devoted to experimental...... investigations of photonic-wireless links with record high capacities to fulfill the requirements of next generation hybrid optical fiber-wireless access networks. The main contributions of this thesis have expanded the state-of-the-art in two main areas: high speed millimeter-wave (mm-wave) communication links......Integration between fiber-optic and wireless communications systems in the "last mile" access networks is currently considered as a promising solution for both service providers and users, in terms of minimizing deployment cost, shortening upgrading period and increasing mobility and flexibility...

  2. Performance of WLAN RSS-based SON for LTE/WLAN access network selection

    NARCIS (Netherlands)

    Wang, Y.; Djapic, R.; Bergström, A.; Kovács, I.Z.; Laselva, D.; Spaey, K.; Sas, B.

    2014-01-01

    Mobile Network Operators (MNOs) are integrating carrier-grade Wireless Local Area Network (WLAN) to cellular networks to improve network performance and user experience. Access network selection (ANS) between cellular and WLAN plays a key role in the integration. Given the complexity of

  3. Models for QoS-Aware Capacity Management in Cable Access Networks

    NARCIS (Netherlands)

    Attema, T.; van den Berg, Hans Leo; Kempker, P.C.; Worm, D.; van der Vliet-Hameeteman, C.

    In this article, mathematical models are presented that “map‿ measured or predicted network utilisations to user throughputs for given network configurations (segment capacity, subscription speeds etc.). They provide valuable insights into the user experience in cable access networks. The models,

  4. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani

    2013-01-01

    that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over...

  5. Highball: A high speed, reserved-access, wide area network

    Science.gov (United States)

    Mills, David L.; Boncelet, Charles G.; Elias, John G.; Schragger, Paul A.; Jackson, Alden W.

    1990-01-01

    A network architecture called Highball and a preliminary design for a prototype, wide-area data network designed to operate at speeds of 1 Gbps and beyond are described. It is intended for applications requiring high speed burst transmissions where some latency between requesting a transmission and granting the request can be anticipated and tolerated. Examples include real-time video and disk-disk transfers, national filestore access, remote sensing, and similar applications. The network nodes include an intelligent crossbar switch, but have no buffering capabilities; thus, data must be queued at the end nodes. There are no restrictions on the network topology, link speeds, or end-end protocols. The end system, nodes, and links can operate at any speed up to the limits imposed by the physical facilities. An overview of an initial design approach is presented and is intended as a benchmark upon which a detailed design can be developed. It describes the network architecture and proposed access protocols, as well as functional descriptions of the hardware and software components that could be used in a prototype implementation. It concludes with a discussion of additional issues to be resolved in continuing stages of this project.

  6. Optimal design of mixed-media packet-switching networks - Routing and capacity assignment

    Science.gov (United States)

    Huynh, D.; Kuo, F. F.; Kobayashi, H.

    1977-01-01

    This paper considers a mixed-media packet-switched computer communication network which consists of a low-delay terrestrial store-and-forward subnet combined with a low-cost high-bandwidth satellite subnet. We show how to route traffic via ground and/or satellite links by means of static, deterministic procedures and assign capacities to channels subject to a given linear cost such that the network average delay is minimized. Two operational schemes for this network model are investigated: one is a scheme in which the satellite channel is used as a slotted ALOHA channel; the other is a new multiaccess scheme we propose in which whenever a channel collision occurs, retransmission of the involved packets will route through ground links to their destinations. The performance of both schemes is evaluated and compared in terms of cost and average packet delay tradeoffs for some examples. The results offer guidelines for the design and optimal utilization of mixed-media networks.

  7. Modified network simulation model with token method of bus access

    Directory of Open Access Journals (Sweden)

    L.V. Stribulevich

    2013-08-01

    Full Text Available Purpose. To study the characteristics of the local network with the marker method of access to the bus its modified simulation model was developed. Methodology. Defining characteristics of the network is carried out on the developed simulation model, which is based on the state diagram-layer network station with the mechanism of processing priorities, both in steady state and in the performance of control procedures: the initiation of a logical ring, the entrance and exit of the station network with a logical ring. Findings. A simulation model, on the basis of which can be obtained the dependencies of the application the maximum waiting time in the queue for different classes of access, and the reaction time usable bandwidth on the data rate, the number of network stations, the generation rate applications, the number of frames transmitted per token holding time, frame length was developed. Originality. The technique of network simulation reflecting its work in the steady condition and during the control procedures, the mechanism of priority ranking and handling was proposed. Practical value. Defining network characteristics in the real-time systems on railway transport based on the developed simulation model.

  8. Repeated exposure to media violence is associated with diminished response in an inhibitory frontolimbic network.

    Directory of Open Access Journals (Sweden)

    Christopher R Kelly

    Full Text Available BACKGROUND: Media depictions of violence, although often claimed to induce viewer aggression, have not been shown to affect the cortical networks that regulate behavior. METHODOLOGY/PRINCIPAL FINDINGS: Using functional magnetic resonance imaging (fMRI, we found that repeated exposure to violent media, but not to other equally arousing media, led to both diminished response in right lateral orbitofrontal cortex (right ltOFC and a decrease in right ltOFC-amygdala interaction. Reduced function in this network has been previously associated with decreased control over a variety of behaviors, including reactive aggression. Indeed, we found reduced right ltOFC responses to be characteristic of those subjects that reported greater tendencies toward reactive aggression. Furthermore, the violence-induced reduction in right ltOFC response coincided with increased throughput to behavior planning regions. CONCLUSIONS: These novel findings establish that even short-term exposure to violent media can result in diminished responsiveness of a network associated with behaviors such as reactive aggression.

  9. Partial Interference and Its Performance Impact on Wireless Multiple Access Networks

    Directory of Open Access Journals (Sweden)

    Lau WingCheong

    2010-01-01

    Full Text Available To determine the capacity of wireless multiple access networks, the interference among the wireless links must be accurately modeled. In this paper, we formalize the notion of the partial interference phenomenon observed in many recent wireless measurement studies and establish analytical models with tractable solutions for various types of wireless multiple access networks. In particular, we characterize the stability region of IEEE 802.11 networks under partial interference with two potentially unsaturated links numerically. We also provide a closed-form solution for the stability region of slotted ALOHA networks under partial interference with two potentially unsaturated links and obtain a partial characterization of the boundary of the stability region for the general M-link case. Finally, we derive a closed-form approximated solution for the stability region for general M-link slotted ALOHA system under partial interference effects. Based on our results, we demonstrate that it is important to model the partial interference effects while analyzing wireless multiple access networks. This is because such considerations can result in not only significant quantitative differences in the predicted system capacity but also fundamental qualitative changes in the shape of the stability region of the systems.

  10. a Fractal Network Model for Fractured Porous Media

    Science.gov (United States)

    Xu, Peng; Li, Cuihong; Qiu, Shuxia; Sasmito, Agus Pulung

    2016-04-01

    The transport properties and mechanisms of fractured porous media are very important for oil and gas reservoir engineering, hydraulics, environmental science, chemical engineering, etc. In this paper, a fractal dual-porosity model is developed to estimate the equivalent hydraulic properties of fractured porous media, where a fractal tree-like network model is used to characterize the fracture system according to its fractal scaling laws and topological structures. The analytical expressions for the effective permeability of fracture system and fractured porous media, tortuosity, fracture density and fraction are derived. The proposed fractal model has been validated by comparisons with available experimental data and numerical simulation. It has been shown that fractal dimensions for fracture length and aperture have significant effect on the equivalent hydraulic properties of fractured porous media. The effective permeability of fracture system can be increased with the increase of fractal dimensions for fracture length and aperture, while it can be remarkably lowered by introducing tortuosity at large branching angle. Also, a scaling law between the fracture density and fractal dimension for fracture length has been found, where the scaling exponent depends on the fracture number. The present fractal dual-porosity model may shed light on the transport physics of fractured porous media and provide theoretical basis for oil and gas exploitation, underground water, nuclear waste disposal and geothermal energy extraction as well as chemical engineering, etc.

  11. Design mobile satellite system architecture as an integral part of the cellular access digital network

    Science.gov (United States)

    Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.

    1988-01-01

    The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.

  12. Service Class Resource Management For Green Wireless-Optical Broadband Access NetworksWOBAN

    Directory of Open Access Journals (Sweden)

    SRUTHY.S

    2015-08-01

    Full Text Available Abstract-Broadband access networks have become an essential part of worldwide communication systems because of the exponential growth of broadband services such as video on demand high definition TV internet protocol TV and video conferencing. Exponential growth in the volume of wireless data boosted by the growing popularity of mobile devices such as smartphone and tablets has forced the telecommunication industries to rethink the way networks are currently designed and to focus on the development of high-capacity mobile broadband networks. In response to this challenge researchers have been working toward the development of an integrated wireless optical broadband access network. Two major candidate technologies which are currently known for their high capacity as well as quality of service QoS for multimedia traffic are passive optical networks PON and fourth generation 4G wireless networks. PON is a wired access technology well known for its cost efficiency and high capacity whereas 4G is a wireless broadband access technology which has achieved broad market acceptance because of its ease of deployment ability to offer mobility and its cost efficiency. Integration of PON and 4G technologies in the form of wireless-optical broadband access networks offers advantages such as extension of networks in rural areas support for mobile broadband services and quick deployment of broadband networks. These two technologies however have different design architectures for handling broadband services that require quality of service. For example 4G networks use traffic classification for supporting different QoS demands whereas the PON architecture has no such mechanism to differentiate between types of traffic. These two technologies also differ in their power saving mechanisms. Propose a service class mapping for the integrated PON-4G network which is based on the MG1 queuing model and class-based power saving mechanism which significantly improves the

  13. Hopping control channel MAC protocol for opportunistic spectrum access networks

    Institute of Scientific and Technical Information of China (English)

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  14. Research and Design of Dynamic Migration Access Control Technology Based on Heterogeneous Network

    Directory of Open Access Journals (Sweden)

    Wang Feng

    2017-01-01

    Full Text Available With the continuous development of wireless networks, the amount of privacy services in heterogeneous mobile networks is increasing, such as information storage, user access, and so on. Access control security issues for heterogeneous mobile radio network, this paper proposes a dynamic migration access control technology based on heterogeneous network. Through the system architecture of the mutual trust system, we can understand the real-time mobile node failure or abnormal state. To make the service can be terminated for the node. And adopt the 802.1X authentication way to improve the security of the system. Finally, it by combining the actual running test data, the trust update algorithm of the system is optimized to reduce the actual security threats in the environment. Experiments show that the system’s anti-attack, the success rate of access, bit error rate is in line with the expected results. This system can effectively reduce the system authentication information is illegally obtained after the network security protection mechanism failure and reduce the risk of user data leakage.

  15. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP

    Directory of Open Access Journals (Sweden)

    Dan Garcia-Carrillo

    2017-11-01

    Full Text Available The Internet-of-Things (IoT landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN, the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP, which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA infrastructures and the Extensible Authentication Protocol (EAP protocol. For this integration, we use the Constrained Application Protocol (CoAP to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  16. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.

    Science.gov (United States)

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-11-17

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  17. Access to mass media messages, and use of family planning in Nigeria: a spatio-demographic analysis from the 2013 DHS

    Directory of Open Access Journals (Sweden)

    Chukwuedozie K. Ajaero

    2016-05-01

    Full Text Available Abstract Background Nigeria has the highest population in sub-Saharan Africa with high birth and growth rates. There is therefore need for family planning to regulate and stabilize this population. This study examined the relationship between access to mass media messages on family planning and use of family planning in Nigeria. It also investigated the impacts of spatio-demographic variables on the relationship between access to mass media messages and use of family planning. Methods Data from the 2013 demographic and health survey of Nigeria which was conducted in all the 36 states of Nigeria, and Abuja were used for the study. The sample was weighted to ensure representativeness. Univariate, bivariate and binary logistic regressions were conducted. The relationship between each of the access to mass media messages, and the family planning variables were determined with Pearson correlation analysis. Results The correlation results showed significant but weak direct relationships between the access to mass media messages and use of family planning at p < 0.0001 with access to television messages (r = 0.239 being associated with highest use of family planning. Some of the results of the adjusted regression analysis showed that access to television messages (OR = 1.2.225; p < 0.0001, and radio messages (OR = 1.945; p < 0.0001 increase the likelihood of the use of family planning. The adjusted regression model also indicated increased likelihood in the use of family planning by respondents with secondary education (OR = 2.709; p < 0.0001, the married (OR = 1.274; p < 0.001, and respondents within the highest wealth quintiles (OR = 3.442; p < 0.0001. Conclusions There exist significant variations within spatio-demographic groups with regards to having access to mass media messages on family planning, and on the use of family planning. The results showed that access to mass media messages increases the

  18. Effects Of Social Networking Sites (SNSs) On Hyper Media Computer Mediated Environments (HCMEs)

    OpenAIRE

    Yoon C. Cho

    2011-01-01

    Social Networking Sites (SNSs) are known as tools to interact and build relationships between users/customers in Hyper Media Computer Mediated Environments (HCMEs). This study explored how social networking sites play a significant role in communication between users. While numerous researchers examined the effectiveness of social networking websites, few studies investigated which factors affected customers attitudes and behavior toward social networking sites. In this paper, the authors inv...

  19. Computer network access to scientific information systems for minority universities

    Science.gov (United States)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  20. OSoMe: the IUNI observatory on social media

    Directory of Open Access Journals (Sweden)

    Clayton A. Davis

    2016-10-01

    Full Text Available The study of social phenomena is becoming increasingly reliant on big data from online social networks. Broad access to social media data, however, requires software development skills that not all researchers possess. Here we present the IUNI Observatory on Social Media, an open analytics platform designed to facilitate computational social science. The system leverages a historical, ongoing collection of over 70 billion public messages from Twitter. We illustrate a number of interactive open-source tools to retrieve, visualize, and analyze derived data from this collection. The Observatory, now available at osome.iuni.iu.edu, is the result of a large, six-year collaborative effort coordinated by the Indiana University Network Science Institute.

  1. Upgrade of hybrid fibre coax networks towards bi-directional access

    NARCIS (Netherlands)

    Khoe, G.D.; Wolters, R.P.C.; Boom, van den H.P.A.; Prati, G.

    1997-01-01

    In this paper we describe an upgrade scenario for Hybrid Fibre Coax (HFC) CATV Networks towards hi-directional access. The communication system described has been newly designed, and is based on the use of Direct Sequence- Code Division Multiple-Access (DS-CDMA). Due to its spread-spectrum

  2. The influence of repressive legislation on the structure of a social media network

    OpenAIRE

    Marcoux, Marianne; Lusseau, David

    2013-01-01

    Social media have been widely used to organize citizen movements. In 2012, 75% university and college students in Quebec, Canada, participated in mass protests against an increase in tuition fees, mainly organized using social media. To reduce public disruption, the government introduced special legislation designed to impede protest organization. Here, we show that the legislation changed the behaviour of social media users but not the overall structure of their social network on Twitter. Th...

  3. Opinion dynamics on interacting networks: media competition and social influence.

    Science.gov (United States)

    Quattrociocchi, Walter; Caldarelli, Guido; Scala, Antonio

    2014-05-27

    The inner dynamics of the multiple actors of the informations systems - i.e, T.V., newspapers, blogs, social network platforms, - play a fundamental role on the evolution of the public opinion. Coherently with the recent history of the information system (from few main stream media to the massive diffusion of socio-technical system), in this work we investigate how main stream media signed interaction might shape the opinion space. In particular we focus on how different size (in the number of media) and interaction patterns of the information system may affect collective debates and thus the opinions' distribution. We introduce a sophisticated computational model of opinion dynamics which accounts for the coexistence of media and gossip as separated mechanisms and for their feedback loops. The model accounts also for the effect of the media communication patterns by considering both the simple case where each medium mimics the behavior of the most successful one (to maximize the audience) and the case where there is polarization and thus competition among media memes. We show that plurality and competition within information sources lead to stable configurations where several and distant cultures coexist.

  4. Opinion dynamics on interacting networks: media competition and social influence

    Science.gov (United States)

    Quattrociocchi, Walter; Caldarelli, Guido; Scala, Antonio

    2014-05-01

    The inner dynamics of the multiple actors of the informations systems - i.e, T.V., newspapers, blogs, social network platforms, - play a fundamental role on the evolution of the public opinion. Coherently with the recent history of the information system (from few main stream media to the massive diffusion of socio-technical system), in this work we investigate how main stream media signed interaction might shape the opinion space. In particular we focus on how different size (in the number of media) and interaction patterns of the information system may affect collective debates and thus the opinions' distribution. We introduce a sophisticated computational model of opinion dynamics which accounts for the coexistence of media and gossip as separated mechanisms and for their feedback loops. The model accounts also for the effect of the media communication patterns by considering both the simple case where each medium mimics the behavior of the most successful one (to maximize the audience) and the case where there is polarization and thus competition among media memes. We show that plurality and competition within information sources lead to stable configurations where several and distant cultures coexist.

  5. DiffServ resource management in IP-based radio access networks

    NARCIS (Netherlands)

    Heijenk, Geert; Karagiannis, Georgios; Rexhepi, Vlora; Westberg, Lars; prof.dr. Prasad, R.; prof.dr. Bach Andersen, J.

    2001-01-01

    The increasing popularity of the Internet, the flexibility of IP, and the wide deployment of IP technologies, as well as the growth of mobile communications have driven the development of IP-based solutions for wireless networking. The introduction of IP-based transport in Radio Access Networks

  6. Academic e-learning experience in the enhancement of open access audiovisual and media education

    OpenAIRE

    Pacholak, Anna; Sidor, Dorota

    2015-01-01

    The paper presents how the academic e-learning experience and didactic methods of the Centre for Open and Multimedia Education (COME UW), University of Warsaw, enhance the open access to audiovisual and media education at various levels of education. The project is implemented within the Audiovisual and Media Education Programme (PEAM). It is funded by the Polish Film Institute (PISF). The aim of the project is to create a proposal of a comprehensive and open programme for the audiovisual (me...

  7. Spatial Tiling and Streaming in an Immersive Media Delivery Network

    NARCIS (Netherlands)

    Niamut, O.A.; Prins, M.J.; Brandenburg, R. van; Havekes, A.

    2011-01-01

    Within the EU FP7 project FascinatE, a capture, production and delivery system capable of supporting pan/tilt/zoom interaction with immersive media is being developed. Intelligent networks with processing components are needed to repurpose the content to suit different device types and framing

  8. Young people's comfort receiving sexual health information via social media and other sources.

    Science.gov (United States)

    Lim, Megan Sc; Vella, Alyce; Sacks-Davis, Rachel; Hellard, Margaret E

    2014-12-01

    Social media are growing in popularity and will play a key role in future sexual health promotion initiatives. We asked 620 survey participants aged 16 to 29 years about their time spent using social media and their comfort in receiving information about sexual health via different channels. Median hours per day spent using social network sites was two; 36% spent more than 2 hours per day using social network sites. In multivariable logistic regression, being aged less than 20 years and living in a major city (compared to rural/regional Australia) were associated with use of social media more than 2 hours per day. Most participants reported being comfortable or very comfortable accessing sexual health information from websites (85%), followed by a doctor (81%), school (73%), and the mainstream media (67%). Fewer reported being comfortable getting information from social media; Facebook (52%), apps (51%), SMS (44%), and Twitter (36%). Several health promotion programmes via social media have demonstrated efficacy; however, we have shown that many young people are not comfortable with accessing sexual health information through these channels. Further research is needed to determine how to best take advantage of these novel opportunities for health promotion. © The Author(s) 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  9. Knowledge Access in Rural Inter-connected Areas Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... and indigenous knowledge using information and communication technologies (ICTs) ... for research proposals on the aforementioned topics, action-research projects, ... Evaluating knowledge-sharing methods to improve land utilization and ...

  10. Optical code-division multiple-access networks

    Science.gov (United States)

    Andonovic, Ivan; Huang, Wei

    1999-04-01

    This review details the approaches adopted to implement classical code division multiple access (CDMA) principles directly in the optical domain, resulting in all optical derivatives of electronic systems. There are a number of ways of realizing all-optical CDMA systems, classified as incoherent and coherent based on spreading in the time and frequency dimensions. The review covers the basic principles of optical CDMA (OCDMA), the nature of the codes used in these approaches and the resultant limitations on system performance with respect to the number of stations (code cardinality), the number of simultaneous users (correlation characteristics of the families of codes), concluding with consideration of network implementation issues. The latest developments will be presented with respect to the integration of conventional time spread codes, used in the bulk of the demonstrations of these networks to date, with wavelength division concepts, commonplace in optical networking. Similarly, implementations based on coherent correlation with the aid of a local oscillator will be detailed and comparisons between approaches will be drawn. Conclusions regarding the viability of these approaches allowing the goal of a large, asynchronous high capacity optical network to be realized will be made.

  11. Virus spreading in wireless sensor networks with a medium access control mechanism

    International Nuclear Information System (INIS)

    Wang Ya-Qi; Yang Xiao-Yuan

    2013-01-01

    In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. (general)

  12. Switched-based interference reduction scheme for open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh; Alouini, Mohamed-Slim

    2012-01-01

    coordination between access points is infeasible. This paper targets interference management in such overlaid networks. It is assumed that the femtocells employ the open-access strategy to reduce cross-tier interference, and can share resources concurrently

  13. Energy efficiency for cloud-radio access networks with imperfect channel state information

    KAUST Repository

    Al-Oquibi, Bayan; Amin, Osama; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2016-01-01

    metric in next generation wireless systems (5G). Cloud radio access network (C-RAN), a promising 5G network architecture, provides an efficient framework for improving the EE performance, by means of coordinating the transmission across the network

  14. Energy Saving Scheme Based On Traffic Forwarding For Optical Fiber Access Networks

    DEFF Research Database (Denmark)

    Lopez, G. Arturo Rodes; Estaran Tolosa, Jose Manuel; Vegas Olmos, Juan José

    2013-01-01

    We report on an energy saving block that regroups and powers off OLTs during low traffic periods, resulting in energy savings up to 87,5% in the central office of optical access networks.......We report on an energy saving block that regroups and powers off OLTs during low traffic periods, resulting in energy savings up to 87,5% in the central office of optical access networks....

  15. PROXY-BASED PATCHING STREAM TRANSMISSION STRATEGY IN MOBILE STREAMING MEDIA SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Liao Jianxin; Lei Zhengxiong; Ma Xutao; Zhu Xiaomin

    2006-01-01

    A mobile transmission strategy, PMPatching (Proxy-based Mobile Patching) transmission strategy is proposed, it applies to the proxy-based mobile streaming media system in Wideband Code Division Multiple Access (WCDMA) network. Performance of the whole system can be improved by using patching stream to transmit anterior part of the suffix that had been played back, and by batching all the demands for the suffix arrived in prefix period and patching stream transmission threshold period. Experimental results show that this strategy can efficiently reduce average network transmission cost and number of channels consumed in central streaming media server.

  16. Social Media for Enhancing Stakeholders' Innovation Networks in Ontario, Canada

    NARCIS (Netherlands)

    Kaushik, Pawandeep; Chowdhuy, Ataharul; Hambly Odame, Helen; Passen, van Annemarie

    2018-01-01

    This case study assessed local food stakeholders' use of Facebook and Twitter to support interaction and build their networks of innovation in Ontario. Data were collected using Netlytic − an online data mining tool from the social media platforms − and key informant interviews. Findings revealed

  17. Highly Reliable PON Optical Splitters for Optical Access Networks in Outside Environments

    Science.gov (United States)

    Watanabe, Hiroshi; Araki, Noriyuki; Fujimoto, Hisashi

    Broadband optical access services are spreading throughout the world, and the number of fiber to the home (FTTH) subscribers is increasing rapidly. Telecom operators are constructing passive optical networks (PONs) to provide optical access services. Externally installed optical splitters for PONs are very important passive devices in optical access networks, and they must provide satisfactory performance as outdoor plant over long periods. Therefore, we calculate the failure rate of optical access networks and assign a failure rate to the optical splitters in optical access networks. The maximum cumulative failure rate of 1 × 8 optical splitters was calculated as 0.025 for an optical access fiber length of 2.1km and a 20-year operating lifetime. We examined planar lightwave circuit (PLC) type optical splitters for use as outside plant in terms of their optical characteristics and environmental reliability. We confirmed that PLC type optical splitters have sufficient optical performance for a PON splitter and sufficient reliability as outside plant in accordance with ITU-T standard values. We estimated the lifetimes of three kinds of PLC type optical splitters by using accelerated aging tests. The estimated failure rate of these splitters installed in optical access networks was below the target value for the cumulative failure rate, and we confirmed that they have sufficient reliability to maintain the quality of the network service. We developed 1 × 8 optical splitter modules with plug and socket type optical connectors and optical fiber cords for optical aerial closures designed for use as outside plant. These technologies make it easy to install optical splitters in an aerial optical closure. The optical splitter modules have sufficient optical performance levels for PONs because the insertion loss at the commercially used wavelengths of 1.31 and 1.55µm is less than the criterion established by ITU-T Recommendation G.671 for optical splitters. We performed a

  18. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Science.gov (United States)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  19. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  20. INOVASI MEDIA PEMBELAJARAN KEARSIPAN ELECTRONIK ARSIP (E-ARSIP BERBASIS MICROSOFT OFFICE ACCESS

    Directory of Open Access Journals (Sweden)

    Ahmad Saeroji

    2014-12-01

    Full Text Available Microsoft Office Access (Ms Access is a database management system which is a Relational Database Management System. The database in Microsoft Access is a set of objects consisting of tables, queries, forms, reports. Archival system is basically to store useful various files for organizations with the specific rules so the files can be found quickly and easily. Therefore; Microsoft Office Access is an appropriate breakthrough to build archival application systems based on Microsoft Office Access. It is not only easy to be operated but also available a package of Microsoft Office program. One of the most important benefits of the database is to facilitate the access to the data. The ease of accessing the data is the implication of the order data since it is the prerequisite of a good database. The database of archiving system is an application or system design which allows the archives storage digitally. The objective of the e-archives application program using Microsoft Access is to facilitate the delivery of material practices of electronic filing (e-archives. The purposes of the scientific study are: (1 to determine the basic concept and scope of Electronic archives (e-archives, (2 To know how to use the media of electronic archives (E-archives aided Microsoft Office Access in the learning activities for Vocational students of Office Administration program.

  1. INOVASI MEDIA PEMBELAJARAN KEARSIPAN ELECTRONIK ARSIP (E-ARSIP BERBASIS MICROSOFT OFFICE ACCESS

    Directory of Open Access Journals (Sweden)

    Ahmad Saeroji

    2016-01-01

    Full Text Available Microsoft Office Access (Ms Access is a database management system which is a Relational Database Management System. The database in Microsoft Access is a set of objects consisting of tables, queries, forms, reports. Archival system is basically to store useful various files for organizations with the specific rules so the files can be found quickly and easily. Therefore; Microsoft Office Access is an appropriate breakthrough to build archival application systems based on Microsoft Office Access. It is not only easy to be operated but also available a package of Microsoft Office program. One of the most important benefits of the database is to facilitate the access to the data. The ease of accessing the data is the implication of the order data since it is the prerequisite of a good database. The database of archiving system is an application or system design which allows the archives storage digitally. The objective of the e-archives application program using Microsoft Access is to facilitate the delivery of material practices of electronic filing (e-archives. The purposes of the scientific study are: (1 to determine the basic concept and scope of Electronic archives (e-archives, (2 To know how to use the media of electronic archives (E-archives aided Microsoft Office Access in the learning activities for Vocational students of Office Administration program.

  2. Future Scenarios for Software-Defined Metro and Access Networks and Software-Defined Photonics

    Directory of Open Access Journals (Sweden)

    Tommaso Muciaccia

    2017-01-01

    Full Text Available In recent years, architectures, devices, and components in telecommunication networks have been challenged by evolutionary and revolutionary factors which are drastically changing the traffic features. Most of these changes imply the need for major re-configurability and programmability not only in data-centers and core networks, but also in the metro-access segment. In a wide variety of contexts, this necessity has been addressed by the proposed introduction of the innovative paradigm of software-defined networks (SDNs. Several solutions inspired by the SDN model have been recently proposed also for metro and access networks, where the adoption of a new generation of software-defined reconfigurable integrated photonic devices is highly desirable. In this paper, we review the possible future application scenarios for software-defined metro and access networks and software-defined photonics (SDP, on the base of analytics, statistics, and surveys. This work describes the reasons underpinning the presented radical change of paradigm and summarizes the most significant solutions proposed in literature, with a specific emphasis to physical-layer reconfigurable networks and a focus on both architectures and devices.

  3. Brain network: social media and the cognitive scientist.

    Science.gov (United States)

    Stafford, Tom; Bell, Vaughan

    2012-10-01

    Cognitive scientists are increasingly using online social media, such as blogging and Twitter, to gather information and disseminate opinion, while linking to primary articles and data. Because of this, internet tools are driving a change in the scientific process, where communication is characterised by rapid scientific discussion, wider access to specialist debates, and increased cross-disciplinary interaction. This article serves as an introduction to and overview of this transformation. Copyright © 2012 Elsevier Ltd. All rights reserved.

  4. A CyberCIEGE Traffic Analysis Extension for Teaching Network Security

    Science.gov (United States)

    2011-12-01

    Information Technology LAN Local Area Network MAADNET Military Academy Attack/Defense Network MAC Media Access Control MMORPG Massively...ready to launch its latest massively multiplayer online role-playing game ( MMORPG ) “SyberSIEGE”! The product is currently in the final stages of

  5. The Design of Passive Optical Networking+Ethernet over Coaxial Cable Access Networking and Video-on-Demand Services Carrying

    Science.gov (United States)

    Ji, Wei

    2013-07-01

    Video on demand is a very attractive service used for entertainment, education, and other purposes. The design of passive optical networking+Ethernet over coaxial cable accessing and a home gateway system is proposed. The network integrates the passive optical networking and Ethernet over coaxial cable to provide high dedicated bandwidth for the metropolitan video-on-demand services. Using digital video broadcasting, IP television protocol, unicasting, and broadcasting mechanisms maximizes the system throughput. The home gateway finishes radio frequency signal receiving and provides three kinds of interfaces for high-definition video, voice, and data, which achieves triple-play and wire/wireless access synchronously.

  6. An access alternative for mobile satellite networks

    Science.gov (United States)

    Wu, W. W.

    1988-01-01

    Conceptually, this paper discusses strategies of digital satellite communication networks for a very large number of low density traffic stations. These stations can be either aeronautical, land mobile, or maritime. The techniques can be applied to international, domestic, regional, and special purpose satellite networks. The applications can be commercial, scientific, military, emergency, navigational or educational. The key strategy is the use of a non-orthogonal access method, which tolerates overlapping signals. With n being either time or frequency partitions, and with a single overlapping signal allowed, a low cost mobile satellite system can be designed with n squared (n squared + n + 1) number of terminals.

  7. Power Allocation and Outage Probability Analysis for SDN-based Radio Access Networks

    Science.gov (United States)

    Zhao, Yongxu; Chen, Yueyun; Mai, Zhiyuan

    2018-01-01

    In this paper, performance of Access network Architecture based SDN (Software Defined Network) is analyzed with respect to the power allocation issue. A power allocation scheme PSO-PA (Particle Swarm Optimization-power allocation) algorithm is proposed, the proposed scheme is subjected to constant total power with the objective of minimizing system outage probability. The entire access network resource configuration is controlled by the SDN controller, then it sends the optimized power distribution factor to the base station source node (SN) and the relay node (RN). Simulation results show that the proposed scheme reduces the system outage probability at a low complexity.

  8. Understanding the tariff. Access to the public power transportation network

    International Nuclear Information System (INIS)

    2002-01-01

    Since the European directive of December 19, 1996 about the common rules of the European power market, the eligible companies can chose their power supplier anywhere in Europe. The manager of the French power transportation network (RTE) supplies a network access to these companies according to a tariff fixed by the decree no. 2002-1014 from July 19, 2002. The aim of this document is to explain this tariff: tariffing principles ('mail-stamp' principle, voltage domain, subscribed output power tariffs, input power tariffs), tariffing elements (access to the grid, elements of output tariffs (subscribed power, overload, emergency tariffs, modifications etc..)), invoicing modalities, output tariffs, definitions. (J.S.)

  9. Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    Science.gov (United States)

    Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  10. Social Sensor Analytics: Making Sense of Network Models in Social Media

    Energy Technology Data Exchange (ETDEWEB)

    Dowling, Chase P.; Harrison, Joshua J.; Sathanur, Arun V.; Sego, Landon H.; Corley, Courtney D.

    2015-07-27

    Social networks can be thought of as noisy sensor networks mapping real world information to the web. Owing to the extensive body of literature in sensor network analysis, this work sought to apply several novel and traditional methods in sensor network analysis for the purposes of efficiently interrogating social media data streams from raw data. We carefully revisit our definition of a social media signal from previous work both in terms of time-varying features within the data and the networked nature of the medium. Further, we detail our analysis of global patterns in Twitter over the months of November 2013 and June 2014, detect and categorize events, and illustrate how these analyses can be used to inform graph-based models of Twitter, namely using a recent network influence model called PhySense: similar to PageRank but tuned to behavioral analysis by leveraging a sociologically inspired probabilistic model. We ultimately identify forms of information dissemination via analysis of time series and dynamic graph spectra and corroborate these findings through manual investigation of the data as a requisite step in modeling the diffusion process with PhySense. We hope to sufficiently characterize global behavior in a medium such as Twitter as a means of learning global model parameters one may use to predict or simulate behavior on a large scale. We have made our time series and dynamic graph analytical code available via a GitHub repository https://github.com/cpatdowling/salsa and our data are available upon request.

  11. Public Access; Public Interest. The Network Project. Notebook Number 11.

    Science.gov (United States)

    Columbia Univ., New York, NY. Network Project.

    The transcript of a panel discussion and an essay on public access to and control of society's information resources are presented. It is contended that the electronic Media--including radio, television, and communication satellites--are controlled by a select group of individuals and corporations and that they are not meeting the public interest.…

  12. Network Asymmetries and Access Pricing in Cellular Telecommunications

    NARCIS (Netherlands)

    V. Kocsis

    2005-01-01

    textabstractNetwork shares and retail prices are not symmetric in the telecommunications market with multiple bottlenecks which give rise to new questions of access fee regulation. In this paper we consider a model with two types of asymmetry arising from different entry timing, i.e. a larger

  13. Accessing Wireless Sensor Networks Via Dynamically Reconfigurable Interaction Models

    Directory of Open Access Journals (Sweden)

    Maria Cecília Gomes

    2012-12-01

    Full Text Available The Wireless Sensor Networks (WSNs technology is already perceived as fundamental for science across many domains, since it provides a low cost solution for environment monitoring. WSNs representation via the service concept and its inclusion in Web environments, e.g. through Web services, supports particularly their open/standard access and integration. Although such Web enabled WSNs simplify data access, network parameterization and aggregation, the existing interaction models and run-time adaptation mechanisms available to clients are still scarce. Nevertheless, applications increasingly demand richer and more flexible accesses besides the traditional client/server. For instance, applications may require a streaming model in order to avoid sequential data requests, or the asynchronous notification of subscribed data through the publish/subscriber. Moreover, the possibility to automatically switch between such models at runtime allows applications to define flexible context-based data acquisition. To this extent, this paper discusses the relevance of the session and pattern abstractions on the design of a middleware prototype providing richer and dynamically reconfigurable interaction models to Web enabled WSNs.

  14. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed.......We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  15. Fast Distributed Dynamics of Semantic Networks via Social Media

    Directory of Open Access Journals (Sweden)

    Facundo Carrillo

    2015-01-01

    Full Text Available We investigate the dynamics of semantic organization using social media, a collective expression of human thought. We propose a novel, time-dependent semantic similarity measure (TSS, based on the social network Twitter. We show that TSS is consistent with static measures of similarity but provides high temporal resolution for the identification of real-world events and induced changes in the distributed structure of semantic relationships across the entire lexicon. Using TSS, we measured the evolution of a concept and its movement along the semantic neighborhood, driven by specific news/events. Finally, we showed that particular events may trigger a temporary reorganization of elements in the semantic network.

  16. Formal Specification and Validation of Secure Connection Establishment in a Generic Access Network Scenario

    DEFF Research Database (Denmark)

    Fleischer, Paul; Kristensen, Lars Michael

    2008-01-01

    The Generic Access Network (GAN) architecture is defined by the 3rd Generation Partnership Project (3GPP), and allows telephone services, such as SMS and voice-calls, to be accessed via generic IP networks. The main usage of this is to allow mobile phones to use WiFi in addition to the usual GSM...... network. The GAN specification relies on the Internet Protocol Security layer (IPSec) and the Internet Key Exchange protocol (IKEv2) to provide encryption across IP networks, and thus avoid compromising the security of the telephone networks. The detailed usage of these two Internet protocols (IPSec...

  17. Civic Engagement through Digital Citizenship: Engaging Youth in Active, Participatory Citizenship through Digital Media. The Progress of Education Reform. Volume 13, Number 1

    Science.gov (United States)

    Baumann, Paul

    2012-01-01

    Participatory digital media--broadly defined as media such as the Internet, social network sites and cell phones that allow users to interact--are ubiquitous among today's youth. Among teens ages 12-17, 95% have access to the Internet; 70% go online daily; 80% use social networking sites such as Facebook and Twitter; and 77% have cell phones. Many…

  18. Responses to a self-presented suicide attempt in social media: a social network analysis.

    Science.gov (United States)

    Fu, King-Wa; Cheng, Qijin; Wong, Paul W C; Yip, Paul S F

    2013-01-01

    The self-presentation of suicidal acts in social media has become a public health concern. This article centers on a Chinese microblogger who posted a wrist-cutting picture that was widely circulated in Chinese social media in 2011. This exploratory study examines written reactions of a group of Chinese microbloggers exposed to the post containing a self-harming message and photo. In addition, we investigate the pattern of information diffusion via a social network. We systematically collected and analyzed 5,971 generated microblogs and the network of information diffusion. We found that a significant portion of written responses (36.6%) could help vulnerable netizens by providing peer-support and calls for help. These responses were reposted and diffused via an online social network with markedly more clusters of users--and at a faster pace-- than a set of randomly generated networks. We conclude that social media can be a double-edged sword: While it may contagiously affect others by spreading suicidal thoughts and acts, it may also play a positive role by assisting people at risk for suicide, providing rescue or support. More research is needed to learn how suicidally vulnerable people interact with online suicide information, and how we can effectively intervene.

  19. Greening radio access networks using distributed base station architectures

    DEFF Research Database (Denmark)

    Kardaras, Georgios; Soler, José; Dittmann, Lars

    2010-01-01

    Several actions for developing environmentally friendly technologies have been taken in most industrial fields. Significant resources have also been devoted in mobile communications industry. Moving towards eco-friendly alternatives is primarily a social responsibility for network operators....... However besides this, increasing energy efficiency represents a key factor for reducing operating expenses and deploying cost effective mobile networks. This paper presents how distributed base station architectures can contribute in greening radio access networks. More specifically, the advantages...... energy saving. Different subsystems have to be coordinated real-time and intelligent network nodes supporting complicated functionalities are necessary. Distributed base station architectures are ideal for this purpose mainly because of their high degree of configurability and self...

  20. Community access networks: how to connect the next billion to the ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Community access networks: how to connect the next billion to the Internet. Despite recent progress with mobile technology diffusion, more than four billion people worldwide are unconnected and have limited access to global communication infrastructure. The cost of implementing connectivity infrastructure in underserved ...

  1. Geo-Spatial Social Network Analysis of Social Media to Mitigate Disasters

    Science.gov (United States)

    Carley, K. M.

    2017-12-01

    Understanding the spatial layout of human activity can afford a better understanding many phenomena - such as local cultural, the spread of ideas, and the scope of a disaster. Today, social media is one of the key sensors for acquiring information on socio-cultural activity, some with cues as to the geo-location. We ask, What can be learned by putting such data on maps? For example, are people who chat on line more likely to be near each other? Can Twitter data support disaster planning or early warning? In this talk, such issues are examined using data collected via Twitter and analyzed using ORA. ORA is a network analysis and visualization system. It supports not just social networks (who is interacting with whom), but also high dimensional networks with many types of nodes (e.g. people, organizations, resources, activities …) and relations, geo-spatial network analysis, dynamic network analysis, & geo-temporal analysis. Using ORA lessons learned from five case studies are considered: Arab Spring, Tsunami warning in Padang Indonesia, Twitter around Fukushima in Japan, Typhoon Haiyan (Yolanda), & regional conflict. Using Padang Indonesia data, we characterize the strengths and limitations of social media data to support disaster planning & early warning, identify at risk areas & issues of concern, and estimate where people are and which areas are impacted. Using Fukushima Japanese data, social media is used to estimate geo-spatial regularities in movement and communication that can inform disaster response and risk estimation. Using Arab Spring data, we find that the spread of bots & extremists varies by country and time, to the extent that using twitter to understand who is important or what ideas are critical can be compromised. Bots and extremists can exploit disaster messaging to create havoc and facilitate criminal activity e.g. human trafficking. Event discovery mechanisms support isolating geo-epi-centers for key events become crucial. Spatial inference

  2. Resource Allocation for Cloud Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama

    2016-04-01

    Cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio system. In CRANs, joint signal processing is performed at multiple cloud computing centers (clouds) that are connected to several base stations (BSs) via high capacity backhaul links. As a result, large-scale interference management and network power consumption reduction can be effectively achieved. Unlike recent works on CRANs which consider a single cloud processing and treat inter-cloud interference as background noise, the first part of this thesis focuses on the more practical scenario of the downlink of a multi-cloud radio access network where BSs are connected to each cloud through wireline backhaul links. Assume that each cloud serves a set of pre-known single-antenna mobile users (MUs). This part focuses on minimizing the network total power consumption subject to practical constraints. The problems are solved using sophisticated techniques from optimization theory (e.g. Dual Decomposition-based algorithm and the alternating direction method of multipliers (ADMM)-based algorithm). One highlight of this part is that the proposed solutions can be implemented in a distributed fashion by allowing a reasonable information exchange between the coupled clouds. Additionally, feasible solutions of the considered optimization problems can be estimated locally at each iteration. Simulation results show that the proposed distributed algorithms converge to the centralized algorithms in a reasonable number of iterations. To further account of the backhaul congestion due to densification in CRANs, the second part of this thesis considers the downlink of a cache-enabled CRAN where each BS is equipped with a local-cache with limited size used to store the popular files without the need for backhauling. Further, each cache-enabled BS is connected to the cloud via limited capacity backhaul link and can serve a set of pre-known single antenna MUs. This part

  3. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  4. Efficient traffic grooming with dynamic ONU grouping for multiple-OLT-based access network

    Science.gov (United States)

    Zhang, Shizong; Gu, Rentao; Ji, Yuefeng; Wang, Hongxiang

    2015-12-01

    Fast bandwidth growth urges large-scale high-density access scenarios, where the multiple Passive Optical Networking (PON) system clustered deployment can be adopted as an appropriate solution to fulfill the huge bandwidth demands, especially for a future 5G mobile network. However, the lack of interaction between different optical line terminals (OLTs) results in part of the bandwidth resources waste. To increase the bandwidth efficiency, as well as reduce bandwidth pressure at the edge of a network, we propose a centralized flexible PON architecture based on Time- and Wavelength-Division Multiplexing PON (TWDM PON). It can provide flexible affiliation for optical network units (ONUs) and different OLTs to support access network traffic localization. Specifically, a dynamic ONU grouping algorithm (DGA) is provided to obtain the minimal OLT outbound traffic. Simulation results show that DGA obtains an average 25.23% traffic gain increment under different OLT numbers within a small ONU number situation, and the traffic gain will increase dramatically with the increment of the ONU number. As the DGA can be deployed easily as an application running above the centralized control plane, the proposed architecture can be helpful to improve the network efficiency for future traffic-intensive access scenarios.

  5. Social media for radiologists: an introduction.

    Science.gov (United States)

    Ranschaert, Erik R; van Ooijen, P M A; Lee, Simon; Ratib, Osman; Parizel, P M

    2015-12-01

    Social media, which can be defined as dynamic and interactive online communication forums, are becoming increasingly popular, not only for the general public but also for radiologists. In addition to assisting radiologists in finding useful profession-related information and interactive educational material in all kinds of formats, they can also contribute towards improving communication with peers, clinicians, and patients. The growing use of social networking in healthcare also has an impact on the visibility and engagement of radiologists in the online virtual community. Although many radiologists are already using social media, a large number of our colleagues are still unaware of the wide spectrum of useful information and interaction available via social media and of the added value these platforms can bring to daily practice. For many, the risk of mixing professional and private data by using social media creates a feeling of insecurity, which still keeps radiologists from using them. In this overview we aim to provide information on the potential benefits, challenges, and inherent risks of social media for radiologists. We will provide a summary of the different types of social media that can be of value for radiologists, including useful tips on how to use them safely and efficiently. • Online social networking enhances communication and collaboration between peers • Social media facilitate access to educational and scientific information • Recommendations and guidelines from policymakers and professional organisations are needed • Applications are desired for efficient and secure exchange of medical images in social media.

  6. Metro-access integrated network based on optical OFDMA with dynamic sub-carrier allocation and power distribution.

    Science.gov (United States)

    Zhang, Chongfu; Zhang, Qiongli; Chen, Chen; Jiang, Ning; Liu, Deming; Qiu, Kun; Liu, Shuang; Wu, Baojian

    2013-01-28

    We propose and demonstrate a novel optical orthogonal frequency-division multiple access (OFDMA)-based metro-access integrated network with dynamic resource allocation. It consists of a single fiber OFDMA ring and many single fiber OFDMA trees, which transparently integrates metropolitan area networks with optical access networks. The single fiber OFDMA ring connects the core network and the central nodes (CNs), the CNs are on demand reconfigurable and use multiple orthogonal sub-carriers to realize parallel data transmission and dynamic resource allocation, meanwhile, they can also implement flexible power distribution. The remote nodes (RNs) distributed in the user side are connected by the single fiber OFDMA trees with the corresponding CN. The obtained results indicate that our proposed metro-access integrated network is feasible and the power distribution is agile.

  7. Social Networks and Health: Understanding the Nuances of Healthcare Access between Urban and Rural Populations.

    Science.gov (United States)

    Amoah, Padmore Adusei; Edusei, Joseph; Amuzu, David

    2018-05-13

    Communities and individuals in many sub-Saharan African countries often face limited access to healthcare. Hence, many rely on social networks to enhance their chances for adequate health care. While this knowledge is well-established, little is known about the nuances of how different population groups activate these networks to improve access to healthcare. This paper examines how rural and urban dwellers in the Ashanti Region in Ghana distinctively and systematically activate their social networks to enhance access to healthcare. It uses a qualitative cross-sectional design, with in-depth interviews of 79 primary participants (28 urban and 51 rural residents) in addition to the views of eight community leaders and eight health personnel. It was discovered that both intimate and distanced social networks for healthcare are activated at different periods by rural and urban residents. Four main stages of social networks activation, comprising different individuals and groups were observed among rural and urban dwellers. Among both groups, physical proximity, privacy, trust and sense of fairness, socio-cultural meaning attached to health problems, and perceived knowledge and other resources (mainly money) held in specific networks inherently influenced social network activation. The paper posits that a critical analysis of social networks may help to tailor policy contents to individuals and groups with limited access to healthcare.

  8. Navigating the massive world of reddit: using backbone networks to map user interests in social media

    Directory of Open Access Journals (Sweden)

    Randal S. Olson

    2015-05-01

    Full Text Available In the massive online worlds of social media, users frequently rely on organizing themselves around specific topics of interest to find and engage with like-minded people. However, navigating these massive worlds and finding topics of specific interest often proves difficult because the worlds are mostly organized haphazardly, leaving users to find relevant interests by word of mouth or using a basic search feature. Here, we report on a method using the backbone of a network to create a map of the primary topics of interest in any social network. To demonstrate the method, we build an interest map for the social news web site reddit and show how such a map could be used to navigate a social media world. Moreover, we analyze the network properties of the reddit social network and find that it has a scale-free, small-world, and modular community structure, much like other online social networks such as Facebook and Twitter. We suggest that the integration of interest maps into popular social media platforms will assist users in organizing themselves into more specific interest groups, which will help alleviate the overcrowding effect often observed in large online communities.

  9. On Planning of FTTH Access Networks with and without Redundancy

    DEFF Research Database (Denmark)

    Riaz, M. Tahir; Haraldsson, Gustav; Gutierrez Lopez, Jose Manuel

    2010-01-01

    This paper presents a planning analysis of FTTH access network with and without redundancy. Traditionally, access networks are planned only without redundancy, which is mainly due to lowering the cost of deployment. As fiber optics provide a huge amount of capacity, more and more services are being...... offered on a single fiber connection. As a single point of failure in fiber connection can cause multiple service deprivation therefore redundancy is very crucial. In this work, an automated planning model was used to test different scenarios of implementation. A cost estimation is presented in terms...... of digging and amount of fiber used. Three topologies, including the traditional one “tree topology”, were test with combination of various passive optical technologies....

  10. Social media in the mentorship and networking of physicians: Important role for women in surgical specialties.

    Science.gov (United States)

    Luc, Jessica G Y; Stamp, Nikki L; Antonoff, Mara B

    2018-04-01

    Social media may be a useful supplement to physician and trainee interactions; however, its role in enhancing mentorship has not been described. A 35-item survey investigating trainee and physician social media use was distributed. Responses were analyzed using descriptive statistics. 282 respondents completed the survey, among whom 136 (48.2%) reported careers in surgical specialties. Women in surgical specialties were more likely to describe the specialty as being dominated by the opposite sex (p media to build a network of same-sex mentorship (p = 0.031). Social media serves as a valuable tool to enhance the networking and mentorship of surgeons, particularly for women in surgical specialties who may lack exposure to same-sex mentors at their own institution. Copyright © 2018 Elsevier Inc. All rights reserved.

  11. Simulation and measurement of optical access network with different types of optical-fiber amplifiers

    Science.gov (United States)

    Latal, Jan; Vogl, Jan; Koudelka, Petr; Vitasek, Jan; Siska, Petr; Liner, Andrej; Papes, Martin; Vasinek, Vladimir

    2012-01-01

    The optical access networks are nowadays swiftly developing in the telecommunications field. These networks can provide higher data transfer rates, and have great potential to the future in terms of transmission possibilities. Many local internet providers responded to these facts and began gradually installing optical access networks into their originally built networks, mostly based on wireless communication. This allowed enlargement of possibilities for end-users in terms of high data rates and also new services such as Triple play, IPTV (Internet Protocol television) etc. However, with this expansion and building-up is also related the potential of reach in case of these networks. Big cities, such as Prague, Brno, Ostrava or Olomouc cannot be simply covered, because of their sizes and also because of their internal regulations given by various organizations in each city. Standard logical and also physical reach of EPON (IEEE 802.3ah - Ethernet Passive Optical Network) optical access network is about 20 km. However, for networks based on Wavelength Division Multiplex the reach can be up to 80 km, if the optical-fiber amplifier is inserted into the network. This article deals with simulation of different types of amplifiers for WDM-PON (Wavelength Division Multiplexing-Passive Optical Network) network in software application Optiwave OptiSystem and than are the values from the application and from real measurement compared.

  12. Event-based user classification in Weibo media.

    Science.gov (United States)

    Guo, Liang; Wang, Wendong; Cheng, Shiduan; Que, Xirong

    2014-01-01

    Weibo media, known as the real-time microblogging services, has attracted massive attention and support from social network users. Weibo platform offers an opportunity for people to access information and changes the way people acquire and disseminate information significantly. Meanwhile, it enables people to respond to the social events in a more convenient way. Much of the information in Weibo media is related to some events. Users who post different contents, and exert different behavior or attitude may lead to different contribution to the specific event. Therefore, classifying the large amount of uncategorized social circles generated in Weibo media automatically from the perspective of events has been a promising task. Under this circumstance, in order to effectively organize and manage the huge amounts of users, thereby further managing their contents, we address the task of user classification in a more granular, event-based approach in this paper. By analyzing real data collected from Sina Weibo, we investigate the Weibo properties and utilize both content information and social network information to classify the numerous users into four primary groups: celebrities, organizations/media accounts, grassroots stars, and ordinary individuals. The experiments results show that our method identifies the user categories accurately.

  13. FIR: An Effective Scheme for Extracting Useful Metadata from Social Media.

    Science.gov (United States)

    Chen, Long-Sheng; Lin, Zue-Cheng; Chang, Jing-Rong

    2015-11-01

    Recently, the use of social media for health information exchange is expanding among patients, physicians, and other health care professionals. In medical areas, social media allows non-experts to access, interpret, and generate medical information for their own care and the care of others. Researchers paid much attention on social media in medical educations, patient-pharmacist communications, adverse drug reactions detection, impacts of social media on medicine and healthcare, and so on. However, relatively few papers discuss how to extract useful knowledge from a huge amount of textual comments in social media effectively. Therefore, this study aims to propose a Fuzzy adaptive resonance theory network based Information Retrieval (FIR) scheme by combining Fuzzy adaptive resonance theory (ART) network, Latent Semantic Indexing (LSI), and association rules (AR) discovery to extract knowledge from social media. In our FIR scheme, Fuzzy ART network firstly has been employed to segment comments. Next, for each customer segment, we use LSI technique to retrieve important keywords. Then, in order to make the extracted keywords understandable, association rules mining is presented to organize these extracted keywords to build metadata. These extracted useful voices of customers will be transformed into design needs by using Quality Function Deployment (QFD) for further decision making. Unlike conventional information retrieval techniques which acquire too many keywords to get key points, our FIR scheme can extract understandable metadata from social media.

  14. Optimal Caching in Multicast 5G Networks with Opportunistic Spectrum Access

    KAUST Repository

    Emara, Mostafa

    2018-01-15

    Cache-enabled small base station (SBS) densification is foreseen as a key component of 5G cellular networks. This architecture enables storing popular files at the network edge (i.e., SBS caches), which empowers local communication and alleviates traffic congestions at the core/backhaul network. This paper develops a mathematical framework, based on stochastic geometry, to characterize the hit probability of a cache-enabled multicast 5G network with SBS multi-channel capabilities and opportunistic spectrum access. To this end, we first derive the hit probability by characterizing opportunistic spectrum access success probabilities, service distance distributions, and coverage probabilities. The optimal caching distribution to maximize the hit probability is then computed. The performance and trade-offs of the derived optimal caching distributions are then assessed and compared with two widely employed caching distribution schemes, namely uniform and Zipf caching, through numerical results and extensive simulations. It is shown that the Zipf caching almost optimal only in scenarios with large number of available channels and large cache sizes.

  15. Telemetry Standards, IRIG Standard 106-17, Chapter 22, Network Based Protocol Suite

    Science.gov (United States)

    2017-07-01

    requirements. 22.2 Network Access Layer 22.2.1 Physical Layer Connectors and cable media should meet the electrical or optical properties required by the...Telemetry Standards, IRIG Standard 106-17 Chapter 22, July 2017 i CHAPTER 22 Network -Based Protocol Suite Acronyms...iii Chapter 22. Network -Based Protocol Suite

  16. Cross-Layer Framework for Fine-Grained Channel Access in Next Generation High-Density WiFi Networks

    Institute of Scientific and Technical Information of China (English)

    ZHAO Haitao; ZHANG Shaojie; Emiliano Garcia-Palacios

    2016-01-01

    Densely deployed WiFi networks will play a crucial role in providing the capacity for next generation mobile internet.However,due to increasing interference,overlapped channels in WiFi networks and throughput efficiency degradation,densely deployed WiFi networks is not a guarantee to obtain higher throughput.An emergent challenge is how to efficiently utilize scarce spectrum resources,by matching physical layer resources to traffic demand.In this aspect,access control allocation strategies play a pivotal role but remain too coarse-grained.As a solution,this research proposes a flexible framework for fine-grained channel width adaptation and multi-channel access in WiFi networks.This approach,named SFCA (Subcarrier Fine-grained Channel Access),adopts DOFDM (Discontinuous Orthogonal Frequency Division Multiplexing) at the PHY layer.It allocates the frequency resource with a subcarrier granularity,which facilitates the channel width adaptation for multi-channel access and thus brings more flexibility and higher frequency efficiency.The MAC layer uses a frequencytime domain backoff scheme,which combines the popular time-domain BEB scheme with a frequency-domain backoff to decrease access collision,resulting in higher access probability for the contending nodes.SFCA is compared with FICA (an established access scheme) showing significant outperformance.Finally we present results for next generation 802.11 ac WiFi networks.

  17. Failure Analysis of Network Based Accessible Pedestrian Signals in Closed-Loop Operation

    Science.gov (United States)

    2011-03-01

    The potential failure modes of a network based accessible pedestrian system were analyzed to determine the limitations and benefits of closed-loop operation. The vulnerabilities of the system are accessed using the industry standard process known as ...

  18. Supporting continuous media communications and applications by exploiting their special characteristics

    OpenAIRE

    Fan, C.

    1998-01-01

    Distributed multimedia applications need end-to-end support from both the networks and the endsystems. The operating systems are critical both for accessing networking services and for controlling the activities on the endsystems. It is therefore vital to enhance the functionality and performance of the operating system in order to provide feasible support for multimedia communications and applications. The work proposes to support multimedia, especially continuous media, communications and a...

  19. Innovative approaches to using new media and technology in health promotion for adolescents and young adults.

    Science.gov (United States)

    Hyden, Christel; Cohall, Alwyn

    2011-12-01

    Over the past decade, new technology and media have changed the way we communicate, access information, and share content with one another. Most 12- to 17-year-olds now own cell phones, and most adolescents and young adults spend several hours per day on computers and cell phones. The American Academy of Pediatrics now encourages all pediatricians to increase their knowledge of new media and technology. This article details technology access among adolescents and young adults, highlights several current and potential innovative applications for new technology and social networking in health promotion, and discusses issues to consider as practitioners move toward integrating new media into clinical and health education settings.

  20. Studying Fake News via Network Analysis: Detection and Mitigation

    OpenAIRE

    Shu, Kai; Bernard, H. Russell; Liu, Huan

    2018-01-01

    Social media for news consumption is becoming increasingly popular due to its easy access, fast dissemination, and low cost. However, social media also enable the wide propagation of "fake news", i.e., news with intentionally false information. Fake news on social media poses significant negative societal effects, and also presents unique challenges. To tackle the challenges, many existing works exploit various features, from a network perspective, to detect and mitigate fake news. In essence...

  1. Delay-aware adaptive sleep mechanism for green wireless-optical broadband access networks

    Science.gov (United States)

    Wang, Ruyan; Liang, Alei; Wu, Dapeng; Wu, Dalei

    2017-07-01

    Wireless-Optical Broadband Access Network (WOBAN) is capacity-high, reliable, flexible, and ubiquitous, as it takes full advantage of the merits from both optical communication and wireless communication technologies. Similar to other access networks, the high energy consumption poses a great challenge for building up WOBANs. To shot this problem, we can make some load-light Optical Network Units (ONUs) sleep to reduce the energy consumption. Such operation, however, causes the increased packet delay. Jointly considering the energy consumption and transmission delay, we propose a delay-aware adaptive sleep mechanism. Specifically, we develop a new analytical method to evaluate the transmission delay and queuing delay over the optical part, instead of adopting M/M/1 queuing model. Meanwhile, we also analyze the access delay and queuing delay of the wireless part. Based on such developed delay models, we mathematically derive ONU's optimal sleep time. In addition, we provide numerous simulation results to show the effectiveness of the proposed mechanism.

  2. The accessibility of Poland’s Space to the Trans-European Transport Network

    Directory of Open Access Journals (Sweden)

    Wiśniewski Szymon

    2017-09-01

    Full Text Available The aim of the article is to analyse the land transport accessibility of two trans-European corridors within the boundaries of Poland. The adjustment of the course of transport routes to the distribution of the population and the country’s land development (including economic potential and logistic infrastructure was outlined using measurements of cumulative accessibility. The results were presented in both cartographic form (isochrone approach and tabular form (cumulative approach. Research was conducted adopting different forms of transport used for relocation (including foot traffic, car, rail and multimodal transport and both the current and target layout of the transport network. This made it possible to determine the changes that will effectively run the process of investment in transport infrastructure on Polish territory. This allowed the identification of the areas of Poland which are particularly conveniently located in relation to domestic connections (in terms of the international network and those for which the European transport network remains difficult to access.

  3. A Comparative Study of Multiplexing Schemes for Next Generation Optical Access Networks

    Science.gov (United States)

    Imtiaz, Waqas A.; Khan, Yousaf; Shah, Pir Mehar Ali; Zeeshan, M.

    2014-09-01

    Passive optical network (PON) is a high bandwidth, economical solution which can provide the necessary bandwidth to end-users. Wavelength division multiplexed passive optical networks (WDM PONs) and time division multiplexed passive optical networks (TDM PONs) are considered as an evolutionary step for next-generation optical access (NGOA) networks. However they fail to provide highest transmission capacity, efficient bandwidth access, and robust dispersion tolerance. Thus future PONs are considered on simpler, efficient and potentially scalable, optical code division multiplexed (OCDM) PONs. This paper compares the performance of existing PONs with OCDM PON to determine a suitable scheme for NGOA networks. Two system parameter are used in this paper: fiber length, and bit rate. Performance analysis using Optisystem shows that; for a sufficient system performance parameters i.e. bit error rate (BER) ≤ 10-9, and maximum quality factor (Q) ≥ 6, OCDMA PON efficiently performs upto 50 km with 10 Gbit/s per ONU.

  4. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks.

    Science.gov (United States)

    Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Zhang, Xuekun

    2015-12-03

    Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT), Machine-to-Machine (M2M) communications, Vehicular-to-Vehicular (V2V) communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  5. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunyang Lei

    2015-12-01

    Full Text Available Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT, Machine-to-Machine (M2M communications, Vehicular-to-Vehicular (V2V communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  6. Social Network, Surgeon, and Media Influence on the Decision to Undergo Contralateral Prophylactic Mastectomy.

    Science.gov (United States)

    Venetis, Maria K; MacGeorge, Erina L; Baptiste, Dadrie F; Mouton, Ashton; Friley, Lorin B; Pastor, Rebekah; Hatten, Kristen; Lagoo, Janaka; Bowling, Monet W; Clare, Susan E

    2018-06-01

    The rate of contralateral prophylactic mastectomy (CPM) has risen sharply in the past decade. The current study was designed to examine social network, surgeon, and media influence on patients' CPM decision-making, examining not only who influenced the decision, and to what extent, but also the type of influence exerted. Patients (N=113) who underwent CPM at 4 Indiana University-affiliated hospitals between 2008 and 2012 completed structured telephone interviews in 2013. Questions addressed the involvement and influence of the social network (family, friends, and nonsurgeon health professionals), surgeon, and media on the CPM decision. Spouses, children, family, friends, and health professionals were reported as exerting a meaningful degree of influence on patients' decisions, largely in ways that were positive or neutral toward CPM. Most surgeons were regarded as providing options rather than encouraging or discouraging CPM. Media influence was present, but limited. Patients who choose CPM do so with influence and support from members of their social networks. Reversing the increasing choice of CPM will require educating these influential others, which can be accomplished by encouraging patients to include them in clinical consultations, and by providing patients with educational materials that can be shared with their social networks. Surgeons need to be perceived as having an opinion, specifically that CPM should be reserved for those patients for whom it is medically indicated.

  7. Social/Electronic Media Use of Children and Adolescents Who Attend the Pediatric Weight Management Programs of the COMPASS Network.

    Science.gov (United States)

    Siegel, Robert; Fals, Angela; Mirza, Nazrat; Datto, George; Stratbucker, William; Ievers-Landis, Carolyn E; Christison, Amy; Wang, Yu; Woolford, Susan J

    2015-10-01

    Obesity is a major healthcare problem in youth and their social/electronic media (SEM) use has been described as a risk factor. Though much is known about the newer technologies youth use to communicate, little is known about what is used by those in weight management programs. The aim of this study was to determine what types of SEM, including sedentary and active video games, youth in weight management programs use and which they prefer for communicating with healthcare providers. This was a multisite study using a 24-question online SurveyMonkey® questionnaire. Youth, 12-17 years old, attending pediatric weight management programs at seven participating centers in the Childhood Obesity Multi Program Analysis and Study System network were eligible. There were 292 responders with a mean age of 14.2 years. Fifty-four percent were female, 36% Caucasian, 35% African American, and 33% were Hispanic. Ninety-four percent had access to a computer, 71% had Internet access, and 63% had smartphones. Whereas 87% had at least one gaming system at home, 50% reported they never played sedentary video games (71% of females vs. 25% males; p social media (6%). Face-to-face communication with healthcare providers is the preferred method for youth in pediatric weight management programs. They self-reported video game use less than previously described.

  8. Medium Access Control in Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon

    Focusing on Wireless Sensor Networks (WSN) that are powered by energy harvesting, this dissertation focuses on energy-efficient communication links between senders and receivers that are alternating between active and sleeping states of operation. In particular, the focus lies on Medium Access...

  9. A New Hybrid Channel Access Scheme for Ad Hoc Networks

    National Research Council Canada - National Science Library

    Wang, Yu; Garcia-Luna-Aceves, J. J

    2002-01-01

    Many contention-based channel access schemes have been proposed for multi-hop ad hoc networks in the recent past, and they can be divided into two categories, sender-initiated and receiver-initiated...

  10. Porting Social Media Contributions with SIOC

    Science.gov (United States)

    Bojars, Uldis; Breslin, John G.; Decker, Stefan

    Social media sites, including social networking sites, have captured the attention of millions of users as well as billions of dollars in investment and acquisition. To better enable a user's access to multiple sites, portability between social media sites is required in terms of both (1) the personal profiles and friend networks and (2) a user's content objects expressed on each site. This requires representation mechanisms to interconnect both people and objects on the Web in an interoperable, extensible way. The Semantic Web provides the required representation mechanisms for portability between social media sites: it links people and objects to record and represent the heterogeneous ties that bind each to the other. The FOAF (Friend-of-a-Friend) initiative provides a solution to the first requirement, and this paper discusses how the SIOC (Semantically-Interlinked Online Communities) project can address the latter. By using agreed-upon Semantic Web formats like FOAF and SIOC to describe people, content objects, and the connections that bind them together, social media sites can interoperate and provide portable data by appealing to some common semantics. In this paper, we will discuss the application of Semantic Web technology to enhance current social media sites with semantics and to address issues with portability between social media sites. It has been shown that social media sites can serve as rich data sources for SIOC-based applications such as the SIOC Browser, but in the other direction, we will now show how SIOC data can be used to represent and port the diverse social media contributions (SMCs) made by users on heterogeneous sites.

  11. FttC-Based Fronthaul for 5G Dense/Ultra-Dense Access Network: Performance and Costs in Realistic Scenarios

    Directory of Open Access Journals (Sweden)

    Franco Mazzenga

    2017-10-01

    Full Text Available One distinctive feature of the next 5G systems is the presence of a dense/ultra-dense wireless access network with a large number of access points (or nodes at short distances from each other. Dense/ultra-dense access networks allow for providing very high transmission capacity to terminals. However, the deployment of dense/ultra-dense networks is slowed down by the cost of the fiber-based infrastructure required to connect radio nodes to the central processing units and then to the core network. In this paper, we investigate the possibility for existing FttC access networks to provide fronthaul capabilities for dense/ultra-dense 5G wireless networks. The analysis is realistic in that it is carried out considering an actual access network scenario, i.e., the Italian FttC deployment. It is assumed that access nodes are connected to the Cabinets and to the corresponding distributors by a number of copper pairs. Different types of cities grouped in terms of population have been considered. Results focus on fronthaul transport capacity provided by the FttC network and have been expressed in terms of the available fronthaul bit rate per node and of the achievable coverage.

  12. A Method for Upper Bounding Long Term Growth of Network Access Speed

    Directory of Open Access Journals (Sweden)

    Thomas Phillip Knudsen

    2006-06-01

    Full Text Available The development in home Internet access speed has shown an exponential development with growth rates averaging 25% per year. For resource management in network provisioning it becomes an urgent question how long such growth can continue. This paper presents a method for calculating an upper bound to visual content driven growth, proceeding from datarate requirements for a full virtual environment. Scenarios and approaches for reducing datarate requirements are considered and discussed. The presented figures for an upper bound on network access speed are discussed and perspectives on further research presented.

  13. A Method for Upper Bounding Long Term Growth of Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Pedersen, Jens Myrup; Madsen, Ole Brun

    2004-01-01

    The development in home Internet access speed has shown an exponential development with growth rates averaging 25% per year. For resource management in network provisioning it becomes an urgent question how long such growth can continue. This paper presents a method for calculating an upper bound...... to visual content driven growth, proceeding from datarate requirements for a full virtual environment. Scenarios and approaches for reducing datarate requirements are considered and discussed. The presented figures for an upper bound on network access speed are discussed and perspectives on further research...

  14. Modeling the video distribution link in the Next Generation Optical Access Networks

    International Nuclear Information System (INIS)

    Amaya, F; Cardenas, A; Tafur, I

    2011-01-01

    In this work we present a model for the design and optimization of the video distribution link in the next generation optical access network. We analyze the video distribution performance in a SCM-WDM link, including the noise, the distortion and the fiber optic nonlinearities. Additionally, we consider in the model the effect of distributed Raman amplification, used to extent the capacity and the reach of the optical link. In the model, we use the nonlinear Schroedinger equation with the purpose to obtain capacity limitations and design constrains of the next generation optical access networks.

  15. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  16. Variable disparity estimation based intermediate view reconstruction in dynamic flow allocation over EPON-based access networks

    Science.gov (United States)

    Bae, Kyung-Hoon; Lee, Jungjoon; Kim, Eun-Soo

    2008-06-01

    In this paper, a variable disparity estimation (VDE)-based intermediate view reconstruction (IVR) in dynamic flow allocation (DFA) over an Ethernet passive optical network (EPON)-based access network is proposed. In the proposed system, the stereoscopic images are estimated by a variable block-matching algorithm (VBMA), and they are transmitted to the receiver through DFA over EPON. This scheme improves a priority-based access network by converting it to a flow-based access network with a new access mechanism and scheduling algorithm, and then 16-view images are synthesized by the IVR using VDE. Some experimental results indicate that the proposed system improves the peak-signal-to-noise ratio (PSNR) to as high as 4.86 dB and reduces the processing time to 3.52 s. Additionally, the network service provider can provide upper limits of transmission delays by the flow. The modeling and simulation results, including mathematical analyses, from this scheme are also provided.

  17. How Researchers Use Social Media to Promote their Research and Network with Industry

    Directory of Open Access Journals (Sweden)

    Päivi Jaring

    2017-08-01

    Full Text Available Social media is now an essential information and interaction channel. Companies advertise and sell their products and services through social media, but this channel has not been so commonly applied to the task of selling knowledge and research work. This article studies the use of social media by researchers to promote their research and network with product developers in industry, and it presents a model of the use of social media by researchers. The data for this research was obtained by interviewing individual researchers of a research organization and surveying product developers from industry. The findings show that social media is seen as a good source of new information and contacts, and it is suitable for promoting awareness of research services and results. The results show that the speed and intensity of social media present challenges for researchers, but by being active in posting content and participating in discussions, researchers can derive benefits and enhance their personal reputations.

  18. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    Science.gov (United States)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  19. Auction pricing of network access for North American railways

    DEFF Research Database (Denmark)

    Harrod, Steven

    2013-01-01

    The question of pricing train paths for "open access" railway networks in North America is discussed. An auction process is suggested as necessary to maintain transparency in the contracting process. Multiple random samples of auction pricing for a single track railway line demonstrate...... that the infrastructure entity will receive approximately 15.6% less than the true value of the contracted train paths. This loss of revenue threatens the objective of reducing government subsidy for the railway network. (C) 2012 Elsevier Ltd. All rights reserved....

  20. Analyzing Social Media and Learning through Content and Social Network Analysis: A Faceted Methodological Approach

    Science.gov (United States)

    Gruzd, Anatoliy; Paulin, Drew; Haythornthwaite, Caroline

    2016-01-01

    In just a short period, social media have altered many aspects of our daily lives, from how we form and maintain social relationships to how we discover, access, and share information online. Now social media are also affecting how we teach and learn. In this paper, we discuss methods that can help researchers and educators evaluate and understand…

  1. The Strategic Combination of Open-Access Peer-Review, Mainstream Media and Social Media to Improve Public Climate Literacy (Invited)

    Science.gov (United States)

    Cook, J.; Nuccitelli, D. A.; Jacobs, P.

    2013-12-01

    The Skeptical Science website began in 2007, with the goal of refuting climate misinformation with peer-reviewed science. It achieved this by embracing a diversity of message formats and delivery methods. Myth rebuttals are available at beginner, intermediate and advanced levels, spanning from long, technical treatments to tweetable one-liners. Content has been translated into 20 different languages and made available via the web, an iPhone app and books while adopted by third parties in textbooks, university and MOOC curricula, books, Senate testimonies and TV documentaries. While social media has been a fruitful medium, we experimented with a new model in 2013, employing the strategic combination of open-access peer-review, mainstream media outreach and social media marketing. This strategy was adopted with the release of a paper quantifying the level of scientific consensus in published climate papers, resulting in broad mainstream media attention as well as acknowledgement from key public figures such as Al Gore, the UK Minister for Energy Edward Davey and President Obama. Our approach was informed by psychological research into both the importance of scientific consensus and how to reduce the influence of misconceptions. While multiple methods of delivery are important, equally important is the construction of the messages themselves. I will examine the science of crafting compelling messages and how combination with diverse message delivery can lead to impactful outcomes.

  2. Network Performance and Quality of Experience of Remote Access Laboratories

    Directory of Open Access Journals (Sweden)

    Alexander A. Kist

    2012-11-01

    Full Text Available Remote Access Laboratories (RAL have become important learning and teaching tools. This paper presents a performance study that targets a specific remote access architecture implemented within a universities operational environment. This particular RAL system provides globally authenticated and arbitrated remote access to virtualized computers as well as computer controlled hardware experiments. This paper presents system performance results that have been obtained utilizing both a set of automated and human subject tests. Principle objectives of the study were: To gain a better understanding of the nature of network traffic caused by experimental activity usage; to obtain an indication of user expectations of activity performance; and to develop a measure to predict Quality of Experience, based on easily measurable Quality of Service parameters. The study emulates network layer variation of access-bandwidth and round-trip-time of typical usage scenarios and contrasts against user perception results that allow classifying expected user performance. It demonstrates that failure rate is excellent measure of usability, and that round-trip-time predominantly affects user experience. Thin-client and remote desktop architectures are popular to separate the location of users and the actual data processing and use similar structures, hence results of this study to be applied in these application areas as well.

  3. Access to In-Network Emergency Physicians and Emergency Departments Within Federally Qualified Health Plans in 2015

    Directory of Open Access Journals (Sweden)

    Stephen C. Dorner, MSc

    2016-01-01

    Full Text Available Introduction: Under regulations established by the Affordable Care Act, insurance plans must meet minimum standards in order to be sold through the federal Marketplace. These standards to become a qualified health plan (QHP include maintaining a provider network sufficient to assure access to services. However, the complexity of emergency physician (EP employment practices – in which the EPs frequently serve as independent contractors of emergency departments, independently establish insurance contracts, etc... – and regulations governing insurance repayment may hinder the application of network adequacy standards to emergency medicine. As such, we hypothesized the existence of QHPs without in-network access to EPs. The objective is to identify whether there are QHPs without in-network access to EPs using information available through the federal Marketplace and publicly available provider directories. Results: In a national sample of Marketplace plans, we found that one in five provider networks lacks identifiable in-network EPs. QHPs lacking EPs spanned nearly half (44% of the 34 states using the federal Marketplace. Conclusion: Our data suggest that the present regulatory framework governing network adequacy is not generalizable to emergency care, representing a missed opportunity to protect patient access to in-network physicians. These findings and the current regulations governing insurance payment to EPs dis-incentivize the creation of adequate physician networks, incentivize the practice of balance billing, and shift the cost burden to patients.

  4. Quantitative analysis of access strategies to remoteinformation in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    of analytic models to compute different performance metrics for these approaches, with special focus on the so-called mismatch probability. The results of the analytic models allow for design decisions on which strategy to implement for specific input parameters (change rate of the information element......Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach...... initiated by the requesting entity, and two versions of proactive approaches in which the entity that contains the information element actively propagates its changes to potential requesters, either (2) periodically or triggered by changes of the information element (3). This paper first develops a set...

  5. Resource Sharing in Heterogeneous and Cloud Radio Access Networks

    DEFF Research Database (Denmark)

    Zakrzewska, Anna; Iversen, Villy Bæk

    2012-01-01

    be improved. However, we identify the benefit of individual operators and show that it’s not equal but highly depends on the initial network dimensioning. Furthermore, we demonstrate that under specific conditions the blocking probability in an area is lower than for fully accessible system and therefore...

  6. Optically transparent multiple access networks employing incoherent spectral codes

    NARCIS (Netherlands)

    Huiszoon, B.

    2008-01-01

    This Ph.D. thesis is divided into 7 chapters to provide the reader an overview of the main results achieved in di®erent sub-topics of the study towards optically transparent multiple access networks employing incoherent spectral codes taking into account wireless transmission aspects. The work

  7. Enhancing Access to Land Remote Sensing Data through Mainstream Social Media Channels

    Science.gov (United States)

    Sohre, T.; Maiersperger, T.

    2011-12-01

    Social media tools are changing the way that people discover information, communicate, and collaborate. Government agencies supporting the Land Remote Sensing user community have begun taking advantage of standard social media tools and capabilities. National Aeronautics and Space Administration (NASA) Earth Observing System (EOS) data centers have started providing outreach utilizing services including Facebook, Twitter, and YouTube videos. Really Simple Syndication (RSS) Feeds have become more standard means of sharing information, and a DataCasting tool was created as a NASA Technology Infusion effort to make RSS-based technology for accessing Earth Science information available. The United States Geological Survey (USGS) has also started using social media to allow the community access to news feeds and real-time earthquake alerts; listen to podcasts; get updates on new USGS publications, videos, and photographs; and more. Twitter feeds have been implemented in 2011 for the USGS Land Cover and Landsat user communities. In early 2011, the NASA Land Processes Distributed Active Archive Center (LP DAAC) user working group suggested the investigation of concepts for creating and distributing "bundles" of data, which would aggregate theme-based data sets from multiple sources. The LP DAAC is planning to explore the use of standard social bookmarking tools to support community developed bundles through the use of tools such as Delicious, Digg, or StumbleUpon. This concept would allow science users to organize and discover common links to data resources based on community developed tags, or a folksonomy. There are challenges that will need to be addressed such as maintaining the quality of tags but a social bookmarking system may have advantages over traditional search engines or formal ontologies for identifying and labeling various data sets relevant to a theme. As classification is done by the community of scientists who understand the data, the tagged data sets

  8. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yun Lin

    2016-10-01

    Full Text Available Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel.

  9. Converged wireline and wireless signal distribution in optical fiber access networks

    DEFF Research Database (Denmark)

    Prince, Kamau

    This thesis presents results obtained during the course of my doctoral studies into the transport of fixed and wireless signaling over a converged otpical access infrastructure. In the formulation, development and assessment of a converged paradigma for multiple-services delivery via optical access...... networking infrastructure, I have demonstrated increased functionalities with existing optical technologies and commercially available optoelectronic devices. I have developed novel systems for extending the range of optical access systems, and have demonstrated the repurposing of standard digital devices...

  10. Using LinkedIn in the Marketing Classroom: Exploratory Insights and Recommendations for Teaching Social Media/Networking

    Science.gov (United States)

    McCorkle, Denny E.; McCorkle, Yuhua Li

    2012-01-01

    With the rapid growth of social networking and media comes their consideration for use in the marketing classroom. Social networking skills are becoming essential for personal branding (e.g., networking, self-marketing) and corporate/product branding (e.g., marketing communication). This paper addresses the use of LinkedIn (i.e., an online…

  11. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad; Elsawy, Hesham; Bader, Ahmed; Alouini, Mohamed-Slim

    2017-01-01

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  12. Tractable Stochastic Geometry Model for IoT Access in LTE Networks

    KAUST Repository

    Gharbieh, Mohammad

    2017-02-07

    The Internet of Things (IoT) is large-scale by nature. This is not only manifested by the large number of connected devices, but also by the high volumes of traffic that must be accommodated. Cellular networks are indeed a natural candidate for the data tsunami the IoT is expected to generate in conjunction with legacy human-type traffic. However, the random access process for scheduling request represents a major bottleneck to support IoT via LTE cellular networks. Accordingly, this paper develops a mathematical framework to model and study the random access channel (RACH) scalability to accommodate IoT traffic. The developed model is based on stochastic geometry and discrete time Markov chains (DTMC) to account for different access strategies and possible sources of inter-cell and intra-cell interferences. To this end, the developed model is utilized to assess and compare three different access strategies, which incorporate a combination of transmission persistency, back-off, and power ramping. The analysis and the results showcased herewith clearly illustrate the vulnerability of the random access procedure as the IoT intensity grows. Finally, the paper offers insights into effective scenarios for each transmission strategy in terms of IoT intensity and RACH detection thresholds.

  13. Secret Shoppers Find Access To Providers And Network Accuracy Lacking For Those In Marketplace And Commercial Plans.

    Science.gov (United States)

    Haeder, Simon F; Weimer, David L; Mukamel, Dana B

    2016-07-01

    The adequacy of provider networks for plans sold through insurance Marketplaces established under the Affordable Care Act has received much scrutiny recently. Various studies have established that networks are generally narrow. To learn more about network adequacy and access to care, we investigated two questions. First, no matter the nominal size of a network, can patients gain access to primary care services from providers of their choice in a timely manner? Second, how does access compare to plans sold outside insurance Marketplaces? We conducted a "secret shopper" survey of 743 primary care providers from five of California's nineteen insurance Marketplace pricing regions in the summer of 2015. Our findings indicate that obtaining access to primary care providers was generally equally challenging both inside and outside insurance Marketplaces. In less than 30 percent of cases were consumers able to schedule an appointment with an initially selected physician provider. Information about provider networks was often inaccurate. Problems accessing services for patients with acute conditions were particularly troubling. Effectively addressing issues of network adequacy requires more accurate provider information. Project HOPE—The People-to-People Health Foundation, Inc.

  14. Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks.

    Science.gov (United States)

    Anwar, Asim; Seet, Boon-Chong; Ding, Zhiguo

    2018-02-08

    Ubiquitous wireless sensor networks (UWSNs) have become a critical technology for enabling smart cities and other ubiquitous monitoring applications. Their deployment, however, can be seriously hampered by the spectrum available to the sheer number of sensors for communication. To support the communication needs of UWSNs without requiring more spectrum resources, the power-domain non-orthogonal multiple access (NOMA) technique originally proposed for 5th Generation (5G) cellular networks is investigated for UWSNs for the first time in this paper. However, unlike 5G networks that operate in the licensed spectrum, UWSNs mostly operate in unlicensed spectrum where sensors also experience cross-technology interferences from other devices sharing the same spectrum. In this paper, we model the interferences from various sources at the sensors using stochastic geometry framework. To evaluate the performance, we derive a theorem and present new closed form expression for the outage probability of the sensors in a downlink scenario under interference limited environment. In addition, diversity analysis for the ordered NOMA users is performed. Based on the derived outage probability, we evaluate the average link throughput and energy consumption efficiency of NOMA against conventional orthogonal multiple access (OMA) technique in UWSNs. Further, the required computational complexity for the NOMA users is presented.

  15. ALPHA: Proposal of Mapping QoS Parameters between UPnP Home Network and GMPLS Access

    DEFF Research Database (Denmark)

    Brewka, Lukasz Jerzy; Sköldström, Pontus; Gavler, Anders

    2011-01-01

    This paper is treating the interdomain QoS signaling between the home and access domains with a focus on applying it for providing QoS between a UPnP-QoS based home network and GMPLS based access network. The work presented here is defining a possible approach for an interface between UPn...

  16. Event-Based User Classification in Weibo Media

    Directory of Open Access Journals (Sweden)

    Liang Guo

    2014-01-01

    Full Text Available Weibo media, known as the real-time microblogging services, has attracted massive attention and support from social network users. Weibo platform offers an opportunity for people to access information and changes the way people acquire and disseminate information significantly. Meanwhile, it enables people to respond to the social events in a more convenient way. Much of the information in Weibo media is related to some events. Users who post different contents, and exert different behavior or attitude may lead to different contribution to the specific event. Therefore, classifying the large amount of uncategorized social circles generated in Weibo media automatically from the perspective of events has been a promising task. Under this circumstance, in order to effectively organize and manage the huge amounts of users, thereby further managing their contents, we address the task of user classification in a more granular, event-based approach in this paper. By analyzing real data collected from Sina Weibo, we investigate the Weibo properties and utilize both content information and social network information to classify the numerous users into four primary groups: celebrities, organizations/media accounts, grassroots stars, and ordinary individuals. The experiments results show that our method identifies the user categories accurately.

  17. The Role of Individual-Media Relationship and Consumer Personal Factors on Spanish Teenagers' Mobile Social Networking Sites Usage

    OpenAIRE

    Carla Ruiz-Mafé; Silvia Sanz-Blas; José Martí-Parreño

    2014-01-01

    Social Networking Sites (SNS) are gaining momentum as powerful tools of marketing communications. Mobile phones are becoming one of the most popular devices for accessing Social Networking Sites. In Spain, 44% of Social Networking Sites users access these sites on a daily basis while 79% of them access these sites on a weekly basis. Furthermore, it is notable that over 70% of Social Networking Sites users talk about and recommend commercial brands. This justifies the interest of the study of ...

  18. Modeling the video distribution link in the Next Generation Optical Access Networks

    DEFF Research Database (Denmark)

    Amaya, F.; Cárdenas, A.; Tafur Monroy, Idelfonso

    2011-01-01

    In this work we present a model for the design and optimization of the video distribution link in the next generation optical access network. We analyze the video distribution performance in a SCM-WDM link, including the noise, the distortion and the fiber optic nonlinearities. Additionally, we...... consider in the model the effect of distributed Raman amplification, used to extent the capacity and the reach of the optical link. In the model, we use the nonlinear Schrödinger equation with the purpose to obtain capacity limitations and design constrains of the next generation optical access networks....

  19. Examining the use of evidence-based and social media supported tools in freely accessible physical activity intervention websites.

    Science.gov (United States)

    Vandelanotte, Corneel; Kirwan, Morwenna; Rebar, Amanda; Alley, Stephanie; Short, Camille; Fallon, Luke; Buzza, Gavin; Schoeppe, Stephanie; Maher, Carol; Duncan, Mitch J

    2014-08-17

    It has been shown that physical activity is more likely to increase if web-based interventions apply evidence-based components (e.g. self-monitoring) and incorporate interactive social media applications (e.g. social networking), but it is unclear to what extent these are being utilized in the publicly available web-based physical activity interventions. The purpose of this study was to evaluate whether freely accessible websites delivering physical activity interventions use evidence-based behavior change techniques and provide social media applications. In 2013, a systematic search strategy examined 750 websites. Data was extracted on a wide range of variables (e.g. self-monitoring, goal setting, and social media applications). To evaluate website quality a new tool, comprising three sub-scores (Behavioral Components, Interactivity and User Generated Content), was developed to assess implementation of behavior change techniques and social media applications. An overall website quality scored was obtained by summing the three sub-scores. Forty-six publicly available websites were included in the study. The use of self-monitoring (54.3%), goal setting (41.3%) and provision of feedback (46%) was relatively low given the amount of evidence supporting these features. Whereas the presence of features allowing users to generate content (73.9%), and social media components (Facebook (65.2%), Twitter (47.8%), YouTube (48.7%), smartphone applications (34.8%)) was relatively high considering their innovative and untested nature. Nearly all websites applied some behavioral and social media applications. The average Behavioral Components score was 3.45 (±2.53) out of 10. The average Interactivity score was 3.57 (±2.16) out of 10. The average User Generated Content Score was 4.02 (±2.77) out of 10. The average overall website quality score was 11.04 (±6.92) out of 30. Four websites (8.7%) were classified as high quality, 12 websites (26.1%) were classified as moderate

  20. Network-based modeling and intelligent data mining of social media for improving care.

    Science.gov (United States)

    Akay, Altug; Dragomir, Andrei; Erlandsson, Bjorn-Erik

    2015-01-01

    Intelligently extracting knowledge from social media has recently attracted great interest from the Biomedical and Health Informatics community to simultaneously improve healthcare outcomes and reduce costs using consumer-generated opinion. We propose a two-step analysis framework that focuses on positive and negative sentiment, as well as the side effects of treatment, in users' forum posts, and identifies user communities (modules) and influential users for the purpose of ascertaining user opinion of cancer treatment. We used a self-organizing map to analyze word frequency data derived from users' forum posts. We then introduced a novel network-based approach for modeling users' forum interactions and employed a network partitioning method based on optimizing a stability quality measure. This allowed us to determine consumer opinion and identify influential users within the retrieved modules using information derived from both word-frequency data and network-based properties. Our approach can expand research into intelligently mining social media data for consumer opinion of various treatments to provide rapid, up-to-date information for the pharmaceutical industry, hospitals, and medical staff, on the effectiveness (or ineffectiveness) of future treatments.

  1. Open-Access-Kooperationen in Österreich: Open Access Network Austria und E-Infrastructures Austria – aktuelle Entwicklungen seit 2012

    Directory of Open Access Journals (Sweden)

    Bauer, Bruno

    2014-12-01

    Full Text Available [english] The Berlin Declaration on Open Access to scientific knowledge was published in October 2003. All over the world initiatives and projects were started. However, in Austria Open Access got little attention over many years. This was confirmed by a study among Austrian universities on behalf of the Council of Austrian University Libraries. Finally at the turn of the year 2012/2013 the Open Access Network Austria and the university infrastructure project E-Infrastructure Austria were started to push Open Access in Austria on a national level. So 10 years after the Berlin Declaration Austria set up the preconditions to establish sustainable Open Access.

  2. A feedback-retransmission based asynchronous frequency hopping MAC protocol for military aeronautical ad hoc networks

    Directory of Open Access Journals (Sweden)

    Jinhui TANG

    2018-05-01

    Full Text Available Attacking time-sensitive targets has rigid demands for the timeliness and reliability of information transmission, while typical Media Access Control (MAC designed for this application works well only in very light-load scenarios; as a consequence, the performances of system throughput and channel utilization are degraded. For this problem, a feedback-retransmission based asynchronous FRequency hopping Media Access (FRMA control protocol is proposed. Burst communication, asynchronous Frequency Hopping (FH, channel coding, and feedback retransmission are utilized in FRMA. With the mechanism of asynchronous FH, immediate packet transmission and multi-packet reception can be realized, and thus the timeliness is improved. Furthermore, reliability can be achieved via channel coding and feedback retransmission. With theories of queuing theory, Markov model, packets collision model, and discrete Laplace transformation, the formulas of packet success probability, system throughput, average packet end-to-end delay, and delay distribution are obtained. The approximation accuracy of theoretical derivation is verified by experimental results. Within a light-load network, the proposed FRMA has the ability of millisecond delay and 99% reliability as well as outperforms the non-feedback-retransmission based asynchronous frequency hopping media access control protocol. Keywords: Ad hoc networks, Aeronautical communications, Frequency hopping, Media Access Control (MAC, Time-sensitive

  3. mCRAN: A radio access network architecture for 5G indoor ccommunications

    NARCIS (Netherlands)

    Chandra, Kishor; Cao, Zizheng; Bruintjes, Tom; Prasad, R.V.; Karagiannis, Georgios; Tangdiongga, E.; van den Boom, H.P.A.; Kokkeler, Andre B.J.

    2015-01-01

    Millimeter wave (mmWave) communication is being seen as a disruptive technology for 5G era. In particular, 60GHz frequency band has emerged as a promising candidate for multi-Gbps connectivity in indoor and hotspot areas. In terms of network architecture, cloud radio access network (CRAN) has

  4. mCRAN : a radio access network architecture for 5G indoor communications

    NARCIS (Netherlands)

    Chandra, Kishor; Cao, Zizheng; Bruintjes, T. M.; Prasad, R. Venkatesha; Karagiannis, G.; Tangdiongga, Eduward; van den Boom, H.P.A.; Kokkeler, A. B J

    2015-01-01

    Millimeter wave (mmWave) communication is being seen as a disruptive technology for 5G era. In particular, 60GHz frequency band has emerged as a promising candidate for multi-Gbps connectivity in indoor and hotspot areas. In terms of network architecture, cloud radio access network (CRAN) has

  5. Network access charges, vertical integration, and property rights structure - experiences from the German electricity markets

    International Nuclear Information System (INIS)

    Growitsch, C.; Wein, T.

    2005-01-01

    After the deregulation of the German electricity markets in 1998, the German government opted for a regulatory regime called negotiated third party access, which would be subject to ex-post control by the federal cartel office. Network access charges for new competitors are based on contractual arrangements between energy producers and industrial consumers. As the electricity networks are incontestable natural monopolies, the local and regional network operators are able to set (monopolistic) charges at their own discretion, restricted only by the possible interference of the federal cartel office (Bundeskartellamt). In this paper we analyze if there is evidence for varying charging behaviour depending on the supplier's economic independence (structure of property rights) or its level of vertical integration. For this purpose, we hypothesise that incorporated and vertically integrated suppliers set different charges than independent utility companies. Multivariate estimations show a relation between network access charges and the network operator's economic independence as well as level of vertical integration: on the low voltage level for an estimated annual consumption of 1700 kW/h, vertically integrated firms set-in accordance with our hypothesis-significantly lower access charges than vertically separated suppliers, whereas incorporated network operators charge significantly higher charges compared to independent suppliers. These results could not have been confirmed for other consumptions or voltage levels. (author)

  6. Self-represented witnessing: the use of social media by asylum seekers in Australia's offshore immigration detention centres.

    Science.gov (United States)

    Rae, Maria; Holman, Rosa; Nethery, Amy

    2018-05-01

    The act of witnessing connects audiences with distant suffering. But what happens when bearing witness becomes severely restricted? External parties, including the mainstream news media, are constrained from accessing Australia's offshore immigration detention centres. The effect is that people seeking asylum are hidden from the public and excluded from national debates. Some detainees have adopted social media as a platform to communicate their stories of flight, and their experiences of immigration detention, to a wider audience. This article examines the ways in which social media, and particularly Facebook, has facilitated what we call self-represented witnessing. We analyse two public Facebook pages to assess how detainees use such social media networks to document their experiences, and we observe the interaction between detainees, other social media users and mainstream media. Significantly, these social media networks enable detained asylum seekers to conduct an unmediated form of self-represented witnessing that exposes human rights abuses and documents justice claims.

  7. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  8. An Examination of Not-For-Profit Stakeholder Networks for Relationship Management: A Small-Scale Analysis on Social Media

    Science.gov (United States)

    Carlson, Jamie; Kitchens, Brent; Kozary, Ben; Zaki, Mohamed

    2016-01-01

    Using a small-scale descriptive network analysis approach, this study highlights the importance of stakeholder networks for identifying valuable stakeholders and the management of existing stakeholders in the context of mental health not-for-profit services. We extract network data from the social media brand pages of three health service organizations from the U.S., U.K., and Australia, to visually map networks of 579 social media brand pages (represented by nodes), connected by 5,600 edges. This network data is analyzed using a collection of popular graph analysis techniques to assess the differences in the way each of the service organizations manage stakeholder networks. We also compare node meta-information against basic topology measures to emphasize the importance of effectively managing relationships with stakeholders who have large external audiences. Implications and future research directions are also discussed. PMID:27711236

  9. An Examination of Not-For-Profit Stakeholder Networks for Relationship Management: A Small-Scale Analysis on Social Media.

    Directory of Open Access Journals (Sweden)

    Jessica Wyllie

    Full Text Available Using a small-scale descriptive network analysis approach, this study highlights the importance of stakeholder networks for identifying valuable stakeholders and the management of existing stakeholders in the context of mental health not-for-profit services. We extract network data from the social media brand pages of three health service organizations from the U.S., U.K., and Australia, to visually map networks of 579 social media brand pages (represented by nodes, connected by 5,600 edges. This network data is analyzed using a collection of popular graph analysis techniques to assess the differences in the way each of the service organizations manage stakeholder networks. We also compare node meta-information against basic topology measures to emphasize the importance of effectively managing relationships with stakeholders who have large external audiences. Implications and future research directions are also discussed.

  10. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    Science.gov (United States)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  11. Multilingual Information Discovery and AccesS (MIDAS): A Joint ACM DL'99/ ACM SIGIR'99 Workshop.

    Science.gov (United States)

    Oard, Douglas; Peters, Carol; Ruiz, Miguel; Frederking, Robert; Klavans, Judith; Sheridan, Paraic

    1999-01-01

    Discusses a multidisciplinary workshop that addressed issues concerning internationally distributed information networks. Highlights include multilingual information access in media other than character-coded text; cross-language information retrieval and multilingual metadata; and evaluation of multilingual systems. (LRW)

  12. Resource allocation in heterogeneous cloud radio access networks: advances and challenges

    KAUST Repository

    Dahrouj, Hayssam

    2015-06-01

    Base station densification is increasingly used by network operators to provide better throughput and coverage performance to mobile subscribers in dense data traffic areas. Such densification is progressively diffusing the move from traditional macrocell base stations toward heterogeneous networks with diverse cell sizes (e.g., microcell, picocell, femotcell) and diverse radio access technologies (e.g., GSM, CDMA), and LTE). The coexistence of the different network entities brings an additional set of challenges, particularly in terms of the provisioning of high-speed communications and the management of wireless interference. Resource sharing between different entities, largely incompatible in conventional systems due to the lack of interconnections, becomes a necessity. By connecting all the base stations from different tiers to a central processor (referred to as the cloud) through wire/wireline backhaul links, the heterogeneous cloud radio access network, H-CRAN, provides an open, simple, controllable, and flexible paradigm for resource allocation. This article discusses challenges and recent developments in H-CRAN design. It proposes promising resource allocation schemes in H-CRAN: coordinated scheduling, hybrid backhauling, and multicloud association. Simulations results show how the proposed strategies provide appreciable performance improvement compared to methods from recent literature. © 2015 IEEE.

  13. Raging Against the Machine: Network Gatekeeping and Collective Action on Social Media Platforms

    Directory of Open Access Journals (Sweden)

    Sarah Myers West

    2017-09-01

    Full Text Available Social media platforms act as networked gatekeepers—by ranking, channeling, promoting, censoring, and deleting content they hold power to facilitate or hinder information flows. One of the mechanisms they use is content moderation, or the enforcement of which content is allowed or disallowed on the platform. Though content moderation relies on users’ labor to identify content to delete, users have little capacity to influence content policies or enforcement. Despite this, some social media users are turning to collective action campaigns, redirecting information flows by subverting the activities of moderators, raising the visibility of otherwise hidden moderation practices, and organizing constituencies in opposition to content policies. Drawing on the example of the campaign to change Facebook’s nudity policy, this paper examines the strategies and tactics of users turning to collective action, considering which factors are most influential in determining the success or failure of a campaign. It finds that network gatekeeping salience is a good model for assessing which collective action efforts are most likely to be effective in achieving individual user goals. This indicates that the users who are already most able to harness the attention economy of social media platforms are more likely to successfully navigate the content moderation process. The analysis concludes by attending to what users might learn from the dynamics of network gatekeeping as they seek to resist the asymmetrical power relations of platforms.

  14. Adaptive spectrum decision framework for heterogeneous dynamic spectrum access networks

    CSIR Research Space (South Africa)

    Masonta, M

    2015-09-01

    Full Text Available Spectrum decision is the ability of a cognitive radio (CR) system to select the best available spectrum band to satisfy dynamic spectrum access network (DSAN) users¿ quality of service (QoS) requirements without causing harmful interference...

  15. Measuring sustainable accessibility potential using the mobility infrastructure's network configuration

    NARCIS (Netherlands)

    Gil, J.; Read, S.

    2012-01-01

    This paper is an exploration into the analysis of public transport networks using space syntax approaches combined with concepts of sustainable accessibility. Present urban development policy aims to achieve sustainable mobility patterns, shifting mobility to soft transportation modes such as

  16. Design of Active Queue Management for Robust Control on Access Router for Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Åhlund Christer

    2011-01-01

    Full Text Available The Internet architecture is a packet switching technology that allows dynamic sharing of bandwidth among different flows with in an IP network. Packets are stored and forwarded from one node to the next until reaching their destination. Major issues in this integration are congestion control and how to meet different quality of service requirements associated with various services. In other words streaming media quality degrades with increased packet delay and jitter caused by network congestion. To mitigate the impact of network congestion, various techniques have been used to improve multimedia quality and one of those techniques is Active Queue Management (AQM. Access routers require a buffer to hold packets during times of congestion. A large buffer can absorb the bursty arrivals, and this tends to increase the link utilizations but results in higher queuing delays. Traffic burstiness has a considerable negative impact on network performance. AQM is now considered an effective congestion control mechanism for enhancing transport protocol performance over wireless links. In order to have good link utilization, it is necessary for queues to adapt to varying traffic loads. This paper considers a particular scheme which is called Adaptive AQM (AAQM and studies its performance in the presence of feedback delays and its ability to maintain a small queue length as well as its robustness in the presence of traffic burstiness. The paper also presents a method based on the well-known Markov Modulated Poisson Process (MPP to capture traffic burstiness and buffer occupancy. To demonstrate the generality of the presented method, an analytic model is described and verified by extensive simulations of different adaptive AQM algorithms. The analysis and simulations show that AAQM outperforms the other AQMs with respect to responsiveness and robustness.

  17. Detection of strong attractors in social media networks.

    Science.gov (United States)

    Qasem, Ziyaad; Jansen, Marc; Hecking, Tobias; Hoppe, H Ulrich

    2016-01-01

    Detection of influential actors in social media such as Twitter or Facebook plays an important role for improving the quality and efficiency of work and services in many fields such as education and marketing. The work described here aims to introduce a new approach that characterizes the influence of actors by the strength of attracting new active members into a networked community. We present a model of influence of an actor that is based on the attractiveness of the actor in terms of the number of other new actors with which he or she has established relations over time. We have used this concept and measure of influence to determine optimal seeds in a simulation of influence maximization using two empirically collected social networks for the underlying graphs. Our empirical results on the datasets demonstrate that our measure stands out as a useful measure to define the attractors comparing to the other influence measures.

  18. ‪The Vulnerability of Social Networking Media and the Insider Threat: New Eyes for Bad Guys‬ [video

    OpenAIRE

    Lenkart, John; Center for Homeland Defense and Security Naval Postgraduate School

    2012-01-01

    Social networking media introduces a new set of vulnerabilities to protecting an organization's sensitive information. Adversaries are actively targeting U.S. industry to acquire trade secrets to undercut U.S. business in the marketplace. Of primary concern is an insider's betrayal of an organization by providing sensitive information to a hostile outsider. Social engineering, when coupled with the new and widespread use of social networking media, becomes more effective by exploiting the wea...

  19. Hybrid monitoring scheme for end-to-end performance enhancement of multicast-based real-time media

    Science.gov (United States)

    Park, Ju-Won; Kim, JongWon

    2004-10-01

    As real-time media applications based on IP multicast networks spread widely, end-to-end QoS (quality of service) provisioning for these applications have become very important. To guarantee the end-to-end QoS of multi-party media applications, it is essential to monitor the time-varying status of both network metrics (i.e., delay, jitter and loss) and system metrics (i.e., CPU and memory utilization). In this paper, targeting the multicast-enabled AG (Access Grid) a next-generation group collaboration tool based on multi-party media services, the applicability of hybrid monitoring scheme that combines active and passive monitoring is investigated. The active monitoring measures network-layer metrics (i.e., network condition) with probe packets while the passive monitoring checks both application-layer metrics (i.e., user traffic condition by analyzing RTCP packets) and system metrics. By comparing these hybrid results, we attempt to pinpoint the causes of performance degradation and explore corresponding reactions to improve the end-to-end performance. The experimental results show that the proposed hybrid monitoring can provide useful information to coordinate the performance improvement of multi-party real-time media applications.

  20. The Future of the New Media in the Communication of Science

    Science.gov (United States)

    Hanson, Joseph

    2014-03-01

    New media, that which is based around social networks, ubiquitous consumer technology, and today's near-universal access to information, has transformed the way that science is communicated to the scientist and non-scientist alike. We may be in the midst of mankind's greatest shift in information consumption and distribution since the invention of the printing press. Or maybe not. The problem with predicting the future is that it's very hard, and unless you're Isaac Asimov, it's very easy to be wrong. When one predicts the future regarding the internet, that risk becomes almost a certainty. Still, we can apply lessons learned from the near and distant history of science communication to put today's new media evolution into perspective, and to give us clues as to where social media, digital journalism, open access, and online education will lead science communication in years to come. Most importantly, it remains to be seen whether this new media evolution will translate into a shift in how science is viewed by citizens and their policymakers.

  1. Switched-based interference reduction scheme for open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh

    2012-06-01

    Femtocells have been proposed to enhance the spatial coverage and system capacity of existing cellular networks. However, this technology may result in significant performance loss due to the increase in co-channel interference, particularly when coordination between access points is infeasible. This paper targets interference management in such overlaid networks. It is assumed that the femtocells employ the open-access strategy to reduce cross-tier interference, and can share resources concurrently. It is also assumed that each end user (EU) can access one channel at a time, and transfer limited feedback. To reduce the effect of co-tier interference in the absence of the desired EU channel state information (CSI) at the serving access point as well as coordination between active access points, a switched scheme based on the interference levels associated with available channels is proposed. Through the analysis, the scheme modes of operation in under-loaded and over-loaded channels are studied, from which the statistics of the resulting interference power are quantified. The impact of the proposed scheme on the received desired power is thoroughly discussed. In addition, the effect of the switching threshold on the achieved performance of the desired EU is investigated. The results clarify that the proposed scheme can improve the performance while reducing the number of examined channels and feedback load. © 2012 IEEE.

  2. Labeling Actors and Uncovering Causal Accounts of Their States in Social Networks and Social Media

    Science.gov (United States)

    Bui, Ngot P.

    2016-01-01

    The emergence of social networks and social media has resulted in exponential increase in the amount of data that link diverse types of richly structured digital objects e.g., individuals, articles, images, videos, music, etc. Such data are naturally represented as heterogeneous networks with multiple types of objects e.g., actors, video,…

  3. Social media: the word of mouth revolution.

    Science.gov (United States)

    Garven, Joseph J

    2010-01-01

    Many dental practices today find themselves uncertain about the new social media universe, and in particular with how to relate to younger patients. The power of social networking is its immediate access to the word of mouth exchange of information, and the word of mouth avenue itself is recognized as the single most effective form of advertising. To tap into that phenomenon, begin by investing a small amount of time and effort to understand the basics of social networking. Sign up for Facebook and Twitter. First-hand experience interacting in a social network is the vital first step. The bottom line is simply this: To begin to understand this new arena of communication, you first have to join the conversation.

  4. Applying a rateless code in content delivery networks

    Science.gov (United States)

    Suherman; Zarlis, Muhammad; Parulian Sitorus, Sahat; Al-Akaidi, Marwan

    2017-09-01

    Content delivery network (CDN) allows internet providers to locate their services, to map their coverage into networks without necessarily to own them. CDN is part of the current internet infrastructures, supporting multi server applications especially social media. Various works have been proposed to improve CDN performances. Since accesses on social media servers tend to be short but frequent, providing redundant to the transmitted packets to ensure lost packets not degrade the information integrity may improve service performances. This paper examines the implementation of rateless code in the CDN infrastructure. The NS-2 evaluations show that rateless code is able to reduce packet loss up to 50%.

  5. Detecting Rumors Through Modeling Information Propagation Networks in a Social Media Environment.

    Science.gov (United States)

    Liu, Yang; Xu, Songhua; Tourassi, Georgia

    2015-01-01

    In the midst of today's pervasive influence of social media content and activities, information credibility has increasingly become a major issue. Accordingly, identifying false information, e.g. rumors circulated in social media environments, attracts expanding research attention and growing interests. Many previous studies have exploited user-independent features for rumor detection. These prior investigations uniformly treat all users relevant to the propagation of a social media message as instances of a generic entity. Such a modeling approach usually adopts a homogeneous network to represent all users, the practice of which ignores the variety across an entire user population in a social media environment. Recognizing this limitation of modeling methodologies, this study explores user-specific features in a social media environment for rumor detection. The new approach hypothesizes that whether a user tends to spread a rumor is dependent upon specific attributes of the user in addition to content characteristics of the message itself. Under this hypothesis, information propagation patterns of rumors versus those of credible messages in a social media environment are systematically differentiable. To explore and exploit this hypothesis, we develop a new information propagation model based on a heterogeneous user representation for rumor recognition. The new approach is capable of differentiating rumors from credible messages through observing distinctions in their respective propagation patterns in social media. Experimental results show that the new information propagation model based on heterogeneous user representation can effectively distinguish rumors from credible social media content.

  6. Access, fronthaul and backhaul networks for 5G and beyond

    CERN Document Server

    Imran, Muhammad Ali; Shakir, Muhammad Zeeshan

    2017-01-01

    This book provides an overview from both academic and industrial stakeholders of innovative backhaul/fronthaul solutions, covering a wide spectrum of underlying themes ranging from the recent thrust in edge caching for backhaul relaxation to mmWave based fronthauling for radio access networks.

  7. Predicting ethnicity with first names in online social media networks

    Directory of Open Access Journals (Sweden)

    Bas Hofstra

    2018-03-01

    Full Text Available Social scientists increasingly use (big social media data to illuminate long-standing substantive questions in social science research. However, a key challenge of analyzing such data is their lower level of individual detail compared to highly detailed survey data. This limits the scope of substantive questions that can be addressed with these data. In this study, we provide a method to upgrade individual detail in terms of ethnicity in data gathered from social media via the use of register data. Our research aim is twofold: first, we predict the most likely value of ethnicity, given one's first name, and second, we show how one can test hypotheses with the predicted values for ethnicity as an independent variable while simultaneously accounting for the uncertainty in these predictions. We apply our method to social network data collected from Facebook. We illustrate our approach and provide an example of hypothesis testing using our procedure, i.e., estimating the relation between predicted network ethnic homogeneity on Facebook and trust in institutions. In a comparison of our method with two other methods, we find that our method provides the most conservative tests of hypotheses. We discuss the promise of our approach and pinpoint future research directions.

  8. Downlink Non-Orthogonal Multiple Access (NOMA) in Poisson Networks

    KAUST Repository

    Ali, Konpal S.

    2018-03-21

    A network model is considered where Poisson distributed base stations transmit to $N$ power-domain non-orthogonal multiple access (NOMA) users (UEs) each that employ successive interference cancellation (SIC) for decoding. We propose three models for the clustering of NOMA UEs and consider two different ordering techniques for the NOMA UEs: mean signal power-based and instantaneous signal-to-intercell-interference-and-noise-ratio-based. For each technique, we present a signal-to-interference-and-noise ratio analysis for the coverage of the typical UE. We plot the rate region for the two-user case and show that neither ordering technique is consistently superior to the other. We propose two efficient algorithms for finding a feasible resource allocation that maximize the cell sum rate $\\\\mathcal{R}_{\\ m tot}$, for general $N$, constrained to: 1) a minimum rate $\\\\mathcal{T}$ for each UE, 2) identical rates for all UEs. We show the existence of: 1) an optimum $N$ that maximizes the constrained $\\\\mathcal{R}_{\\ m tot}$ given a set of network parameters, 2) a critical SIC level necessary for NOMA to outperform orthogonal multiple access. The results highlight the importance in choosing the network parameters $N$, the constraints, and the ordering technique to balance the $\\\\mathcal{R}_{\\ m tot}$ and fairness requirements. We also show that interference-aware UE clustering can significantly improve performance.

  9. Downlink Non-Orthogonal Multiple Access (NOMA) in Poisson Networks

    KAUST Repository

    Ali, Konpal S.; Haenggi, Martin; Elsawy, Hesham; Chaaban, Anas; Alouini, Mohamed-Slim

    2018-01-01

    A network model is considered where Poisson distributed base stations transmit to $N$ power-domain non-orthogonal multiple access (NOMA) users (UEs) each that employ successive interference cancellation (SIC) for decoding. We propose three models for the clustering of NOMA UEs and consider two different ordering techniques for the NOMA UEs: mean signal power-based and instantaneous signal-to-intercell-interference-and-noise-ratio-based. For each technique, we present a signal-to-interference-and-noise ratio analysis for the coverage of the typical UE. We plot the rate region for the two-user case and show that neither ordering technique is consistently superior to the other. We propose two efficient algorithms for finding a feasible resource allocation that maximize the cell sum rate $\\mathcal{R}_{\\rm tot}$, for general $N$, constrained to: 1) a minimum rate $\\mathcal{T}$ for each UE, 2) identical rates for all UEs. We show the existence of: 1) an optimum $N$ that maximizes the constrained $\\mathcal{R}_{\\rm tot}$ given a set of network parameters, 2) a critical SIC level necessary for NOMA to outperform orthogonal multiple access. The results highlight the importance in choosing the network parameters $N$, the constraints, and the ordering technique to balance the $\\mathcal{R}_{\\rm tot}$ and fairness requirements. We also show that interference-aware UE clustering can significantly improve performance.

  10. Scalable Active Optical Access Network Using Variable High-Speed PLZT Optical Switch/Splitter

    Science.gov (United States)

    Ashizawa, Kunitaka; Sato, Takehiro; Tokuhashi, Kazumasa; Ishii, Daisuke; Okamoto, Satoru; Yamanaka, Naoaki; Oki, Eiji

    This paper proposes a scalable active optical access network using high-speed Plumbum Lanthanum Zirconate Titanate (PLZT) optical switch/splitter. The Active Optical Network, called ActiON, using PLZT switching technology has been presented to increase the number of subscribers and the maximum transmission distance, compared to the Passive Optical Network (PON). ActiON supports the multicast slot allocation realized by running the PLZT switch elements in the splitter mode, which forces the switch to behave as an optical splitter. However, the previous ActiON creates a tradeoff between the network scalability and the power loss experienced by the optical signal to each user. It does not use the optical power efficiently because the optical power is simply divided into 0.5 to 0.5 without considering transmission distance from OLT to each ONU. The proposed network adopts PLZT switch elements in the variable splitter mode, which controls the split ratio of the optical power considering the transmission distance from OLT to each ONU, in addition to PLZT switch elements in existing two modes, the switching mode and the splitter mode. The proposed network introduces the flexible multicast slot allocation according to the transmission distance from OLT to each user and the number of required users using three modes, while keeping the advantages of ActiON, which are to support scalable and secure access services. Numerical results show that the proposed network dramatically reduces the required number of slots and supports high bandwidth efficiency services and extends the coverage of access network, compared to the previous ActiON, and the required computation time for selecting multicast users is less than 30msec, which is acceptable for on-demand broadcast services.

  11. Distributed cloud association in downlink multicloud radio access networks

    KAUST Repository

    Dahrouj, Hayssam

    2015-03-01

    This paper considers a multicloud radio access network (M-CRAN), wherein each cloud serves a cluster of base-stations (BS\\'s) which are connected to the clouds through high capacity digital links. The network comprises several remote users, where each user can be connected to one (and only one) cloud. This paper studies the user-to-cloud-assignment problem by maximizing a network-wide utility subject to practical cloud connectivity constraints. The paper solves the problem by using an auction-based iterative algorithm, which can be implemented in a distributed fashion through a reasonable exchange of information between the clouds. The paper further proposes a centralized heuristic algorithm, with low computational complexity. Simulations results show that the proposed algorithms provide appreciable performance improvements as compared to the conventional cloud-less assignment solutions. © 2015 IEEE.

  12. Identifying Opinion Leaders to Promote Organ Donation on Social Media: Network Study

    Science.gov (United States)

    Salmon, Charles T

    2018-01-01

    Background In the recent years, social networking sites (SNSs, also called social media) have been adopted in organ donation campaigns, and recruiting opinion leaders for such campaigns has been found effective in promoting behavioral changes. Objective The aim of this paper was to focus on the dissemination of organ donation tweets on Weibo, the Chinese equivalent of Twitter, and to examine the opinion leadership in the retweet network of popular organ donation messages using social network analysis. It also aimed to investigate how personal and social attributes contribute to a user’s opinion leadership on the topic of organ donation. Methods All messages about organ donation posted on Weibo from January 1, 2015 to December 31, 2015 were extracted using Python Web crawler. A retweet network with 505,047 nodes and 545,312 edges of the popular messages (n=206) was constructed and analyzed. The local and global opinion leaderships were measured using network metrics, and the roles of personal attributes, professional knowledge, and social positions in obtaining the opinion leadership were examined using general linear model. Results The findings revealed that personal attributes, professional knowledge, and social positions predicted individual’s local opinion leadership in the retweet network of popular organ donation messages. Alternatively, personal attributes and social positions, but not professional knowledge, were significantly associated with global opinion leadership. Conclusions The findings of this study indicate that health campaign designers may recruit peer leaders in SNS organ donation promotions to facilitate information sharing among the target audience. Users who are unverified, active, well connected, and experienced with information and communications technology (ICT) will accelerate the sharing of organ donation messages in the global environment. Medical professionals such as organ transplant surgeons who can wield a great amount of

  13. An Adaptive Time-Spread Multiple-Access Policy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Konstantinos Oikonomou

    2007-05-01

    Full Text Available Sensor networks require a simple and efficient medium access control policy achieving high system throughput with no or limited control overhead in order to increase the network lifetime by minimizing the energy consumed during transmission attempts. Time-spread multiple-access (TSMA policies that have been proposed for ad hoc network environments, can also be employed in sensor networks, since no control overhead is introduced. However, they do not take advantage of any cross-layer information in order to exploit the idiosyncrasies of the particular sensor network environment such as the presence of typically static nodes and a common destination for the forwarded data. An adaptive probabilistic TSMA-based policy, that is proposed and analyzed in this paper, exploits these idiosyncrasies and achieves higher system throughput than the existing TSMA-based policies without any need for extra control overhead. As it is analytically shown in this paper, the proposed policy always outperforms the existing TSMA-based policies, if certain parameter values are properly set; the analysis also provides for these proper values. It is also shown that the proposed policy is characterized by a certain convergence period and that high system throughput is achieved for long convergence periods. The claims and expectations of the provided analysis are supported by simulation results presented in this paper.

  14. Network flow model of force transmission in unbonded and bonded granular media.

    Science.gov (United States)

    Tordesillas, Antoinette; Tobin, Steven T; Cil, Mehmet; Alshibli, Khalid; Behringer, Robert P

    2015-06-01

    An established aspect of force transmission in quasistatic deformation of granular media is the existence of a dual network of strongly versus weakly loaded particles. Despite significant interest, the regulation of strong and weak forces through the contact network remains poorly understood. We examine this aspect of force transmission using data on microstructural fabric from: (I) three-dimensional discrete element models of grain agglomerates of bonded subspheres constructed from in situ synchrotron microtomography images of silica sand grains under unconfined compression and (II) two-dimensional assemblies of unbonded photoelastic circular disks submitted to biaxial compression under constant volume. We model force transmission as a network flow and solve the maximum flow-minimum cost (MFMC) problem, the solution to which yields a percolating subnetwork of contacts that transmits the "maximum flow" (i.e., the highest units of force) at "least cost" (i.e., the dissipated energy from such transmission). We find the MFMC describes a two-tier hierarchical architecture. At the local level, it encapsulates intraconnections between particles in individual force chains and in their conjoined 3-cycles, with the most common configuration having at least one force chain contact experiencing frustrated rotation. At the global level, the MFMC encapsulates interconnections between force chains. The MFMC can be used to predict most of the force chain particles without need for any information on contact forces, thereby suggesting the network flow framework may have potential broad utility in the modeling of force transmission in unbonded and bonded granular media.

  15. A Review Paper On Exploring Text Link And Spacial-Temporal Information In Social Media Networks

    Directory of Open Access Journals (Sweden)

    Dr. Mamta Madan

    2015-03-01

    Full Text Available ABSTRACT The objective of this paper is to have a literature review on the various methods to mine the knowledge from the social media by taking advantage of embedded heterogeneous information. Specifically we are trying to review different types of mining framework which provides us useful information from these networks that have heterogeneous data types including text spacial-temporal and data association LINK information. Firstly we will discuss the link mining to study the link structure with respect to Social Media SM. Secondly we summarize the various text mining models thirdly we shall review spacial as well the temporal models to extract or detect the frequent related topics from SM. Fourthly we will try to figure out few improvised models that take advantage of the link textual temporal and spacial information which motivates to discover progressive principles and fresh methodologies for DM Data Mining in social media networks SMNs.

  16. Convergence of broadband optical and wireless access networks

    Science.gov (United States)

    Chang, Gee-Kung; Jia, Zhensheng; Chien, Hung-Chang; Chowdhury, Arshad; Hsueh, Yu-Ting; Yu, Jianjun

    2009-01-01

    This paper describes convergence of optical and wireless access networks for delivering high-bandwidth integrated services over optical fiber and air links. Several key system technologies are proposed and experimentally demonstrated. We report here, for the first ever, a campus-wide field trial demonstration of radio-over-fiber (RoF) system transmitting uncompressed standard-definition (SD) high-definition (HD) real-time video contents, carried by 2.4-GHz radio and 60- GHz millimeter-wave signals, respectively, over 2.5-km standard single mode fiber (SMF-28) through the campus fiber network at Georgia Institute of Technology (GT). In addition, subsystem technologies of Base Station and wireless tranceivers operated at 60 GHz for real-time video distribution have been developed and tested.

  17. Image transmission in multicore-fiber code-division multiple access network

    Science.gov (United States)

    Yang, Guu-Chang; Kwong, Wing C.

    1997-01-01

    Recently, two-dimensional (2-D) signature patterns were proposed to encode binary digitized image pixels in optical code-division multiple-access (CDMA) networks with 'multicore' fiber. The new technology enables parallel transmission and simultaneous access of 2-D images in multiple-access environment, where these signature patterns are defined as optical orthogonal signature pattern codes (OOSPCs). However, previous work on OOSPCs assumed that the weight of each signature pattern was the same. In this paper, we construct a new family of OOSPCs with the removal of this assumption. Since varying the weight of a user's signature pattern affects that user's performance, this approach is useful for CDMA optical systems with multiple performance requirements.

  18. School Library Media Specialists and the Internet: Road Kill or Road Warriors?

    Science.gov (United States)

    Barron, Daniel D.

    1994-01-01

    Discusses use of the Internet by school library media specialists and its importance in the development of the library profession. Highlights include how to access the Internet and resources about the Internet, including information about networks as well as three sources that provide introductions to the general concepts of the Internet. (LRW)

  19. New mothers and media use: associations between blogging, social networking, and maternal well-being.

    Science.gov (United States)

    McDaniel, Brandon T; Coyne, Sarah M; Holmes, Erin K

    2012-10-01

    Drawing on Bronfenbrenner's ecological theory and prior empirical research, the current study examines the way that blogging and social networking may impact feelings of connection and social support, which in turn could impact maternal well-being (e.g., marital functioning, parenting stress, and depression). One hundred and fifty-seven new mothers reported on their media use and various well-being variables. On average, mothers were 27 years old (SD = 5.15) and infants were 7.90 months old (SD = 5.21). All mothers had access to the Internet in their home. New mothers spent approximately 3 hours on the computer each day, with most of this time spent on the Internet. Findings suggested that frequency of blogging predicted feelings of connection to extended family and friends which then predicted perceptions of social support. This in turn predicted maternal well-being, as measured by marital satisfaction, couple conflict, parenting stress, and depression. In sum, blogging may improve new mothers' well-being, as they feel more connected to the world outside their home through the Internet.

  20. Analyzing Social Media Networks with NodeXL Insights from a Connected World

    CERN Document Server

    Hansen, Derek; Smith, Marc A

    2010-01-01

    Businesses, entrepreneurs, individuals, and government agencies alike are looking to social network analysis (SNA) tools for insight into trends, connections, and fluctuations in social media. Microsoft's NodeXL is a free, open-source SNA plug-in for use with Excel. It provides instant graphical representation of relationships of complex networked data. But it goes further than other SNA tools -- NodeXL was developed by a multidisciplinary team of experts that bring together information studies, computer science, sociology, human-computer interaction, and over 20 years of visual analytic theor

  1. #TheWeaponizationOfSocialMedia

    DEFF Research Database (Denmark)

    Nissen, Thomas Elkjer

    In today’s conflict environment, transformed by information technology and of who can communicate and how, states, non-state actors, ad hoc activist networks and individuals create effect(s) in and through social network media in support of their objectives. #TheWeaponizationOfSocialMedia develops...... a framework for understanding how social network media shapes global politics and contemporary conflicts by examining their role as a platform for conduction intelligence collection, targeting, cyber-operations, psychological warfare and command and control activities. Through these, the weaponization...... of social media shows both the possibilities and the limitations of social network media in contemporary conflicts and makes a contribution to theorizing and studying contemporary conflicts....

  2. Receiver-initiated medium access control protocols for wireless sensor networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.

    2015-01-01

    One of the fundamental building blocks of a Wireless Sensor Network (WSN) is the Medium Access Control (MAC) protocol, that part of the system governing when and how two independent neighboring nodes activate their respective transceivers to directly interact. Historically, data exchange has always...

  3. MediaTracker system

    Energy Technology Data Exchange (ETDEWEB)

    Sandoval, D. M. (Dana M.); Strittmatter, R. B. (Richard B.); Abeyta, J. D. (Joline D.); Brown, J. (John); Marks, T. (Thomas), Jr.; Martinez, B. J. (Benny J.); Jones, D. B. (Dana Benelli); Hsue, W.

    2004-01-01

    The initial objectives of this effort were to provide a hardware and software platform that can address the requirements for the accountability of classified removable electronic media and vault access logging. The Media Tracker system software assists classified media custodian in managing vault access logging and Media Tracking to prevent the inadvertent violation of rules or policies for the access to a restricted area and the movement and use of tracked items. The MediaTracker system includes the software tools to track and account for high consequence security assets and high value items. The overall benefits include: (1) real-time access to the disposition of all Classified Removable Electronic Media (CREM), (2) streamlined security procedures and requirements, (3) removal of ambiguity and managerial inconsistencies, (4) prevention of incidents that can and should be prevented, (5) alignment with the DOE's initiative to achieve improvements in security and facility operations through technology deployment, and (6) enhanced individual responsibility by providing a consistent method of dealing with daily responsibilities. In response to initiatives to enhance the control of classified removable electronic media (CREM), the Media Tracker software suite was developed, piloted and implemented at the Los Alamos National Laboratory beginning in July 2000. The Media Tracker software suite assists in the accountability and tracking of CREM and other high-value assets. One component of the MediaTracker software suite provides a Laboratory-approved media tracking system. Using commercial touch screen and bar code technology, the MediaTracker (MT) component of the MediaTracker software suite provides an efficient and effective means to meet current Laboratory requirements and provides new-engineered controls to help assure compliance with those requirements. It also establishes a computer infrastructure at vault entrances for vault access logging, and can

  4. MediaTracker system

    International Nuclear Information System (INIS)

    Sandoval, D.M.; Strittmatter, R.B.; Abeyta, J.D.; Brown, J.; Marks, T. Jr.; Martinez, B.J.; Jones, D.B.; Hsue, W.

    2004-01-01

    The initial objectives of this effort were to provide a hardware and software platform that can address the requirements for the accountability of classified removable electronic media and vault access logging. The Media Tracker system software assists classified media custodian in managing vault access logging and Media Tracking to prevent the inadvertent violation of rules or policies for the access to a restricted area and the movement and use of tracked items. The MediaTracker system includes the software tools to track and account for high consequence security assets and high value items. The overall benefits include: (1) real-time access to the disposition of all Classified Removable Electronic Media (CREM), (2) streamlined security procedures and requirements, (3) removal of ambiguity and managerial inconsistencies, (4) prevention of incidents that can and should be prevented, (5) alignment with the DOE's initiative to achieve improvements in security and facility operations through technology deployment, and (6) enhanced individual responsibility by providing a consistent method of dealing with daily responsibilities. In response to initiatives to enhance the control of classified removable electronic media (CREM), the Media Tracker software suite was developed, piloted and implemented at the Los Alamos National Laboratory beginning in July 2000. The Media Tracker software suite assists in the accountability and tracking of CREM and other high-value assets. One component of the MediaTracker software suite provides a Laboratory-approved media tracking system. Using commercial touch screen and bar code technology, the MediaTracker (MT) component of the MediaTracker software suite provides an efficient and effective means to meet current Laboratory requirements and provides new-engineered controls to help assure compliance with those requirements. It also establishes a computer infrastructure at vault entrances for vault access logging, and can accommodate

  5. Channel Access and Power Control for Mobile Crowdsourcing in Device-to-Device Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yue Ma

    2018-01-01

    Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.

  6. Enhancing Sensing and Channel Access in Cognitive Radio Networks

    KAUST Repository

    Hamza, Doha R.

    2014-06-18

    Cognitive radio technology is a promising technology to solve the wireless spectrum scarcity problem by intelligently allowing secondary, or unlicensed, users access to the primary, licensed, users\\' frequency bands. Cognitive technology involves two main tasks: 1) sensing the wireless medium to assess the presence of the primary users and 2) designing secondary spectrum access techniques that maximize the secondary users\\' benefits while maintaining the primary users\\' privileged status. On the spectrum sensing side, we make two contributions. First, we maximize a utility function representing the secondary throughput while constraining the collision probability with the primary below a certain value. We optimize therein the channel sensing time, the sensing decision threshold, the channel probing time, together with the channel sensing order for wideband primary channels. Second, we design a cooperative spectrum sensing technique termed sensing with equal gain combining whereby cognitive radios simultaneously transmit their sensing results to the fusion center over multipath fading reporting channels. The proposed scheme is shown to outperform orthogonal reporting systems in terms of achievable secondary throughput and to be robust against phase and synchronization errors. On the spectrum access side, we make four contributions. First, we design a secondary scheduling scheme with the goal of minimizing the secondary queueing delay under constraints on the average secondary transmit power and the maximum tolerable primary outage probability. Second, we design another secondary scheduling scheme based on the spectrum sensing results and the primary automatic repeat request feedback. The optimal medium access probabilities are obtained via maximizing the secondary throughput subject to constraints that guarantee quality of service parameters for the primary. Third, we propose a three-message superposition coding scheme to maximize the secondary throughput without

  7. Modeling Accessibility of Screening and Treatment Facilities for Older Adults using Transportation Networks.

    Science.gov (United States)

    Zhang, Qiuyi; Northridge, Mary E; Jin, Zhu; Metcalf, Sara S

    2018-04-01

    Increased lifespans and population growth have resulted in an older U.S. society that must reckon with the complex oral health needs that arise as adults age. Understanding accessibility to screening and treatment facilities for older adults is necessary in order to provide them with preventive and restorative services. This study uses an agent-based model to examine the accessibility of screening and treatment facilities via transportation networks for older adults living in the neighborhoods of northern Manhattan, New York City. Older adults are simulated as socioeconomically distinct agents who move along a GIS-based transportation network using transportation modes that mediate their access to screening and treatment facilities. This simulation model includes four types of mobile agents as a simplifying assumption: walk, by car, by bus, or by van (i.e., a form of transportation assistance for older adults). These mobile agents follow particular routes: older adults who travel by car, bus, and van follow street roads, whereas pedestrians follow walkways. The model enables the user to focus on one neighborhood at a time for analysis. The spatial dimension of an older adult's accessibility to screening and treatment facilities is simulated through the travel costs (indicated by travel time or distance) incurred in the GIS-based model environment, where lower travel costs to screening and treatment facilities imply better access. This model provides a framework for representing health-seeking behavior that is contextualized by a transportation network in a GIS environment.

  8. Clock Synchronization for Multihop Wireless Sensor Networks

    Science.gov (United States)

    Solis Robles, Roberto

    2009-01-01

    In wireless sensor networks, more so generally than in other types of distributed systems, clock synchronization is crucial since by having this service available, several applications such as media access protocols, object tracking, or data fusion, would improve their performance. In this dissertation, we propose a set of algorithms to achieve…

  9. Virtual Community, social network and media environment of Canary Isands regional digital newspapers

    Directory of Open Access Journals (Sweden)

    Dr. Francisco Manuel Mateos Rodríguez

    2008-01-01

    Full Text Available The impact of the new communication and information technologies has favoured the creation of multiple local newspaper websites in the Canary Islands, thus making the regional press emerge as an alternative on the rise. This tendency affects significantly both traditional and new editions of the different regional and local newspapers from the Canaries and motivates a different distribution, positioning and development within the local media environment in which these media share a novel dimension of communication with a specific virtual community and social network within the World Wide Web.

  10. Acoustic Metadata Management and Transparent Access to Networked Oceanographic Data Sets

    Science.gov (United States)

    2015-09-30

    Transparent Access to Networked Oceanographic Data Sets Marie A. Roch Dept. of Computer Science San Diego State University 5500 Campanile Drive San...specific technologies for processing Excel spreadsheets and Access databases. The architecture (Figure 4) is based on a client-server model...Keesey, M. S., Lieske, J. H., Ostro, S. J., Standish, E. M., and Wimberly, R. N. (1996). "JPL’s On-Line Solar System Data Service," B. Am. Astron

  11. Optimization of flow modeling in fractured media with discrete fracture network via percolation theory

    Science.gov (United States)

    Donado-Garzon, L. D.; Pardo, Y.

    2013-12-01

    Fractured media are very heterogeneous systems where occur complex physical and chemical processes to model. One of the possible approaches to conceptualize this type of massifs is the Discrete Fracture Network (DFN). Donado et al., modeled flow and transport in a granitic batholith based on this approach and found good fitting with hydraulic and tracer tests, but the computational cost was excessive due to a gigantic amount of elements to model. We present in this work a methodology based on percolation theory for reducing the number of elements and in consequence, to reduce the bandwidth of the conductance matrix and the execution time of each network. DFN poses as an excellent representation of all the set of fractures of the media, but not all the fractures of the media are part of the conductive network. Percolation theory is used to identify which nodes or fractures are not conductive, based on the occupation probability or percolation threshold. In a fractured system, connectivity determines the flow pattern in the fractured rock mass. This volume of fluid is driven through connection paths formed by the fractures, when the permeability of the rock is negligible compared to the fractures. In a population of distributed fractures, each of this that has no intersection with any connected fracture do not contribute to generate a flow field. This algorithm also permits us to erase these elements however they are water conducting and hence, refine even more the backbone of the network. We used 100 different generations of DFN that were optimized in this study using percolation theory. In each of the networks calibrate hydrodynamic parameters as hydraulic conductivity and specific storage coefficient, for each of the five families of fractures, yielding a total of 10 parameters to estimate, at each generation. Since the effects of the distribution of fault orientation changes the value of the percolation threshold, but not the universal laws of classical

  12. Pharmacy, social media, and health: Opportunity for impact.

    Science.gov (United States)

    Cain, Jeff; Romanelli, Frank; Fox, Brent

    2010-01-01

    To discuss opportunities and challenges for pharmacists' use of social media to affect health care. Not applicable. Evolutions in social media (e.g., Facebook, Twitter, YouTube) are beginning to alter the way society communicates. These new applications promote openness, user-generated content, social networking, and collaboration. The technologies, along with patient behaviors and desires, are stimulating a move toward more open and transparent access to health information. Although social media applications can reach large audiences, they offer message-tailoring capabilities that can effectively target specific populations. Another powerful aspect of social media is that they facilitate the organization of people and distribution of content-two necessary components of public health services. Although implementing health interventions via social media poses challenges, several examples exist that display the potential for pharmacists to use social media in health initiatives. Pharmacists have long played a role in educating patients on matters influencing health care. Social media offer several unique features that may be used to advance the role of pharmacy in health care initiatives. Public familiarity with social media, the economical nature of using social media, and the ability to disseminate information rapidly through social media make these new applications ideal for pharmacists wanting to provide innovative health care on both an individual and public level.

  13. Simple measurement-based admission control for DiffServ access networks

    Science.gov (United States)

    Lakkakorpi, Jani

    2002-07-01

    In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.

  14. Social networking and the Olympic Movement: social media analysis, opportunities and trends : final report

    OpenAIRE

    Fernández Peña, Emilio

    2011-01-01

    Table of contents : 1: Introduction. - 2 : Sociodemographic data of social networking sites. - 3 : The Vancouver 2010 Olympic Winter Games on Facebook, Twitter and Orkut. - 4 : Singapore 2010 Youth Olympic Games communication strategies on Facebook and Twitter. - 5 : Sport organizations social networking strategies : case study analysis. - 6 : Olympic athletes and social media use during a non olympic-period. - 7. The Olympic Games, NBA and FC Barcelona on Facebook : content and fan participa...

  15. Gain transient control for wavelength division multiplexed access networks using semiconductor optical amplifiers

    DEFF Research Database (Denmark)

    Gibbon, Timothy Braidwood; Osadchiy, Alexey Vladimirovich; Kjær, Rasmus

    2009-01-01

    Gain transients can severely hamper the upstream network performance in wavelength division multiplexed (WDM) access networks featuring erbium doped fiber amplifiers (EDFAs) or Raman amplification. We experimentally demonstrate for the first time using 10 Gb/s fiber transmission bit error rate...... measurements how a near-saturated semiconductor optical amplifier (SOA) can be used to control these gain transients. An SOA is shown to reduce the penalty of transients originating in an EDFA from 2.3 dB to 0.2 dB for 10 Gb/s transmission over standard single mode fiber using a 231-1 PRBS pattern. The results...... suggest that a single SOA integrated within a WDM receiver at the metro node could offer a convenient all-optical solution for upstream transient controlin WDM access networks....

  16. Design Aspects of An Energy-Efficient, Lightweight Medium Access Control Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2006-01-01

    This document gives an overview of the most relevant design aspects of the lightweight medium access control (LMAC) protocol [16] for wireless sensor networks (WSNs). These aspects include selfconfiguring and localized operation of the protocol, time synchronization in multi-hop networks, network

  17. Monday 9 January 2006: RESTRICTED ACCESS to the Technical Network

    CERN Multimedia

    CNIC Users Exchange and IT/CS

    2005-01-01

    As of Monday 9 January 2006, Ethernet access from the general CERN network to the Technical Network (TN) will be restricted in order to improve security on the TN. As a result, all Ethernet communication between the General Purpose Network (GPN) and the TN will be filtered. Only communication lines to the general IT services such as DNS, TP, NICE, DFS, AFS, Antivirus, Linux installation servers, License servers, OracleDB, TSM backup servers and dedicated AB and TS servers on the GPN will remain open. Please make sure that all your devices are registered properly in the network database (LANDB): http://network.cern.ch/. You are encouraged to make proper use of the 'Tag' and 'Description' fields in order to identify your system later on. If your system depends on special services on the GPN or is split between the GPN and the TN, e.g. consists of devices (PCs, PLCs, VME crates, webcams, etc.) connected to both the TN and the GPN, please contact the Technical-Network.Administrator@cern.ch . They will include...

  18. A Comparative Analysis of Social Media Marketing by Transportation Network Companies in the Sharing Economy

    OpenAIRE

    Heymans, Alice

    2017-01-01

    The sharing economy is a new business model rapidly expanding. In transportation, many people use innovative services proposed by ride-hailing mobile applications. These technological platforms, operated by networking companies, rely extensively on social media to promote their services, and reach new customers (riders) and providers (drivers). This dissertation focuses on e-marketing communication. It makes a comparative analysis of the information published on several social media (Facebook...

  19. Accounting for Energy Cost When Designing Energy-Efficient Wireless Access Networks

    Directory of Open Access Journals (Sweden)

    Greta Vallero

    2018-03-01

    Full Text Available Because of the increase of the data traffic demand, wireless access networks, through which users access telecommunication services, have expanded, in terms of size and of capability and, consequently, in terms of power consumption. Therefore, costs to buy the necessary power for the supply of base stations of those networks is becoming very high, impacting the communication cost. In this study, strategies to reduce the amount of money spent for the purchase of the energy consumed by the base stations are proposed for a network powered by solar panels, energy batteries and the power grid. First, the variability of the energy prices is exploited. It provides a cost reduction of up to 30%, when energy is bought in advance. If a part of the base stations is deactivated when the energy price is higher than a given threshold, a compromise between the energy cost and the user coverage drop is needed. In the simulated scenario, the necessary energy cost can be reduced by more than 40%, preserving the user coverage by greater than 94%. Second, the network is introduced to the energy market: it buys and sells energy from/to the traditional power grid. Finally, costs are reduced by the reduction of power consumption of the network, achieved by using microcell base stations. In the considered scenario, up to a 31% cost reduction is obtained, without the deterioration of the quality of service, but a huge Capex expenditure is required.

  20. The ENSDF radioactivity data base for IBM-PC and computer network access

    International Nuclear Information System (INIS)

    Ekstroem, P.; Spanier, L.

    1989-08-01

    A data base system for radioactivity gamma rays is described. A base with approximately 15000 gamma rays from 2777 decays is available for installation on the hard disk of a PC, and a complete system with approximately 73000 gamma rays is available for on-line access via the NORDic University computer NETwork (NORDUNET) and the Swedish University computer NETwork (SUNET)

  1. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    Directory of Open Access Journals (Sweden)

    Antonio F. Gomez Skarmeta

    2013-11-01

    Full Text Available Internet of Things (IoT networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA has been standardized by the Internet engineering task force (IETF to carry the Extensible Authentication Protocol (EAP, which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1 to demonstrate the feasibility of EAP/PANA in IoT devices; (2 to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS, called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  2. PANATIKI: a network access control implementation based on PANA for IoT devices.

    Science.gov (United States)

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  3. Allocation of spectral and spatial modes in multidimensional metro-access optical networks

    Science.gov (United States)

    Gao, Wenbo; Cvijetic, Milorad

    2018-04-01

    Introduction of spatial division multiplexing (SDM) has added a new dimension in an effort to increase optical fiber channel capacity. At the same time, it can also be explored as an advanced optical networking tool. In this paper, we have investigated the resource allocation to end-users in multidimensional networking structure with plurality of spectral and spatial modes actively deployed in different networking segments. This presents a more comprehensive method as compared to the common practice where the segments of optical network are analyzed independently since the interaction between network hierarchies is included into consideration. We explored the possible transparency from the metro/core network to the optical access network, analyzed the potential bottlenecks from the network architecture perspective, and identified an optimized network structure. In our considerations, the viability of optical grooming through the entire hierarchical all-optical network is investigated by evaluating the effective utilization and spectral efficiency of the network architecture.

  4. User recommendation in healthcare social media by assessing user similarity in heterogeneous network.

    Science.gov (United States)

    Jiang, Ling; Yang, Christopher C

    2017-09-01

    The rapid growth of online health social websites has captured a vast amount of healthcare information and made the information easy to access for health consumers. E-patients often use these social websites for informational and emotional support. However, health consumers could be easily overwhelmed by the overloaded information. Healthcare information searching can be very difficult for consumers, not to mention most of them are not skilled information searcher. In this work, we investigate the approaches for measuring user similarity in online health social websites. By recommending similar users to consumers, we can help them to seek informational and emotional support in a more efficient way. We propose to represent the healthcare social media data as a heterogeneous healthcare information network and introduce the local and global structural approaches for measuring user similarity in a heterogeneous network. We compare the proposed structural approaches with the content-based approach. Experiments were conducted on a dataset collected from a popular online health social website, and the results showed that content-based approach performed better for inactive users, while structural approaches performed better for active users. Moreover, global structural approach outperformed local structural approach for all user groups. In addition, we conducted experiments on local and global structural approaches using different weight schemas for the edges in the network. Leverage performed the best for both local and global approaches. Finally, we integrated different approaches and demonstrated that hybrid method yielded better performance than the individual approach. The results indicate that content-based methods can effectively capture the similarity of inactive users who usually have focused interests, while structural methods can achieve better performance when rich structural information is available. Local structural approach only considers direct connections

  5. Resource allocation in heterogeneous cloud radio access networks: advances and challenges

    KAUST Repository

    Dahrouj, Hayssam; Douik, Ahmed S.; Dhifallah, Oussama Najeeb; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2015-01-01

    , becomes a necessity. By connecting all the base stations from different tiers to a central processor (referred to as the cloud) through wire/wireline backhaul links, the heterogeneous cloud radio access network, H-CRAN, provides an open, simple

  6. Australian health professions student use of social media.

    Science.gov (United States)

    Usher, Kim; Woods, Cindy; Casellac, Evan; Glass, Nel; Wilson, Rhonda; Mayner, Lidia; Jackson, Debra; Brown, Janie; Duffy, Elaine; Mather, Carey; Cummings, Elizabeth; Irwin, Pauletta

    2014-01-01

    Increased bandwidth, broadband network availability and improved functionality have enhanced the accessibility and attractiveness of social media. The use of the Internet by higher education students has markedly increased. Social media are already used widely across the health sector but little is currently known of the use of social media by health profession students in Australia. A cross-sectional study was undertaken to explore health profession students' use of social media and their media preferences for sourcing information. An electronic survey was made available to health profession students at ten participating universities across most Australian states and territories. Respondents were 637 first year students and 451 final year students. The results for first and final year health profession students indicate that online media is the preferred source of information with only 20% of students nominating traditional peer-reviewed journals as a preferred information source. In addition, the results indicate that Facebook usage was high among all students while use of other types of social media such as Twitter remains comparatively low. As health profession students engage regularly with social media, and this use is likely to grow rather than diminish, educational institutions are challenged to consider the use of social media as a validated platform for learning and teaching.

  7. Considerations for Public Health Organizations Attempting to Implement a Social Media Presence: A Qualitative Study.

    Science.gov (United States)

    Hart, Mark; Stetten, Nichole; Castaneda, Gail

    2016-01-01

    In the past decade, social media has become an integral part of our everyday lives, but research on how this tool is used by public health workers and organizations is still developing. Budget cuts and staff reduction in county departments have required employees to take on more responsibilities. These reductions have caused a reduction in the time for training or collaborating with others in the field. To make up for the loss, many employees are seeking collaboration through social media sites but are unable to do so because state departments block these Internet sites. This study sought to highlight the key considerations and decision-making process for a public health organization deciding whether to implement a social media presence for their organization. Using 3 structured interviews, 15 stakeholders were questioned on their personal experience with social media, experience within the context of public health, and their thoughts on implementation for their center. Interviews were coded using constant comparative qualitative methods. The following themes emerged from the interviews: (1) personal experience with technology and social networking sites, (2) use of social networking sites in public health, (3) use of social networking sites in work environments, (4) social networking sites access, (5) ways the Rural South Public Health Training Center could use social networking sites, and (6) perceived outcomes of social networking site usage for the Rural South Public Health Training Center (positive and negative). The collective voice of the center showed a positive perceived perception of social media implementation, with the benefits outweighing the risks. Despite the benefits, there is a cautious skepticism of the importance of social networking site use.

  8. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Meng Yi

    2016-11-01

    Full Text Available This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  9. Applying 4-regular grid structures in large-scale access networks

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Knudsen, Thomas P.; Patel, Ahmed

    2006-01-01

    4-Regular grid structures have been used in multiprocessor systems for decades due to a number of nice properties with regard to routing, protection, and restoration, together with a straightforward planar layout. These qualities are to an increasing extent demanded also in largescale access...... networks, but concerning protection and restoration these demands have been met only to a limited extent by the commonly used ring and tree structures. To deal with the fact that classical 4-regular grid structures are not directly applicable in such networks, this paper proposes a number of extensions...... concerning restoration, protection, scalability, embeddability, flexibility, and cost. The extensions are presented as a tool case, which can be used for implementing semi-automatic and in the longer term full automatic network planning tools....

  10. Role of social media in retail network operations and marketing to enhance customer satisfaction

    OpenAIRE

    Ramanathan, U; Subramanian, N; Parrott, G

    2017-01-01

    Purpose: The technology evolution compels retail networks to introduce unique business models to retain customers and to gain a competitive advantage. Customer reviews available through social media need to be taken into account by retail networks to design a model with unique service operations and marketing approaches that will improve loyalty by adding value to customers. Furthermore, the relationship between customer satisfaction and customer spending behaviour is very weak and needs furt...

  11. EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks

    Science.gov (United States)

    Zrelli, Saber; Okabe, Nobuo; Shinoda, Yoichi

    The wireless medium is a key technology for enabling ubiquitous and continuous network connectivity. It is becoming more and more important in our daily life especially with the increasing adoption of networking technologies in many fields such as medical care and transportation systems. Although most wireless technologies nowadays provide satisfying bandwidth and higher speeds, several of these technologies still lack improvements with regard to handoff performance. In this paper, we focus on wireless network technologies that rely on the Extensible Authentication Protocol for mutual authentication between the station and the access network. Such technologies include local area wireless networks (IEEE 802.11) as well as broadband wireless networks (IEEE 802.16). We present a new EAP authentication method based on a three party authentication scheme, namely Kerberos, that considerably shortens handoff delays. Compared to other methods, the proposed method has the advantage of not requiring any changes on the access points, making it readily deployable at reasonable costs.

  12. Understanding “Baby Boomers” and “Millennials” motivations to interact with brands on Social Media

    OpenAIRE

    Oliveira, Rute Sofia Matos de

    2017-01-01

    The emergence and importance of social media and, in particular, social networking sites (SNS), has made it possible for an accessible integration between consumers and brands, by providing unlimited reasons for users to express, share and create content. The aim of this dissertation is to explore what motivates consumers to interact with brands on social media and to understand the relevance of those variables in explaining consumers’ loyalty toward a brand. Members of two distinct genera...

  13. Pore network modeling of drainage process in patterned porous media: a quasi-static study

    KAUST Repository

    Zhang, Tao; Salama, Amgad; Sun, Shuyu; El-Amin, Mohamed

    2015-01-01

    -saturation relationships, it is quite challenging to isolate its effects explicitly in real porous media applications. However, within the framework of pore network models, it is easy to highlight the effects of wettability conditions on the transport of two-phase systems

  14. One4All Cooperative Media Access Strategy in Infrastructure Based Distributed Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    a cooperative cluster using their short-range air interface and one device contends the channel for all the devices within the cluster. This strategy reduces the number of mobile devices involved in the collision process for the wireless medium resulting in larger throughput, smaller access delay, and less...

  15. On the development of online cities and neighborhoods: an exploration of cumulative and segmentive network effects in social media

    NARCIS (Netherlands)

    Maris, I.; Huizinga, A; Bouman, W.; Tuunainen, V.K.; Rossi, M.; Nandhakumar, J.

    2011-01-01

    This paper outlines a research in progress set to study network effects in social media. The focus is on outlining the theoretical framework in which this study is embedded. The concepts of cumulative network effects and segmentive network effects are introduced to explain the processes by which

  16. Identifying Opinion Leaders to Promote Organ Donation on Social Media: Network Study.

    Science.gov (United States)

    Shi, Jingyuan; Salmon, Charles T

    2018-01-09

    In the recent years, social networking sites (SNSs, also called social media) have been adopted in organ donation campaigns, and recruiting opinion leaders for such campaigns has been found effective in promoting behavioral changes. The aim of this paper was to focus on the dissemination of organ donation tweets on Weibo, the Chinese equivalent of Twitter, and to examine the opinion leadership in the retweet network of popular organ donation messages using social network analysis. It also aimed to investigate how personal and social attributes contribute to a user's opinion leadership on the topic of organ donation. All messages about organ donation posted on Weibo from January 1, 2015 to December 31, 2015 were extracted using Python Web crawler. A retweet network with 505,047 nodes and 545,312 edges of the popular messages (n=206) was constructed and analyzed. The local and global opinion leaderships were measured using network metrics, and the roles of personal attributes, professional knowledge, and social positions in obtaining the opinion leadership were examined using general linear model. The findings revealed that personal attributes, professional knowledge, and social positions predicted individual's local opinion leadership in the retweet network of popular organ donation messages. Alternatively, personal attributes and social positions, but not professional knowledge, were significantly associated with global opinion leadership. The findings of this study indicate that health campaign designers may recruit peer leaders in SNS organ donation promotions to facilitate information sharing among the target audience. Users who are unverified, active, well connected, and experienced with information and communications technology (ICT) will accelerate the sharing of organ donation messages in the global environment. Medical professionals such as organ transplant surgeons who can wield a great amount of influence on their direct connections could also effectively

  17. Low-Complexity Scheduling and Power Adaptation for Coordinated Cloud-Radio Access Networks

    KAUST Repository

    Douik, Ahmed; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    In practical wireless systems, the successful implementation of resource allocation techniques strongly depends on the algorithmic complexity. Consider a cloud-radio access network (CRAN), where the central cloud is responsible for scheduling

  18. 3. Informationsveranstaltung des Open Access Network Austria (OANA (Wien, 1. Juni 2016

    Directory of Open Access Journals (Sweden)

    Katharina Rieck

    2016-09-01

    Full Text Available Dieser Beitrag fasst die Ergebnisse der 3. OANA-Veranstaltung, die am 01.06.2016 im Palais Harrach in Wien stattfand, zusammen. Das „Open Access Network Austria“ (OANA ist eine „joint activity“ unter dem organisatorischen Dach des Fonds zur Förderung der wissenschaftlichen Forschung (FWF und der Österreichischen Universitätenkonferenz (UNIKO mit dem Ziel Open Access Aktivitäten in der österreichischen Forschungslandschaft zu koordinieren. Die fünf Arbeitsgruppen, die im Jänner 2015 gebildet wurden, präsentierten bei der Informationsveranstaltung die Ergebnisse und Fortschritte aus eineinhalb Jahren Arbeit. Ab Herbst 2016 werden sich vier neue Arbeitsgruppen mit den Themenschwerpunkten „Strategische Positionierung & Administration der Open-Access-Transition“, „Open Access & die Zukunft von Scholarly Communication“, „Open Access & Open Research Data“ und „Open Access & Open Educational Resources“ beschäftigen.

  19. Stochastic geometry model for multi-channel fog radio access networks

    KAUST Repository

    Emara, Mostafa

    2017-06-29

    Cache-enabled base station (BS) densification, denoted as a fog radio access network (F-RAN), is foreseen as a key component of 5G cellular networks. F-RAN enables storing popular files at the network edge (i.e., BS caches), which empowers local communication and alleviates traffic congestions at the core/backhaul network. The hitting probability, which is the probability of successfully transmitting popular files request from the network edge, is a fundamental key performance indicator (KPI) for F-RAN. This paper develops a scheduling aware mathematical framework, based on stochastic geometry, to characterize the hitting probability of F-RAN in a multi-channel environment. To this end, we assess and compare the performance of two caching distribution schemes, namely, uniform caching and Zipf caching. The numerical results show that the commonly used single channel environment leads to pessimistic assessment for the hitting probability of F-RAN. Furthermore, the numerical results manifest the superiority of the Zipf caching scheme and quantify the hitting probability gains in terms of the number of channels and cache size.

  20. Writing Programs as Distributed Networks: A Materialist Approach to University-Community Digital Media Literacy

    Science.gov (United States)

    Comstock, Michelle

    2006-01-01

    This article addresses how community-university digital media literacy projects are redefining literacy, literate practices, and institutions. Using Actor-Network Theory (ANT), which emphasizes the organizing process itself, I analyze the shifting definitions of literacy within one particular university-community collaboration. My analysis…

  1. Interactive social media interventions to promote health equity: an overview of reviews

    Science.gov (United States)

    Welch, V.; Petkovic, J.; Pardo, J. Pardo; Rader, T.; Tugwell, P.

    2016-01-01

    Abstract Introduction: Social media use has been increasing in public health and health promotion because it can remove geographic and physical access barriers. However, these interventions also have the potential to increase health inequities for people who do not have access to or do not use social media. In this paper, we aim to assess the effects of interactive social media interventions on health outcomes, behaviour change and health equity. Methods: We conducted a rapid response overview of systematic reviews. We used a sensitive search strategy to identify systematic reviews and included those that focussed on interventions allowing two-way interaction such as discussion forums, social networks (e.g. Facebook and Twitter), blogging, applications linked to online communities and media sharing. Results: Eleven systematic reviews met our inclusion criteria. Most interventions addressed by the reviews included online discussion boards or similar strategies, either as stand-alone interventions or in combination with other interventions. Seven reviews reported mixed effects on health outcomes and healthy behaviours. We did not find disaggregated analyses across characteristics associated with disadvantage, such as lower socioeconomic status or age. However, some targeted studies reported that social media interventions were effective in specific populations in terms of age, socioeconomic status, ethnicities and place of residence. Four reviews reported qualitative benefits such as satisfaction, finding information and improved social support. Conclusion: Social media interventions were effective in certain populations at risk for disadvantage (youth, older adults, low socioeconomic status, rural), which indicates that these interventions may be effective for promoting health equity. However, confirmation of effectiveness would require further study. Several reviews raised the issue of acceptability of social media interventions. Only four studies reported on the

  2. Interactive social media interventions to promote health equity: an overview of reviews

    Directory of Open Access Journals (Sweden)

    V. Welch

    2016-04-01

    Full Text Available Introduction: Social media use has been increasing in public health and health promotion because it can remove geographic and physical access barriers. However, these interventions also have the potential to increase health inequities for people who do not have access to or do not use social media. In this paper, we aim to assess the effects of interactive social media interventions on health outcomes, behaviour change and health equity. Methods: We conducted a rapid response overview of systematic reviews. We used a sensitive search strategy to identify systematic reviews and included those that focussed on interventions allowing two-way interaction such as discussion forums, social networks (e.g. Facebook and Twitter, blogging, applications linked to online communities and media sharing. Results: Eleven systematic reviews met our inclusion criteria. Most interventions addressed by the reviews included online discussion boards or similar strategies, either as stand-alone interventions or in combination with other interventions. Seven reviews reported mixed effects on health outcomes and healthy behaviours. We did not find disaggregated analyses across characteristics associated with disadvantage, such as lower socioeconomic status or age. However, some targeted studies reported that social media interventions were effective in specific populations in terms of age, socioeconomic status, ethnicities and place of residence. Four reviews reported qualitative benefits such as satisfaction, finding information and improved social support. Conclusion: Social media interventions were effective in certain populations at risk for disadvantage (youth, older adults, low socioeconomic status, rural, which indicates that these interventions may be effective for promoting health equity. However, confirmation of effectiveness would require further study. Several reviews raised the issue of acceptability of social media interventions. Only four studies reported

  3. Interactive social media interventions to promote health equity: an overview of reviews.

    Science.gov (United States)

    Welch, V; Petkovic, J; Pardo Pardo, J; Rader, T; Tugwell, P

    2016-04-01

    Social media use has been increasing in public health and health promotion because it can remove geographic and physical access barriers. However, these interventions also have the potential to increase health inequities for people who do not have access to or do not use social media. In this paper, we aim to assess the effects of interactive social media interventions on health outcomes, behaviour change and health equity. We conducted a rapid response overview of systematic reviews. We used a sensitive search strategy to identify systematic reviews and included those that focussed on interventions allowing two-way interaction such as discussion forums, social networks (e.g. Facebook and Twitter), blogging, applications linked to online communities and media sharing. Eleven systematic reviews met our inclusion criteria. Most interventions addressed by the reviews included online discussion boards or similar strategies, either as stand-alone interventions or in combination with other interventions. Seven reviews reported mixed effects on health outcomes and healthy behaviours. We did not find disaggregated analyses across characteristics associated with disadvantage, such as lower socioeconomic status or age. However, some targeted studies reported that social media interventions were effective in specific populations in terms of age, socioeconomic status, ethnicities and place of residence. Four reviews reported qualitative benefits such as satisfaction, finding information and improved social support. Social media interventions were effective in certain populations at risk for disadvantage (youth, older adults, low socioeconomic status, rural), which indicates that these interventions may be effective for promoting health equity. However, confirmation of effectiveness would require further study. Several reviews raised the issue of acceptability of social media interventions. Only four studies reported on the level of intervention use and all of these reported

  4. Making Dutch pupils media conscious: preadolescents' self-assessment of possible media risks and the need for media education

    NARCIS (Netherlands)

    Küter-Luks, Theresa; Heuvelman, A.; Peters, O.

    2011-01-01

    Despite clear European and Dutch policies about media education, there is currently no media education curriculum in Dutch schools. A survey among preadolescents (n = 257) in six primary schools in the Netherlands included questions regarding media access, fears, risks, parental mediation of

  5. #wheretoeat : The impact of electronic word-of-mouth in social network media on millennials’ purchase intention in the restaurant setting

    OpenAIRE

    Tersén, Vendela; Wecken, Katharina

    2017-01-01

    Social media has been growing constantly during the past years and social networking is one of the most popular online activities. This development has changed how individuals communicate with each other as it enabled valuable improvements for electronic word-of-mouth. Individuals share experiences, evaluations or opinions regarding products or services within their network, which has driven marketers’ attention towards this tool. Here, millennials are active users of social media, they have ...

  6. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  7. Access Selection Algorithm of Heterogeneous Wireless Networks for Smart Distribution Grid Based on Entropy-Weight and Rough Set

    Science.gov (United States)

    Xiang, Min; Qu, Qinqin; Chen, Cheng; Tian, Li; Zeng, Lingkang

    2017-11-01

    To improve the reliability of communication service in smart distribution grid (SDG), an access selection algorithm based on dynamic network status and different service types for heterogeneous wireless networks was proposed. The network performance index values were obtained in real time by multimode terminal and the variation trend of index values was analyzed by the growth matrix. The index weights were calculated by entropy-weight and then modified by rough set to get the final weights. Combining the grey relational analysis to sort the candidate networks, and the optimum communication network is selected. Simulation results show that the proposed algorithm can implement dynamically access selection in heterogeneous wireless networks of SDG effectively and reduce the network blocking probability.

  8. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    OpenAIRE

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols,...

  9. Social Media, Power, and the Future of VBAC.

    Science.gov (United States)

    Romano, Amy M; Gerber, Hilary; Andrews, Desirre

    2010-01-01

    The Internet has been called a disruptive technology because it has shifted power and altered the economics of doing business, whether that business is selling books or providing health care. Social media have accelerated the pace of disruption by enabling interactive information sharing and blurring the lines between the "producers" and "consumers" of knowledge, goods, and services. In the wake of the National Institutes of Health Consensus Development Conference on Vaginal Birth After Cesarean (VBAC) and major national recommendations for maternity care reform, activated, engaged consumers face an unprecedented opportunity to drive meaningful changes in VBAC access and safety. This article examines the role of social networks in informing women about VBAC, producing low-cost, accessible decision aids, and enabling multi-stakeholder collaborations toward workable solutions that remove barriers women face in accessing VBAC.

  10. The Role of the Underground Economy in Social Network Spam and Abuse

    OpenAIRE

    Thomas, Kurt

    2013-01-01

    Online social networks have emerged as real-time communication platforms connecting billions of users around the globe. Implicit to the interactions within an online social network is the notion of trust; users create relationships with their friends and valued media outlets, in turn receiving access to content generated by each relationship. This trust however comes with a price. On the heels of the widespread adoption of online social networks, scams, phishing, and malware attacks conducted...

  11. Heterogeneous wireless/wireline optical access networks with the R-EAT as backend component

    Science.gov (United States)

    Hagedorn, Klaus; Gindera, Ralf; Stohr, Andreas; Jager, Dieter

    2004-09-01

    A heterogeneous wireless/wireline optical transmission link using a reflection type electroabsorption transceiver (R-EAT) is presented. Simultaneous transmission of full-duplex broadband wireless LAN (WLAN) channels and 1Gb/s base band data is experimentally demonstrated. The system link employs sub-carrier multiplexing (SCM) and two optical channels for full duplex transmission of various analog WLAN channels and downlink digital base band data. The developed link architecture is suitable for simultaneous transmission of broadband wireline and wireless signals, it enables the coexistence and interoperability between wireline and wireless access technologies. The developed R-EAT component employed in this wireline/wireless access system, features "single-chip-component" base stations in access networks with star type topology where only a single optical fiber is used for bidirectional optical transmission. The R-EAT can be used within the optical C-band (1530- 1560nm) and is suitable for (D)WDM networks. Bit error rate measurements demonstrate the capabilities of the R-EAT for 1Gb/s base band transmission. The analog performance for WLAN transmission is characterised by a spurious free dynamic range (SFDR) of more than 75dB and 90dB for uplink and downlink transmission, respectively. The link gain for uplink and downlink transmission is -42dB and -37dB, respectively. The demonstrates the analog performances of the R-EAT for being used in wireless access networks such as W-LAN.

  12. Wide area network access to CMS data using the LustreTM filesystem

    Science.gov (United States)

    Rodriguez, J. L.; Avery, P.; Brody, T.; Bourilkov, D.; Fu, Y.; Kim, B.; Prescott, C.; Wu, Y.

    2010-04-01

    In this paper, we explore the use of the LustreTM cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed LustreTM filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with IOzone for sequential access to data.

  13. Wide area network access to CMS data using the LustreTM filesystem

    International Nuclear Information System (INIS)

    Rodriguez, J L; Brody, T; Avery, P; Bourilkov, D; Fu, Y; Kim, B; Wu, Y; Prescott, C

    2010-01-01

    In this paper, we explore the use of the Lustre TM cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed Lustre TM filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with IOzone for sequential access to data.

  14. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Mahdi Zareei

    2017-09-01

    Full Text Available New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN. First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.

  15. On-demand virtual optical network access using 100 Gb/s Ethernet.

    Science.gov (United States)

    Ishida, Osamu; Takamichi, Toru; Arai, Sachine; Kawate, Ryusuke; Toyoda, Hidehiro; Morita, Itsuro; Araki, Soichiro; Ichikawa, Toshiyuki; Hoshida, Takeshi; Murai, Hitoshi

    2011-12-12

    Our Terabit LAN initiatives attempt to enhance the scalability and utilization of lambda resources. This paper describes bandwidth-on-demand virtualized 100GE access to WDM networks on a field fiber test-bed using multi-domain optical-path provisioning. © 2011 Optical Society of America

  16. Performance Evaluation of TDMA Medium Access Control Protocol in Cognitive Wireless Networks

    Directory of Open Access Journals (Sweden)

    Muhammed Enes Bayrakdar

    2017-02-01

    Full Text Available Cognitive radio paradigm has been revealed as a new communication technology that shares channels in wireless networks. Channel assignment is a crucial issue in the field of cognitive wireless networks because of the spectrum scarcity. In this work, we have evaluated the performance of TDMA medium access control protocol. In our simulation scenarios, primary users and secondary users utilize TDMA as a medium access control protocol. We have designed a network environment in Riverbed simulation software that consists of primary users, secondary users, and base stations. In our system model, secondary users sense the spectrum and inform the base station about empty channels. Then, the base station decides accordingly which secondary user may utilize the empty channel. Energy detection technique is employed as a spectrum sensing technique because it is the best when information about signal of primary user is acquired. Besides, different number of users is selected in simulation scenarios in order to obtain accurate delay and throughput results. Comparing analytical model with simulation results, we have shown that performance analysis of our system model is consistent and accurate.

  17. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  18. The New News Media: Democratic implications of undergraduate education and news consumption over social and traditional media

    OpenAIRE

    Miller, Jennifer

    2013-01-01

    Communication students at Simon Fraser University were surveyed and interviewed to deduce perceptions and behaviour of news consumption over social and traditional media. Both social media and traditional media are used to consume news with traditional media acting as the primary news source and as more accessible and reliable than social media. News stories considered important or having various perspectives were verified the most, especially world news. Extent of accessibility of sources an...

  19. Personalised Access to Social Media

    NARCIS (Netherlands)

    M. Clements (Maarten)

    2010-01-01

    htmlabstractOn many websites users can personally contribute information, ranging from short text messages to photos and videos. Users can see the information contributed by others and respond to it. These social media actively engage their community in the structuring of the collection by making

  20. Bandwidth Impacts of Localizing Peer-to-Peer IP Video Traffic in Access and Aggregation Networks

    Directory of Open Access Journals (Sweden)

    Kenneth Kerpez

    2008-10-01

    Full Text Available This paper examines the burgeoning impact of peer-to-peer (P2P traffic IP video traffic. High-quality IPTV or Internet TV has high-bandwidth requirements, and P2P IP video could severely strain broadband networks. A model for the popularity of video titles is given, showing that some titles are very popular and will often be available locally; making localized P2P attractive for video titles. The bandwidth impacts of localizing P2P video to try and keep traffic within a broadband access network area or within a broadband access aggregation network area are examined. Results indicate that such highly localized P2P video can greatly lower core bandwidth usage.

  1. A Spontaneous Ad Hoc Network to Share WWW Access

    Directory of Open Access Journals (Sweden)

    Lloret Jaime

    2010-01-01

    Full Text Available In this paper, we propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction, to grant a quick, easy, and secure access to the users to surf the Web. The paper shows the description of our proposal, the procedure of the nodes involved in the system, the security algorithms implemented, and the designed messages. We have taken into account the security and its performance. Although some people have defined and described the main features of spontaneous ad-hoc networks, nobody has published any design and simulation until today. Spontaneous networking will enable a more natural form of wireless computing when people physically meet in the real world. We also validate the success of our proposal through several simulations and comparisons with a regular architecture, taking into account the optimization of the resources of the devices. Finally, we compare our proposal with other caching techniques published in the related literature. The proposal has been developed with the main objective of improving the communication and integration between different study centers of low-resource communities. That is, it lets communicate spontaneous networks, which are working collaboratively and which have been created on different physical places.

  2. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  3. The Effect of Information Access Strategy on Power Consumption and Reliability in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    This paper examines the effect of different information access strategies on power consumption and information reliability, considering the wireless sensor network as the source of information. Basically, the paper explores three different access strategies, namely; reactive, periodic and hybrid...

  4. Voice over LTE via Generic access (Volga) as a possible solution of mobile networks transformation

    OpenAIRE

    Stepaniuk, Oleg

    2010-01-01

    This paper is focused on Voice over LTE via Generic Access Network, which concept is to connect the already existing Mobile Switching Centers to the LTE network via a gateway supporting 2G or 3G voice environment.

  5. Performance Analysis of DPSK-OCDMA System for Optical Access Network

    Science.gov (United States)

    Islam, Monirul; Ahmed, N.; Aljunid, S. A.; Ali, Sharafat; Sayeed, S.; Sabri, Naseer

    2016-03-01

    In this research, the performance of optical code division multiple access (OCDMA) using differential phase shift keying (DPSK) has been compared with OCDMA On-Off Keying (OOK). This comparison took place in terms of bit error rate (BER) and receiver power where two bit rates (155 Mbps and 622 Mbps) have been used for this analysis. Using of OptiSystem 7.0 simulation, comparing eye diagram and optical spectrum alongside with BER and Rx power. It is found that OCDMA-DPSK performs better in comparison to OCDMA-OOK. The performance analysis also provides parameter for designing and development of an OCDMA system for optical access network using DPSK.

  6. [Using web 2.0 technologies and social media for the nephrologist].

    Science.gov (United States)

    Santoro, Eugenio; Quintaliani, Giuseppe

    2013-01-01

    New media tools such as web 2.0 are increasingly being used in the medical field. RSS feeds, podcasts, blogs, wikis, online social networks and social media have all been proposed as innovative tools for the education and updating of clinicians, nurses, other health workers and medical students because of their ease of access and widespread use. Nephrology is one of the medical fields where these technologies have been successfully applied. Medical journals such as the American Journal Kidney Diseases and the Journal of the American Society of Nephrology, and medical societies such as the American Society of Nephrology, are all using these new and powerful communication tools. In addition, blogs and social networks have been developed to allow physicians to distribute, share and comment medical material concerning issues related to nephrology and kidney disease, including images, videos, slides, scientific abstracts and clinical trials updates. This review provides background information on the evolution of both web 2.0 and the social media and describes some of the most interesting applications of web 2.0 and its correlated tools in the field of nephrology.

  7. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    OpenAIRE

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X aut...

  8. Research on Czech firms’ marketing communication based on social media networks

    Directory of Open Access Journals (Sweden)

    Vít Chlebovský

    2012-01-01

    Full Text Available Objective of the research described in this article is to make an analysis of the usage of marketing communication using both traditional Internet communication channels as well as Social Media Networks by the Czech companies. Primary research was made through on-line questionnaire. Companies across the branches and size categories within the Czech economy were addressed. Companies were selected from the www.firmy.cz portal. Only companies with their own web domain were addressed. The typical respondents were mostly from middle management, especially managers from the marketing or commercial departments. The final number of questionnaire respondents covered in the research is 1009. The main research method was questioning. The questionnaire consisted of three sections with the scale answer questions mainly. Google Refine was used for data processing and Microsoft Excel for statistical processing and graphic outputs of the research. Evaluated results show significant gaps in usage of Internet communication tools in marketing of Czech companies and also deficiency between clear understanding of the respondents how Social Media should be used in marketing communication and real use in the companies. This deficiency was statistically tested and relation between respondents’ perception of the importance of Social Media use for bidirectional communication with stakeholders and non-use of Social Media for bidirectional communication with stakeholders by respondents’ company was confirmed.

  9. Community access networks: how to connect the next billion to the ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Community access networks: how to connect the next billion to the Internet ... services is a prerequisite to sustainable socio-economic development. ... It will provide case studies and formulate recommendations with respect to ... An IDRC delegation will join international delegates and city representatives at the ICLEI World ...

  10. Personalised Access to Social Media

    NARCIS (Netherlands)

    Clements, M.

    2010-01-01

    On many websites users can personally contribute information, ranging from short text messages to photos and videos. Users can see the information contributed by others and respond to it. These social media actively engage their community in the structuring of the collection by making use of

  11. "Honk against homophobia": rethinking relations between media and sexual minorities.

    Science.gov (United States)

    Venzo, Paul; Hess, Kristy

    2013-01-01

    The theory of "symbolic annihilation" or "symbolic violence" has been used in academic literature to describe the way in which sexual minorities have been ignored, trivialized, or condemned by the media. This article aims to de-center research from issues of media representation to consider the capacity for minority groups to proactively use new media and its various avenues for interactivity, social networking, and feedback to fight social exclusion. This work suggests that new media has become a space in which the nominally marginal in society may acquire "social artillery"-a term used to describe how sexual minorities utilize their expanding and more readily accessible social connections in digital space to combat instances of homophobia. The research draws on the results of an inquiry into the relation between media and a regional youth social justice group in Australia tackling homophobia. The research demonstrates that the group is becoming increasingly adept and comfortable with using a cross-section of media platforms to fulfill their own objectives, rather than seeing themselves as passive subjects of media representation. This article argues that this sets an example for other socially excluded groups looking to renegotiate their relation with the media in regional areas.

  12. Topology-selective jamming of fully-connected, code-division random-access networks

    Science.gov (United States)

    Polydoros, Andreas; Cheng, Unjeng

    1990-01-01

    The purpose is to introduce certain models of topology selective stochastic jamming and examine its impact on a class of fully-connected, spread-spectrum, slotted ALOHA-type random access networks. The theory covers dedicated as well as half-duplex units. The dominant role of the spatial duty factor is established, and connections with the dual concept of time selective jamming are discussed. The optimal choices of coding rate and link access parameters (from the users' side) and the jamming spatial fraction are numerically established for DS and FH spreading.

  13. Wide Area Network Access to CMS Data Using the Lustre Filesystem

    CERN Document Server

    Rodríguez, J L; Prescott, C; Wu, Y; Kim, B; Fu, Y; Bourilkov, D; Avery, P

    2009-01-01

    In this paper, we explore the use of the Lustre cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed Lustre filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with ...

  14. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.

    Science.gov (United States)

    Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen

    2018-04-28

    Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.

  15. CompTIA network+ study guide exam N10-006

    CERN Document Server

    Lammle, Todd

    2015-01-01

    All-star N10-006 prep, fully updated for the new exam The CompTIA Network+ Study Guide is your one-stop comprehensive resource in preparing for exam N10-006 Bestselling author and networking Guru Todd Lammle guides you through 100% of all exam objectives detailing the fundamental concepts you will need to know to prepare for the exam. Coverage includes network technologies, installation and configuration, media and topologies, security, and much more, plus practical examples drawn from real-world situations. You also gain access to practice exams and electronic flashcards that facilitate info

  16. An Optimal Medium Access Control with Partial Observations for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Servetto Sergio D

    2005-01-01

    Full Text Available We consider medium access control (MAC in multihop sensor networks, where only partial information about the shared medium is available to the transmitter. We model our setting as a queuing problem in which the service rate of a queue is a function of a partially observed Markov chain representing the available bandwidth, and in which the arrivals are controlled based on the partial observations so as to keep the system in a desirable mildly unstable regime. The optimal controller for this problem satisfies a separation property: we first compute a probability measure on the state space of the chain, namely the information state, then use this measure as the new state on which the control decisions are based. We give a formal description of the system considered and of its dynamics, we formalize and solve an optimal control problem, and we show numerical simulations to illustrate with concrete examples properties of the optimal control law. We show how the ergodic behavior of our queuing model is characterized by an invariant measure over all possible information states, and we construct that measure. Our results can be specifically applied for designing efficient and stable algorithms for medium access control in multiple-accessed systems, in particular for sensor networks.

  17. Multi-Channel Multi-Radio Using 802.11 Based Media Access for Sink Nodes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kok-Keong Loo

    2011-05-01

    Full Text Available The next generation surveillance and multimedia systems will become increasingly deployed as wireless sensor networks in order to monitor parks, public places and for business usage. The convergence of data and telecommunication over IP-based networks has paved the way for wireless networks. Functions are becoming more intertwined by the compelling force of innovation and technology. For example, many closed-circuit TV premises surveillance systems now rely on transmitting their images and data over IP networks instead of standalone video circuits. These systems will increase their reliability in the future on wireless networks and on IEEE 802.11 networks. However, due to limited non-overlapping channels, delay, and congestion there will be problems at sink nodes. In this paper we provide necessary conditions to verify the feasibility of round robin technique in these networks at the sink nodes by using a technique to regulate multi-radio multichannel assignment. We demonstrate through simulations that dynamic channel assignment scheme using multi-radio, and multichannel configuration at a single sink node can perform close to optimal on the average while multiple sink node assignment also performs well. The methods proposed in this paper can be a valuable tool for network designers in planning network deployment and for optimizing different performance objectives.

  18. Multi-channel multi-radio using 802.11 based media access for sink nodes in wireless sensor networks.

    Science.gov (United States)

    Campbell, Carlene E-A; Khan, Shafiullah; Singh, Dhananjay; Loo, Kok-Keong

    2011-01-01

    The next generation surveillance and multimedia systems will become increasingly deployed as wireless sensor networks in order to monitor parks, public places and for business usage. The convergence of data and telecommunication over IP-based networks has paved the way for wireless networks. Functions are becoming more intertwined by the compelling force of innovation and technology. For example, many closed-circuit TV premises surveillance systems now rely on transmitting their images and data over IP networks instead of standalone video circuits. These systems will increase their reliability in the future on wireless networks and on IEEE 802.11 networks. However, due to limited non-overlapping channels, delay, and congestion there will be problems at sink nodes. In this paper we provide necessary conditions to verify the feasibility of round robin technique in these networks at the sink nodes by using a technique to regulate multi-radio multichannel assignment. We demonstrate through simulations that dynamic channel assignment scheme using multi-radio, and multichannel configuration at a single sink node can perform close to optimal on the average while multiple sink node assignment also performs well. The methods proposed in this paper can be a valuable tool for network designers in planning network deployment and for optimizing different performance objectives.

  19. Comparison of a Ring On-Chip Network and a Code-Division Multiple-Access On-Chip Network

    Directory of Open Access Journals (Sweden)

    Xin Wang

    2007-01-01

    Full Text Available Two network-on-chip (NoC designs are examined and compared in this paper. One design applies a bidirectional ring connection scheme, while the other design applies a code-division multiple-access (CDMA connection scheme. Both of the designs apply globally asynchronous locally synchronous (GALS scheme in order to deal with the issue of transferring data in a multiple-clock-domain environment of an on-chip system. The two NoC designs are compared with each other by their network structures, data transfer principles, network node structures, and their asynchronous designs. Both the synchronous and the asynchronous designs of the two on-chip networks are realized using a hardware-description language (HDL in order to make the entire designs suit the commonly used synchronous design tools and flow. The performance estimation and comparison of the two NoC designs which are based on the HDL realizations are addressed. By comparing the two NoC designs, the advantages and disadvantages of applying direct connection and CDMA connection schemes in an on-chip communication network are discussed.

  20. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    Science.gov (United States)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  1. Media analysis of radioactive wastes

    International Nuclear Information System (INIS)

    Janowski, M.J.

    1989-01-01

    The radioactive waste cleanup community has not effectively utilized its most powerful communications tool to inform the general public; the print and broadcast media. Environmental interest groups have known of the value of accessing the media for their message for years and have used it effectively. The radioactive waste cleanup community's efforts to date have not been focused on education of the media so that they in turn can inform the public of our cleanup mission. Their focus must be to learn of the importance of the media, develop training programs that train technical people in how to know and respond to the media's needs for information, and then incorporate that training into a comprehensive program of public information in which access to the media is a key communications tool. This paper discusses how media education and access is a cost-effective means of accomplishing community relations goals of public information and public participation in radioactive waste cleanup and has been effectively utilized at the Weldon Spring Site Remedial Action Project

  2. DIGITALIZATION AND NEW MEDIA LANDSCAPE

    Directory of Open Access Journals (Sweden)

    Tadej Praprotnik

    2016-05-01

    Full Text Available The article presents the phenomena of new communication technologies. It exposes the role of social media (Web 2.0 and sketches some global trends within the field of new media. It further outlines basic characteristics of traditional mass communication and consumption of media products, and as a counter-part presents interactive nature of a new media and the phenomena of user-generated media contents. The main focus of the article is the process of digitalization and its influence on important social system: media industry and production. Digitalization and growth of social media have challenged the news industry, so the latter has to adjust its media production to the rising power of independent publishers on social media platforms, as well as to users, which became publishers themselves, the so-called prosumers. The process of multimedia production is described through various types of inclusion promised in the technological formats. This article also highlights the transformed “intimacy” of new media cultures, which presents further evidence of new, unstable, and to some respect blurring divisions between the public and private spheres of communication. Several positive and negative consequences of digitalization on media landscape are enumerated. There are problems concerning transparency, accountability and professionalism of media production. Digital media has speed up the process of media production, journalists are faced with lack of time. Journalists as multitasking professionals are becaming the norm. The article exposes social activities manifested on social media (networks. Social networks, such as Facebook and Twitter, are becoming news platforms for spreading information and news among users. Moreover, social media has become a powerful tool for publishers and journalists, as it enables them to augment or to keep their audience. Since social networks are usually used to accomplish interpersonal rather than professional goals

  3. Securing social media in the enterprise

    CERN Document Server

    Dalziel, Henry

    2015-01-01

    Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media wi

  4. Scalable and Media Aware Adaptive Video Streaming over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Béatrice Pesquet-Popescu

    2008-07-01

    Full Text Available This paper proposes an advanced video streaming system based on scalable video coding in order to optimize resource utilization in wireless networks with retransmission mechanisms at radio protocol level. The key component of this system is a packet scheduling algorithm which operates on the different substreams of a main scalable video stream and which is implemented in a so-called media aware network element. The concerned type of transport channel is a dedicated channel subject to parameters (bitrate, loss rate variations on the long run. Moreover, we propose a combined scalability approach in which common temporal and SNR scalability features can be used jointly with a partitioning of the image into regions of interest. Simulation results show that our approach provides substantial quality gain compared to classical packet transmission methods and they demonstrate how ROI coding combined with SNR scalability allows to improve again the visual quality.

  5. Improving Feature Representation Based on a Neural Network for Author Profiling in Social Media Texts.

    Science.gov (United States)

    Gómez-Adorno, Helena; Markov, Ilia; Sidorov, Grigori; Posadas-Durán, Juan-Pablo; Sanchez-Perez, Miguel A; Chanona-Hernandez, Liliana

    2016-01-01

    We introduce a lexical resource for preprocessing social media data. We show that a neural network-based feature representation is enhanced by using this resource. We conducted experiments on the PAN 2015 and PAN 2016 author profiling corpora and obtained better results when performing the data preprocessing using the developed lexical resource. The resource includes dictionaries of slang words, contractions, abbreviations, and emoticons commonly used in social media. Each of the dictionaries was built for the English, Spanish, Dutch, and Italian languages. The resource is freely available.

  6. Bandwidth Impacts of Localizing Peer-to-Peer IP Video Traffic in Access and Aggregation Networks

    Directory of Open Access Journals (Sweden)

    Kerpez Kenneth

    2008-01-01

    Full Text Available Abstract This paper examines the burgeoning impact of peer-to-peer (P2P traffic IP video traffic. High-quality IPTV or Internet TV has high-bandwidth requirements, and P2P IP video could severely strain broadband networks. A model for the popularity of video titles is given, showing that some titles are very popular and will often be available locally; making localized P2P attractive for video titles. The bandwidth impacts of localizing P2P video to try and keep traffic within a broadband access network area or within a broadband access aggregation network area are examined. Results indicate that such highly localized P2P video can greatly lower core bandwidth usage.

  7. Making Dutch Pupils Media Conscious: Preadolescents' Self-Assessment of Possible Media Risks and the Need for Media Education

    Science.gov (United States)

    Kuter-Luks, Theresa; Heuvelman, Ard; Peters, Oscar

    2011-01-01

    Despite clear European and Dutch policies about media education, there is currently no media education curriculum in Dutch schools. A survey among preadolescents (n = 257) in six primary schools in the Netherlands included questions regarding media access, fears, risks, parental mediation of television and the internet, and the need for media…

  8. Youth media lifestyles

    NARCIS (Netherlands)

    van Kruistum, Claudia; Leseman, Paul Pm; de Haan, Mariëtte

    2014-01-01

    In this article, the concept of "media lifestyles" is adopted in order to develop a comprehensive approach toward youth engagement in communication media. We explore how 503 Dutch eighth grade students with full access to new technology combine a broad range of media by focusing on their engagement

  9. Access to specific social resources across different social media : divergent consequences of the time spent with new contacts

    NARCIS (Netherlands)

    Matzat, U.; Sadowski, B.M.

    2015-01-01

    Despite a large number of studies on the social impact of the Internet, little is known about the specific social resources to which social media provide access. Most studies have either examined issues surrounding the question whether or not new online contacts have been established or they have

  10. Protein Solvent-Accessibility Prediction by a Stacked Deep Bidirectional Recurrent Neural Network

    Directory of Open Access Journals (Sweden)

    Buzhong Zhang

    2018-05-01

    Full Text Available Residue solvent accessibility is closely related to the spatial arrangement and packing of residues. Predicting the solvent accessibility of a protein is an important step to understand its structure and function. In this work, we present a deep learning method to predict residue solvent accessibility, which is based on a stacked deep bidirectional recurrent neural network applied to sequence profiles. To capture more long-range sequence information, a merging operator was proposed when bidirectional information from hidden nodes was merged for outputs. Three types of merging operators were used in our improved model, with a long short-term memory network performing as a hidden computing node. The trained database was constructed from 7361 proteins extracted from the PISCES server using a cut-off of 25% sequence identity. Sequence-derived features including position-specific scoring matrix, physical properties, physicochemical characteristics, conservation score and protein coding were used to represent a residue. Using this method, predictive values of continuous relative solvent-accessible area were obtained, and then, these values were transformed into binary states with predefined thresholds. Our experimental results showed that our deep learning method improved prediction quality relative to current methods, with mean absolute error and Pearson’s correlation coefficient values of 8.8% and 74.8%, respectively, on the CB502 dataset and 8.2% and 78%, respectively, on the Manesh215 dataset.

  11. Protein Solvent-Accessibility Prediction by a Stacked Deep Bidirectional Recurrent Neural Network.

    Science.gov (United States)

    Zhang, Buzhong; Li, Linqing; Lü, Qiang

    2018-05-25

    Residue solvent accessibility is closely related to the spatial arrangement and packing of residues. Predicting the solvent accessibility of a protein is an important step to understand its structure and function. In this work, we present a deep learning method to predict residue solvent accessibility, which is based on a stacked deep bidirectional recurrent neural network applied to sequence profiles. To capture more long-range sequence information, a merging operator was proposed when bidirectional information from hidden nodes was merged for outputs. Three types of merging operators were used in our improved model, with a long short-term memory network performing as a hidden computing node. The trained database was constructed from 7361 proteins extracted from the PISCES server using a cut-off of 25% sequence identity. Sequence-derived features including position-specific scoring matrix, physical properties, physicochemical characteristics, conservation score and protein coding were used to represent a residue. Using this method, predictive values of continuous relative solvent-accessible area were obtained, and then, these values were transformed into binary states with predefined thresholds. Our experimental results showed that our deep learning method improved prediction quality relative to current methods, with mean absolute error and Pearson's correlation coefficient values of 8.8% and 74.8%, respectively, on the CB502 dataset and 8.2% and 78%, respectively, on the Manesh215 dataset.

  12. Experimental demonstration of large capacity WSDM optical access network with multicore fibers and advanced modulation formats.

    Science.gov (United States)

    Li, Borui; Feng, Zhenhua; Tang, Ming; Xu, Zhilin; Fu, Songnian; Wu, Qiong; Deng, Lei; Tong, Weijun; Liu, Shuang; Shum, Perry Ping

    2015-05-04

    Towards the next generation optical access network supporting large capacity data transmission to enormous number of users covering a wider area, we proposed a hybrid wavelength-space division multiplexing (WSDM) optical access network architecture utilizing multicore fibers with advanced modulation formats. As a proof of concept, we experimentally demonstrated a WSDM optical access network with duplex transmission using our developed and fabricated multicore (7-core) fibers with 58.7km distance. As a cost-effective modulation scheme for access network, the optical OFDM-QPSK signal has been intensity modulated on the downstream transmission in the optical line terminal (OLT) and it was directly detected in the optical network unit (ONU) after MCF transmission. 10 wavelengths with 25GHz channel spacing from an optical comb generator are employed and each wavelength is loaded with 5Gb/s OFDM-QPSK signal. After amplification, power splitting, and fan-in multiplexer, 10-wavelength downstream signal was injected into six outer layer cores simultaneously and the aggregation downstream capacity reaches 300 Gb/s. -16 dBm sensitivity has been achieved for 3.8 × 10-3 bit error ratio (BER) with 7% Forward Error Correction (FEC) limit for all wavelengths in every core. Upstream signal from ONU side has also been generated and the bidirectional transmission in the same core causes negligible performance degradation to the downstream signal. As a universal platform for wired/wireless data access, our proposed architecture provides additional dimension for high speed mobile signal transmission and we hence demonstrated an upstream delivery of 20Gb/s per wavelength with QPSK modulation formats using the inner core of MCF emulating a mobile backhaul service. The IQ modulated data was coherently detected in the OLT side. -19 dBm sensitivity has been achieved under the FEC limit and more than 18 dB power budget is guaranteed.

  13. QoS Provisioning Techniques for Future Fiber-Wireless (FiWi Access Networks

    Directory of Open Access Journals (Sweden)

    Martin Maier

    2010-04-01

    Full Text Available A plethora of enabling optical and wireless access-metro network technologies have been emerging that can be used to build future-proof bimodal fiber-wireless (FiWi networks. Hybrid FiWi networks aim at providing wired and wireless quad-play services over the same infrastructure simultaneously and hold great promise to mitigate the digital divide and change the way we live and work by replacing commuting with teleworking. After overviewing enabling optical and wireless network technologies and their QoS provisioning techniques, we elaborate on enabling radio-over-fiber (RoF and radio-and-fiber (R&F technologies. We describe and investigate new QoS provisioning techniques for future FiWi networks, ranging from traffic class mapping, scheduling, and resource management to advanced aggregation techniques, congestion control, and layer-2 path selection algorithms.

  14. Media literacy and remote community development in Eastern Indonesia Region

    Science.gov (United States)

    Aras, M.

    2018-03-01

    This study focused on media literacy phenomenon and educational development of remote communities in the eastern Indonesia region. Therefore, this study used the qualitative approach. The research was done by using direct observation and depth-interview. The research results showed that (1) the media literacy phenomenon of remote community in eastern Indonesia region was apprehensive. This was due to lack of access to information or media exposure through print media, electronic media, and social media. Therefore, the implication was the education awareness of the local community. The media literacy community has a strong relation with public awareness in improving education, and (2) the role of media in the development as facilitators or means of socialization to convey messages related to sustainable development programs in Indonesia. The current media phenomenon had become a necessity, without the exception of the remote communities. The development of an area was also characterized by the increasing education of its citizen and media became one of supporting factors that can motivate the citizen in gaining knowledge. It meant that media literacy community has strong relationships with people awareness in increasing their education. The more media literate, the more people have an awareness of self-development and their region development. Therefore, in the future, there will be no more remote areas because the media network has reached all areas.

  15. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  16. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  17. A novel root-index based prioritized random access scheme for 5G cellular networks

    Directory of Open Access Journals (Sweden)

    Taehoon Kim

    2015-12-01

    Full Text Available Cellular networks will play an important role in realizing the newly emerging Internet-of-Everything (IoE. One of the challenging issues is to support the quality of service (QoS during the access phase, while accommodating a massive number of machine nodes. In this paper, we show a new paradigm of multiple access priorities in random access (RA procedure and propose a novel root-index based prioritized random access (RIPRA scheme that implicitly embeds the access priority in the root index of the RA preambles. The performance evaluation shows that the proposed RIPRA scheme can successfully support differentiated performance for different access priority levels, even though there exist a massive number of machine nodes.

  18. Brand community integration and customer satisfaction of social media network sites among students

    Directory of Open Access Journals (Sweden)

    Hayford Amegbe

    2017-11-01

    Full Text Available The aim of the study was to examine how consumers integrate into brand communities on social media network sites (SNSs and how it affects overall satisfaction of social media sites users among students. The study depends on the service-dominant logic (SDL to develop the constructs for hypotheses testing. The study used a cross-sectional survey research design. The data were col-lected using a web-based survey of university of Nairobi Students. In all, a total of 608 students participated in the survey. The data was analyzed using structural equation modeling with AMOS software. The results revealed that frequency of usage of SNSs and duration of usage positively affect the self –perceived relevance of SNSs. Also, the self-perceived relevance leads to building brand community which finally leads to customer satisfaction. The research was limited to only students of Nairobi and selecting students in itself, which is a limitation as well as limiting it to uni-versity of Nairobi. The younger or the millennial are not the only users of SNSs. We have older generations as well, who also use SNSs for various activities such as professional development among others. Understanding why consumers of social media network site would integrate brand community is seminal for both local and foreign firms doing business in a developing country. This would enable marketing practitioners to craft marketing strategies best for community brand build-ing.

  19. Media, social networking, and pediatric obesity.

    Science.gov (United States)

    Vandewater, Elizabeth A; Denis, Laurence M

    2011-12-01

    The 5 years leading up to 2011 witnessed unprecedented transformations in the technology and media available to American consumers. These changes have led to major paradigmatic shifts in the way people think about media, how they use it, and the role they expect it to play in their lives. This article discusses the new media landscape and summarizes the evidence regarding media influences on pediatric obesity. Various effects on pediatric obesity are discussed and some conclusions and implications are provided, including possibilities and future directions for clinical practice and research. Copyright © 2011. Published by Elsevier Inc.

  20. Support networks and people with physical disabilities: social inclusion and access to health services.

    Science.gov (United States)

    Holanda, Cristina Marques de Almeida; De Andrade, Fabienne Louise Juvêncio Paes; Bezerra, Maria Aparecida; Nascimento, João Paulo da Silva; Neves, Robson da Fonseca; Alves, Simone Bezerra; Ribeiro, Kátia Suely Queiroz Silva

    2015-01-01

    This study seeks to identify the formation of social support networks of people with physical disabilities, and how these networks can help facilitate access to health services and promote social inclusion. It is a cross-sectional study, with data collected via a form applied to physically disabled persons over eighteen years of age registered with the Family Health Teams of the municipal district of João Pessoa in the state of Paraíba. It was observed that the support networks of these individuals predominantly consist of family members (parents, siblings, children, spouses) and people outside the family (friends and neighbors). However, 50% of the interviewees declared that they could not count on any support from outside the family. It was observed that the support network contributes to access to the services and participation in social groups. However, reduced social inclusion was detected, due to locomotion difficulties, this being the main barrier to social interaction. Among those individuals who began to interact in society, the part played by social support was fundamental.

  1. Blurred Lines: Ethical Implications of Social Media for Behavior Analysts.

    Science.gov (United States)

    O'Leary, Patrick N; Miller, Megan M; Olive, Melissa L; Kelly, Amanda N

    2017-03-01

    Social networking has a long list of advantages: it enables access to a large group of people that would otherwise not be geographically convenient or possible to connect with; it reaches several different generations, particularly younger ones, which are not typically involved in discussion of current events; and these sites allow a cost effective, immediate, and interactive way to engage with others. With the vast number of individuals who use social media sites as a way to connect with others, it may not be possible to completely abstain from discussions and interactions on social media that pertain to our professional practice. This is all the more reason that behavior analysts attend to the contingencies specific to these tools. This paper discusses potential ethical situations that may arise and offers a review of the Behavior Analysis Certification Board (BACB) guidelines pertaining to social networking, as well as provides suggestions for avoiding or resolving potential violations relating to online social behavior.

  2. Network Plus

    Science.gov (United States)

    Bender, Walter; Chesnais, Pascal

    1988-05-01

    Over the past several years, the Electronic Publishing Group at the MIT Media Laboratory has been conducting a family of media experiments which explore a new kind of broadcast: the distribution of data and computer programs rather than pre-packaged material. This broadcast is not directed to a human recipient, but to a local computational agent acting on his behalf. In response to instructions from both the broadcaster and the reader, this agent selects from the incoming data and presents it in a manner suggestive of traditional media. The embodiment of these media experiments is a news retrieval system where the news editor has been replaced by the personal computer. A variety of both local and remote databases which operate passively as well as interac-tively are accessed by "reporters." These "reporters" are actually software interfaces, which are programmed to gather news. Ideally, they are "broadcatching" that is to say, watching all broadcast television channels, listening to all radio transmissions, and reading all newspapers, magazines, and journals. 1 A possible consequence of the synthesis of media through active processing is the merger of newspapers and television (figure 1). The result is either a newspaper with illustrations which move 2 or, conversely, print as television output. The latter is the theme of Network Plus.

  3. Factors influencing trust in media: exploring the association between media consumption and news about the 15M Movement

    OpenAIRE

    Ariadna Fernández-Planells

    2015-01-01

    Debate over consumer trust in traditional media has intensified due to theappearance of networked social movements, particularly considering media coverage ofthe protests, the emergence of alternative media and social media as informationsources. A survey was created for this study to provide insight into the associationbetween media exposure, trust and political participation in networked socialmovements, specifically among 15M Movement activists. Data is presented to show towhat extent do ...

  4. The public space of social media connected cultures of the network society

    CERN Document Server

    Tierney, Therese

    2013-01-01

    Social media is restructuring urban practices-through ad-hoc experimentation, commercial software development, and communities of participation. This book is the first to consider how practices contained within social media are situated within a larger genealogy of public space, including theories of communal identity, civitas and democracy, the fete, and self-expression. Through empirical research, the actual social practices of participants of networked publics are described and analyzed. Documenting how online counterpublics use the Internet to transmit classified photos, mobilize activists, and challenge the status quo, Tierney argues that online activities do not stop in online conversations; they are physically grounded through mobile GPS coordinates which are then transformed into activities in physical space-the street, the plaza, the places where people have traditionally gathered to demonstrate and express their opinions publicly.

  5. Constructing a two bands optical code-division multiple-access network of bipolar optical access codecs using Walsh-coded liquid crystal modulators

    Science.gov (United States)

    Yen, Chih-Ta; Huang, Jen-Fa; Chih, Ping-En

    2014-08-01

    We propose and experimentally demonstrated the two bands optical code-division multiple-access (OCDMA) network over bipolar Walsh-coded liquid-crystal modulators (LCMs) and driven by green light and red light lasers. Achieving system performance depends on the construction of a decoder that implements a true bipolar correlation using only unipolar signals and intensity detection for each band. We took advantage of the phase delay characteristics of LCMs to construct a prototype optical coder/decoder (codec). Matched and unmatched Walsh signature codes were evaluated to detect correlations among multiuser data in the access network. By using LCMs, a red and green laser light source was spectrally encoded and the summed light dots were complementary decoded. Favorable contrast on auto- and cross-correlations indicates that binary information symbols can be properly recovered using a balanced photodetector.

  6. New resource allocation scheme for cognitive relay networks with opportunistic access

    KAUST Repository

    Zafar, Ammar

    2012-06-01

    In this paper, a new resource allocation scheme to minimize Symbol Error rate (SER) for relay assisted cognitive radio networks is studied. A cognitive relay network with amplify-and-forward (AF) fixed gain relays and opportunistic access to the licensed spectrum is considered. The SER objective function and the optimization constraints are derived first. The resource allocation algorithm is then derived using the Langrangian multiplier method. Closed form expressions are derived for the source and relay powers and, symbol time. Analytical results show that the optimal power allocation follows an extended water-filling solution. © 2012 IEEE.

  7. De-optical-line-terminal hybrid access-aggregation optical network for time-sensitive services based on software-defined networking orchestration

    Science.gov (United States)

    Bai, Wei; Yang, Hui; Xiao, Hongyun; Yu, Ao; He, Linkuan; Zhang, Jie; Li, Zhen; Du, Yi

    2017-11-01

    With the increase in varieties of services in network, time-sensitive services (TSSs) appear and bring forward an impending need for delay performance. Ultralow-latency communication has become one of the important development goals for many scenarios in the coming 5G era (e.g., robotics and driverless cars). However, the conventional methods, which decrease delay by promoting the available resources and the network transmission speed, have limited effect; a new breakthrough for ultralow-latency communication is necessary. We propose a de-optical-line-terminal (De-OLT) hybrid access-aggregation optical network (DAON) for TSS based on software-defined networking (SDN) orchestration. In this network, low-latency all-optical communication based on optical burst switching can be achieved by removing OLT. For supporting this network and guaranteeing the quality of service for TSSs, we design SDN-driven control method and service provision method. Numerical results demonstrate the proposed DAON promotes network service efficiency and avoids traffic congestion.

  8. Evaluating the Impact of China’s Rail Network Expansions on Local Accessibility: A Market Potential Approach

    Directory of Open Access Journals (Sweden)

    Wenjie Wu

    2016-05-01

    Full Text Available This paper uses a market potential approach to examine the evolution of the rail transport network of China and its spatial distributional impacts on local accessibility, with a particular focus on high-speed rail improvements. Accessibility is measured by using a “market potential” function that was derived from the general equilibrium model of the economic geography literature, and is empirically calculated based on Geographical Information System (GIS techniques. A key finding, albeit from a highly stylized model, is that rail improvements may help raise territorial polarizing patterns across counties. The results point to the profound implications of railroad network expansion on the accessibility dynamics in periphery regions relative to core regions.

  9. Association Between Portable Screen-Based Media Device Access or Use and Sleep Outcomes: A Systematic Review and Meta-analysis.

    Science.gov (United States)

    Carter, Ben; Rees, Philippa; Hale, Lauren; Bhattacharjee, Darsharna; Paradkar, Mandar S

    2016-12-01

    Sleep is vital to children's biopsychosocial development. Inadequate sleep quantity and quality is a public health concern with an array of detrimental health outcomes. Portable mobile and media devices have become a ubiquitous part of children's lives and may affect their sleep duration and quality. To conduct a systematic review and meta-analysis to examine whether there is an association between portable screen-based media device (eg, cell phones and tablet devices) access or use in the sleep environment and sleep outcomes. A search strategy consisting of gray literature and 24 Medical Subject Headings was developed in Ovid MEDLINE and adapted for other databases between January 1, 2011, and June 15, 2015. Searches of the published literature were conducted across 12 databases. No language restriction was applied. The analysis included randomized clinical trials, cohort studies, and cross-sectional study designs. Inclusion criteria were studies of school-age children between 6 and 19 years. Exclusion criteria were studies of stationary exposures, such as televisions or desktop or personal computers, or studies investigating electromagnetic radiation. Of 467 studies identified, 20 cross-sectional studies were assessed for methodological quality. Two reviewers independently extracted data. The primary outcomes were inadequate sleep quantity, poor sleep quality, and excessive daytime sleepiness, studied according to an a priori protocol. Twenty studies were included, and their quality was assessed. The studies involved 125 198 children (mean [SD] age, 14.5 [2.2] years; 50.1% male). There was a strong and consistent association between bedtime media device use and inadequate sleep quantity (odds ratio [OR], 2.17; 95% CI, 1.42-3.32) (P sleep quality (OR, 1.46; 95% CI, 1.14-1.88) (P = .003, I2 = 76%), and excessive daytime sleepiness (OR, 2.72; 95% CI, 1.32-5.61) (P = .007, I2 = 50%). In addition, children who had access to (but did not use) media

  10. Hybrid Scheduling/Signal-Level Coordination in the Downlink of Multi-Cloud Radio-Access Networks

    KAUST Repository

    Douik, Ahmed

    2016-03-28

    In the context of resource allocation in cloud- radio access networks, recent studies assume either signal-level or scheduling-level coordination. This paper, instead, considers a hybrid level of coordination for the scheduling problem in the downlink of a multi-cloud radio- access network, so as to benefit from both scheduling policies. Consider a multi-cloud radio access network, where each cloud is connected to several base-stations (BSs) via high capacity links, and therefore allows joint signal processing between them. Across the multiple clouds, however, only scheduling-level coordination is permitted, as it requires a lower level of backhaul communication. The frame structure of every BS is composed of various time/frequency blocks, called power- zones (PZs), and kept at fixed power level. The paper addresses the problem of maximizing a network-wide utility by associating users to clouds and scheduling them to the PZs, under the practical constraints that each user is scheduled, at most, to a single cloud, but possibly to many BSs within the cloud, and can be served by one or more distinct PZs within the BSs\\' frame. The paper solves the problem using graph theory techniques by constructing the conflict graph. The scheduling problem is, then, shown to be equivalent to a maximum- weight independent set problem in the constructed graph, in which each vertex symbolizes an association of cloud, user, BS and PZ, with a weight representing the utility of that association. Simulation results suggest that the proposed hybrid scheduling strategy provides appreciable gain as compared to the scheduling-level coordinated networks, with a negligible degradation to signal-level coordination.

  11. Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

    Directory of Open Access Journals (Sweden)

    Ming Luo

    2018-01-01

    Full Text Available Nowadays wireless sensor network (WSN is increasingly being used in the Internet of Things (IoT for data collection, and design of an access control scheme that allows an Internet user as part of IoT to access the WSN becomes a hot topic. A lot of access control schemes have been proposed for the WSNs in the context of the IoT. Nevertheless, almost all of these schemes assume that communication nodes in different network domains share common system parameters, which is not suitable for cross-domain IoT environment in practical situations. To solve this shortcoming, we propose a more secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the Internet of Things, which allows an Internet user in a certificateless cryptography (CLC environment to communicate with a sensor node in an identity-based cryptography (IBC environment with different system parameters. Moreover, our proposed scheme achieves known session-specific temporary information security (KSSTIS that most of access control schemes cannot satisfy. Performance analysis is given to show that our scheme is well suited for wireless sensor networks in the cross-domain context of the IoT.

  12. Transformation of Traditional Marketing Communications in to Paradigms of Social Media Networking

    OpenAIRE

    Nair, T. R. Gopalakrishnan; Subramaniam, Kumarashvari

    2012-01-01

    Effective Communication for marketing is a vital field in business organizations, which is used to convey the details about their products and services to the market segments and subsequently to build long lasting customer relationships. This paper focuses on an emerging component of the integrated marketing communication, ie. social media networking, as it is increasingly becoming the trend. In 21st century, the marketing communication platforms show a tendency to shift towards innovative te...

  13. Managing Media: Segmenting Media Through Consumer Expectancies

    Directory of Open Access Journals (Sweden)

    Matt Eastin

    2014-04-01

    Full Text Available It has long been understood that consumers are motivated to media differently. However, given the lack of comparative model analysis, this assumption is without empirical validation, and thus, the orientation of segmentation from a media management perspective is without motivational grounds. Thus, evolving the literature on media consumption, the current study develops and compares models of media segmentation within the context of use. From this study, six models of media expectancies were constructed so that motivational differences between media (i.e., local and national newspapers, network and cable television, radio, and Internet could be observed. Utilizing higher order statistical analyses the data indicates differences across a model comparison approach for media motivations. Furthermore, these differences vary across numerous demographic factors. Results afford theoretical advancement within the literature of consumer media consumption as well as provide media planners’ insight into consumer choices.

  14. CLASSICAL MEDIA RELATIONS AND NEW MEDIA RELATIONS IN SPORT

    Directory of Open Access Journals (Sweden)

    Alexandru Lucian MIHAI

    2014-06-01

    Full Text Available Media relations in sport mean maintenance of networks and positive relationships with people in the media to obtain positive media exposure for a sport product (informal and formal information sessions with media representatives. Because of the pervasive influence the media has on marketing success, sport marketers must make concerted efforts to create a positive relationship between their sport event and the media. They may accomplish this by providing the media with press releases, having news conferences, having media-day events (in which the media are invited to interact with the players, coaches, and administrators, providing media guides for the respective sport events and so on. Each of these activities promotes active involvement from the media, which will subsequently contribute to relationship building with the community.

  15. Social media in otolaryngology-head and neck surgery.

    Science.gov (United States)

    Oyewumi, Modupe; Lee, John; Vescan, Allan

    2017-09-01

    The objective of this study was to assess the current use of social media tools within Canadian otolaryngology-head and neck surgery (OHNS) programs and to assess the interest within these programs to integrate social media for networking, social, and educational programs. A prospective study from September 2013 to February 2014 was performed involving residents and faculty in Canadian OHNS programs. A 26-item questionnaire was created and sent to staff and resident physicians who met the study inclusion criteria using an online survey tool (http://surveymonkey.com). There were 101 respondents for a 10% response rate. More than half (58.4%) of respondents reported use of social media for personal and/or professional matters. Residents and junior faculty physicians 39 years and younger were more likely to have social media accounts and used them more frequently than their older counterparts. Among staff physicians, pediatric otolaryngologists had the highest rate of use, and otologists exhibited the lowest rate. Cellular phones were the most commonly used devices to access social media sites. Fewer than 35% of social media users failed to separate their personal and professional accounts. Although OHNS trainees and practicing physicians identified the potential benefits of social media tools in their specialty, most were unsure how to apply these tools to their practice. Ours is the first study to assess social media use in OHNS. Otolaryngologists are currently using social media; however, their application as a communication and educational tool in otolaryngology remains to be defined.

  16. Access, engagement, networks, and norms: Dimensions of social capital at work in a first grade classroom

    Science.gov (United States)

    Wexler-Robock, Stephanie

    Social capital refers to access and use of resources available through one's networks to solve problems, and the norms that reflect inclusive or exclusive access to those networks and resources. Research has found positive relationships between social capital, academic achievement, and attainment. Studies, however, have generally examined social capital through factors that occur outside the classroom; students who have social capital, acquired through their family and community relationships, seem to be more successful academically. Limited research has explored what if any factors within the classroom might impact the production, and nature of social capital, or its workings in a classroom. The purpose of this study was to explore the workings and nature of classroom social capital, including its possible relationships to engagement and cognition among 5 student participants. Using methods of qualitative data collection, mixed methods were used to analyze information resources, participants' networking, student work, and classroom discourse. Eight interdependent networking factors and 3 overarching patterns of norms were discovered. The networking factors reflected the structure, content, processes, purposes, and acceptability of participants' networking. The norms, also working interdependently, appeared to promote or inhibit among other things, engagement in networking, help seeking, access, sharing, and intertextual use of diverse, often complex sources of information. Through interaction of the 8 factors and 3 overarching norms, ongoing outcomes of networking appeared to include the creation of bridging (inclusive) and bonding (exclusive) forms of social capital, and depth of scientific conceptual understanding, in this case, about birds. Bridging social capital appeared related to willingness to engage in strong and weak tie networking, help seeking, intertextuality, and possibly to mastery goal orientation for all participants, regardless of reading level

  17. MIXING SOCIAL INTO SOCIAL MEDIA: ON-LINE NETWORKING IS TRANSFORMING THE WAY OF BUSINESS ALL OVER THE GLOBE

    Directory of Open Access Journals (Sweden)

    Adriana Manolică

    2011-09-01

    Full Text Available In last three years, we are witnessing an explosion on social media scene: more and more actors, spectacular growth. So, the social media phenomena cannot be ignored and it is global. Now, in 2011, Facebook is bigger than ever - the most visited site on the Internet. The popularity of social networks like Facebook, Twitter and YouTube, together with the growth of social technologies like blogs and wikis, presents a huge opportunity for marketers. This paper aims to present some facts about social-media users and about its incidence in Romania.

  18. Pore network modeling of drainage process in patterned porous media: a quasi-static study

    KAUST Repository

    Zhang, Tao

    2015-04-17

    This work represents a preliminary investigation on the role of wettability conditions on the flow of a two-phase system in porous media. Since such effects have been lumped implicitly in relative permeability-saturation and capillary pressure-saturation relationships, it is quite challenging to isolate its effects explicitly in real porous media applications. However, within the framework of pore network models, it is easy to highlight the effects of wettability conditions on the transport of two-phase systems. We employ quasi-static investigation in which the system undergo slow movement based on slight increment of the imposed pressure. Several numerical experiments of the drainage process are conducted to displace a wetting fluid with a non-wetting one. In all these experiments the network is assigned different scenarios of various wettability patterns. The aim is to show that the drainage process is very much affected by the imposed pattern of wettability. The wettability conditions are imposed by assigning the value of contact angle to each pore throat according to predefined patterns.

  19. Nonadditivity of quantum capacities of quantum multiple-access channels and the butterfly network

    International Nuclear Information System (INIS)

    Huang Peng; He Guangqiang; Zhu Jun; Zeng Guihua

    2011-01-01

    Multipartite quantum information transmission without additional classical resources is investigated. We show purely quantum superadditivity of quantum capacity regions of quantum memoryless multiple-access (MA) channels, which are not entanglement breaking. Also, we find that the superadditivity holds when the MA channel extends to the quantum butterfly network, which can achieve quantum network coding. The present widespread effects for the channels which enable entanglement distribution have not been revealed for multipartite scenarios.

  20. Cost- and reliability-oriented aggregation point association in long-term evolution and passive optical network hybrid access infrastructure for smart grid neighborhood area network

    Science.gov (United States)

    Cheng, Xiao; Feng, Lei; Zhou, Fanqin; Wei, Lei; Yu, Peng; Li, Wenjing

    2018-02-01

    With the rapid development of the smart grid, the data aggregation point (AP) in the neighborhood area network (NAN) is becoming increasingly important for forwarding the information between the home area network and wide area network. Due to limited budget, it is unable to use one-single access technology to meet the ongoing requirements on AP coverage. This paper first introduces the wired and wireless hybrid access network with the integration of long-term evolution (LTE) and passive optical network (PON) system for NAN, which allows a good trade-off among cost, flexibility, and reliability. Then, based on the already existing wireless LTE network, an AP association optimization model is proposed to make the PON serve as many APs as possible, considering both the economic efficiency and network reliability. Moreover, since the features of the constraints and variables of this NP-hard problem, a hybrid intelligent optimization algorithm is proposed, which is achieved by the mixture of the genetic, ant colony and dynamic greedy algorithm. By comparing with other published methods, simulation results verify the performance of the proposed method in improving the AP coverage and the performance of the proposed algorithm in terms of convergence.